220-1002 Real Exam Dumps Questions and answers 11-20

Get Full Version of the Exam

Question No.11

A network administrator has noticed unusual activity with a user#39;s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access. Which of the following should the network administrator do NEXT?

  1. Delete the user#39;s AD account.

  2. Decrease the user#39;s AD privileges.

  3. Disable the user#39;s AD account.

  4. Reset the password on the user#39;s AD account.

Correct Answer: C

Question No.12

Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?

  1. AES

  2. TKIP

  3. S/MIME

  4. 3DES

Correct Answer: A

Question No.13

A user#39;s personal settings are not saving, and a technician suspects the user#39;s local Windows profile is corrupt. The technician wants to check the size of the ntuser.dat file, but It does not appear in the user#39;s profile directory. Which of the following Control Panel utilities should the technician use to correct this?

  1. Folder Options

  2. Sync Center

  3. Display Settings

  4. User Accounts

Correct Answer: A

Question No.14

A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST?

  1. ping

  2. nslooking

  3. net use

  4. ipconfig

Correct Answer: B

Question No.15

Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a quot;?quot; in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?

  1. There is unauthenticated wireless connectivity

  2. She has exceeded the data allowance

  3. The phone is only 3G capable

  4. It is an unrooted phone

  5. The SIM card was not activated

  6. A data plan was not purchased

Correct Answer: A

Question No.16

Which of the following file types should be opened when executing a PowerShell script?

  1. .bat

  2. .vbs

  3. .sh

  4. .ps1

  5. .psd

Correct Answer: D

Question No.17

An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO).

  1. Close applications when tasks are completed.

  2. Increase the time to dim the screen automatically.

  3. Increase the frequency for syncing corporate email.

  4. Set the smartphone display to maximum brightness.

  5. Connect to the office WiFi network automatically.

  6. Disable 802.11ac and use mobile data exclusively.

Correct Answer: AE

Question No.18

A technician has been dispatched to resolve a malware problem on a user#39;s workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT?

  1. Run the scan again to ensure all malware has been removed

  2. Quarantine the infected workstation from the network

  3. Install all of the latest Windows Updates to patch the system

  4. Educate the user on safe browsing practices

Correct Answer: C

Question No.19

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

  1. Untrusted software

  2. Outdated antivirus

  3. MDM policies

  4. Inactive VPNs

Correct Answer: D

Question No.20

Which of the following technologies is used by malicious employees to obtain user passwords?

  1. Main-in-the-middle

  2. Phishing

  3. Tailgating

  4. Shoulder surfing

Correct Answer: D

Get Full Version of 220-1002 Dumps