220-1102 Exam Questions

Total 739 Questions

Last Updated Exam : 16-Dec-2024

Topic 1: Exam Pool A

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?


A. Remote wipe


B. Anti-maIware


C. Device encryption


D. Failed login restrictions





A.
  Remote wipe

Explanation:
The feature that BEST addresses the user’s concern is remote wipe. This is because remote wipe allows the user to erase all data on the mobile device if it is lost or stolen, which will prevent unauthorized access to the device1.

A user is unable to access a remote server from a corporate desktop computer using the appropriate terminal emulation program. The user contacts the help desk to report the issue. Which of the following clarifying questions would be most effective for the help desk technician to ask the user in order to understand the issue?


A. What is the error message?


B. Does the program work on another computer?


C. Did the program ever work?


D. Is anyone else having this issue?





A.
  What is the error message?

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:


A. set AirDrop so that transfers are only accepted from known contacts


B. completely disable all wireless systems during the flight


C. discontinue using iMessage and only use secure communication applications


D. only allow messages and calls from saved contacts





A.
  set AirDrop so that transfers are only accepted from known contacts

To best resolve this issue, the executive should set AirDrop so that transfers are only accepted from known contacts (option A). AirDrop is a feature on iOS devices that allows users to share files, photos, and other data between Apple devices. By setting AirDrop so that it only accepts transfers from known contacts, the executive can ensure that unwanted files and photos are not sent to their device. Additionally, the executive should ensure that the AirDrop setting is only enabled when it is necessary, as this will protect their device from any unwanted files and photos.

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems? Turn off the machine.


A. Run a full antivirus scan.


B. Remove the LAN card.


C. Install a different endpoint solution





A.
  Run a full antivirus scan.

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?


A. Configure the network as private


B. Enable a proxy server


C. Grant the network administrator role to the user


D. Create a shortcut to public documents





A.
  Configure the network as private

Explanation:
The technician should configure the network as private to allow the user to access files on a drive shared from another desktop on the network1.

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?


A. .bat


B. .dll


C. .ps1


D. .txt





A.
  .bat

Explanation: The .bat file type would be used in the Windows Startup folder to automate copying a personal storage table (.pst) file to a network drive at log-in. A .bat file is a batch file that contains a series of commands that can be executed by the command interpreter. A .bat file can be used to perform various tasks, such as copying, moving, deleting, or renaming files or directories. A .bat file can be placed in the Windows Startup folder to run automatically when a user logs in to the system. A .bat file can use the copy command to copy a .pst file from a local drive to a network drive. A .pst file is a personal storage table file that contains email messages, contacts, calendars, and other data from Microsoft Outlook. A .pst file can be backed up to a network drive for security or recovery purposes. The .dll, .ps1, and .txt file types are not used in the Windows Startup folder to automate copying a .pst file to a network drive at log-in. A .dll file is a dynamic link library file that contains code or data that can be shared by multiple programs. A .dll file cannot be executed directly by the user or the system. A .ps1 file is a PowerShell script file that contains commands or expressions that can be executed by the PowerShell interpreter. A .ps1 file can also perform various tasks, such as copying files or directories, but it requires PowerShell to be installed and configured on the system. A .txt file is a plain text file that contains unformatted text that can be read by any text editor or word processor. A .txt file cannot contain commands or expressions that can be executed by the system.

Which of the following Linux commands would be used to install an application?


A. yum


B. grep


C. Is


D. sudo





D.
  sudo

Explanation:
The Linux command used to install an application is sudo. The sudo command allows users to run programs with the security privileges of another user, such as the root user. This is necessary to install applications because it requires administrative privileges1.

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?


A. Rights management


B. Audit trail


C. Chain of custody


D. Data integrity





C.
  Chain of custody

Explanation:
The process of documenting who had possession of evidence at every step of the process is called chain of custody.

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?


A. Install and run Linux and the required application in a PaaS cloud environment


B. Install and run Linux and the required application as a virtual machine installed under the Windows OS


C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed


D. Set up a dual boot system by selecting the option to install Linux alongside Windows





B.
  Install and run Linux and the required application as a virtual machine installed under the Windows OS

The user should install and run Linux and the required application as a virtual machine installed under the Windows OS. This solution would allow for parallel execution of the Linux application and Windows applications2.
The MOST efficient solution that allows for parallel execution of the Linux application and Windows applications is to install and run Linux and the required application as a virtual machine installed under the Windows OS. This is because it allows you to run both Linux and Windows together without the need to keep the Linux portion confined to a VM window3.

Which of the following is a proprietary Cisco AAA protocol?


A. TKIP


B. AES


C. RADIUS


D. TACACS+





D.
  TACACS+

Explanation:
TACACS+ is a proprietary Cisco AAA protocol.


Page 7 out of 74 Pages
Previous