This page was exported from PassLeader Premium VCE and PDF Exam Dumps For Free
[
https://www.vcedumps.net
]
Export date: Mon Mar 25 0:14:48 2024 / +0000 GMT
New Updated 220-1002 Exam Questions from PassLeader 220-1002 PDF dumps! Welcome to download the newest PassLeader 220-1002 VCE dumps: https://www.passleader.com/220-1002.html (196 Q&As) Keywords: 220-1002 exam dumps, 220-1002 exam questions, 220-1002 VCE dumps, 220-1002 PDF dumps, 220-1002 practice tests, 220-1002 study guide, 220-1002 braindumps, CompTIA A+ Exam P.S. New 220-1002 dumps PDF: https://drive.google.com/open?id=13vUuTATazaO0hrkrQIRv_mOwcbXT2Q-o P.S. New 220-1001 dumps PDF: https://drive.google.com/open?id=1KD6v_bQbnkkLIMvXS92fI1YvddfkgQRh NEW QUESTION 163 A. AES Answer: A NEW QUESTION 164 A. Files disappearing. Answer: D NEW QUESTION 165 A. Use full device encryption. Answer: AC NEW QUESTION 166 A. Provide documentation of the repair to the customer. Answer: A NEW QUESTION 167 A. Installation method Answer: B NEW QUESTION 168 A. Biometric device Answer: D NEW QUESTION 169 A. Unattended installation Answer: A NEW QUESTION 170 A. Drill Answer: D NEW QUESTION 171 A. Implementing strong passwords Answer: C NEW QUESTION 172 A. WPA2 Answer: D NEW QUESTION 173 A. Resolution Answer: A NEW QUESTION 174 A. Screen locks Answer: ABG NEW QUESTION 175 A. PHI certification Answer: B NEW QUESTION 176 A. chkdsk Answer: C NEW QUESTION 177 A. Preserve data integrity. Answer: A NEW QUESTION 178 A. Mylar bags Answer: C NEW QUESTION 179 A. Promptly notify the administrator's immediate supervisor. Answer: A NEW QUESTION 180 A. Degauss Answer: B NEW QUESTION 181 A. Access control lists Answer: BD NEW QUESTION 182 A. RDP Answer: B NEW QUESTION 183 A. GPT Answer: A NEW QUESTION 184 A. phishing Answer: D NEW QUESTION 185 A. Backout plan Answer: D NEW QUESTION 186 A. Create a risk analysis report for review. Answer: B NEW QUESTION 187 A. Unattended installation Answer: D NEW QUESTION 188 A. Certificates Answer: B NEW QUESTION 189 A. Disconnect the PC from the network. Answer: A NEW QUESTION 190 A. System files have been deleted. Answer: BF NEW QUESTION 191 A. Protects against accidental static discharge. Answer: A NEW QUESTION 192 A. Device compatibility Answer: B NEW QUESTION 193 Download the newest PassLeader 220-1002 dumps from passleader.com now! 100% Pass Guarantee! 220-1002 PDF dumps & 220-1002 VCE dumps: https://www.passleader.com/220-1002.html (196 Q&As) (New Questions Are 100% Available and Wrong Answers Have Been Corrected! Free VCE simulator!) P.S. New 220-1002 dumps PDF: https://drive.google.com/open?id=13vUuTATazaO0hrkrQIRv_mOwcbXT2Q-o P.S. New 220-1001 dumps PDF: https://drive.google.com/open?id=1KD6v_bQbnkkLIMvXS92fI1YvddfkgQRh
Which of the following is the MOST secure wireless security protocol?
B. WPA
C. WPA2
D. WEP
Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?
B. File permission changes.
C. Application crash.
D. Too many startup items.
Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.)
B. Enable a pattern lock.
C. Implement remote wipe features.
D. Use device lockout policies.
E. Require complex administrator passwords.
F. Disable unknown application installations.
A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?
B. Allow the customer to voice concerns and post the story to social media later.
C. Inform the customer the job is done and return to the office.
D. Defend each step and why it was necessary.
A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook?
B. System requirements
C. OS compatibility
D. File permissions
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used?
B. Common access card
C. Cable lock
D. Privacy screen
E. Mantrap
A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10. Which of the following installation methods would the technician MOST likely use to accomplish this quickly?
B. Remote network installation
C. In-place upgrade
D. Clean installation
A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task?
B. Hammer
C. Low-level format
D. Degaussing
A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack?
B. Changing default credentials
C. Disabling AutoRun
D. Removing Guest account
E. Encrypting data
Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?
B. AES
C. MAC filtering
D. RADIUS
E. WPS
A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue?
B. Refresh rate
C. Extended monitor
D. Color depth
After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)
B. Screensaver passwords
C. UEFI passwords
D. Login time restrictions
E. Strong passwords
F. Multifactor authentication
G. BitLocker
H. Credential Manager
I. Smart card
J. Biometric authentication
A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?
B. PCI compliance
C. POTS implementation
D. PII filtering
A company's security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user's workstation?
B. netstat
C. gpupdate
D. diskpart
A user's computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT?
B. Identify violations of acceptable use.
C. Collect evidence of illegal activity.
D. Report through proper channels.
Which of the following would a technician use to store memory chips from a laptop safely after an upgrade?
B. Cardboard boxes
C. Antistatic containers
D. Paper envelopes
A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company's AUP. Which of the following would be the NEXT appropriate act?
B. Rename the folder on the server, and notify the information security officer.
C. Move the folder to another location on the server, and notify the local authorities.
D. Ask the owner to move the files from the server to a local computer.
A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?
B. Drive wipe
C. Standard format
D. Low-level format
Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)
B. Multifactor authentication
C. Organizational unit
D. Trusted software sources
E. Data loss prevention
F. Pre-shared key
A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?
B. SSH
C. TFTP
D. HTTP
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter "J" assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3TB drive?
B. Dynamic
C. Basic
D. Extended
Users notify the help desk of an email that was just received. The email came from the help desk's email address and asked the users to click on an embedded link. This email is BEST described as ____.
B. zombie
C. whaling
D. spoofing
During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware?
B. Contingency plan
C. Alternative plan
D. Backup plan
An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?
B. Submit a change order for approval.
C. Insist the worker accepts the standard desktop.
D. Document the request and place the order.
Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?
B. Remote installation
C. Repair installation
D. Image deployment installation
A new company policy states that all end-user access to network resources will be controlled based on the users' roles and responsibilities within the organization. Which of the following security concepts has the company just enabled?
B. Least privilege
C. Directory permissions
D. Blacklists
A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST?
B. Perform an antivirus scan.
C. Run a backup and restore.
D. Educate the end user.
A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Choose two.)
B. Proxy settings are configured improperly.
C. The OS has been updated recently.
D. There are disabled services on the vendor website.
E. Program file permissions have changed recently.
F. There is a rogue anti-malware program.
Which of the following BEST describes the purpose of an ESD mat?
B. Protects against dust/dirt contamination.
C. Protects against accidental scratches.
D. Protects against accidental water damage.
Which of the following is a reason to use WEP over WPA?
B. Increased security
C. TACACS
D. Multifactor authentication
......
Post date: 2019-07-15 09:12:01
Post date GMT: 2019-07-15 09:12:01
Post modified date: 2019-07-15 09:12:01
Post modified date GMT: 2019-07-15 09:12:01
Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com