A technician is setting up network adapter settings on Windows clients that have static IP address assignments. The technician has more than 100 workstation to complete and wants to automate the process. The requirements for the adapter settings are as follows:
1.
They must utilize a command line utility
2.
The technician has no access to Group Policy
3.
All workstation should have an IP address assigned by the DHCP.
Which of the following steps should the technician perform to meet these requirements?
A. Use the ipconfig/release and ipconfig /renev command to have the workstation contact the DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.
B. Use the petsh command to reset the workstation adapter. Then use the ipconfig /renew command to use DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.
C. Use the net use command to view active connection on the network. Then use the ipconf /renew command to use DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.
D. Use the netstat command to find connections on the workstation adapter. Then use the ipconf /renew command to use DHCP for a new lease. Place these two commands in a .bat file to execute on all systems.
Which of the following physical security measures is intended to mitigate tailgating?
A. Biometrics
B. Badge reader
C. Smart card
D. Mantrap
A user's smartphone began experiencing decreased performance after the user watched some videos, browsed the web, and accessed the application store. The user states the phone was working fine beforehand.
Which of the following should be done FIRST to resolve the issue?
A. Replace the smartphone with a model that has faster hardware.
B. Check the storage space availability on the smartphone.
C. Look for OS updates.
D. Restore the smartphone to the manufacturing image
An IT manager receives an email from an upset. The customer has been reporting an issue with a computer virus for a weeks. The customer has already put in a support ticket for the issue and left phone messages with IT support requesting an update on when the issue might be fixed, but the customer's call s has not been returned. The IT manager knows the IT staff is very busy and not purchased ignore the customer.
Which of the should the do to address customer's complaint?
A. Contact the customer and explain the IT staff a busy. and the customer will have to wait for service.
B. Contact the customer and attempt to get more details on the issue, and then assign a technician to follow up with the customer.
C. Contact the customer and attempt to fix the issue without assigning it to a technician.
D. Contact the customer and recommend that the customer call the IT support desk to troubleshoot the issue.
Which of the following may include the use of a password and a rotating PIN lo access a wireless network?
A. RADIUS authentication
B. TKIP authentication
C. Multifactor authentication
D. TACACS authentication
After purchasing an Ultrabook. Ann. a home user, has a technician come to her home and install an operating system. Which of the following OS retaliation methods will the technician MOST likely use?
A. Flash drive
B. PXE
C. Optical disc
D. Cloned drive
A user's laptop screen goes black after five minutes of not being used. Which of the following Windows Control Panel utilities should be used to modify the user experience?
A. Troubleshooting
B. Internet Options
C. Power Options
D. Device Manager
A home user installed 16GB of RAM in an older PC to increase its performance. However, after booting up, the computer is only reporting 4GB of RAM to the system. Which of the following is the MOST likely cause of the issue?
A. The RAM type is mismatched
B. The OS is 32-bit.
C. The RAM is faulty.
D. The memory installed incorrectly.
A company's computers have continuously been infected with malware. Multiple users have been bringing in USB flash drives, which they use to work on project while at home and the office.
Which of the following security best practices should a technician implement to minimize exposure with the LEAST amount of impact to the users?
A. Disable AutoRun.
B. Enable data encryption.
C. Restrict user permissions.
D. Configure logon time restrictions
After a successful phishing attempt on a corporate workstation, the workstation is infected with malware that went undetected by the antivirus. When a technician arrives to investigate the issue, the workstation is no longer in a bootable state. Recovery is not possible, and the operating system has to be reinstalled completely.
Which of the following would MOST likely prevent a future infection?
A. Creating regular restore points
B. Educating the user
C. Scanning for viruses frequently
D. Channing to a different antivirus vendor
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.