Ready to Pass Your Certification Test

Ready to guarantee a pass on the certification that will elevate your career? Visit this page to explore our catalog and get the questions and answers you need to ace the test.

CompTIA 220-1202

Custom view settings

Exam contains 72 questions

Page 12 of 12
Question 67 ๐Ÿ”ฅ

SIMULATION As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires the following: โ— All phishing attempts must be reported. โ— Future spam emails to users must be prevented. INSTRUCTIONS Review each email and perform the following within the email: โ— Classify the emails โ— Identify suspicious items, if applicable, in each email โ— Select the appropriate resolution If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Explanation: ee explanation below. Inbox mail 1 - Account Locked - Phishing - Report email to Information Security Inbox mail 2 - Share your feedback - Legitimate - Perform no additional actions Inbox mail 3 โ€“ Employee orientation - Legitimate - Perform no additional actions Inbox mail 4 โ€“ Security Update โ€“ Spam - Report email to Information Security Inbox mail 5 โ€“ Interview - Legitimate - Perform no additional actions

Question 68 ๐Ÿ”ฅ

A user reports getting a BSOD error on their computer at least twice a day. Which of the following should the technician use to determine the cause?

Question 69 ๐Ÿ”ฅ

A technician is setting up a Windows server to allow remote desktop connections for multiple users. Which of the following should the technician configure on the workstation?

Question 70 ๐Ÿ”ฅ

A technician thinks that an application a user downloaded from the internet may not be the legitimate one, even though the name is the same. The technician needs to confirm whether the application is legitimate. Which of the following should the technician do?

Question 71 ๐Ÿ”ฅ

A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

Question 72 ๐Ÿ”ฅ

Which of the following is used to detect and record access to restricted areas?

Lorem ipsum dolor sit amet consectetur. Eget sed turpis aenean sit aenean. Integer at nam ullamcorper a.

ยฉ 2024 Exam Prepare, Inc. All Rights Reserved.