220-1002 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam
http://www.EnsurePass.com/220-1002.html

Question No.1

An end user#39;s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

  1. Remove applications from startup

  2. Defragment the hard drive

  3. Install additional RAM

  4. Install a faster hard drive

  5. End the processes in Task Manager

  6. Run the Disk Cleanup utility

Correct Answer: AB

Question No.2

A user#39;s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?

  1. Reset the device#39;s network settings

  2. Check the data usage statistics on the device

  3. Verify the SSID with which the device is associated

  4. Run any pending application or OS updates

Correct Answer: C

Question No.3

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

  1. Driver detection

  2. Metro interface

  3. Account control

  4. PXE installation

Correct Answer: A

Question No.4

A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the quot;My Documentsquot; folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?

  1. Remove the registry entry and rename the local account folder

  2. Delete or rename the local user folder

  3. Run DISM and re-add the local power user account

  4. Remove the user account in Credential Manager and restart the PC

Correct Answer: C

Question No.5

Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be

the BEST resolution to issue?

  1. Restart the table

  2. Disable and then renewable Bluetooth

  3. Calibrate the touchscreen sensor

  4. Disconnect and then reconnect the stylus

Correct Answer: C

Question No.6

Company policy states that users must secure their laptops before leaving the office for the evening Which of the following physical security measures should be used?

  1. Cable lock

  2. Windows key L

  3. Smart card removal

  4. Key fob

  5. BIOS password

Correct Answer: A

Question No.7

A client wants a technician to create a PC naming convention that will make the client#39;s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

  1. Domain name, location, IP address

  2. Domain name, location, asset ID

  3. Asset ID, MAC address

  4. Location, RFID

Correct Answer: C

Question No.8

Corporate management is concerned about the security of the company#39;s mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.)

  1. Use full device encryption

  2. Enable a pattern lock

  3. Implement remote wipe features

  4. Use device lockout policies

  5. Require complex administrator passwords

  6. Disable unknown application installations

Correct Answer: AC

Question No.9

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business#39;s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

  1. Default SSID

  2. MAC filtering

  3. NAT

  4. QoS

  5. Signal strength

  6. Encryption

Correct Answer: BE

Question No.10

Which of the following threats uses personalized information in an attempt at obtaining information?

  1. Whaling

  2. Impersonation

  3. Spoofing

  4. Spear phishing

Correct Answer: D

Get Full Version of 220-1002 Dumps

Tagged

Leave a Reply

Your email address will not be published. Required fields are marked *