Practice Free 220-1202 Exam Online Questions
A user receives a new personal computer but is unable to run an application. An error displays saying that .NET Framework 3.5 is required and not found.
Which of the following actions is the best way to resolve this issue?
- A . Resolve the dependency through the ‘Turn Windows features on or off’ menu.
- B . Download the dependency via a third-party repository.
- C . Ignore the dependency and install the latest version 4 instead.
- D . Forward the trouble ticket to the SOC team because the issue poses a great security risk.
A
Explanation:
Windows includes .NET Framework 3.5 as an optional feature. Enabling it via Control Panel → Programs and Features → Turn Windows features on or off ensures the OS installs the correct version directly from Microsoft without relying on untrusted sources or skipping needed dependencies.
A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file.
Which of the following should a technician do to resolve the issue?
- A . Revert the spreadsheet to the last restore point.
- B . Increase the amount of RAM.
- C . the storage drive.
- D . Upgrade the network connection speed.
B
Explanation:
As spreadsheets grow in size and complexity, they demand more system memory to load and manipulate data. If the file becomes so large that the available RAM is insufficient, the application may fail to open it. Adding more RAM gives the spreadsheet software the resources it needs to load and work with the expanded dataset.
A help desk team was alerted that a company-owned cell phone has an unrecognized password-cracking application.
Which of the following should the help desk team do to prevent further unauthorized installations from occurring?
- A . Configure Group Policy.
- B . Implement PAM.
- C . Install anti-malware software.
- D . Deploy MDM.
D
Explanation:
A Mobile Device Management (MDM) solution lets administrators enforce app-installation policies – whitelisting approved applications and blocking all others. By deploying MDM, the help desk can centrally control which apps users may install on company-owned phones, preventing unauthorized tools from being added in the future.
SIMULATION
As a corporate technician, you are asked to evaluate several suspect email messages on a client’s computer.
Corporate policy requires the following:
● All phishing attempts must be reported.
● Future spam emails to users must be prevented.
INSTRUCTIONS
Review each email and perform the following within the email:
● Classify the emails
● Identify suspicious items, if applicable, in each email
● Select the appropriate resolution
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Inbox mail 2 – Share your feedback – Legitimate – Perform no additional actions
Inbox mail 3 C Employee orientation – Legitimate – Perform no additional actions
Inbox mail 4 C Security Update C Spam – Report email to Information Security
Inbox mail 5 C Interview – Legitimate – Perform no additional actions
A company wants to use a single operating system for its workstation and servers and avoid licensing fees.
Which of the following operating systems would the company most likely select?
- A . Linux
- B . Windows
- C . macOS
- D . Chrome OS
A
Explanation:
Linux distributions are open-source and generally free of licensing fees, making them suitable for both desktop workstations and servers. Organizations can use the same Linux OS across all their systems without incurring per-seat or per-server costs, unlike proprietary systems such as Windows or macOS.
A company wants to use a single operating system for its workstation and servers and avoid licensing fees.
Which of the following operating systems would the company most likely select?
- A . Linux
- B . Windows
- C . macOS
- D . Chrome OS
A
Explanation:
Linux distributions are open-source and generally free of licensing fees, making them suitable for both desktop workstations and servers. Organizations can use the same Linux OS across all their systems without incurring per-seat or per-server costs, unlike proprietary systems such as Windows or macOS.
An application’s performance is degrading over time. The application is slowing, but it never gives an error and does not crash.
Which of the following tools should a technician use to start troubleshooting?
- A . Reliability history
- B . Computer management
- C . Resource monitor
- D . Disk
C
Explanation:
Resource Monitor provides real-time insights into CPU, memory, disk, and network usage by process. By observing which resources steadily increase or become bottlenecks over time, a technician can pinpoint leaks (e.g., memory), I/O contention, or other performance issues driving the slowdown.
A technician verifies that a malware incident occurred on some computers in a small office.
Which of the following should the technician do next?
- A . Quarantine the infected systems.
- B . Educate the end users.
- C . Disable System Restore.
- D . Update the anti-malware and scan the computers.
A
Explanation:
Once an incident is confirmed, the immediate priority is containment. Isolating (quarantining) the infected machines prevents the malware from spreading to other systems or exfiltrating data, enabling safe analysis and remediation.
A company recently transitioned to a cloud-based productivity suite and wants to secure the
environment from external threat actors.
Which of the following is the most effective method?
- A . Multifactor authentication
- B . Encryption
- C . Backups
- D . Strong passwords
A
Explanation:
While strong passwords and encryption are important, multifactor authentication (MFA) provides the most effective defense against external threat actors targeting cloud-based services. By requiring a second verification step, such as a push notification, one-time code, or hardware token, MFA ensures that even if credentials are compromised, attackers cannot gain access without the additional factor. This significantly reduces the risk of unauthorized account takeovers in cloud environments.
A customer wants to be able to work from home but does not want to be responsible for bringing company equipment back and forth.
Which of the following would allow the user to remotely access and use a Windows PC at the main office? (Choose two.)
- A . SPICE
- B . SSH
- C . RDP
- D . VPN
- E . RMM
- F . WinRM
C, D
Explanation:
RDP (Remote Desktop Protocol): Allows the user to connect to and control the Windows PC’s desktop environment from home.
VPN (Virtual Private Network): Establishes a secure tunnel into the office network so the user’s home device can reach the Windows PC before initiating the RDP session.