Free 220-1102 Exam Braindumps (page: 55)

Page 54 of 177

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

  1. Restore the device to factory settings.
  2. Uninstall the unapproved application.
  3. Disable the ability to install applications from unknown sources.
  4. Ensure the device is connected to the corporate WiFi network.

Answer(s): B



A technician is creating a full inventory of the company’s IT hardware. Which of the following should the technician use for documentation management?

  1. Checklist for new user setup
  2. User information
  3. Asset tags and IDs
  4. Procurement life cycle

Answer(s): C



A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to mirror the source data for the backup?

  1. copy
  2. xcopy
  3. robocopy
  4. Copy-Item

Answer(s): C



Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?

  1. System time
  2. IP address
  3. DNS servers
  4. Windows updates

Answer(s): C






Post your Comments and Discuss CompTIA 220-1102 exam with other Community members:

220-1102 Discussions & Posts