220-1102 Exam Questions

Total 739 Questions

Last Updated Exam : 7-Jul-2025

Topic 6, Exam Pool F

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).


A. Degauss


B. Delete


C. Incinerate


D. Recycle


E. Format


F. Shred





C.
  Incinerate

F.
  Shred

Which of the following features can be used to ensure a user can access multiple versions of files?


A. Multiple desktops


B. Remote Disc


C. Time Machine


D. FileVault





C.
  Time Machine

Explanation: Time Machine is a backup feature available in macOS that automatically makes hourly backups for the past 24 hours, daily backups for the past month, and weekly backups for all previous months to an external drive or NAS. It allows users to recover the entire system or specific files from any point in time, ensuring access to multiple versions of files. This feature is particularly useful for reverting to earlier versions of a document or recovering a file that has been accidentally deleted or altered. The other options, such as Multiple Desktops, Remote Disc, and FileVault, do not provide versioning capabilities for file access.

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?


A. Changing channels


B. Modifying the wireless security


C. Disabling the SSIO broadcast


D. Changing the access point name





A.
  Changing channels

Explanation:
Changing channels can best resolve interference from other nearby SSIDs. Wireless networks operate on different channels, and changing the channel can help to avoid interference from other nearby networks.

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?


A. Request physical media


B. Mount the ISO file.


C. Install a third-party software.


D. Download an appropriate 32-bit/64-bit OS file.





B.
  Mount the ISO file.

Explanation: If a technician is unable to run an OS installation file and receives a message indicating no software is installed to handle the file, the next step is to mount the ISO file. Mounting the ISO will create a virtual drive from which the installation can be run, mimicking the behavior of a physical installation media.

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?


A. Lock all devices in a closet


B. Ensure all devices are from the same manufacturer.


C. Change the default administrative password


D. Install the latest operating system and patches





C.
  Change the default administrative password

Explanation:
The technician should change the default administrative password FIRST to ensure the network equipment is secured against external threats on the Internet. Changing the default administrative password is a basic security measure that can help prevent unauthorized access to the network equipment. Locking all devices in a closet is a physical security measure that can help prevent theft or damage to the devices, but it does not address external threats on the Internet. Ensuring all devices are from the same manufacturer is not a security measure and does not address external threats on the Internet. Installing the latest operating system and patches is important for maintaining the security of the network equipment, but it is not the first action the technician should take.

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?


A. Move the application to the desktop and press delete


B. Identify the application in Finder and drag it to the trash can.


C. Use Spotlight to search for the application, and then run the application.


D. Use Time Machine to go back to the date before the installation.





B.
  Identify the application in Finder and drag it to the trash can.

Explanation: On macOS, uninstalling an application typically involves locating the app in Finder and dragging it to the Trash. This method is straightforward and commonly used for removing unwanted applications. The other options do not directly relate to the standard process of uninstalling applications on a Mac.

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?


A. Degaussing


B. Low-level formatting


C. Recycling


D. Shredding





D.
  Shredding

Explanation:
Shredding is the most effective method to securely dispose of data stored on optical discs12
References: 4. How Can I Safely Destroy Sensitive Data CDs/DVDs? - How-To Geek.
Retrieved from https://www.howtogeek.com/174307/how-can-i-safely-destroy-sensitivedata- cdsdvds/ 5. Disposal — UK Data Service. Retrieved from https://ukdataservice.ac.uk/learning-hub/research-data-management/store-yourdata/ disposal/

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?


A. SSH


B. MDM


C. RDP


D. SFTP





B.
  MDM

Explanation: For updating software on several hundred Mac laptops, the best method is Mobile Device Management (MDM). MDM solutions allow administrators to remotely manage and update software across multiple devices efficiently, making it an ideal choice for handling software updates on a large scale.

A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).


A. Utilizing an ESD strap


B. Disconnecting the computer from the power source


C. Placing the PSU in an antistatic bag


D. Ensuring proper ventilation


E. Removing dust from the ventilation fans


F. Ensuring equipment is grounded





A.
  Utilizing an ESD strap

C.
  Placing the PSU in an antistatic bag

Explanation:
The two safety procedures that would best protect the components in the PC are:

  • Utilizing an ESD strap
  • Placing the PSU in an antistatic bag

A user is experiencing the following issues with Bluetooth on a smartphone:

•The user cannot hear any sound from a speaker paired with the smartphone.
•The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?


A. Restart the smartphone.


B. Reset the network settings.


C. Unpair the Bluetooth speaker.


D. Check for system updates.





A.
  Restart the smartphone.


Page 22 out of 74 Pages
Previous