Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the applications are not responding. Which of the following would a technician most likely inspect?
Answer(s): D
A very large or complex spreadsheet can consume excessive RAM and CPU cycles, causing the application to hang or become unresponsive. By checking the file's size and monitoring how much memory Excel (or the spreadsheet program) uses when opening it, the technician can confirm whether resource exhaustion is the culprit and take steps - like simplifying the file or adding RAM - to resolve the issue.
A user frequently misplaces their Windows laptop and is concerned about it being stolen. The user would like additional security controls on their laptop. Which of the following is a built-in technology that a technician can use to enable full drive encryption?
BitLocker is a built-in Windows feature that provides full-volume encryption of the system drive, protecting all data if the laptop is lost or stolen. It integrates with the TPM (when available) for secure key storage and can be configured via Group Policy or the Control Panel without additional software.
Which of the following is used to apply corporate restrictions on an Apple device?
An MDM (Mobile Device Management) management profile allows administrators to enforce corporate policies on Apple devices, such as restricting app installations, configuring network settings, and applying security restrictions. This profile is installed on the device and centrally managed to ensure compliance.
A user's new smartphone is not staying charged throughout the day. The smartphone charges fully every night. Which of the following should a technician review first to troubleshoot the issue?
Background apps can consume significant battery by running processes, syncing data, or using location services throughout the day. Reviewing and limiting or disabling unnecessary background applications will help identify and mitigate excessive battery drain.
A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted. Which of the following best describes this issue?
Answer(s): B
Ransomware is malware that encrypts a user's files and then demands payment (a ransom) in exchange for the decryption key. The user's inability to open the files and the message indicating they're encrypted are classic signs of a ransomware attack.
An organization is experiencing an increased number of issues. A technician notices applications that are not installed by default. Users are reporting an increased number of system prompts for software licensing. Which of the following would the security team most likely do to remediate the root cause?
When users have local administrative rights, they can install unauthorized applications - leading to licensing prompts, unsupported software, and potential security risks. By removing users from the local Administrators group, installations require elevated credentials, ensuring that only approved software is installed and reducing these recurring issues.
A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer. Which of the following specifications will help the specialist determine which OS architecture to use?
The CPU's architecture determines whether it can run a 64-bit OS. Most Intel i7 processors are 64-bit capable, whereas simply knowing the amount of RAM (e.g., 16 GB) doesn't guarantee the processor supports 64-bit operations. Once you confirm the CPU is 64-bit (as with an Intel i7), you can install a 64-bit OS to fully utilize available memory.
Which of the following prevents forced entry into a building?
Bollards are sturdy, fixed posts installed around buildings or sensitive areas to physically block vehicles and prevent ramming attacks or forced vehicular entry. Unlike surveillance or lighting, bollards provide a direct physical barrier.
Post your Comments and Discuss CompTIA 220-1202 exam dumps with other Community members:
/sbin/init
/etc/inittab
/etc/rc.d
/etc/init.d
/lib/init.so
/etc/rc.d/rcinit
/proc/sys/kernel/init
/boot/init
/bin/init
Amazon S3 Intelligent-Tiering
S3 Lifecycle
S3 Glacier Flexible Retrieval
Amazon Athena
Amazon EFS
EC2 instance store
ElastiCache for Redis
S3 Glacier Deep Archive
AWS Lake Formation
Amazon EMR Spark jobs
Amazon Kinesis Data Streams
Amazon DynamoDB
Defender for Endpoint
Defender for Identity
Defender for Cloud Apps
Defender for Office 365
S3 Object Lock
S3
SFTP
AWS Transfer Family
Amazon SQS
API Gateway
Lambda
usage plan
AWS WAF
Amazon ECS
Application Load Balancer
AWS Global Accelerator
Network Load Balancer
EC2
Auto Scaling group
CloudFront
ALB
AWS PrivateLink
CRR
SSE-S3
Athena
SSE-KMS
RDS Custom for Oracle
s3:GetObject
Amazon OpenSearch Service
CloudWatch Logs
Kinesis Data Firehose
Kinesis
S3 bucket
SQS
AWS Lambda
AWS Secrets Manager
AWS Systems Manager OpsCenter
secretsmanager:GetSecretValue
seq
for h in {1..254}
for h in $(seq 1 254); do
Kinesis Data Streams
Amazon Redshift
secrets:GetSecretValue
aws:PrincipalOrgID
"aws:PrincipalOrgID": "o-1234567890"
Azure Bot Service
Our website is free, but we have to fight against AI bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 220-1202 content, but please register or login to continue.