[2021.7 Updated] Valid Lead4Pass CompTIA 220-1002 exam questions with VCE and PDF download

New updated CompTIA 220-1002 exam questions from Lead4Pass CompTIA 220-1002 dumps!
Welcome to download the latest Lead4Pass CompTIA 220-1002 dumps with PDF and VCE: https://www.leads4pass.com/220-1002.html (697 Q&As)

[CompTIA 220-1002 exam pdf] CompTIA 220-1002 exam PDF uploaded from google drive, online download provided by the latest update of Lead4pass:
https://drive.google.com/file/d/10TP39C0SueJWMLwmjBb_WJwOGvkkfMn3/

Latest update CompTIA 220-1002 exam questions and answers online practice test

QUESTION 1
An end user reports a Windows computer is infected with a virus. Which of the following should be the technician\\’s
FIRST troubleshooting step?
A. Identify malware symptoms
B. Disable System Restore
C. Run Windows Update
D. Educate the end user
Correct Answer: A

 

QUESTION 2
An end user contacts the help desk to report a browser issue. When the user selects a hyperlink to a POF file within the
browser, nothing happens. The user notes the browser is otherwise working properly. Which of the following should a
technician direct the user to do FIRST?
A. Ask the user to restart the computer.
B. Install browser updates.
C. Open the link in a different web browser.
D. Disable the pop-up blocker.
Correct Answer: A

 

QUESTION 3
A MAC user\\’s operating system became corrupted, and files were deleted after malware was downloaded. The user
needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be
used?
A. Time Machine
B. Snapshot
C. System Restore
D. Boot Camp
Correct Answer: A

 

QUESTION 4
Which of the following basic scripting components can be used to repeat an operation until a specific requirement is
met?
A. If-then logic
B. String variables
C. Conditional loop
D. Goto statement
Correct Answer: C

 

QUESTION 5
Which of the following should be enacted to reduce a company\\’s liability and exposure to a potential lawsuit?
A. Acceptable use policy
B. Incident documentation policy
C. Password compliance policy
D. Change control policy
Correct Answer: C

 

QUESTION 6
Which of the following should a technician do FIRST before opening a computer case to replace a part?
A. Remove all jewelry
B. Put on an ESD strap
C. Perform self-grounding
D. Disconnect the power
Correct Answer: A

 

QUESTION 7
A user installed a new SOHO router and new wireless NICs to increase their transmission speed from 802.11b to
802.11g with the manufacturer\\’s default settings. The user lives in an apartment building and is still experiencing
slowness to the Internet after the installations. Which of the following is the MOST secure option that a technician could
implement to resolve this issue?
A. Hide the SSID
B. Assign static IP addresses
C. Enable MAC filtering
D. Disable the WAN port
Correct Answer: C
Reference: http://security.stackexchange.com/questions/755/how-does-basic-http-auth-work

 

QUESTION 8
A technician is troubleshooting a network connectivity issue on a Linux workstation. Which of the following commands
would help the technician gain information about the network settings on the machine?
A. chmod
B. grep
C. ifconfig
D. sudo
Correct Answer: C

 

QUESTION 9
A manager with a restricted user account receives the following error message:
Windows Update cannot currently check for updates because the service is not running.
The manager contacts the help desk to report the error. A technician remotely connects to the user\\’s computer and
identifies the problem. Which of the following should the technician do NEXT?
A. Reboot the computer
B. Restart the network services
C. Roll back the device drivers
D. Rebuild the Windows profiles
Correct Answer: B

 

QUESTION 10
Corporate management is concerned about the security of the company\\’s mobile phones, in the event they are lost or
stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users.
Which of the following would provide the BEST level of protection in this scenario? (Choose two.)
A. Use full device encryption
B. Enable a pattern lock
C. Implement remote wipe features
D. Use device lockout policies
E. Require complex administrator passwords
F. Disable unknown application installations
Correct Answer: AC

 

QUESTION 11
After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports
as soon as possible. The technician has been asked to avoid interrupting any users Which of the following is the BEST
way for the technician to perform this security feature?
A. Push a group policy.
B. Assign a local security policy.
C. Create a network login script.
D. Update the AUP
Correct Answer: B

 

QUESTION 12
While troubleshooting a software error on a user\\’s computer, a technician finds inappropriate content. Which of the
following should the technician perform FIRST?
A. Preserve the data on an external drive.
B. Report the discovery through proper channels.
C. Document the findings.
D. Erase the data and inform the user.
Correct Answer: C

 

QUESTION 13
A small business, which is located in a Hood plain, wants a technician to recommend a backup strategy that will allow
for Its flies to be recovered at an alternate location within a few days following a disaster. Which of the following backup
methodologies will the technician MOST likely recommend\\’\\’
A. Implement a hoi site in an area outside the flood plain.
B. Move all servers to an laaS provider and only use SaaS applications
C. Install cloud backup software and use it (or regular backups
D. Configure local tape backups and store them in a safe on site.
Correct Answer: C


The above content: shared 220-1002 exam pdf, 220-1002 Exam Questions, And Answers and get the complete 220-1002 exam dumps path. For information about 220-1002 Dumps from Lead4pass (including PDF and VCE), please visit: https://www.leads4pass.com/220-1002.html (697 Q&A)

ps. Get free CompTIA 220-1002 dumps PDF online: https://drive.google.com/file/d/10TP39C0SueJWMLwmjBb_WJwOGvkkfMn3/