CompTIA 220-902 Certification Practice Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following port does Telnet use?

23

Anna calls you stating that her computer was running fine yesterday. At the end of the day, she powered off her computer. But today, when she powered on her computer, Windows did not start. In place of Windows, the following error message displayed: NTLDR is missing Press any key to restart *Which of the following would MOST likely apply to the issue on Anna's computer?*

A non-bootable CD was left in the optical drive.

You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing, internet access, printers and other local network keep costs low and facilitate easier file sharing, internet access, printers and other local network resources. *Which of the following would be BEST to implement for your business?*

A workgroup

You are currently managing a few Apple iPad devices which are running the iOS operating system. *Which of the following BEST describes the architecture used by this device?*

ARM

Your computer seems to be running slow. In particular, you notice that the HDD activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. *Which of the following would MOST likely improve your computer's speed?*

Add more memory

You manage a computer that runs Windows 7. You want to create a new user account and allow the user to create and save files, install applications, and change the system time. *Which of the following group memberships is the BEST to assign for the new user?*

Administrator

Joe, a frequent visitor to a branch office, attempts to connect his tablet to the office wireless network but it is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworkers hot spot, but is still unable to connect to the internet. *Which of the following is the MOST likely cause of this issue?*

Airplane mode has been set on the tablet

Alice has received several calls from her friends informing her that they are receiving strange emails containing content that seems odd coming from her. *Which of the following MOST likely happened on Alice's computer?*

Alice's email account was hijacked

As you arrive on-site to fix an issue, you are met by a frantic employee who immediately details how critical an issue this is and how important it is to fix it as quickly as possible. Having seen this same issue many times, you inform the customer to stop worrying because you know what you are doing. *Which of the following professionalism principles is the technician failing to follow?*

Avoid dismissing customer problems

You are an IT technician for your company. A coworker calls your department and asks for help fixing his malfunctioning internal Blu-ray drive, which he installed himself. When you arrive, you unplug and then open the employee's computer. As you begin to examine his computer, the employee begins to describe the steps he has taken to install and troubleshoot the issue on his own. You examine all of the connectors and discover that the employee forgot to connect the Blu-ray drive's power cable. Your initial thought is, "How stupid can this guy be?" but your restrain from making any comments. At that moment, another coworker calls your cell phone. The ringing of the phone distracts your thoughts, and while the owner of the computer is still explaining the troubleshooting steps already completed, you quickly connect the power to the device and close the computer. A quick test determines the device is now working properly. *Which of the following professionalism principles is the technician failing to follow? (SELECT TWO)*

Avoiding being judgmental. Actively listening.

A portion of the hard disk that cannot be used.

Bad sector

What type of authentication would require a user fingerprint or face recognition to get past the screen lock on a mobile device and get access to the device?

Biometric Authentication

A user has configured his mobile device to unlock using facial recognition. *Which of the following methods for securing a mobile device is being used?*

Biometrics

You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. *Which of the following is the BEST method of achieving your goals?*

BitLocker

A user stores sensitive data on a USB flash drive. *Which of the following can be used to encrypt the data on this drive?*

BitLocker To Go

A wireless technology standard for exchanging data over short distances.

Bluetooth

A technician is tasked to install the Windows OS on a Mac OS computer so that the computer could be booted to either the Mac OS or the Windows OS. *Which Mac OS feature would the technician use to do this?*

Boot Camp

One day while trying to start your Windows 10 computer, the system displays the following error: *Windows could not start. Could not read from the selected boot disk. Check boot path and disk hardware.* *Which of the following will MOST likely fix the problem?*

Boot into the recovery environment and run the bootrec /rebuildcd command

Your company provides testing services that help customers identify and resolve performance Your company provides testing services that help customers identify and resolve performance issues with their software and e-commerce sites before they go live. To perform accurate testing, issues with their software and e-commerce sites before they go live. To perform accurate testing, a large number of computers are required, sometimes numbering in the hundreds. a large number of computers are required, sometimes numbering in the hundreds. Recently, you have noticed that the lights in the testing lab seem dimmer than normal and Recently, you have noticed that the lights in the testing lab seem dimmer than normal and sometimes flicker. *Which of the following electrical terms BEST describes the condition you are MOST likely experiencing?*

Brownout

You have a Windows system with two SATA hard drives, one used for the operating system and other is used for storing data. You have traced recent problems to a fault in the system motherboard. You replaced the motherboard and reconnected all the hardware. When you start the computer, the system showed the startup information screen, but then returned an error than an operating system could not be found. *Which of the following are the BEST actions to complete? (SELECT TWO)*

Change the boot order in the UEFI configuration. Verify the operating system SATA drive is configured as the boot drive in the UEFI configuration.

Nate, an employee in your organization, has started to work from home two days a week. Nate uses the same company laptop while working in the office and working at home. uses the same company laptop while working in the office and working at home. Nate's laptop automatically connects to the wireless network in the office, but does not Nate's laptop automatically connects to the wireless network in the office, but does not automatically connect to his home wireless network. Nate would like the laptop to connect automatically connect to his home wireless network. Nate would like the laptop to connect automatically at home and at work. *Which of the following would BEST allow this to happen?*

Configure an alternate TCP/IP configuration on the laptop's wireless adapter to use a static IP address that is compatible with the home network

You have just installed anti-malware software on all the computers on your company's network. *Which of the following additional actions would be BEST to take to help protect the systems from malicious software? (SELECT TWO)*

Configure the software to automatically update its definition files. Train users to scan removable strage devices before copying files.

As an IT technician for your company, you have been notified that the Windows domain does not seem to be functioning properly. Being familiar with domains, you are fairly confident you know what the issue is. But just to be safe, you take the applicable time to gather additional information and to identify what, if anything, has changed. *Which of the following is your next BEST step?*

Create a hypothesis

Occurs when two files claim the same cluster.

Cross-linked file.

As you arrive on-site at a customer's place of business, you go to the front desk and ask for Mr. Magorium, the head of the IT department. Mr. Magorium meets you, introduces himself as Edward, and escortys you to the printer, which is jammed. After you fix the printer, the existing print job completes. As the paper comes out, you notice that on of them is marked confidential and has to do with an upcoming merger. You go to Mr. Magorium and say "Hi Edward, your printer is fixed and working perfectly." Mr. Magorium then escorts you off the premises. When you get home that evening, you tell your spouse about the merger document you saw. The next day, you call Mr. Magorium to verify that the printer is still functioning properly. *Which of the following professionalism principles is the technician failing to follow?*

Deal with confidential materials appropriately.

The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions: -Allow Full Control to the D:\Reports folder -Deny Full Control to the D:\Sales folder -Deny Full Control to the D:\Reports\2010reports.doc file -Allow Full Control to the D:\Sales\2010sales.doc file *Which of the following BEST describes the effective permissions Mary will have for both files?*

Deny Full Control to D:\Reports\2010repors.doc; Allow Full Control to D:\Sales\2010sales.doc

Ted, an employee in the Sales department has asked a coworker, Ann in the Production department, to update the product descriptions contained in a Sales document. Ann can open the file, but after making changes can't save the file. *Which of the following digital security methods is MOST likely preventing this?*

Directory permissions

Timothy works in the graphic arts departments and has gotten approval to upgrade his video card. The card has arrived, and you are ready to being the upgrade. *To ensure your personal safety, which of the following should you do FIRST?*

Disconnect power

Nathan, a long time Mac user, has been using his Mac computer for some time now with no issues. Recently, however, he has reported that his Mac will unexpectedly tell him that his computer must be restarted by holding down the Power button for several seconds or by pressing the Restart button. *Assuming that this is a symptom of kernel panic, which of the following steps would be the BEST first step for troubleshooting this issue?*

Do a safe boot

Mobile devices can connect to the Internet and to other devices using a variety of connection types.

Drag the connection type of the left to the appropriate description on the right

A technician wants to destroy the data on a hard drive and repurpose it as a spare drive. *Which of the following data destruction methods allow the reuse of the hard drive?*

Drive wipe

You want to install Windows on a mirrored disk array. You run the motherboard disk You want to install Windows on a mirrored disk array. You run the motherboard disk configuration utility and create the RAID 1 array, then configure the system to boot from the configuration utility and create the RAID 1 array, then configure the system to boot from the Windows installation disc. Windows installation disc. The Windows installation starts but does not detect the RAID array. *Which of the following will MOST likely allow the RAID array to be detected?*

During the install, browse to and select the appropriate driver for your RAID controller when prompted where you want to install Windows.

You work for a store that sells and repairs computers. Due to the room's layout, while repairing computers, you must walk from one side of the carpeted room to the other frequently. *Which of the following would BEST protect your from static electricity buildup?*

ESD wrist strap

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Mary user account is a member of the Sales group. *Which of the following will BEST prevent Mary from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users?*

Edit the properties for the file; assign Mary the Deny Full Control permission

A technician is installing a SOHO router at an after-school community center. The customer would like to keep the children from accessing inappropriate material when web browsing. *Which of the following would help accomplish this?*

Enable content filtering

You have just purchased a used laptop and you want to configure it to hibernate when you press the power button. You edit the Power Options settings and enable hibernation, then you configure the power button to trigger hibernation. Everything works fine for several weeks. However, one day when you press the power button, the laptop does not hibernate. *Which of the following will BEST resolve the issue?*

Free up disk space

A user calls to report a problem. He is trying to install an application on his new Windows 10 system, but cannot. His user account is a member of the Users group on the system. *Which of the following is the MOST likely cause of the installation error?*

His group membership does not allow him to install new software.

A physical location where you can obtain wireless Internet access using a WLAN.

Hotspot

A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility you note the following: -They use an 802.11a wireless network -The wireless network SSID is set to BWLAN -The wireless network is not brodcasting the network SSID -The wireless network uses WPA2 with AES security -Omnidirectional access points are positioned around the periphery of the building. *Which of the following would you MOST likely recommend your client do to increase their wireless network security?*

Implement directional access points.

You have created a custom library using D:\Stats as the path to the library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. *Which of the following steps would BEST meet your requirements?*

Include the D:\Reports folder in the Library.

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only FIVE computers in this office. In addition to the ability to share network resources, security is top priority. *Which of the following BEST describes the type of network you should help install?*

Install a WorkGroup to allow each device to control what is shared and with whom.

You would like to control internet access based on users, time of day, and Websites visited. *Which of the following actions would BEST meet your criteria?*

Install a proxy server. Allow Internet access only through the proxy server.

Don is an accountant in the Finance department, and for the last several months has been testing an online accounting program. After speaking with his manager, Don received permission to download a streamlined version of the software which requires a local installation. After downloading, Don tried to install the application, but the OS will not allow it. Out of frustration, he called the Help Desk. The Help Desk personnel came to Don's machine and installed the application without issue. *Which of the following is the MOST likely reason Don could not install the application?*

Insufficient permissions

Don is an accountant in the Finance department. For the last several months he has been testing an online accounting program. After speaking with his manager, Don received permission to an online accounting program. After speaking with his manager, Don received permission to download a streamlined version of the software which requires a local installation. After download a streamlined version of the software which requires a local installation. After downloading, Don tried to install the application, but the operating system will not allow it. Out of downloading, Don tried to install the application, but the operating system will not allow it. Out of frustration, he called the Help Desk. The Help Desk personnel came to Don's machine and frustration, he called the Help Desk. The Help Desk personnel came to Don's machine and installed the application without issue. installed the application without issue. *Which of the following is the MOST likely reason Don could not install the application?*

Insufficient permissions

An employee working from home accesses the company network using a VPN connection. When connecting, the employee is prompted for a PIN that changes at predetermined intervals. *Which of the following will the employee MOST like use to obtain the PIN?*

Key fob

A series of used clusters on the hard disk drive that are not associated with a specific file.

Lost clusters

You are in the process of preparing a storage device and must determine which file system to use. *Which of the following BEST describes the advantage of using the exFAT file system over the NTFS?*

Lower memory and processor resource use

You work in the IT department. To perform your daily tasks, you often use many of the Windows consoles, such as the Device Manager, Hyper-V Manager, and the Performance Monitor. Although each of these can be accessed from various locations in Windows, you want one location from which these commend tools can be accessed. *Which of the following system utilities would BEST provide this capability?*

MMC (Microsoft Management Console)

You work as a lab technician, where you are required to service and maintain computers. Doing this often requires disposing of hazardous materials such as batteries and cleaning chemicals. *Which of the following is the BEST resource for determining the proper way to dispose of these materials?*

MSDS

You want to upgrade your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase an upgrade version of Windows 10 and perform an in-place upgrade. *Which of the following would be the next BEST step?*

Make sure that all installed applications run correctly.

Check Disk detects disk integrity errors and fixes them.

Match the types of errors Check Disk detects and fixes on the left with the error description on the right.

As an IT professional, you have found that some Windows computers don't always have enough random access memory (RAM) for all the programs a user may try to run. As such you need to random access memory (RAM) for all the programs a user may try to run. As such you need to ensure that the virtual memory is configured properly. ensure that the virtual memory is configured properly. Which of the following BEST describes the aspects of virtual memory that you can configure on a *Which of the following BEST describes the aspects of virtual memory that you can configure on a Windows workstation? (SELECT TWO)*

Maximize size of the paging file. Location of the paging file.

A customer complains of a slowly-operating Windows system. In researching the problem, you notice that the computer's hard disk drive light stays illuminated for long periods of time as more notice that the computer's hard disk drive light stays illuminated for long periods of time as more applications are loaded. *To speed up the computer, which of the following components would you MOST likely consider upgrading?*

Memory

Provides mobile devices with access to the network resources and software applications on their home network when they connect using other wireless or wired networks.

Mobile VPN

Which of the following networking devices or services MOST likely is not compatible with VPN connections?

NAT

A connector used to emulate cryptographic smart card functionalities.

NFC

You have been called in to a customer's site to troubleshoot and fix one of their computers. From the description you received on the phone (prior to coming to their office), you have already given the customer an idea of which component may need to be replaced and how much it would cost to repair. You have been given permission to fix that component at the cost you quoted. When you open the computer and begin troubleshooting, you notice that what you suspected to be broken was instead working perfectly. The real issue is soon discovered. After checking with your suppliers, you find that the replacement component is less than the component you had intended to fix. *Which of the following is your BEST course of action?*

Obtain authorization before repairing the broken component.

Files that exist on the hard drive but which are not associated with a directory in the index.

Orphaned files

You are an IT technician your your company. Michael, who works at the receptionist desk, thinks his Windows 10 machine is running extra slow today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Michael's computer, perhaps a malfunctioning application. To help troubleshoot Michael's computer, you run Task Manager. *Which of the following tabs would be the MOST helpful for getting an overall view of how Michael's computer is running? (SELECT TWO)*

Performance. Processes.

Joe, a user, receives an email from a popular video streaming web site urging him to renew his membership. The email appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL. *Which of the following security threats does this describe?*

Phishing

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. *Which of the following network hosts would MOST likely provide this service?*

Proxy server

You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming the system files is being caused by malware. *Which of the following is the next BEST step that should be taken?*

Quarantine Vivian's computer

A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. *Which of the following cloud concepts does this represent?*

Rapid Elasticity

While working on your Windows 7 system, the system encounters a critical error. For a brief second, you see the Blue Screen indicating the error. Before you can read the error, however, the system reboots. After rebooting and logging back on, the same thing happens again. *Which of the following actions would stop the computer from rebooting the next time the system encounters a critical error, allowing you to read the error message?*

Reboot the system. Press F8 and disable the automatic restart feature.

A home office user employs a technician to secure a Windows computer. *To secure the local accounts, which of the following actions should the technician perform? (SELECT TWO)*

Rename the Administrator account. Disable the guest account.

On Windows 10, using Storage Spaces eliminates the need for which of the following tasks? (SELECT TWO)

Repartitioning drives. Resizing Volumes.

For the past few fays, a mobile phone has stopped functioning and will not respond to touchscreen input. A soft reset no longer returns functionality. *Which of the following is the BEST step the user can take to fix this problem?*

Reset to factory default

You are an IT technician for your company. Fred calls you complaining that every time he opens You are an IT technician for your company. Fred calls you complaining that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after You suspect this change is being caused by a malware infection on his system. However, after running the antimalware and antivirus software, Fred is still having the same issue. running the antimalware and antivirus software, Fred is still having the same issue. *Which of the following would be the next BEST way to remove the malware?*

Restore Fred's computer back to a previous restore point.

Pablo's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on and to improve his computer's performance. Your run Task Manager on Pablo's computer and find that a suspicious application has nearly 90% CPU utilization. *Which of the following can be used from Task Manager to stop the application from running?*

Right-click>End task

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 7. Your organization relies on a particular application, which worked workstations to Windows 7. Your organization relies on a particular application, which worked correctly in earlier versions of Windows, but now does not run in Windows 7. You have checked correctly in earlier versions of Windows, but now does not run in Windows 7. You have checked the application vendor's website, but there is no update available. *To be able to run the application, which of the following is the next BEST step to try? (SELECT TWO)

Run the application in compatibility mode. Create a virtual computer that runs Windows XP and run the virtual computer each time.

A remote server has an issue that needs to be fixed. Not wanting to go to that computer you decide to create a secure connection to the remote server. *Which of the following is the BEST to use when creating the connection?*

SSH

An administrator configures the Time Machine application on a Mac OS computer and develops scripts that use the tar command on Linux computers. *Which of the following BEST practices is the administrator following?*

Scheduled backups

You're troubleshooting a computer running on Windows 10. The operating system has halted and a blue screen has been displayed on the monitor with an error message. *Which of the following is the MOST likely first step that should be taken in troubleshooting the issue?*

Search for the error in Microsoft's knowledgebase

One of the Windows workstations you manage has three user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. Each limited and adminstrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. *Which of the following would MOST likely increase the security of this system? (SELECT TWO)*

Set a screensaver password./ Disable autorun on the system.

A small business hires an after-hours cleaning service that is known to have a high turnover of employees. They want to prevent unauthorized access to their computers, but do not want to spend money on new hardware. *Which is the BEST solution?*

Set login time restrictions

A user is trying to log into her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. *Which of the following is MOST likely the cause of the problem?*

She has enabled Num Lock, causing numbers to be sent from the keyboard instead of letters.

Emma, a long-haul truck driver, reports that when driving on more remote highways, her smartphone battery drains faster than normal and that her phone often cuts out. *Which of the following is the MOST likely reason for the fast battery drain?*

Signal drop or weak signal

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet. *Which of the following BEST describes the type of attack which has occurred in this scenario*

Spoofing

You have configured your Windows systems to automatically backup user data every night at midnight. You also take a system image backup once a month. *In addition, which of the following would MOST likely ensure that you are protected against data loss? (SELECT TWO)*

Store a copy of all backups off-site. Regularly test restoration procedures.

A new computer has been added to the Sales department and needs to be joined to the CorpNet domain. *Which of the following System Properties settings MUST be used to make the change?*

System Properties>Computer Name

You want to perform a Windows update on your Windows 10 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update. *Which of the following Control Panel utilities would be BEST to enable and use prior to the update?*

System protection

An intruder waits near an organization's secured entrance until an employee approaches the entrance and unlocks it with a security badge. The intruder falls in line behind the employee, who assumes the intruder is another employee and holds the door open for her. *Which of the following BEST describes the kind of attack that just occurred?*

Tailgating or Piggybacking

As a member of the IT staff, your manager has asked you to make sure that automatic backups are performed at regular times (such as on specific days at specific times). *Which of the following is the BEST tool to use for this purpose?*

Task Scheduler

Allows you to share the Internet connection of a phone with a laptop

Tethering

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the following attributes: Read only (R) and encryption. *When the file is copied, which of the following is true?*

The R attribute is retained on the file

After a user checks the volume settings and makes sure it is not muted, sound is still not coming from the internal speaker on a tablet device. *Which of the following is MOST likely the reason?*

The audio output is being directed to a Bluetooth speaker.

A technician is unable to install virtualization software on a host computer. The host has more free disk space than required. *Which of the following is MOST likely to be the cause?*

The motherboard UEFI/BIOS doesn't support hardware assisted virtualization

You want to join your computer to a homegroup but you don't see any homegroups on your home network. You know they have been set up on other computers at home. *Which of the following is MOST likely preventing you from seeing the homegroups that have been created? (SELECT TWO)*

The network location is not set to Home Network. Network Discovery has been disabled on your computer.

You work for a large company that has over 1000 computers. Each of these computers uses a wireless mouse and keyboard. Therefore, your company foes through a lot of alkaline batteries. When these batteries can no longer power the intended device, you must decide what to do with them. *Unless otherwise dictated by your local authorities, which of the following would be the EASIEST way to deal with these batteries?*

They can be thrown in the trash

Your company resides in an area with rapid growth in both the corporate and residential areas surrounding your office. As such, your company has been experiencing several brownouts due to power grid problems (too much demand and not enough electricity). Fearing that your computers (especially the servers) could be damaged by these brownouts, your manager has asked you to find a solution to this problem. *Which of the following would be the BEST type of device to recommend to your manager to protect the computers?*

UPS (Uninterruptible Power Supply)

While trying to log on, a user accidentally typed the wrong password three times, and now the system tells him that he can't log on because of too many incorrect passwords. He still remembers his password, but just typed it wrong. He needs access as quickly as possible. *Which of the following would allow the user to log on?*

Unlock the account

Which of the following is the BEST way to keep a Windows 10 system from automatically restarting after a critical system error occurs?

Use the Disable automatic restart after failure option on the Advanced Startup Options menu.

A technician is tasked to configure a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available. *Which of the following should the technician configure?*

VPN

While on a business trip, an employee access the company's internal network and transfers files using an encrypted connection. *Which of the following digital security methods is being used?*

VPN

You currently use the Exchange email client on your desktop PC. You use it to connect to an email server provided by a service provider using the IMAP and SMTP protocols. You recently purchased an iPad and want to configure its Mail app to connect to your email server. *Which of the following BEST describes whether this can be accomplished?*

Yes, you can configure the Mail app on an iPad to connect to an email server using the IMAP and SMTP protocols.

Your system administrator shared a USB laser printer connected to your Windows 10 system so other users on the network can send jobs to it. A network user has sent a large job to the other users on the network can send jobs to it. A network user has sent a large job to the printer, but the print job has stalled. You try to delete the print job, but can't. *Which of the following BEST describes the reason you cannot delete the job?*

You do not have the Manage documents permisison

In which of the following situations would restoring from a system image be the BEST option?

You need to restore a Windows system after a catastrophic hard drive failure

A technician uses the ps command to find information about a process that is running a browser application a Linux computer. The technician knows the name of the process but the list is very long. *Which of the following commands would help the technician find and display only the information about the browser process?*

grep

As you are working on your Windows 10 computer during a fierce thunderstorm, lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. *Which of the following tools is MOST likely to rectify this issue?*

sfc

You manage the desktop computers at your company. You are in charge of 100 computers, all of You manage the desktop computers at your company. You are in charge of 100 computers, all of which run Windows 7. You want to upgrade all computers to Windows 10. Prior to the upgrade, which run Windows 7. You want to upgrade all computers to Windows 10. Prior to the upgrade, you need to verify the compatibility of each computer with Windows 10. You want to gather the you need to verify the compatibility of each computer with Windows 10. You want to gather the necessary information as quickly as possible. *Whcih of the following will BEST collect the required information?*

use the Microsoft Assessment and Planning Toolkit (MAP)


Set pelajaran terkait

Klett Maximal Interaktiv 1 - Lektion 1.1 (Teil 3)

View Set

Adult care exam 2: Musculoskeletal

View Set

MGMT 117 Business Ethics, MGMT 117 Final Study Set

View Set

Combo "FCE use of english key word transformation"

View Set

Bill of Rights - First 10 Amendments

View Set

Everything I need to know Week 2

View Set

Unit 2: Obstetrics - B. Abnormal Obstetrics

View Set