aiotestking uk

220-902 Exam Questions - Online Test


220-902 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Joe, a user, has connected a tablet to his personal mobile hot-spot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO). 

A. Change the SSID to a different broadcast name 

B. Add the intruding device to a blocked access list 

C. Access the intruder’s device and shut it down 

D. Shut down the device until the intruder is no longer in the area 

E. Set up a WiFi analyzer to identify the intruding device 

Answer: A,B 

Q2. The type of security threat that uses computers or other networks to accept and pass on viruses is called: 

A. phishing. 

B. botnets. 

C. logic bomb. 

D. man-in-the-middle. 

Answer:

Q3. A user states that the computer takes a long time to load the desktop after login. Which of the following tools should be used to help remediate the problem? 

A. Disk Management 

B. FIXMBR 

C. MSCONFIG 

D. SFC 

Answer:

Q4. Joe, a technician, receives an error message on his tower PC just after POST which reads: 

“WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics.” 

Which of the following is generating this error message? 

A. CHKDSK 

B. S.M.A.R.T. 

C. eSATA 

D. QoS 

Answer:

Q5. A user reports browsing the Internet is slow and an icon with a picture of a person with a headset keeps asking them to “click here for help.” The user has clicked on the icon to try to resolve the slowness but all that happens is the computer redirects them to a website to purchase software. Which of the following should be performed FIRST to resolve the issue? 

A. Create a restore point 

B. Run O/S updates 

C. Train the user of malicious software 

D. Identify the type of malware 

Answer:

Q6. A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform? 

A. Secure the workstation in a limited access facility. 

B. Document the incident, purge all policy violating materials. 

C. Immediately delete all unauthorized materials. 

D. Reprimand the user and apply a content filter to their profile. 

Answer:

Q7. A technician has decided to upgrade all users’ iPhones to the latest model. Which of the following is the FIRST thing the technician should advise the users to do with the old phones before turning them in? 

A. Back up the mobile data with a cloud backup service. 

B. Enable remote wipe to clear all personal and corporate data. 

C. Go into the device settings to remove personal customizations. 

D. Factory reset the old phones to ensure the data is no longer on the device. 

Answer:

Q8. A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technician should use the LIST function of which of the following commands? 

A. extract 

B. diskpart 

C. bootrec 

D. chkdsk 

Answer:

Q9. A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several apps recently. Which of the following might be the cause of the issue? 

A. Slow data speeds 

B. Defective SD card 

C. Unauthorized root access 

D. Signal drop or weak signal 

Answer:

Q10. Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open? 

A. Backup 

B. Recovery Image 

C. chkdsk 

D. System Restore 

Answer: