Tuesday, 2 May 2017

220-802 Test Questions PDF

Question: 13

A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?
A. Quick format
B. FDISK
C. Low level format
D. Standard format

Answer: C

Question: 14

An attack that creates a website that looks like another website, with the purpose of learning someone’s account information is called which of the following?

A. Virus
B. Shoulder surfing
C. Trojan
D. Phishing

Answer: D 


Question: 15

Which of the following terms BEST describes the software or hardware used to manage virtual machines?

A. Hypervisor
B. Cloud Server Manager
C. Supervisor
D. Virtual Disk Manager

Answer: A

Question: 16

A technician is required to change a setting for HKEY_Local_Machine. Which of the following would the technician use to change this?

A. BCEDIT
B. WEP setup
C. MSCONFIG
D. REGEDIT

Answer: D

Question: 17
A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following types of RAID is MOST likely in use?

A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10

Answer: A

COMPTIA 220-802 Exam Sample Questions Practice Exam

http://dumps4free.com/220-802-exam-questions-pdf-vce.html

No comments:

Post a Comment

Note: only a member of this blog may post a comment.