220-1002 Real Exam Dumps Questions and answers 111-120

Get Full Version of the Exam

Question No.111

A technician accessed a network share from a computer joined to workgroup. The technician logged in as quot;user1quot; and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the quot;user1quot; account. Which of the following would allow the technician to log in using the quot;administratorquot; username?

  1. Use the command: net use Z: \\fileserver\share

  2. Go to the Sync Center and disable the offline files feature.

  3. Delete the quot;userquot; account for the network share in Credential Manager.

  4. Join the computer and file server to a domain and delegate administrator rights to quot;user1quot;.

  5. Use the Advanced Sharing options in the Network and Sharing Center and enable quot;turn on network discoveryquot;.

Correct Answer: A

Question No.112

A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue?

  1. Zero-day malware

  2. Safari code injection

  3. OS corruption

  4. Overheating

  5. Time sync failure

Correct Answer: D

Question No.113

A user#39;s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

  1. Uninstall the camera application

  2. Check the application permissions

  3. Reset the phone to factory settings

  4. Update all of the applications on the phone

  5. Run any pending OS updates

Correct Answer: B

Question No.114

A technician repaired a laptop for a customer. The customer then complained the repair took too

long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?

  1. Provide documentation of the repair to the customer

  2. Allow the customer to voice concerns and post the story to social media later

  3. Inform the customer the job is done and return to the office

  4. Defend each step and why it was necessary

Correct Answer: A

Question No.115

A user calls a technician to report issues when logging in to a vendor#39;s website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user#39;s office. The user also informs the technician of strange pop-up notifications.

Which of the following are the MOST likely causes of these issues? (Select TWO).

  1. System files have been deleted

  2. Proxy settings are configured improperly

  3. The OS has been updated recently.

  4. There are disabled services on the vendor website.

  5. Program file permissions have changed recently.

  6. There is a rogue anti-malware program.

Correct Answer: DF

Question No.116

Users notify the help desk of an email that was just received. The email came from the help desk#39;s email address and asked the users to click on an embedded link. This email is BEST described as:

  1. phishing.

  2. zombie.

  3. whaling.

  4. spoofing.

Correct Answer: D

Question No.117

Which of the following should be enacted to reduce a company#39;s liability and exposure to a potential lawsuit?

  1. Acceptable use policy

  2. Incident documentation policy

  3. Password compliance policy

  4. Change control policy

Correct Answer: A

Question No.118

Joe. a technician, receives notification that a share for production data files on the network Is encrypted. Joe suspects a crypto virus Is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental

users who are looking for encrypted files. He narrows his search to a single user#39;s computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?

  1. Educate the end user on safe browsing and email habits.

  2. Scan and remove the malware from the infected system.

  3. Create a system restore point and reboot the system.

  4. Schedule antivirus scans and perform Windows updates.

Correct Answer: B

Question No.119

A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?

  1. Check for and apply software updates

  2. Perform repair installation on the application

  3. Add the user to the local administrators group

  4. Rebuild the user#39;s mail profile

Correct Answer: D

Question No.120

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?

  1. Reinstall the application

  2. Roll back the application to the earlier version

  3. Clear the application cache

  4. Update the OS of the smartphones

Correct Answer: D

Get Full Version of 220-1002 Dumps