Practice Free 220-1202 Exam Online Questions
A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted.
Which of the following best describes this issue?
- A . Keylogger
- B . Ransomware
- C . Phishing
- D . Cryptominer
B
Explanation:
Ransomware is malware that encrypts a user’s files and then demands payment (a ransom) in exchange for the decryption key. The user’s inability to open the files and the message indicating they’re encrypted are classic signs of a ransomware attack.
A small office reported a phishing attack that resulted in a malware infection.
A technician is investigating the incident and has verified the following:
● All endpoints are updated and have the newest EDR signatures.
● Logs confirm that the malware was quarantined by EDR on one system.
● The potentially infected machine was reimaged.
Which of the following actions should the technician take next?
- A . Install network security tools to prevent downloading infected files from the internet.
- B . Discuss the cause of the issue and educate the end user about security hygiene.
- C . Flash the firmware of the router to ensure the integrity of network traffic.
- D . Suggest alternate preventative controls that would include more advanced security software.
B
Explanation:
With technical controls updated, EDR signatures current, and the infected system reimaged, the next step is to address the human factor. Educating the user on how to recognize phishing attempts and follow safe practices helps prevent recurrence and strengthens the organization’s overall security posture.
A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue.
Which of the following should the technician do?
- A . Escalate the issue to a senior team member and provide next steps to the customer.
- B . Dismiss the customer and reschedule another troubleshooting session at a later date.
- C . Interrupt the customer and express that troubleshooting support tickets can take time.
- D . Maintain a positive attitude and continue to ask questions regarding the scope of the issue.
A
Explanation:
When you’ve exhausted your troubleshooting expertise and the customer is frustrated, the appropriate next step is to escalate the ticket to a more experienced technician or specialized team. At the same time, communicate clearly to the customer what you’re doing and what they can expect next. This maintains transparency, manages expectations, and ensures the issue is resolved as quickly as possible.
A security administrator teaches all of an organization’s staff members to use BitLocker To Go.
Which of the following best describes the reason for this training?
- A . To ensure that all removable media is password protected in case of loss or theft
- B . To enable Secure Boot and a BIOS-level password to prevent configuration changes
- C . To enforce VPN connectivity to be encrypted by hardware modules
- D . To configure all laptops to use the TPM as an encryption factor for hard drives
A
Explanation:
BitLocker To Go is specifically designed to encrypt removable drives (USB flash drives, external HDDs). Training staff on its use guarantees that any data stored on such media requires a password (or recovery key) to access, protecting sensitive information if the device is lost or stolen.
A technician uses AI to draft a proposal about the benefits of new software. When reading the draft, the technician notices that the draft contains factually incorrect information.
Which of the following best describes this scenario?
- A . Data privacy
- B . Hallucinations
- C . Appropriate use
- D . Plagiarism
B
Explanation:
When an AI model generates plausible-sounding but factually inaccurate or fabricated information, it’s referred to as a “hallucination.” Identifying and correcting these errors is essential to ensure the accuracy and reliability of AI-assisted content.
Which of the following provides information to employees, such as permitted activities when using the organization’s resources?
- A . AUP
- B . MNDA
- C . DRM
- D . EULA
A
Explanation:
An Acceptable Use Policy outlines what activities employees are permitted or prohibited from performing when using the organization’s IT resources. It provides clear guidance on acceptable behavior, ensuring users understand the rules governing company systems and data.
Which of the following methods involves requesting a user’s approval via a push notification to verify the user’s identity?
- A . Call
- B . Authenticator
- C . Hardware token
- D . SMS
B
Explanation:
Modern authenticator apps (such as Microsoft Authenticator or Google Authenticator with push capability) can send a push notification to the user’s registered device. The user approves or denies the login request via the notification, providing a quick and secure second factor for authentication.
A user’s new smartphone is not staying charged throughout the day. The smartphone charges fully every night.
Which of the following should a technician review first to troubleshoot the issue?
- A . Storage usage
- B . End of software support
- C . Charger wattage
- D . Background applications
D
Explanation:
Background apps can consume significant battery by running processes, syncing data, or using location services throughout the day. Reviewing and limiting or disabling unnecessary background applications will help identify and mitigate excessive battery drain.
A user frequently misplaces their Windows laptop and is concerned about it being stolen. The user would like additional security controls on their laptop.
Which of the following is a built-in technology that a technician can use to enable full drive encryption?
- A . Active Directory
- B . New Technology File System
- C . Encrypting File System
- D . BitLocker
D
Explanation:
BitLocker is a built-in Windows feature that provides full-volume encryption of the system drive, protecting all data if the laptop is lost or stolen. It integrates with the TPM (when available) for secure key storage and can be configured via Group Policy or the Control Panel without additional software.
Recently, the number of users sharing smartphone passcodes has increased. The management team wants a technician to deploy a more secure screen lock method.
Which of the following technologies should the technician use?
- A . Pattern lock
- B . Facial recognition
- C . Device encryption
- D . Multifactor authentication
B
Explanation:
Facial recognition leverages biometric characteristics unique to each user, offering stronger security than shared passcodes or easily observed pattern locks. It ensures that only the enrolled individual can unlock the device, reducing the risk of unauthorized access from shared codes.