220-1102 Exam Questions

Total 739 Questions

Last Updated Exam : 7-Jul-2025

Topic 5: Exam Pool E

Which of the following is used to ensure users have the appropriate level of access to perform their job functions?


A. Access control list


B. Multifactor authentication


C. Least privilege


D. Mobile device management





C.
  Least privilege

Explanation: Least privilege is the principle that is used to ensure users have the appropriate level of access to perform their job functions. Least privilege means granting users only the minimum amount of access rights and permissions they need to perform their tasks, and nothing more. Least privilege reduces the risk of unauthorized access, data leakage, malware infection, or accidental damage by limiting what users can do on the system or network. Access control list, multifactor authentication, and mobile device management are not principles, but rather mechanisms or methods that can implement least privilege. Access control list is a list that specifies the users or groups that are allowed or denied access to a resource, such as a file, folder, or printer. Multifactor authentication is a method that requires users to provide two or more pieces of evidence to prove their identity, such as a password, a token, or a biometric factor. Mobile device management is a tool that allows managing and securing mobile devices, such as smartphones or tablets, that are used by employees to access corporate data or applications.

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?


A. Time drift


B. Dual in-line memory module failure


C. Application crash


D. Filesystem errors





A.
  Time drift

Explanation:
The most likely cause of the issue is a “time drift”. Time drift occurs when the clock on a computer is not synchronized with the clock on the domain controller. This can cause authentication problems when a user tries to log in to the domain. The fact that the technician is unable to browse to the secure intranet site to get troubleshooting tools suggests that there may be a problem with the network connection or the firewall settings on the desktop PC12.

A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?


A. Phishing


B. Dumpster diving


C. Tailgating


D. Evil twin





D.
  Evil twin

A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason?


A. The domain's processor compatibility is not met


B. The laptop has Windows 10 Home installed


C. The laptop does not have an onboard Ethernet adapter


D. The Laptop does not have all current Windows updates installed





C.
  The laptop does not have an onboard Ethernet adapter

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?


A. Scope of change


B. Risk level


C. Rollback plan


D. End user acceptance





C.
  Rollback plan

Explanation:
The rollback plan should be updated before requesting approval again. A rollback plan is a plan for undoing a change if it causes problems, and it is an important part of any change management process. If the change advisory board did not approve the requested change due to the lack of alternative actions if implementation failed, then updating the rollback plan would be the best way to address this concern.

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).


A. NIC


B. CPU


C. PSU


D. KVM


E. RAM


F. DVI





A.
  NIC

B.
  CPU

Explanation: The Hardware Compatibility List (HCL) is a list that indicates hardware components that are compatible with a specific software or operating system. If software installation fails due to incompliance with the HCL, it's most likely due to core hardware components like the Network Interface Card (NIC) or the Central Processing Unit (CPU) not being supported or not meeting the software's minimum hardware requirements. The PSU, KVM, RAM, and DVI are less likely to directly impact software compatibility as defined by the HCL.

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?


A. Quarantining system files


B. Reimaging the workstation


C. Encrypting the hard drive


D. Disabling TLS 1.0 support





C.
  Encrypting the hard drive

Explanation:
Encrypting the hard drive would most likely resolve the issue.

Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?


A. Network and Sharing Center


B. Programs and Features


C. Default Apps


D. Add or Remove Programs





C.
  Default Apps

Explanation:
Default Apps should be used to ensure all PDF files open in Adobe Reader.

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?


A. Continue researching the issue


B. Repeat the iterative processes


C. Inform the CEO the repair will take a couple of weeks


D. Escalate the ticket





D.
  Escalate the ticket

Explanation:
The technician should escalate the ticket to ensure that the CEO’s device is returned as soon as possible.

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?


A. RDP


B. VNC


C. SSH


D. VPN





B.
  VNC

Explanation:
VNC will allow a technician to see the issue along with the user when an organization is centralizing support functions and requires the ability to support a remote user’s desktop.


Page 20 out of 74 Pages
Previous