This page was exported from All The Latest MCTS Exam Questions And Answers For Free Share [ https://www.mctsdump.com ] Export date:Thu Nov 21 11:01:38 2024 / +0000 GMT ___________________________________________________ Title: [15/July/2019 Updated] Testing PassLeader 220-1002 Exam Questions and Answers To 100% Pass 220-1002 Exam --------------------------------------------------- New Updated 220-1002 Exam Questions from PassLeader 220-1002 PDF dumps! Welcome to download the newest PassLeader 220-1002 VCE dumps: https://www.passleader.com/220-1002.html (196 Q&As) Keywords: 220-1002 exam dumps, 220-1002 exam questions, 220-1002 VCE dumps, 220-1002 PDF dumps, 220-1002 practice tests, 220-1002 study guide, 220-1002 braindumps, CompTIA A+ Exam P.S. New 220-1002 dumps PDF: https://drive.google.com/open?id=13vUuTATazaO0hrkrQIRv_mOwcbXT2Q-o P.S. New 220-1001 dumps PDF: https://drive.google.com/open?id=1KD6v_bQbnkkLIMvXS92fI1YvddfkgQRh NEW QUESTION 163Which of the following is the MOST secure wireless security protocol? A.    AESB.    WPAC.    WPA2D.    WEP Answer: A NEW QUESTION 164Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue? A.    Files disappearing.B.    File permission changes.C.    Application crash.D.    Too many startup items. Answer: D NEW QUESTION 165Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.) A.    Use full device encryption.B.    Enable a pattern lock.C.    Implement remote wipe features.D.    Use device lockout policies.E.    Require complex administrator passwords.F.    Disable unknown application installations. Answer: AC NEW QUESTION 166A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT? A.    Provide documentation of the repair to the customer.B.    Allow the customer to voice concerns and post the story to social media later.C.    Inform the customer the job is done and return to the office.D.    Defend each step and why it was necessary. Answer: A NEW QUESTION 167A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook? A.    Installation methodB.    System requirementsC.    OS compatibilityD.    File permissions Answer: B NEW QUESTION 168Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used? A.    Biometric deviceB.    Common access cardC.    Cable lockD.    Privacy screenE.    Mantrap Answer: D NEW QUESTION 169A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10. Which of the following installation methods would the technician MOST likely use to accomplish this quickly? A.    Unattended installationB.    Remote network installationC.    In-place upgradeD.    Clean installation Answer: A NEW QUESTION 170A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task? A.    DrillB.    HammerC.    Low-level formatD.    Degaussing Answer: D NEW QUESTION 171A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack? A.    Implementing strong passwordsB.    Changing default credentialsC.    Disabling AutoRunD.    Removing Guest accountE.    Encrypting data Answer: C NEW QUESTION 172Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources? A.    WPA2B.    AESC.    MAC filteringD.    RADIUSE.    WPS Answer: D NEW QUESTION 173A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue? A.    ResolutionB.    Refresh rateC.    Extended monitorD.    Color depth Answer: A NEW QUESTION 174After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.) A.    Screen locksB.    Screensaver passwordsC.    UEFI passwordsD.    Login time restrictionsE.    Strong passwordsF.    Multifactor authenticationG.    BitLockerH.    Credential ManagerI.    Smart cardJ.    Biometric authentication Answer: ABG NEW QUESTION 175A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need? A.    PHI certificationB.    PCI complianceC.    POTS implementationD.    PII filtering Answer: B NEW QUESTION 176A company's security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user's workstation? A.    chkdskB.    netstatC.    gpupdateD.    diskpart Answer: C NEW QUESTION 177A user's computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT? A.    Preserve data integrity.B.    Identify violations of acceptable use.C.    Collect evidence of illegal activity.D.    Report through proper channels. Answer: A NEW QUESTION 178Which of the following would a technician use to store memory chips from a laptop safely after an upgrade? A.    Mylar bagsB.    Cardboard boxesC.    Antistatic containersD.    Paper envelopes Answer: C NEW QUESTION 179A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company's AUP. Which of the following would be the NEXT appropriate act? A.    Promptly notify the administrator's immediate supervisor.B.    Rename the folder on the server, and notify the information security officer.C.    Move the folder to another location on the server, and notify the local authorities.D.    Ask the owner to move the files from the server to a local computer. Answer: A NEW QUESTION 180A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used? A.    DegaussB.    Drive wipeC.    Standard formatD.    Low-level format Answer: B NEW QUESTION 181Which of the following provide the MOST security for PCs and mobile devices? (Choose two.) A.    Access control listsB.    Multifactor authenticationC.    Organizational unitD.    Trusted software sourcesE.    Data loss preventionF.    Pre-shared key Answer: BD NEW QUESTION 182A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router? A.    RDPB.    SSHC.    TFTPD.    HTTP Answer: B NEW QUESTION 183A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter "J" assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3TB drive? A.    GPTB.    DynamicC.    BasicD.    Extended Answer: A NEW QUESTION 184Users notify the help desk of an email that was just received. The email came from the help desk's email address and asked the users to click on an embedded link. This email is BEST described as ____. A.    phishingB.    zombieC.    whalingD.    spoofing Answer: D NEW QUESTION 185During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware? A.    Backout planB.    Contingency planC.    Alternative planD.    Backup plan Answer: D NEW QUESTION 186An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT? A.    Create a risk analysis report for review.B.    Submit a change order for approval.C.    Insist the worker accepts the standard desktop.D.    Document the request and place the order. Answer: B NEW QUESTION 187Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed? A.    Unattended installationB.    Remote installationC.    Repair installationD.    Image deployment installation Answer: D NEW QUESTION 188A new company policy states that all end-user access to network resources will be controlled based on the users' roles and responsibilities within the organization. Which of the following security concepts has the company just enabled? A.    CertificatesB.    Least privilegeC.    Directory permissionsD.    Blacklists Answer: B NEW QUESTION 189A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST? A.    Disconnect the PC from the network.B.    Perform an antivirus scan.C.    Run a backup and restore.D.    Educate the end user. Answer: A NEW QUESTION 190A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Choose two.) A.    System files have been deleted.B.    Proxy settings are configured improperly.C.    The OS has been updated recently.D.    There are disabled services on the vendor website.E.    Program file permissions have changed recently.F.    There is a rogue anti-malware program. Answer: BF NEW QUESTION 191Which of the following BEST describes the purpose of an ESD mat? A.    Protects against accidental static discharge.B.    Protects against dust/dirt contamination.C.    Protects against accidental scratches.D.    Protects against accidental water damage. Answer: A NEW QUESTION 192Which of the following is a reason to use WEP over WPA? A.    Device compatibilityB.    Increased securityC.    TACACSD.    Multifactor authentication Answer: B NEW QUESTION 193...... Download the newest PassLeader 220-1002 dumps from passleader.com now! 100% Pass Guarantee! 220-1002 PDF dumps & 220-1002 VCE dumps: https://www.passleader.com/220-1002.html (196 Q&As) (New Questions Are 100% Available and Wrong Answers Have Been Corrected! Free VCE simulator!) P.S. New 220-1002 dumps PDF: https://drive.google.com/open?id=13vUuTATazaO0hrkrQIRv_mOwcbXT2Q-o P.S. New 220-1001 dumps PDF: https://drive.google.com/open?id=1KD6v_bQbnkkLIMvXS92fI1YvddfkgQRh --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2019-07-15 09:07:40 Post date GMT: 2019-07-15 09:07:40 Post modified date: 2019-07-15 09:07:40 Post modified date GMT: 2019-07-15 09:07:40 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com