Ensurepass

QUESTION 51

Which of the following is the BEST tool for a technician to use to make sure the network cable is securely fastened in the RJ-45 connector?

A. Cable tester

B. Crimper

C. Small flat screwdriver

D. Punch down

Correct Answer: B


QUESTION 52

A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client s machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory?

A. Identify the problem

B. Establish a plan of action to resolve the problem

C. Test the theory to determine cause

D. Document findings, actions, and outcomes

Correct Answer: D


QUESTION 53

A client reports that their VoIP phone screen displays duplicate IP address. Which of the following is the FIRST action to try to resolve this problem?

A. Change MAC address settings

B. Call the vendor 11 / 54

The safer , easier way to help you pass any IT exams.

C. Try another LAN connection

D. Reboot the phone

Correct Answer: D


QUESTION 54

After an installation of a video adapter, the screen on a Windows 7 system cannot be seen. Which of the following Windows 7 functions will resolve this?

A. Component Management

B. Startup Repair

C. Device Manager

D. Task Manager

Correct Answer: B


QUESTION 55

A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?

A. Re-join the computer to the domain

B. Reboot the PC as the domain will automatically rebuild the relationship

C. Update the BIOS using the latest version

D. Run CHKDSK

Which of the following resources is MOST important for accessing remote virtual environments on a client machine?

A. Network speed

B. CPU speed

C. High speed memory

D. Drive space

Correct Answer: A


QUESTION 57

A computer program that functions normally while quietly installing malicious software on a machine is known as a:

A. DDoS attack.

B. Worm.

C. Phishing attack.

D. Trojan.

Correct Answer: D


QUESTION 58

Which of the following security threats is BEST mitigated through proper user training?

A. A Worm

B. Rootkits

C. Social Engineering

D. Browser Adware

Correct Answer: C


QUESTION 59

A user sent an email requesting that a technician check if a computer is on and connected to the

12 / 54

The safer , easier way to help you pass any IT exams.

Internet so the user can login from home.

Which of the following commands in the command prompt would a technician use to verify if the computer is on and connected without having to go to the computer?

A. NSLOOKUP

B. NETSTAT

C. PING

D. IPCONFIG

Correct Answer: C


QUESTION 60

A technician recently removed spyware from a computer and now the user is getting error messages about system files.

Which of the following tools would a technician use to verify all system files are intact and in their original versions?

A. Repair Disk

B. SFC

D. ASR

Correct Answer: B


Download Latest 220-802 Real Free Tests , help you to pass exam 100%.

Comments are closed.