220-1102 Exam Questions

Total 739 Questions

Last Updated Exam : 28-Mar-2025

Topic 5: Exam Pool E

A Linux technician needs a filesystem type that meets the following requirements:
. All changes are tracked. . The possibility of file corruption is reduced. · Data recovery is easy.
Which of the following filesystem types best meets these requirements?
ext3


A. FAT32


B. exFAT


C. NTFS





A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?


A. Degaussing


B. Standard formatting


C. Low-level wiping


D. Deleting





Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?


A. To maintain an information security policy


B. To properly identify the issue


C. To control evidence and maintain integrity


D. To gather as much information as possible





A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?


A. Content filter


B. Screened subnet


C. Port forwarding


D. Access control list





An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?


A. Risk analysis


B. Sandbox testing


C. End user acceptance


D. Lessons learned





A user's antivirus software reports an infection that it is unable to remove. Which of the following is the most appropriate way to remediate the issue?


A. Disable System Restore.


B. Utilize a Linux live disc.


C. Quarantine the infected system.


D. Update the anti-malware.





A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?


A. Disable the browser from sending notifications to the Action Center.


B. Run a full antivirus scan on the computer.


C. Disable all Action Center notifications.


D. Move specific site notifications from Allowed to Block.





When trying to access a secure internal network, the user receives an error messaging stating, "There is a problem with this website's security certificate." The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring?


A. Reimage the system and install SSL.


B. Install Trusted Root Certificate.


C. Select View Certificates and then Install Certificate.


D. Continue to access the website.





A user clicks a link in an email. A warning message in the user's browser states the site's certificate cannot be verified. Which of the following is the most appropriate action for a technician to take?


A. Click proceed.


B. Report the employee to the human resources department for violating company policy.


C. Restore the computer from the last known backup.


D. Close the browser window and report the email to IT security.





Which of the following statements describes the purpose of scripting languages? To access the hardware of the computer it is running on


A. To automate tasks and reduce the amount of manual labor


B. To abstract the complexity of the computer system


C. To compile the program into an executable file






Page 2 out of 74 Pages
Previous