Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

220-1202 Questions and Answers

Question # 6

A town clerk wants to work from home and access documents on a town hall server. What should a technician set up?

A.

VNC

B.

RDP

C.

VPN

D.

SSH

Full Access
Question # 7

Which of the following is used to store passwords in macOS?

A.

FileVault

B.

Keychain

C.

Accessibility

D.

Mission Control

Full Access
Question # 8

A technician needs to map a shared drive from a command-line interface. Which of the following commands should the technician use?

A.

pathping

B.

nslookup

C.

net use

D.

tracert

Full Access
Question # 9

After a user installs a mobile application from an advertisement, the phone's battery dies a few hours later, and it is hot to the touch, even when not in use. Which of the following should a technician do first?

A.

Check for unauthorized device administrators

B.

Contact the software developer

C.

Run a mobile malware scan on the phone

D.

Ensure appropriate MDM policies are applied

Full Access
Question # 10

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide to the management team?

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 11

A technician is setting up a Windows server to allow remote desktop connections for multiple users. Which of the following should the technician configure on the workstation?

A.

Firewall

B.

Computer Management

C.

User Accounts

D.

Ease of Access

Full Access
Question # 12

Various alerts on a user's Windows 11 laptop are continually interrupting videoconference calls. Which of the following should a support technician recommend to best solve the issue?

A.

Use multiple sound output devices for the various source applications

B.

Disable all notifications in different applications in the order they appear

C.

Configure the Sounds option in Control Panel to be set to No Sounds

D.

Set Windows Notifications settings to Do Not Disturb

Full Access
Question # 13

Which of the following provides information to employees, such as permitted activities when using the organization's resources?

A.

AUP

B.

MNDA

C.

DRM

D.

EULA

Full Access
Question # 14

An employee is trying to connect their company laptop to an airport’s Wi-Fi during a business trip. Once the network is connected, a pop-up window appears with the airport logo, which the employee quickly closes. The internet connection is not working properly. Which of the following should a help desk technician suggest?

A.

Look for a wall socket with RJ45 and try to connect the laptop to it

B.

Contact the airport IT department

C.

Tell the employee that company policy prohibits connection to public Wi-Fi

D.

Reconnect to the network and read the pop-up carefully

Full Access
Question # 15

A user is unable to upload files to the corporate servers from their mobile phone when outside the office, but uploading files works without issue in the office. The user saw an error notification but dismissed it. Which of the following should a technician do to determine the root cause?

A.

Check the data usage limit

B.

Enable airplane mode

C.

Verify the last device reboot

D.

Enable Bluetooth connectivity

Full Access
Question # 16

A computer technician is implementing a solution to support a new internet browsing policy for a customer's business. The policy prohibits users from accessing unauthorized websites based on categorization. Which of the following should the technician configure on the SOHO router?

A.

Secure management access

B.

Group Policy Editor

C.

Content filtering

D.

Firewall

Full Access
Question # 17

What is the next step a technician should take after completing malware cleanup?

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Full Access
Question # 18

An organization is experiencing an increased number of issues. A technician notices applications that are not installed by default. Users are reporting an increased number of system prompts for software licensing. Which of the following would the security team most likely do to remediate the root cause?

A.

Deploy an internal PKI to filter encrypted web traffic.

B.

Remove users from the local admin group.

C.

Implement stronger controls to block suspicious websites.

D.

Enable stricter UAC settings on Windows.

Full Access
Question # 19

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Full Access
Question # 20

Which of the following filesystems supports read and write operations for Windows, macOS, and Linux?

A.

exFAT

B.

ReFS

C.

NTFS

D.

APFS

E.

ext4

Full Access
Question # 21

Which of the following is used to detect and record access to restricted areas?

A.

Bollards

B.

Video surveillance

C.

Badge readers

D.

Fence

Full Access
Question # 22

What is found in an MSDS (Material Safety Data Sheet) for a battery backup?

A.

Installation instructions

B.

Emergency procedures

C.

Configuration steps

D.

Voltage

Full Access
Question # 23

Which of the following describes an attack in which an attacker sets up a rogue AP that tricks users into connecting to the rogue AP instead of the legitimate network?

A.

Stalkerware

B.

Evil twin

C.

Tailgating

D.

Shoulder surfing

Full Access
Question # 24

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 25

A technician is 3-D printing high-strength, carbon fiber-based filament parts for a customer order. Which of the following is the most important for the technician to use?

A.

Steel-toed boots

B.

Air filter mask

C.

ESD mat

D.

Antistatic bags

Full Access
Question # 26

Which of the following concepts should a technician consider when discussing confidential work projects with individuals outside the company?

A.

EULA

B.

EOL

C.

SLA

D.

NDA

Full Access
Question # 27

An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches. Which of the following is the most likely reason?

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Full Access
Question # 28

Which of the following is used to apply corporate restrictions on an Apple device?

A.

App Store

B.

VPN configuration

C.

Apple ID

D.

Management profile

Full Access
Question # 29

A secretary receives an email from the CEO requesting immediate vendor payment. Later, the CEO says they never sent it. Which social engineering tactic is this?

A.

Evil twin

B.

Impersonation

C.

Whaling

D.

Spear phishing

Full Access
Question # 30

A desktop technician is mapping a remote Windows share \\WinNAS\shared as local drive Z:. Which command should the technician run?

A.

nslookup -opt 3: \WinNAS\shared

B.

net use 3: \WinNAS\shared

C.

chkdsk /R 2: \WinNAS\shared

D.

sfc /offwindir 3: \WinNAS\shared

Full Access
Question # 31

A user decides to switch to Windows from Linux and is trying to migrate data using an external USB hard disk. However, when the user connects the cable to the Windows machine, an error message appears stating the device must be formatted before it can be used. The hard disk works as expected when connected to the Linux machine. Which of the following should the user do to resolve this issue?

A.

Configure Windows firewall to allow data from Linux systems

B.

Replace the cable with Windows-supported hardware

C.

Apply a firmware update from the PC manufacturer

D.

Update the file allocation system to exFAT

Full Access
Question # 32

Which of the following are system folders on macOS? (Select two)

A.

Applications

B.

Spotlight

C.

Time Machine

D.

Library

E.

FileVault

F.

iCloud

Full Access
Question # 33

After completing malware removal steps, what is the next step the technician should take?

A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs

Full Access
Question # 34

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 35

A Chief Executive Officer wants to meet with remote employees in a way that will allow for communication and training. Which of the following software technologies is the best for this situation?

A.

Videoconferencing

B.

Screen sharing

C.

Remote Desktop

D.

Virtual desktop infrastructure

Full Access
Question # 36

A technician needs to download and install a new web browser on a desktop. Which attribute should be used to verify the installer's authenticity?

A.

Date

B.

Hash

C.

Size

D.

Name

Full Access
Question # 37

When a corporate laptop is connected to the company network, it can reach external websites. However, it cannot reach any internal websites, displaying the error message “Cannot reach this page.” Which of the following should a technician configure?

A.

Subnet mask

B.

DNS settings

C.

Default gateway

D.

DHCP

Full Access
Question # 38

A company would like to deploy baseline images to new computers as they are started up on the network. Which of the following boot processes should the company use for this task?

A.

ISO

B.

Secure

C.

USB

D.

PXE

Full Access
Question # 39

A help desk team was alerted that a company-owned cell phone has an unrecognized password-cracking application. Which of the following should the help desk team do to prevent further unauthorized installations from occurring?

A.

Configure Group Policy.

B.

Implement PAM.

C.

Install anti-malware software.

D.

Deploy MDM.

Full Access
Question # 40

Why would a network engineering team provide a help desk technician with IP addresses for a wired network segment?

A.

Only specific DNS servers are allowed outbound.

B.

The network allow list is set to a specific address.

C.

DHCP is not enabled for this subnet.

D.

NAC servers only allow security updates to be installed.

Full Access
Question # 41

Performance on a user’s smartphone is degrading. Applications take a long time to start, and switching between windows also takes a long time. Which of the following diagnostic steps should a mobile technician take first?

A.

Restore the phone to factory settings

B.

Restart the phone

C.

Check the phone’s battery state

D.

Uninstall unneeded applications

Full Access
Question # 42

Which of the following authentication methods is the best way to prevent users from frequently entering their credentials?

A.

Access control list

B.

Single sign-on

C.

Multifactor authentication

D.

One-time password

Full Access
Question # 43

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

Full Access
Question # 44

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide?

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 45

A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer. Which of the following specifications will help the specialist determine which OS architecture to use?

A.

16GB RAM

B.

Intel i7 CPU

C.

500GB HDD

D.

1Gbps Ethernet

Full Access
Question # 46

An administrator is investigating a zero-day vulnerability. If left unpatched, it could severely impact business. The patch requires downtime. What should the administrator do?

A.

Create a standard change request.

B.

Implement an emergency change.

C.

Immediately freeze all changes.

D.

Continue operations until the next change interval.

Full Access
Question # 47

A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the following:

● All endpoints are updated and have the newest EDR signatures.

● Logs confirm that the malware was quarantined by EDR on one system.

● The potentially infected machine was reimaged.

Which of the following actions should the technician take next?

A.

Install network security tools to prevent downloading infected files from the internet

B.

Discuss the cause of the issue and educate the end user about security hygiene

C.

Flash the firmware of the router to ensure the integrity of network traffic

D.

Suggest alternate preventative controls that would include more advanced security software

Full Access