CompTIA 220-902 Free Practice Exam & Test Training - 101-200
CompTIA 220-902 Free Practice Exam & Test Training - 101-200
0 (220-902) -
Full
Access
Question
101 (
Topic 1
)
A technician needs to log into a user's computer to fix the user's corrupt local profile. Which of the following connectivity tools will allow the technician to connect to the users computer?
A. Remote Assistance
B. Virtual Private Network
C. Computer Management
D. Remote Desktop
Answer :
D
Question
102 (
Topic 1
)
Which of the following tasks is automatically added to the task scheduler in Windows to keep hard disk performance up?
A. defrag
B. chkdsk
C. cleanmgr
D. diskpart
Answer :
A
Question
103 (
Topic 1
)
A technician receives a call regarding a PCs slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but
there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT?
Answer :
C
Question
104 (
Topic 1
)
Which of the following would a technician use to search for a specific string within a file name?
A. grep
B. chmod
C. wget
D. sudo
Answer :
A
Question
105 (
Topic 1
)
A user needs to connect securely to the company network while working from a hotel room.
Which of the following would the user need available to accomplish this?
A. AES
B. VPN
C. UTM
D. WPA2
Answer :
B
Question
106 (
Topic 1
)
Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times.
Question
107 (
Topic 1
)
A technician is working on a users PC. After testing the theory of the cause, which of the following could the technician perform NEXT? (Select TWO).
A. Resolve issue
B. Inform user
C. New theory or escalate
D. Document issue
E. Verify system functionality
Answer :
A,C
Question
108 (
Topic 1
)
A user reports browsing the Internet is slow and an icon with a picture of a person with a headset keeps asking them to click here for help. The user has clicked on the icon to try to resolve the slowness but all that
happens is the computer redirects them to a website to purchase software. Which of the following should be performed FIRST to resolve the issue?
Answer :
D
Question
109 (
Topic 1
)
An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?
A. Antivirus software
B. Internet connectivity issues
C. Ransomware infection
D. Content-filtering
Answer :
D
Question
110 (
Topic 1
)
A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur?
A. Dead pixels
B. Flickering image
C. No image on screen
D. Distorted image
Answer :
D
Question
111 (
Topic 1
)
A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does not run correctly and is reporting that the .dll is missing. Which of the following tools would the technician use to complete
the import of the .dll?
A. gpresult
B. msconfig
C. regedit
D. gpupdate
E. regsrv32
Answer :
E
Question
112 (
Topic 1
)
Which of the following is the BEST option to prevent data breaches on lost mobile devices?
Question
113 (
Topic 1
)
A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case.
Which of the following is the BEST course of action for the technician?
Answer :
D
Question
114 (
Topic 1
)
Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Joe is then required to type in his username and password to
unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screen-lock options are grayed out on the computer and cannot be changed. Which of the following is the
MOST likely cause of this issue?
Answer :
A
Question
115 (
Topic 1
)
The network administrator has changed the IP address of Computer A from 192. 168. 120 to 10. 10. 1020 and now Jane a user, is unable to connect to file shares on Computer A from Computers using the computer
name.
Instructions:
Using the available tools, resolve the connectivity issues. When you have completed the simulation, please select the done button to submit your answer.
Answer :
Please review explanation for detailed answer.
Explanation: Please check the below images for detailed connectivity steps to do:
Question
116 (
Topic 1
)
The customer reports their PC freezes up everyday around the same time. Which of the following utilities would be BEST to check for any error codes?
A. Windows Updates
B. Task Scheduler
C. Event Viewer
D. Performance Monitor
Answer :
C
Question
117 (
Topic 1
)
A user has a Windows 8.1 RT operating system and wants to add additional programs to the computer. Which of the following is available for installing more applications?
A. Microsoft Store
B. DVD
C. Google Play
D. iTunes
Answer :
A
Question
118 (
Topic 1
)
A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following
actions should the technician take NEXT?
Answer :
B
Question
119 (
Topic 1
)
A technician is tasked with installing Windows on numerous network PCs. Which of the following is the QUICKEST method for getting a standard configuration to the PCs?
Answer :
A
Question
120 (
Topic 1
)
A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are
allowed access?
Answer :
B
Question
121 (
Topic 1
)
A technician is tasked to change the number of CPU cores available to the OS to enhance productivity. Which of the following tools would allow the technician to perform this task?
A. msconfig
B. perfmon
C. taskmgr
D. dxdiag
Answer :
A
Question
122 (
Topic 1
)
Which of the following updates should be performed on a regular basis to ensure the OS has the latest security patches?
A. Anti-malware updates
B. Driver updates
C. Windows updates
D. Firmware updates
Answer :
C
Question
123 (
Topic 1
)
Which of the following security threats happens when another person enters a secured area with an authorized person?
A. Tailgating
B. Shoulder surfing
C. Spoofing
D. Phishing
Answer :
A
Question
124 (
Topic 1
)
A technician has successfully completed a gpupdate from a CMD box of a users PC and is ready to move to the next user. Which of the following is the appropriate NEXT step?
(Select TWO).
Answer :
B,D
Question
125 (
Topic 1
)
A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers?
A. 10 feet (3 meters)
B. 15 feet (5 meters)
C. 30 feet (9 meters)
D. 45 feet (14 meters)
Answer :
C
Question
126 (
Topic 1
)
A Google account on an Android device by default will synchronize to which of the following locations?
A. Cloud
B. SSD
C. PC desktop
D. MicroSD
Answer :
A
Question
127 (
Topic 1
)
An administrator is in a Remote Assistance session, sharing a users desktop. While trying to map a shared network drive for the user, an access denied error is encountered while using the users credentials. Which of
the following should be the administrators NEXT step?
Answer :
C
Question
128 (
Topic 1
)
You need to configure your mobile device to send and receive electronic messages from your company. Your mobile device must be able to truly synchronize the message state with your desktop, so that when a
message is read on your desktop, it is marked as read on your mobile device. These are the proper parameters:
Password: P@$$w0rd
Security: WPA2
Passphrase: P@$$w0rd
Instructions: You are not authorized to use the Company's WLAN. The outgoing server does not require login credentials. When you have completed the simulation, please select the done button to submit your
answer.
Answer :
Explanation:
Since we are instructed to not use the companys WLAN we only need to worry about the email settings and ignore the WiFi and Networks tab.
[8]
Question
129 (
Topic 1
)
A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the users
NEXT step in resolving this issue?
Answer :
B
Question
130 (
Topic 1
)
A user tries to connect to the Internet using a dial-up modem and receives a No dial tone detected message. Which of the following is the FIRST thing the technician should check to troubleshoot the issue?
Answer :
B
Question
131 (
Topic 1
)
A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network?
A. SSH
B. VPN
C. SFTP
D. RDP
Answer :
B
Question
132 (
Topic 1
)
In order to prevent other users from editing files in C:\ Files, which of the following steps should be taken?
Answer :
A
Question
133 (
Topic 1
)
A technician is tasked with analyzing computer settings managed by Microsoft Group
Policy configuration. The technician wants to print a report to an HTML file for offline review. Which of the following Windows command line tools would allow the technician to accomplish this task?
A. gpedit.msc
B. gpupdate
C. gpresult
D. gpmc.msc
Answer :
C
Question
134 (
Topic 1
)
Which of the following is TRUE about the difference between a worm and a virus?
A. Worms are written in assembly while viruses are written with scripting languages.
B. Viruses hide in the boot record while worms hide within the file system.
C. Worms self propagate while viruses need human intervention to replicate.
D. Viruses disable the antivirus update service while worms kill the antivirus process.
Answer :
C
Question
135 (
Topic 1
)
A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless signal connection when the laptop screen is tilted forward or backward during operation. When this happens,
the entire wireless signal drops out until the screen is left in position for a good minute or so. Which of the following MOST likely explains what is happening?
A. The hinges on the laptop screen are not strong enough to support the wireless signal cables.
B. The wireless card is losing contact to its socket when the screen is opening/closing.
C. The laptop is designed to work optimally with wireless when the screen is at a perfect 90 degree angle.
D. The wireless signal cables are being crimped when the screen is opening/closing.
Answer :
D
Question
136 (
Topic 1
)
A technician is using a domain account to access files located on a server at the path
\\computername\C$. The technician receives an Access denied error message. Which of the following is MOST likely the cause of the error?
A. The server is no longer accepting connections since reaching its limit of open shares.
B. The password is incorrect, requiring the user to reset it before authentication will proceed.
C. The username should be prefixed by the domain, followed by a backslash (e.g., domain\username).
D. The account does not have local administrative permissions to access the server share.
Answer :
D
Question
137 (
Topic 1
)
A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees laptops have successfully connected to the wireless network, the company would like to prevent
additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change?
Answer :
A
Question
138 (
Topic 1
)
A customers Windows 7 Home Premium computer displays a stop error and automatically reboots. Which of the following system utilities can a support technician use to find more information about the cause of the
error?
A. Action Center
B. Event Viewer
C. File Explorer
D. Disk Management
Answer :
B
Question
139 (
Topic 1
)
A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the following should the computer
technician do before connecting a cable TV line to a TV tuner card?
A. Perform self-grounding
B. Unplug the computer power cable
C. Use an ESD strap
D. Require the electrical system be brought up to code
Answer :
B
Question
140 (
Topic 1
)
Users are reporting that their laser printer is picking up multiple pages. The printer has very high utilization. Which of the following should be performed to resolve this issue?
Answer :
A
Question
141 (
Topic 1
)
A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss of video during operation. Which of the following are MOST likely causes of this problem? (Select TWO).
Answer :
A,C
Question
142 (
Topic 1
)
Which of the following should be used to ensure that a Windows OS is functioning optimally?
A. Driver updates
B. Scheduled backups
C. Application updates
D. Restore points
Answer :
A
Question
143 (
Topic 1
)
A PC is powering on but the only activity a technician can see is spinning fans. Which of the following components would MOST likely be at fault for such a condition? (Select
TWO).
A. SATA controller
B. CPU
C. Memory
D. Hard drive
E. Sound card
Answer :
B,C
Question
144 (
Topic 1
)
A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the
following would be the next BEST step for this technician to perform?
Answer :
A
Question
145 (
Topic 1
)
Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device. He now notices the battery is rapidly draining. Which of the following can Joe
Answer :
D
Question
146 (
Topic 1
)
When removing the top case from a laptop, which of the following, besides hand tools, should a technician have on hand to assure correct disassembly and reassembly? (Select
TWO).
Answer :
D,E
Question
147 (
Topic 1
)
A user frequently travels with a Windows laptop and connects to several wireless networks.
At a new location, the user reports that the locally shared printers are not available on the wireless connection. Which of the following would be causing the issue?
Answer :
A
Question
148 (
Topic 1
)
A technician has just removed malware from a Windows 7 system, but the user reports that every time they type a URL into Internet Explorer to navigate to a search engine the same standard page is being displayed
on the browser. The page is asking the user to purchase antivirus software.
When you have completed the simulation, please select the done button to submit your answer.
Answer :
Please review explanation for detailed answer.
Explanation: Please check the below images for detailed steps to do:
Question
149 (
Topic 1
)
A user is experiencing a software application error. The user contacts a technician for support. Which of the following will allow the user to issue an invitation to the technician in this scenario?
A. Remote desktop
B. Remote assistance
C. telnet
D. FTP
Answer :
B
Question
150 (
Topic 1
)
Which of the following commands are used from a Linux command line interface to elevate a users access level to administrative privilege? (Select TWO).
A. chmod
B. passwd
C. sudo
D. su
E. runas
F. pwd
Answer :
C,D
Question
151 (
Topic 1
)
A PC technician notices that the printers deployed via a new Group Policy are not showing up on the workstation. Which of the following commands should be run on the PC?
A. extract
B. robocopy
C. gpupdate
D. tasklist
Answer :
C
Question
152 (
Topic 1
)
After an installation of a video adapter, the screen on a Windows 7 system cannot be seen.
A. Component Management
B. Startup Repair
C. Device Manager
D. Task Manager
Answer :
B
Question
153 (
Topic 1
)
Which of the following file system types is used primarily for optical media?
A. FAT32
B. NTFS
C. HPFS
D. CDFS
Answer :
D
Question
154 (
Topic 1
)
Which of the following security threats requires the attacker to be physically located near the target machine?
A. Shoulder surfing
B. Social engineering
C. Phishing
D. Rootkit
Answer :
A
Question
155 (
Topic 1
)
An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms
all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technicians FIRST step in troubleshooting the problem?
Answer :
A
Question
156 (
Topic 1
)
Ann, a customer, reports that when she occasionally works in the office basement, her smartphone battery drains faster than normal and she has poor cellular reception. Which of the following is the reason for the
fast battery drain?
A. Unpaired Bluetooth
B. Weak signal
C. Defective SD card
D. Malware
Answer :
B
Question
157 (
Topic 1
)
A technician recently created an email account for a new user, Joe. On the second day,
Joe reports his email account is full of spam even though he has not given out his address.
Answer :
C
Question
158 (
Topic 1
)
A technician recently replaced a users monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue?
Question
159 (
Topic 1
)
A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a child can spend on a particular website. Which of the
following tabs under Internet Options will allow the user to create those settings?
A. Privacy
B. Advanced
C. Security
D. Content
Answer :
D
Question
160 (
Topic 1
)
A turnstile is an example of which of the following forms of physical security?
Answer :
C
Question
161 (
Topic 1
)
A technician receives a report that the pages coming out of a laser printer are smearing when touched. Which of the following components should the technician check FIRST to resolve this issue?
A. Drum
B. Fuser
C. Pickup roller
D. Corona wire
Answer :
B
Question
162 (
Topic 1
)
A technician is attempting to remove malware from a customers workstation. Which of the following Control Panel utilities should the technician use?
Answer :
A
Question
163 (
Topic 1
)
A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the
cause?
Answer :
C
Question
164 (
Topic 1
)
An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this?
Question
165 (
Topic 1
)
A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid
IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the
technician configure next?
A. Hosts files
B. IPv6 settings
C. Proxy settings
D. Lmhosts files
Answer :
C
Question
166 (
Topic 1
)
An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the
user?
A. Power user
B. Administrator
C. Standard
D. Guest
Answer :
A
Question
167 (
Topic 1
)
A technician troubleshooting a computer finds a faulty video card and needs to replace it.
Which of the following safety procedures should be used to prevent damaging the new part?
Answer :
B
Question
168 (
Topic 1
)
A user is reporting that their screen is flickering at a rapid rate. Which of the following
Control Panel paths should a technician use in order to remedy this issue?
Answer :
C
Question
169 (
Topic 1
)
A technician has just fixed a users PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?
Answer :
A
Question
170 (
Topic 1
)
Joe, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently appears on the screen informing the user additional information is required to log in. Which of the following is causing
this?
Answer :
A
Question
171 (
Topic 1
)
A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyones knowledge. Which of the
following would prevent this from occurring?
Answer :
B
Question
172 (
Topic 1
)
Which of the following prevention methods is considered to be digital security?
A. RFID badge
B. Mantrap
C. Biometrics
D. Firewalls
E. ID badge
Answer :
D
Question
173 (
Topic 1
)
A users PC breaks and a technician needs to configure a new machine with a copy of their computer image stored on a remote server. Which of the following technologies would help
A. BRD
B. DVD
C. USB
D. PXE
E. CD
Answer :
D
Question
174 (
Topic 1
)
Which of the following will help to protect an organization from further data exposure
AFTER a list of user passwords has already been leaked due to policy breach? (Select
TWO).
Answer :
A,D
Question
175 (
Topic 1
)
Which of the following is a risk of implementing a BYOD policy?
Answer :
A
Question
176 (
Topic 1
)
A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error is received that the application cannot be installed because the
OS is not supported. Which of the following should the technician do FIRST to try to get the application installed in Windows 7?
Answer :
B
Question
177 (
Topic 1
)
A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technician should use the LIST function of which of the following commands?
A. extract
B. diskpart
C. bootrec
D. chkdsk
Answer :
B
Question
178 (
Topic 1
)
A technician has purchased a new surge protector to protect equipment in the production environment. The surge protectors features safeguard the connected equipment by directing surges to the:
Answer :
D
Question
179 (
Topic 1
)
A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of the following cloud concepts does this represent?
A. Measured service
B. Rapid elasticity
C. On-demand
D. Resource pooling
Answer :
A
Question
180 (
Topic 1
)
A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all system files are intact and in
their original versions?
A. Repair Disk
B. SFC
C. FIXMBR
D. ASR
Answer :
B
Question
181 (
Topic 1
)
Ann, a user, has brought her laptop in for service. She reports that her battery is at 100%, but whenever it is unplugged it immediately shuts down. Which of the following should the technician do?
Answer :
A
Question
182 (
Topic 1
)
l d l l bl k h h h f h f ll h ld h h h k
A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST?
A. Fusing
B. Paper handling
C. Transfer
D. Development
Answer :
D
Question
183 (
Topic 1
)
The network administrator has changed the IP address of ComputerA from 192.168.1.20 to
10.10.10.20 and now Jane, a user, is unable to connect to file shares on ComputerA from
Instructions:
Using the available tools, resolve the connectivity issues. When you have completed the simulation, please select the done button to submit your answer.
Answer :
Explanation:
Question
184 (
Topic 1
)
Which of the following features of a mobile device operates the touch screen?
A. Gyroscope
B. Digitizer
C. Accelerometer
D. Geotracking
Answer :
B
[8]
Question
185 (
Topic 1
)
Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST?
Answer :
A
Question
186 (
Topic 1
)
A technician opens a customers computer and sees large amounts of accumulated dust.
Which of the following is the BEST method of removing the dust from the computer?
A. Use compressed air to free the dust from the components and remove it with an ESD vacuum.
B. Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away.
C. Use a shop vacuum with enough power to ensure all dust has been removed.
D. Remove as much dust as possible by hand and use compressed air to blow the rest out.
Answer :
A
Question
187 (
Topic 1
)
An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contact the IT department and report a violation of which
of the following policies?
A. DRM
B. EULA
C. IRP
D. PII
Answer :
D
Question
188 (
Topic 1
)
A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action
for the technician to perform NEXT?
A. Copy the DLL file from a working PC and use the regsvr32 command to load the file
B. Run the Windows Update utility to manually reinstall the DLL file
C. Run the defrag utility to correct any fragmentation that may have damaged the file
D. Research the DLL file to identify the application it corresponds to before continuing
Answer :
D
Question
189 (
Topic 1
)
A user reports unexpected icons appearing on the desktop. The technician identifies that the symptoms point to a malware infection. Which of the following procedures would be performed NEXT?
Answer :
A
Question
190 (
Topic 1
)
Which of the following network hosts would MOST likely provide the services needed to allow client access to Internet web pages?
A. File server
B. Web server
C. WINS server
D. Proxy server
Answer :
D
Question
191 (
Topic 1
)
A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the
A. VPN
B. ACL
C. RDP
D. DLP
Answer :
B
Question
192 (
Topic 1
)
A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?
Answer :
C
Question
193 (
Topic 1
)
Which of the following should a technician implement to prevent external contractors from physically plugging devices into the companys network jacks unless such jacks are designated for guest use?
A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.
Answer :
C
Question
194 (
Topic 1
)
A customer is experiencing issues with email and calls the help desk. The technician determines it would help clarify the issue if the customer agrees to share their desktop.
Prior to establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to:
Answer :
A
Question
195 (
Topic 1
)
A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types?
A. Hybrid
B. Community
C. Private
D. Public
Answer :
A
Question
196 (
Topic 1
)
An end user needs to completely re-install Windows 7 on a home computer but it did not come with any OS discs. How would a technician accomplish this?
A. Recovery partition
B. Primary partition
C. System restore
D. System refresh
Answer :
A
Question
197 (
Topic 1
)
A technician has verified that Joe, a user, has a malware infection on his desktop. Drag and drop the following malware remediation techniques in the correct order Joe should follow to alleviate this issue.
Answer :
Explanation:
2014\129_I120789-key1.jpg
Question
198 (
Topic 1
)
A user is unable to find the preferred default network printer in the printers list in the user profile. Which of the following is the FIRST step that should be taken?
A. Map printer
B. Reboot computer
C Check to see if printer is turned on
C. Check to see if printer is turned on
D. Log in as a different user and see if printer is mapped
Answer :
A
Question
199 (
Topic 1
)
A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives?
A. Recycling
B. Shredding
C. Overwriting
D. Reformatting
Answer :
B
Question
200 (
Topic 1
)
A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not successfully remove the file. When
the technician attempts to manually remove the file, an error message appears that says, The file is in use by another program. Which of the following tools would be the BEST to use to correct the issue?
A. Terminal
B. SFC
C. Event Viewer
D. Services Console
E. Recovery Console
Answer :
D