aiotestking uk

220-902 Exam Questions - Online Test


220-902 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed? 

A. 143 

B. 23 

C. 443 

D. 3269 

E. 3389 

Answer:

Q2. A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following types of RAID is MOST likely in use? 

A. RAID 0 

B. RAID 1 

C. RAID 5 

D. RAID 10 

Answer:

Q3. A user is looking for the Application Data directory in their profile but cannot see it. Which of the following Control Panel options would correct this? 

A. System 

B. Display 

C. User Accounts 

D. Folder Options 

Answer:

Q4. A technician is instructed to configure a new workstation to boot the OS from the network. The technician must enable which of the following FIRST? 

A. PXE 

B. WOL 

C. WiFi 

D. UPNP 

Answer:

Q5. A user needs to connect securely to the company network while working from a hotel room. Which of the following would the user need available to accomplish this? 

A. AES 

B. VPN 

C. UTM 

D. WPA2 

Answer:

Q6. When using Microsoft Windows 8.1 Operating System, which of the following features allows scripts and snippets to run? 

A. One Drive 

B. XP Mode 

C. Power Shell 

D. Windows Firewall 

Answer:

Q7. A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue? 

A. Unsupported operating system 

B. Unacceptable CPU type and speed 

C. Insufficient airflow and cooling 

D. Inadequate video RAM amount 

Answer:

Q8. Which of the following explains why it is important to secure Personally Identifiable Information (PII)? 

A. So phishing attacks are not launched against employees of the organization. 

B. So sensitive information, such as corporate passwords, is not stolen. 

C. So man-in-the-middle attacks are not launched against the organization. 

D. So sensitive information, such as social security numbers, is not stolen. 

Answer:

Q9. A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not successfully remove the file. When the technician attempts to manually remove the file, an error message appears that says, “The file is in use by another program.” Which of the following tools would be the BEST to use to correct the issue? 

A. Terminal 

B. SFC 

C. Event Viewer 

D. Services Console 

E. Recovery Console 

Answer:

Q10. A technician has been tasked with loading the operating system on every PC with a blank hard drive on a network. The technician wishes to install the operating system with minimal physical interaction with the PCs. Which of the following is the BEST way to accomplish this? 

A. Clone the operating system from an image onto optical media. 

B. Use the original software media to load the operation system on every PC. 

C. Set up a central image that the PCs can load from a PXE boot. 

D. Create an image and copy it from a USB drive using an unattended answer file. 

Answer: