220-1102 Exam Questions

Total 739 Questions

Last Updated Exam : 16-Jul-2025

Topic 2: Exam Pool B

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?


A. Requiring strong passwords


B. Disabling cached credentials


C. Requiring MFA to sign on


D. Enabling BitLocker on all hard drives





D.
  Enabling BitLocker on all hard drives

Explanation:
BitLocker is a disk encryption tool that can be used to encrypt the hard drive of a Windows laptop. This will protect the data stored on the drive in the event that the laptop is lost or stolen, and will help to reduce the risk of data loss. Additionally, BitLocker can be configured to require a PIN or other authentication in order to unlock the drive, providing an additional layer of security.

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders.


A. Turn off inheritance on the requested folder only and set the requested permissions to each file manually.


B. Turn off inheritance at the top-level folder and remove all inherited permissions.


C. Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.


D. Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.





D.
  Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Explanation: Turning off inheritance on the specific folder requested by the manager and setting the requested permissions, followed by turning on inheritance under the child folders, ensures that only the immediate team has access to the confidential material while maintaining the broader permissions structure for other folders and files. This action isolates the folder's permissions from the top-level inheritance, providing a focused security measure for sensitive content.

A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely make this change?


A. Registry Editor


B. Task Manager


C. Event Viewer


D. Local Users and Groups





B.
  Task Manager

Explanation:
The technician would most likely use the Task Manager tool to safely make this change12 The Task Manager tool can be used to disable applications from starting automatically on Windows 10.
The tool that a technician would most likely use to stop an application from automatically starting when a user logs in to a Windows 10 system is the Task Manager. The Task Manager can be used to view and manage processes, including those that are set to automatically start when a user logs in to the system.

A user reports that an Android mobile device takes a long time to boot, and all applications crash when launched. The user installed the applications from a third-party website. Which of the following steps should the technician complete to diagnose the issue?


A. Scan the system for malware.


B. Clear the web browser cache.


C. Enroll the device in an MDM system.


D. Confirm the compatibility of the applications with the OS.





A.
  Scan the system for malware.

Explanation: When an Android device experiences slow boot times and application crashes after installing apps from a third-party website, scanning the system for malware is a critical first step. Third-party sources can often host malicious software that can compromise device performance and security. A malware scan can identify and remove such threats, potentially resolving the performance issues and application instability. Clearing the web browser cache, enrolling the device in an MDM system, and confirming app compatibility are useful steps but do not address the immediate concern of potential malware introduced by third-party app installations.

Which of the following commands lists running processes in Linux?


A. top


B. apt-get


C. Is


D. cat





A.
  top

Explanation: The 'top' command in Linux is used to display the running processes along with information about system resources like CPU and memory usage. It provides a real-time view of the system's resource consumption, making it an essential tool for monitoring and managing system performance.

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).


A. A new IT policy requires users to set up a lock screen PIN.


B. A user is overseas and wants to use a compatible international SIM Card.


C. A user left the phone at home and wants to prevent children from gaining access to the phone.


D. A user traded in the company phone for a cell carrier upgrade by mistake.


E. A user cannot locate the phone after attending a play at a theater.


F. A user forgot the phone in a taxi, and the driver called the company to return the device.





E.
  A user cannot locate the phone after attending a play at a theater.

F.
  A user forgot the phone in a taxi, and the driver called the company to return the device.

Explanation:
Remote wipe capabilities are used to erase all data on a mobile device remotely. This can be useful in situations where a device is lost or stolen, or when sensitive data needs to be removed from a device. Remote wipe capabilities are most likely to be used in the following scenarios:
E. A user cannot locate the phone after attending a play at a theater. F. A user forgot the phone in a taxi, and the driver called the company to return the device1.
In scenario E, remote wipe capabilities would be used to prevent unauthorized access to the device and to protect sensitive data. In scenario F, remote wipe capabilities would be used to erase all data on the device before it is returned to the user.

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:
"This site cannot be reached."
A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?


A. HTTPS


B. VLAN


C. DNS


D. SMTP





C.
  DNS

A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems. Which of the following is the MOST effective method for dealing with this Issue?


A. Adjusting the spam gateway


B. Updating firmware for the spam appliance


C. Adjusting AV settings


D. Providing user training





D.
  Providing user training

The most effective method for dealing with spam messages in a small business is to provide user training1. Users should be trained to recognize spam messages and avoid opening them1. They should also be trained to report spam messages to the IT department so that appropriate action can be taken1. In addition, users should be trained to avoid clicking on links or downloading attachments from unknown sources1. By providing user training, the management team can reduce the risk of users opening spam messages and potentially infecting the network systems1.

A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with?


A. Device


B. Business


C. Network


D. Operation





B.
  Business

Explanation: The IT manager's caution regarding the new applications not having a detrimental effect on company finances points directly to concerns about the business impact. This encompasses potential costs associated with upgrading legacy systems, compatibility issues that might arise from running new applications on old infrastructure, and the risks of system downtime or reduced performance affecting business operations. The focus here is on ensuring that the integration of new applications into the legacy system does not incur unexpected expenses or disrupt critical business processes.

An employee using an Apple MacBook is receiving frequent, random pop-up requests from other Apple devices wanting to share photos and videos and asking whether the user would like to accept the request Which of the following configurations should the technician advise the user to change first"?


A. Wi-Fi


B. iCloud


C. Antivirus


D. AirDrop





D.
  AirDrop

Explanation: AirDrop is a feature on Apple devices that allows users to wirelessly share files, photos, and videos with nearby Apple devices. If the MacBook is receiving unsolicited AirDrop requests, adjusting the AirDrop settings to allow sharing with contacts only or turning it off completely can help prevent these random pop-up requests.


Page 26 out of 74 Pages
Previous