Go Back on 220-1102 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

220-1102 Practice Test


Page 16 out of 148 Pages

Topic 5: Exam Pool E

A Windows computer is experiencing slow performance when the user tries to open programs and files. The user recently installed a new software program from an external website. Various websites are being redirected to an unauthorized site, and Task Manager shows the CPU usage is consistently at 100%. Which of the following should the technician do first?


A. Uninstall the new program.


B. Check the HOSTS file.


C. Restore from a previous backup.


D. Clear the web browser cache.





A.
  Uninstall the new program.

An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT?


A. Verify all third-party applications are disabled


B. Determine if the device has adequate storage available.


C. Check if the battery is sufficiently charged


D. Confirm a strong internet connection is available using Wi-Fi or cellular data





C.
  Check if the battery is sufficiently charged

Explanation:
Since there are no error messages on the device, the technician should check if the battery is sufficiently charged1 If the battery is low, the device may not have enough power to complete the update2 In this scenario, the technician has already determined that there are no error messages on the device. The next best step would be to check if the battery is sufficiently charged. If the battery is low, it could be preventing the device from completing the update process. Verifying that third-party applications are disabled, determining if the device has adequate storage available, and confirming a strong internet connection are all important steps in troubleshooting issues with mobile devices. However, since the problem in this scenario is related to a failed OS update, it is important to first check the battery level before proceeding with further troubleshooting steps.

Which of the following would typically require the most computing resources from the host computer? Chrome OS


A. Windows


B. Android


C. macOS


D. Linux





B.
  Android

Explanation: Windows is the operating system that typically requires the most computing resources from the host computer, compared to the other options. Computing resources include hardware components such as CPU, RAM, disk space, graphics card, and network adapter. The minimum system requirements for an operating system indicate the minimum amount of computing resources needed to install and run the operating system on a computer. The higher the minimum system requirements, the more computing resources the operating system consumes. According to the web search results, the minimum system requirements for Windows 10 and Windows 11 are as follows12: CPU: 1 GHz or faster with two or more cores (Windows 10); 1 GHz or faster with two or more cores on a compatible 64-bit processor (Windows 11) RAM: 1 GB for 32-bit or 2 GB for 64-bit (Windows 10); 4 GB (Windows 11) Disk space: 16 GB for 32-bit or 32 GB for 64-bit (Windows 10); 64 GB (Windows 11) Graphics card: DirectX 9 or later with WDDM 1.0 driver (Windows 10); DirectX 12 compatible with WDDM 2.0 driver (Windows 11)

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?


A. All updated software must be tested with alt system types and accessories


B. Extra technician hours must be budgeted during installation of updates


C. Network utilization will be significantly increased due to the size of CAD files


D. Large update and installation files will overload the local hard drives.





C.
  Network utilization will be significantly increased due to the size of CAD files

Explanation:
The IT manager is most likely to be concerned about network utilization being significantly increased due to the size of CAD files. Backing up all CAD files to the software’s cloud server can result in a large amount of data being transferred over the network, which can cause network congestion and slow down other network traffic.

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO)


A. Enable multifactor authentication for each support account


B. Limit remote access to destinations inside the corporate network


C. Block all support accounts from logging in from foreign countries


D. Configure a replacement remote-access tool for support cases.


E. Purchase a password manager for remote-access tool users


F. Enforce account lockouts after five bad password attempts





A.
  Enable multifactor authentication for each support account

F.
  Enforce account lockouts after five bad password attempts

Explanation:
The best ways to limit the bank’s risk are to enable multifactor authentication for each support account and enforce account lockouts after five bad password attempts. Multifactor authentication adds an extra layer of security to the login process, making it more difficult for attackers to gain access to systems. Account lockouts after five bad password attempts can help to prevent brute force attacks by locking out accounts after a certain number of failed login attempts.


Page 16 out of 148 Pages
Previous