PassLeader released the NEWEST CompTIA 220-1002 exam dumps recently! Both 220-1002 VCE dumps and 220-1002 PDF dumps are available on PassLeader, either 220-1002 VCE dumps or 220-1002 PDF dumps have the NEWEST 220-1002 exam questions in it, they will help you passing CompTIA 220-1002 exam easily! You can download the valid 220-1002 dumps VCE and PDF from PassLeader here:Â https://www.passleader.com/220-1002.html (868 Q&As Dumps)
Also, previewing the NEWEST PassLeader 220-1002 dumps online for free on Google Drive: https://drive.google.com/open?id=13vUuTATazaO0hrkrQIRv_mOwcbXT2Q-o
NEW QUESTION 821
Joe, a technician, is using a terminal session on a Linux desktop. He is trying to install a software update but receives an error message stating he does not have the required privileges. Which of the following commands should Joe use to accomplish this task?
A.   pwd
B.   apt-get
C.   chmod
D.   sudo
Answer: D
NEW QUESTION 822
A technician is setting up a new corporate wireless network. One of the requirements for the network is that connections must only be allowed for current domain accounts without giving users a wireless key. Which of the following should the technician use?
A.   MAC filtering
B.   RADUIS
C.   MFA
D.   WPA2
Answer: B
NEW QUESTION 823
A user is having network printing issues. The user indicates printing was working fine moments ago, but now there are no printers displayed in Microsoft Word. Which of the following should a technician check FIRST?
A.   The toner volume in the printer.
B.   The USB cable from the PC to the printer.
C.   The printer driver version.
D.   The print spooler service.
Answer: D
NEW QUESTION 824
Which of the following features in Windows 10 combines the functionality from Windows 7 and Windows 8 while also introducing Metro-style applications?
A.   Microsoft Edge.
B.   SmartScreen Filter.
C.   Start menu.
D.   User Account Control.
Answer: C
NEW QUESTION 825
A user calls the help desk to report an issue accessing a new application on a Windows PC. When the user tries to launch the application, an error message appears and then quickly disappears before the user can read it. Which of the following protocols would a technician MOST likely use to help diagnose this issue?
A.   FTP
B.   RDP
C.   SNMP
D.   SSH
Answer: B
NEW QUESTION 826
Which of the following is a device that stores a copy of a certificate that is used for authentication?
A.   Biometric scanner.
B.   Soft token.
C.   Smart card.
D.   OTP token.
Answer: C
NEW QUESTION 827
A technician has created a new fileshare for an organization. To maintain data security, all users should have read-only rights to the fileshare. Additionally, supervisors need to be able to write and delete files. After the technician has configured the fileshare, users can read documents, but supervisors cannot modify documents. Which of the following utilities should the technician use to troubleshoot the issue?
A.   Microsoft Management Console
B.   User Account Control
C.   Local Security Policy
D.   Map Network Drive
Answer: C
NEW QUESTION 828
A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?
A.   Data-in-transit encryption.
B.   File encryption.
C.   USB drive encryption.
D.   Disk encryption.
Answer: A
NEW QUESTION 829
A user’s workstation is running extremely slow. A technician sees a pop-up on the workstation offering what appears to be fake technical support, so the technician begins the malware removal procedure. After disabling System Restore, the technician runs a malware scan, but the scan does not find any malware on the machine. Which of the following is the MOST likely reason the technician cannot find any malware?
A.   The technician should not have disabled System Restore.
B.   The technician never quarantined the workstation.
C.   The technician did not update the anti-malware software.
D.   There is no malware on the workstation.
Answer: C
NEW QUESTION 830
A technician is troubleshooting a customer’s PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician’s actions?
A.   Avoid distractions.
B.   Deal appropriately with customer’s confidential material.
C.   Adhere to user privacy policy.
D.   Set and meet timelines.
Answer: A
NEW QUESTION 831
An office computer has been infected with malware. Which of the following steps should be taken FIRST?
A.   Back up the hard drive.
B.   Educate the user.
C.   Quarantine the infected computer.
D.   Run antivirus software.
Answer: C
NEW QUESTION 832
An Android smartphone user constantly receives notices that the device is low on storage. The user has uninstalled unneeded applications and does not want to remove any others. Which of the following troubleshooting steps should the user take FIRST to identify the issue?
A.   Upgrade the device to a newer version with more storage.
B.   Restore installed applications to their original device versions by uninstalling updates.
C.   Check the storage type and size of the data and cache on each installed application.
D.   Add more storage using a memory card.
Answer: C
NEW QUESTION 833
Which of the following must a systems administrator employ to protect the contents of all corporate machines?
A.   Regulatory policy.
B.   Password policy.
C.   Acceptable use policy.
D.   Compliance policy.
Answer: D
NEW QUESTION 834
The Chief Executive Officer at a bank recently saw a news report about a high-profile cybercrime where a remote access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bank’s risk? (Choose two.)
A.   Enable multifactor authentication for each support account.
B.   Limit remote access to destinations inside the corporate network.
C.   Block all support accounts from logging in from foreign countries.
D.   Configure a replacement remote-access tool for support cases.
E.   Purchase a password manager for remote tool users.
F.   Enforce account lockouts after five bad password attempts.
Answer: AC
NEW QUESTION 835
A technician is installing a Linux operating system and is prompted to select the filesystem. Which of the following filesystems should the technician choose?
A.   FAT32
B.   HFS
C.   NTFS
D.   EXT4
Answer: D
NEW QUESTION 836
A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?
A.   PIN-based login.
B.   Quarterly password changes.
C.   Hard drive encryption.
D.   A physical laptop lock.
Answer: C
NEW QUESTION 837
Ann, a user, is experiencing issues trying to decrypt email on a new mobile device. She is unable to access internal resources, but she can get to the Internet while connected to the WLAN. Ann can also decrypt email while using a desktop computer. A technician notices she has several authentication errors when connecting to the WLAN. Which of the following is MOST likely causing the wireless issues?
A.   There is an incorrect certificate on the mobile device.
B.   There is no wireless connectivity.
C.   Ann is using an incorrect password.
D.   The email application is not working correctly.
E.   Ann’s user account is disabled.
Answer: A
NEW QUESTION 838
Ann, a user, has two monitors: one connected with VGA and another connected with DisplayPort. Ann contacts the help desk because she can only see one monitor at a time. Ann tried to fix this on her own, but she sees very limited display settings. Which of the following is MOST likely the issue?
A.   Ann does not have administrative rights over the machine.
B.   The OS is using basic drivers for the video card.
C.   The DisplayPort is plugged into an HDMI port.
D.   The monitor refresh rate is above 60Hz and cannot display a digital signal.
Answer: A
NEW QUESTION 839
A computer’s power light is on, but the screen is completely black. The user is unable to wake the computer and then contacts a technician. The technician asks the user to inspect the display cable, but it is securely connected at each end. Which of the following steps should the technician ask the user to take NEXT?
A.   Roll back the Windows updates.
B.   Perform a startup recovery.
C.   Perform a hard restart.
D.   Boot from the last known-good configuration.
Answer: C
NEW QUESTION 840
An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?
A.   Preserving chain of custody.
B.   Implementing data protection policies.
C.   Informing law enforcement.
D.   Creating a summary of the incident.
Answer: A
NEW QUESTION 841
Which of the following WiFi protocols is the MOST secure?
A.   WPA3
B.   WPA-AES
C.   WEP
D.   WPA-TKIP
Answer: B
NEW QUESTION 842
A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?
A.   Device Manager
B.   System
C.   Ease of Access Center
D.   Programs and Features
Answer: C
NEW QUESTION 843
Which of the following features allows for the separation of authentication, authorization, and accounting?
A.   MFA
B.   RADIUS
C.   TACACS+
D.   LDAP
Answer: C
NEW QUESTION 844
A technician is looking for ways to recover a system in the event of an infection. The antivirus is running, and the customer is receiving weekly threat alerts. The customer’s core work includes daily web browsing and insecure file downloads. Which of the following should the technician do to recover the system with the LEAST amount of effort?
A.   Delete the temporary folder from the system.
B.   Convert the filesystem to NTFS.
C.   Run a full anti-malware scan.
D.   Perform a System Restore from the last known-good state.
E.   Restart the system in safe mode.
Answer: C
NEW QUESTION 845
Which of the following security permissions takes precedence over the other?
A.   File permissions over share permissions.
B.   Share permissions over inherited permissions.
C.   Share permissions over file permissions.
D.   File permissions over user permissions.
Answer: A
NEW QUESTION 846
The network was breached over the weekend. System logs indicate that a single user’s account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?
A.   Encryption at rest.
B.   Account lockout.
C.   Automatic screen lock.
D.   Antivirus.
Answer: B
NEW QUESTION 847
A technician needs to troubleshoot a user’s computer while the user is connected to the system. The technician must also connect to the user’s system using remote access tools built in to Windows. Which of the following is the BEST option to troubleshoot the user’s computer?
A.   Screen share.
B.   MSRA.
C.   Virtual network computer.
D.   RDP.
Answer: D
NEW QUESTION 848
A technician is looking for guidance on securing access to the administrator account. Which of the following policies should the technician reference?
A.   Remediation policy.
B.   Incident response policy.
C.   Acceptable use policy.
D.   Compliance policy.
Answer: C
NEW QUESTION 849
A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message, and no changes have been made within the company. Which of the following has infected the computer?
A.   Cryptominer
B.   Phishing
C.   Ransomware
D.   Keylogger
Answer: C
NEW QUESTION 850
A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?
A.   MDM
B.   EULA
C.   IRP
D.   AUP
Answer: D
NEW QUESTION 851
A user recently had malware removed from a computer, but the user is still experiencing issues with accessing websites. All the websites appear to display the same page. However, when a technician attempts to access the same websites from another computer, they display properly. Which of the following should the technician do NEXT?
A.   Check the DNS server for compromise.
B.   Verify the user’s localhost file.
C.   Request a new IP address from the DHCP server.
D.   Reboot the user’s computer.
Answer: B
NEW QUESTION 852
A user is unable to access corporate email on a smartphone. After the user launches the email application, it crashes and does not display the expected inbox. Additionally, the user reports other applications are running slowly. Which of the following should the technician do NEXT?
A.   Calibrate the smartphone’s touch screen.
B.   Verify the user’s email credentials.
C.   Ensure the smartphone is not in airplane mode.
D.   Completely drain the smartphone’s battery, and then fully charge it.
E.   Check the number of applications running on the smartphone.
Answer: E
NEW QUESTION 853
A user calls the help desk to report issues with a computer. Earlier in the day, the user received an email with a link to a document to download. Nothing happened immediately after the user downloaded the document, but the computer then began to respond slowly. Applications also started to crash. The help desk technician discovers many of the user’s files and applications have been renamed with .enc at the end. There is also a .txt file on the desktop with instructions on how to obtain the encryption key. This is an example of ____.
A.   a virus
B.   spam
C.   spyware
D.   ransomware
Answer: D
NEW QUESTION 854
A user is unable to access the Internet-based email system from a specific workstation. However, the user is able to access the email system from other workstations without any issues. Every time the user tries to access the email system, the affected workstation takes the user to an incorrect site. A technician notices the workstation is not currently connected to the network’s endpoint protection system. Which of the following is the cause of this behavior?
A.   Browser redirection.
B.   Pop-ups.
C.   Ransomware.
D.   Spam.
E.   Hijacked email.
Answer: A
NEW QUESTION 855
A technician was given a surplus graphic card. Which of the following job roles would benefit the MOST from upgrading to a dedicated graphics card?
A.   IT analyst.
B.   Finance worker.
C.   Frontline worker.
D.   Game designer.
Answer: D
NEW QUESTION 856
A technician is installing an application on a Linux system using the Bash shell console. Which of the following extensions should the technician select to install the application?
A.   .exe
B.   .apk
C.   .sh
D.   .app
Answer: C
NEW QUESTION 857
A technician joined a computer to a Windows domain. The technician wants to verify if the computer has received network policies from the domain. Which of the following commands should the technician use?
A.   ipconfig
B.   netstat
C.   gpresult
D.   nslookup
Answer: C
NEW QUESTION 858
Which of the following should be performed FIRST after discovering an employee is using a corporate laptop to steal trade secrets?
A.   Disable the laptop.
B.   Preserve the data.
C.   Report the incident.
D.   Track the evidence.
Answer: C
NEW QUESTION 859
……
Welcome to choose PassLeader 220-1002 dumps for 100% passing CompTIA 220-1002 exam:Â https://www.passleader.com/220-1002.html (868 Q&As VCE Dumps and PDF Dumps)
Also, previewing the NEWEST PassLeader 220-1002 dumps online for free on Google Drive: https://drive.google.com/open?id=13vUuTATazaO0hrkrQIRv_mOwcbXT2Q-o