220-1002 Real Exam Dumps Questions and answers 81-90

Get Full Version of the Exam

Question No.81

A MAC user#39;s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

  1. Time Machine

  2. Snapshot

  3. System Restore

  4. Boot Camp

Correct Answer: A

Question No.82

A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low. Which of the following tasks should be done FIRST?

  1. Disconnect the network cable.

  2. Update the antivirus software.

  3. Run an antivirus scan.

  4. Shut down the PC

Correct Answer: A

Question No.83

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

  1. grupdate

  2. diskpart

  3. gpresult

  4. net use

Correct Answer: A

Question No.84

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

  1. Remove the guest account from the administrators group

  2. Disable single sign-on

  3. Issue a default strong password for all users

  4. Require authentication on wake-up

Correct Answer: D

Question No.85

Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server. Which of the following is the FIRST step the technician should take to correct this issue?

  1. See if Joe#39;s email address has been blacklisted

  2. Change the password on Joe#39;s email account

  3. Update the antivirus and perform a full scan on the PC

  4. Isolate Joe#39;s computer from the network

Correct Answer: D

Question No.86

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?

  1. Image deployment

  2. Multiboot configuration

  3. In-place upgrade

  4. System repair

Correct Answer: A

Question No.87

A technician responds to a report that a user#39;s desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue?

  1. Roll back the OS upgrade. Continue using the older version of Windows

  2. Reset the PC to its factory conditions. Perform the OS upgrade again

  3. Update the SATA controller driver from the manufacturer#39;s website

  4. Perform a full backup and replace the hard drive

Correct Answer: C

Question No.88

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

  1. System

  2. Display

  3. Folder Options

  4. Indexing Options

Correct Answer: C

Question No.89

Which of the following is considered government-regulated data?

  1. PII

  2. End-user license agreement

  3. Digital Millennium Copyright Act

  4. DRM

Correct Answer: A

Question No.90

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing?

  1. Full device encryption

  2. Account lock

  3. Multifactor authentication

  4. Strong password requirements

Correct Answer: C

Get Full Version of 220-1002 Dumps