aiotestking uk

220-902 Exam Questions - Online Test


220-902 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. A user is configuring the email settings on a smartphone. Which of the following configurations will allow the user to synchronize email from multiple devices? 

A. IMAP 

B. S/MIME 

C. POP3 

D. SMTP 

Answer:

Q2. In order to prevent other users from editing files in ‘C:\ Files’, which of the following steps should be taken? 

A. Set NTFS permissions to read only 

B. Set the folder to index files for search 

C. Set the local administrator as the owner of the folder 

D. Set network share permissions to read only 

Answer:

Q3. A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access? 

A. Check the phone for unauthorized root access 

B. Disable the phone’s Bluetooth chip 

C. Erase all personal data from the phone 

D. Check the phone for location tracking 

Answer:

Q4. Which of the following Windows OS capabilities allows modern Windows versions to run applications written for older versions natively? 

A. Microsoft Virtual PC 

B. Compatibility mode 

C. Hyper-V 

D. Virtual XP mode 

Answer:

Q5. Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST? 

A. Set the application to run in XP compatibility mode 

B. Reinstall Windows XP 

C. Configure a dual boot with XP and 7 

D. Install the application in XP mode 

Answer:

Q6. While navigating a Windows machine through command prompt, which of the following commands will a technician use to display the contents of the current folder? 

A. cd 

B. dir 

C. md 

D. rd 

Answer:

Q7. Ann, a user, has brought her laptop in for service. She reports that her battery is at 100%, but whenever it is unplugged it immediately shuts down. Which of the following should the 

technician do? 

A. Replace the battery 

B. Change power settings to balanced 

C. Replace the power adapter 

D. Enable APM in the BIOS 

Answer:

Q8. A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be: 

A. a detriment to employer/employee relations. 

B. personally identifiable information. 

C. a violation of information access policies. 

D. proof of employee corporate affiliation. 

Answer:

Q9. A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the user’s NEXT step in resolving this issue? 

A. Configure Wake-on-LAN for the NIC on the Work PC. 

B. Configure a firewall exception on the Home PC. 

C. Switch the Work PC network from “Work” to “Home”. 

D. Disable the Windows firewall on the Home PC. 

Answer:

Q10. A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client’s machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory? 

A. Identify the problem 

B. Establish a plan of action to resolve the problem 

C. Test the theory to determine cause 

D. Document findings, actions, and outcomes 

Answer: