220-1002 Real Exam Dumps Questions and answers 31-40

Get Full Version of the Exam

Question No.31

Which of the following types of scripts would be seen on the user end of a web page?

  1. .bat

  2. .js

  3. .sh

  4. .vbs

Correct Answer: D

Question No.32

A security team is auditing a company#39;s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)

  1. Disable guest account

  2. Remove admin permissions

  3. Modify AutoRun settings

  4. Change default credentials

  5. Run OS security updates

  6. Install a software firewall

Correct Answer: AC

Question No.33

Ann, an employee at a company, calls the help disk to report issues logging on to a vendor#39;s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann#39;s office. However, when he attempts to log in from Ann#39;s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

  1. Ask Ann for her credentials to verify and log on to the vendor#39;s website from Ann#39;s laptop

  2. Verify Ann#39;s laptop has the correct browser settings

  3. Check all browser cached files on Ann#39;s laptop and log on to another vendor#39;s website

  4. Attempt to log on to another vendor#39;s website from Ann#39;s laptop

  5. Ask Ann about the notification and review the installed programs

  6. Reinstall the browser, reboot the laptop, and check the vendor#39;s website again

Correct Answer: CE

Question No.34

A user#39;s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue?

  1. The Internet security options have changed

  2. The operating system updates have changed

  3. The network directory permissions have changed

  4. The user account permissions have changed

Correct Answer: C

Question No.35

Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?

  1. An IP conflict is present

  2. A corporate VPN is enabled

  3. A firewall exception must be set

  4. HomeGroup must be enabled

Correct Answer: C

Question No.36

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

  1. SSO

  2. Permission propagation

  3. Inheritance

  4. MFA

Correct Answer: A

Question No.37

A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?

  1. Disable System Restore.

  2. Create a restore point.

  3. Apply system updates.

  4. Restart into safe mode.

Correct Answer: D

Question No.38

Which of the following must be enabled to configure 20 new machines to be booted over a network?

  1. Multi-boot

  2. Dynamic

  3. PXE

  4. GPT

Correct Answer: C

Question No.39

A technician is repairing a computer. Which of the following should the technician do to protect the computer from accidental voltage spikes?

  1. Practice electrical fire safety.

  2. Clean tools properly before use.

  3. Remove any jewelry.

  4. Connect a proper ESD strap.

Correct Answer: D

Question No.40

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?

  1. Unattended installation

  2. Refresh upgrade

  3. Clean installation

  4. In-place upgrade

Correct Answer: B

Get Full Version of 220-1002 Dumps