220-1002 Real Exam Dumps Questions and answers 21-30

Get Full Version of the Exam

Question No.21

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

  1. Default SSID

  2. MAC filtering

  3. Power levels

  4. Content filtering

  5. Firewall

Correct Answer: C

Question No.22

Which of the following is a reason to use WEP over WPA?

  1. Device compatibility

  2. Increased security


  4. Multifactor authentication

Correct Answer: B

Question No.23

A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?

  1. Component Services

  2. System Configuration

  3. Security Policy

  4. Local Users and Groups

Correct Answer: D

Question No.24

A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?

  1. Roll back updates

  2. Disable the Windows Update service

  3. Check for updates

  4. Restore hidden updates

Correct Answer: A

Question No.25

A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?

  1. Open license

  2. Personal license

  3. Corporate license

  4. Enterprise license

Correct Answer: A

Question No.26

A technician is installing the latest OS on a user#39;s system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use?

  1. network installation

  2. clean install

  3. in-place upgrade

  4. image deployment

Correct Answer: C

Question No.27

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

  1. Create a policy to remove Internet access from the server during off hours

  2. Set the local antivirus software on the server to update and scan daily

  3. Ensure the server is patched with the latest security updates

  4. Educate the manager on safe Internet browsing practices

Correct Answer: C

Question No.28

After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)

  1. Screen locks

  2. Screensaver passwords

  3. UEFI passwords

  4. Login time restrictions

  5. Strong passwords

  6. Multifactor authentication

  7. BitLocker

  8. Credential Manager

  9. Smart card

  10. Biometric authentication

Correct Answer: ABG

Question No.29

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?

  1. Check the contents of the hosts file

  2. Do a System Restore to a date before the infection

  3. Rerun the antivirus scan with higher sensitivity

  4. Rebuild the OS on the machine

Correct Answer: A

Question No.30

A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook?

  1. Installation method

  2. System requirements

  3. OS compatibility

  4. File permissions

Correct Answer: B

Get Full Version of 220-1002 Dumps