Tuesday 25 March 2014

220-802 PDF

QUESTION NO: 1

Which of the following file system types is used for optical media?

A. FAT32
B. FAT
C. CDFS
D. NTFS

Answer: C

QUESTION NO: 2

A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems.Which of the following should the user do FIRST?

A. Restart the smartphone
B. Reconfigure the smartphone email account
C. Resynchronize the smart phone
D. Update the operating system

Answer: A

QUESTION NO: 3

A technician installed a second hard drive in a computer. Upon restart, a message appears statinG. “primary drive 0 not found. Press F1 to continue." Which of the following should the technician check FIRST?

A. That NTLDR and boot.ini are not missing
B. Proper drive installation (e.g. cables/jumpers)
C. If computer can boot into safe mode
D. If the BIOS boot settings are correct

Answer: B

QUESTION NO: 4

A user has too many applications starting when they log into windows. From the command line,which of the following tools is the FASTEST option to prevent these applications from running on startup?

A. MSCONFIG
B. SERVICES.MSC
C. REGEDIT
D. MSINFO32

Answer: A

QUESTION NO: 5

A technician gets a call from a customer stating that their computer will not boot. They are getting the following error “invalid system disk”. Which of the following should the technician check FIRST?

A. Verify the operating system is installed correctly.
B. Verify that all removable drives are empty.
C. Verify Boot.ini is on the hard drive.
D. Verify the computer will boot into safe mode.

Answer: B

QUESTION NO: 6

A technician is creating an image that will be used to deploy Windows 7 to 100 PCs. Which of the following tools should be used to accomplish this?

A. SYSPREP
B. Windows 7 Advisor
C. CHKDSK
D. DISKPART

Answer: A

QUESTION NO: 7

From which of the following tools can a technician locate the PID of an application?

A. Local Security Policy
B. MSCONFIG
C. Computer Management
D. Task Manager

Answer: D

QUESTION NO: 8

A technician would like to limit computer access to certain users. Which of the following should be configured?

A. Advanced security
B. Boot.ini file
C. System configuration
D. Local security policy

Answer: D

QUESTION NO: 9

When scheduling a backup for preventative maintenance, which of the following would ensure all data was captured?

A. Differential
B. Full
C. Incremental
D. Daily

Answer: B

QUESTION NO: 10

A. an infection that causes a web browser to go to a different site than the one intended from a search result page.
B. a technique used to obtain financial information from a user mimicking a legitimate website.
C. an infection that causes a computer to behave erratically by playing music and launching browser windows.
D. a technique used to obtain financial information from a user by compiling information from social networks and their friends.

Answer: B

No comments:

Post a Comment

Note: only a member of this blog may post a comment.