Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CompTIA 220-1202 Practice Exam with Questions & Answers | Set: 5

Questions 41

A technician is preparing to replace the batteries in a rack-mounted UPS system. After ensuring the power is turned off and the batteries are fully discharged, the technician needs to remove the battery modules from the bottom of the rack. Which of the following steps should the technician take?

Options:
A.

Ensure the fire suppression system is ready to be activated.

B.

Use appropriate lifting techniques and guidelines.

C.

Place the removed batteries in an antistatic bag.

D.

Wear a face mask to filter out any harmful fumes.

CompTIA 220-1202 Premium Access
Questions 42

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message “No operating system found.” The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

Options:
A.

Update BitLocker settings in the BIOS

B.

Replace the CMOS battery

C.

Boot from installation media and repair the MBR

D.

Isolate the system from the corporate network

Questions 43

Which of the following is an example of an application publisher including undisclosed additional software in an installation package?

Options:
A.

Virus

B.

Ransomware

C.

Potentially unwanted program

D.

Trojan

Questions 44

Which of the following methods involves requesting a user’s approval via a push notification to verify the user’s identity?

Options:
A.

Call

B.

Authenticator

C.

Hardware token

D.

SMS

Questions 45

Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the application is not responding. Which of the following would a technician most likely inspect?

Options:
A.

Anti-malware logs

B.

Workstation repair options

C.

Bandwidth status as reported in the Task Manager

D.

File size and related memory utilization

Questions 46

A small office reported a phishing attack that resulted in a malware infection. A technician is investigating the incident and has verified the following:

● All endpoints are updated and have the newest EDR signatures.

● Logs confirm that the malware was quarantined by EDR on one system.

● The potentially infected machine was reimaged.

Which of the following actions should the technician take next?

Options:
A.

Install network security tools to prevent downloading infected files from the internet

B.

Discuss the cause of the issue and educate the end user about security hygiene

C.

Flash the firmware of the router to ensure the integrity of network traffic

D.

Suggest alternate preventative controls that would include more advanced security software

Questions 47

After completing malware removal steps, what is the next step the technician should take?

Options:
A.

Perform a secondary antivirus scan

B.

Educate the end user

C.

Reimage the computer

D.

Review system logs