aiotestking uk

220-902 Exam Questions - Online Test


220-902 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. A user needs to connect securely to the company network while working from a hotel room. Which of the following would the user need available to accomplish this? 

A. AES 

B. VPN 

C. UTM 

D. WPA2 

Answer:

Q2. A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the technician configure next? 

A. Hosts files 

B. IPv6 settings 

C. Proxy settings 

D. Lmhosts files 

Answer:

Q3. Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use? 

A. Disable DHCP and assign a static IP address to each network device physically connected to the network. 

B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices. 

C. Disable all switch ports when they are not utilized and enable them on an as needed basis. 

D. Place guest network jacks in public areas and all other jacks in secure areas as needed. 

Answer:

Q4. Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction. The WiFi icon is displaying that it has connectivity but she is still unable to browse. Which of the following could be the issue? 

A. PRAM needs to be reset 

B. iCloud is corrupted 

C. The router needs to be rebooted 

D. The upgrade needs to be uninstalled 

Answer:

Q5. Which of the following is an example of client-side virtualization? 

A. Compatibility mode on a program icon properties menu 

B. Running a DOS application on a Windows 7 32-bit operating system 

C. Cloud hosted office applications 

D. XP mode running in Windows 7 64-bit operating system 

Answer:

Q6. Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack? 

A. Shoulder surfing 

B. Man-in-the-middle 

C. Social engineering 

D. Ransomware 

Answer:

Q7. A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue? 

A. Unsupported operating system 

B. Unacceptable CPU type and speed 

C. Insufficient airflow and cooling 

D. Inadequate video RAM amount 

Answer:

Q8. CORRECT TEXT 

A technician has just removed malware from a Windows 7 system, but the user reports that every time they type a URL into Internet Explorer to navigate to a search engine the same standard page is being displayed on the browser. The page is asking the user to purchase antivirus software. 

Please resolve the problem using the available tools shown. 

When you have completed the simulation, please select the done button to submit your answer. 

Answer: Please review explanation for detailed answer. 

Q9. A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information? 

A. DHCP server 

B. DNS server 

C. File server 

D. Proxy server 

Answer:

Q10. A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT? 

A. Copy the DLL file from a working PC and use the regsvr32 command to load the file 

B. Run the Windows Update utility to manually reinstall the DLL file 

C. Run the defrag utility to correct any fragmentation that may have damaged the file 

D. Research the DLL file to identify the application it corresponds to before continuing 

Answer: