Skip survey header

A+ Practice Quiz: 220-1102 Quiz 22

Enjoy the following 10 question quiz from GoCertify

1. You have a computer with a 64-bit dual-core processor that runs the 64-bit version of Windows 10 Professional edition. You would like to upgrade to the 64-bit version of Windows 11 Home. You want to perform the upgrade with the least amount of effort possible.

Which of the following installation methods do you need to perform?
2. You are in the process of preparing to install Windows 11 Professional on your Windows 10 laptop. You have already verified that your laptop hardware is compatible with a Windows 11 installation.

Which of the following pre-installation steps should you perform next?
3. Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server.

Which of the following solutions would be BEST to implement?
4. While on a business trip, an employee accesses the company's internal network and transfers files using an encrypted connection. Which of the following digital security methods is the employee MOST likely using?
5. You want to perform a Windows update on your Windows 11 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update.

Which of the following Control Panel utilities is BEST to enable and use prior to the update?
6. Marcus was attempting to edit some registry settings on his Windows 11 system. Now, when he tries to boot his system, it hangs after the Windows splash screen is displayed.

Because he cannot boot to Safe Mode, he boots the system from the Windows installation disc and accesses the Recovery Environment. Which Recovery option should Marcus use FIRST to help resolve his boot issue?
7. A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him Administrator privileges. Later, Joe discovers that he has access to the salaries in the payroll database.

Which of the following security practices was violated?
8. A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence?
9. A large number of compromised computers are infected with malware that allows an attacker (herder) to control the computers to spread email spam and launch denial-of-service attacks.

Which of the following does this security threat describe?
10. You are troubleshooting a malware infection. As part of the remediation process, you have used a USB drive to boot into a lightweight version of Windows. Which of the following did you MOST likely boot into?