Go Back on 220-1102 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

220-1102 Practice Test


Page 4 out of 148 Pages

Topic 5: Exam Pool E

A user's antivirus software reports an infection that it is unable to remove. Which of the following is the most appropriate way to remediate the issue?


A. Disable System Restore.


B. Utilize a Linux live disc.


C. Quarantine the infected system.


D. Update the anti-malware.





C.
  Quarantine the infected system.

Explanation: Quarantining the infected system is the most appropriate way to remediate the issue of an infection that the antivirus software cannot remove. Quarantining means isolating the system from the network and other devices to prevent the infection from spreading or causing further damage. Quarantining also allows the technician to perform further analysis and removal of the infection without risking the security of other systems or data.
Some of the steps involved in quarantining an infected system are: Disconnect the system from the internet and any local network connections, such as Wi-Fi, Ethernet, Bluetooth, or USB.
Disable any file-sharing or remote access services on the system, such as Windows File Sharing, Remote Desktop, or TeamViewer.
Use a separate device to download and update the antivirus software and any other tools that may be needed to remove the infection, such as malware scanners, rootkit removers, or bootable rescue disks.
Transfer the updated antivirus software and tools to the infected system using a removable media, such as a CD, DVD, or USB flash drive. Scan the removable media for any infections before and after using it on the infected system.
Run the antivirus software and tools on the infected system and follow the instructions to delete or quarantine the infection. If the infection is persistent or complex, it may require booting the system from a rescue disk or using a Linux live disc to access and clean the system files.
After the infection is removed, restore the system to a previous clean state using System Restore, backup, or recovery partition. Scan the system again to ensure that it is clean and secure. Reconnect the system to the network and update the system and the antivirus software.

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?


A. Disable the browser from sending notifications to the Action Center.


B. Run a full antivirus scan on the computer.


C. Disable all Action Center notifications.


D. Move specific site notifications from Allowed to Block.





D.
  Move specific site notifications from Allowed to Block.

When trying to access a secure internal network, the user receives an error messaging stating, "There is a problem with this website's security certificate." The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring?


A. Reimage the system and install SSL.


B. Install Trusted Root Certificate.


C. Select View Certificates and then Install Certificate.


D. Continue to access the website.





C.
  Select View Certificates and then Install Certificate.

Explanation: The error message indicates that the website’s security certificate is not trusted by the user’s device, which may prevent the user from accessing the secure internal network. To resolve this issue, the user can view the certificate details and install it on the device, which will add it to the trusted root certificate store. Reimaging the system and installing SSL, installing Trusted Root Certificate, or continuing to access the website are not recommended solutions, as they may compromise the security of the device or the network.

A user clicks a link in an email. A warning message in the user's browser states the site's certificate cannot be verified. Which of the following is the most appropriate action for a technician to take?


A. Click proceed.


B. Report the employee to the human resources department for violating company policy.


C. Restore the computer from the last known backup.


D. Close the browser window and report the email to IT security.





D.
  Close the browser window and report the email to IT security.

Which of the following statements describes the purpose of scripting languages? To access the hardware of the computer it is running on


A. To automate tasks and reduce the amount of manual labor


B. To abstract the complexity of the computer system


C. To compile the program into an executable file





B.
  To abstract the complexity of the computer system

Explanation: Scripting languages are used to write small to medium-sized programs that perform specific tasks. Some common uses of scripting languages are: automating repetitive processes, web development, system administration, data processing, multimedia and games, report generation, document and text processing, writing plugins and extensions for existing programs and applications1.


Page 4 out of 148 Pages
Previous