Discount Offer
Go Back on 220-1102 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

220-1102 Practice Test

Whether you're a beginner or brushing up on skills, our 220-1102 practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 24 out of 148 Pages

Topic 1: Exam Pool A

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?


A. Encrypt the files


B. Clone any impacted hard drives


C. Contact the cyber insurance company


D. Inform law enforcement





B.
  Clone any impacted hard drives

Explanation:
The incident handler should clone any impacted hard drives to preserve evidence for possible litigation1

A user's application is unresponsive. Which of the following Task Manager tabs will allow the user to address the situation?


A. Startup


B. Performance


C. Application history


D. Processes





D.
  Processes

Explanation: The Processes tab in the Task Manager shows all the running processes on the computer, including applications and background services. The user can use this tab to identify the unresponsive application and end its process by right-clicking on it and selecting End task. This will free up the system resources and close the application. The other tabs in the Task Manager do not allow the user to address the situation. The Startup tab shows the programs that run when the computer starts, the Performance tab shows the system resource usage and statistics, and the Application history tab shows the resource usage of the applications over time

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?


A. Open Settings, select Accounts, select, Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper


B. Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper


C. Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper


D. Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.





B.
  Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper

Explanation:
To change the desktop wallpaper on a Windows 10 computer using a Windows 10 Settings tool, the user should open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper1
https://www.lifewire.com/change-desktop-background-windows-11-5190733

A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?


A. Event Viewer


B. System Configuration


C. Device Manager


D. Performance Monitor





A.
  Event Viewer

Explanation: Event Viewer is a Microsoft tool that records and displays system events, errors, warnings, and information. Event Viewer can help troubleshoot and diagnose problems, such as unexpected shutdowns, by showing the details of what happened before, during, and after the incident. Event Viewer can also show the source of the event, such as an application, a service, a driver, or a hardware device. By using Event Viewer, a technician can identify the root cause of the unexpected shutdown, such as a power failure, a thermal event, a driver conflict, or a malware infection.

A technician is hardening a company file server and needs to prevent unauthorized LAN devices from accessing stored files. Which of the following should the technician use?


A. Software firewall


B. Password complexity


C. Antivirus application


D. Anti-malware scans





A.
  Software firewall


Page 24 out of 148 Pages
Previous