Review Guide: 220-902 Practice Exam 1 Flashcards
According to CompTIA, what is the first step in the troubleshooting theory?
A. Identify the problem.
B. Establish a plan of action.
C. Verify full system functionality.
D. Document.
Identify the problem.
The first step is to identify the problem. One way of so doing is to question the user and identify user changes to the computer.
Which of the following is a command that enables you to verify the route to a remote host?
A. NETSTAT
B. NSLOOKUP
C. TRACERT
D. ECHOOFF
C. TRACERT
TRACERT is a command that enables you to verify the route to a remote host.
Which of the following is a command that can be used to troubleshoot DNS issues?
A. NETSTAT
B. NSLOOKUP
C. TRACERT
D. ECHOOFF
B. NSLOOKUP
The NSLOOKUP command is used to troubleshoot DNS issues on a device.
Which switch can be used with IPCONFIG to obtain a new IP address?
A. /RELEASE
B. /NEW
C. /IP
D. /RENEW
D. /RENEW
The /RENEW switch can be used with the IPCONFIG command to obtain a new IP address.
Which switch is used with CHKDSK to tell it to fix errors that it finds?
A. /R
B. /C
C. /S
D. /A
A. /R
The /R (or /F) switch is used with CHKDSK to tell it to fix errors that it finds.
Which wireless technology is most often used to connect peripherals to a mobile device?
A. 802.11a
B. Bluetooth
C. DSSS
D. WiMax
B. Bluetooth
Bluetooth is a short-range wireless technology that is used to create a wireless connection between digital devices. One of its applications is to create connections between mobile devices and items such as speakers, headphones, external GPS units, and keyboards.
Which of the following is known as the System Configuration Editor?
A. Edit
B. MSConfig
C. MSN
D. Regedit
B. MSConfig
The MSConfig utility, known as the System Configuration Editor, helps troubleshoot startup problems by allowing you to selectively disable individual items that normally are executed at startup.
Which type of backup backs up only files for which the archive bit is currently turned on and leaves the archive bit in its current state?
A. Incremental
B. Differential
C. Full
D. Modification
B. Differential
A differential backup backs up only files for which the archive bit is currently turned on and leaves the archive bit in its current state.
You are currently working at the command line in the directory C:\Novell\Messenger\LogFiles and type CD .. Where will this move you to?
A. C:\Novell\Messenger\LogFiles
B. C:\Novell\Messenger
C. C:\Novell
D. C:\
B. C:\Novell\Messenger
The command CD .. would move you to C:\Novell\Messenger, while CD . would not move you to any other directory but simply signify the existing directory.
Which switch is used with the COPY command to tell it that you are working with an ASCII text file?
A. /Z
B. /A
C. /V
D. /Y
B. /A
The /A switch tells COPY that you are working with an ASCII text file.
Which versions of Windows Vista offer offline file support? (Choose all that apply.)
A. Enterprise
B. Business
C. Ultimate
D. Home Professional
A. Enterprise
B. Business
C. Ultimate
In Windows Vista, offline file support is limited to the Business, Enterprise, and Ultimate versions.
Which switch is used with DEFRAG to force defragmentation even when disk space is low?
A. /A
B. /F
C. /V
D. /Z
B. /F
The /F switch is used with DEFRAG to force defragmentation even when disk space is low.
Which command is like COPY but also duplicates any subfolders?
A. XCOPY
B. SCOPY
C. DCOPY
D. GCOPY
A. XCOPY
XCOPY is like COPY, but it also duplicates any subfolders.
Which of the following commands can be used to set network-related configuration?
A. NET ACCOUNTS
B. NET COMPUTER
C. NET CONFIG
D. NET FILES
C. NET CONFIG
NET CONFIG is used to see network-related configuration. NET ACCOUNTS is used to set account options (password age, length, and so on). The NET COMPUTER command can be used to add and delete computer accounts. NET FILES can be used to close open files.
Which NTFS permission allows the user to navigate the entire directory structure, view the contents of the directory, view the contents of any files in the directory, and see ownership and attributes?
A. List
B. Read
C. Modify
D. Write
B. Read
The Read permission allows the user to navigate the entire directory structure, view the contents of the directory, view the contents of any files in the directory, and see ownership and attributes.
Which command can be used to add and delete computer accounts?
A. NET ACCOUNTS
B. NET COMPUTER
C. NET CONFIG
D. NET FILES
B. NET COMPUTER
The NET COMPUTER command can be used to add and delete computer accounts. NET CONFIG is used to see network-related configuration. NET ACCOUNTS is used to set account options (password age, length, and so on). NET FILES can be used to close open files.
Which Windows 7 edition is available only in a 32-bit version?
A. Windows 7 Starter.
B. Windows 7 Home Premium.
C. Windows 7 Professional.
D. None. All are available in both 32-bit and 54-bit versions.
A. Windows 7 Starter.
Windows 7 Starter is available only in a 32-bit version and supports a single processor with a maximum of 2 GB of RAM.
Which Windows feature allows you to use drive encryption to protect files, including those needed for startup and logon?
A. ReadyBoost
B. Defender
C. UAC
D. BitLocker
D. BitLocker
BitLocker allows you to use drive encryption to protect files, including those needed for startup and logon.
What is the result of pressing Ctrl+Shift+Esc in Windows 7?
A. You toggle between windows.
B. Flip 3D opens.
C. Task Manager opens.
D. The screen lock is activated.
C. Task Manager opens.
To get to the Task Manager directly in any of the Windows versions, you can press Ctrl+Shift+Esc.
Which type of virus is designed to make itself difficult to detect or analyze?
A. Armored
B. Red
C. Companion
D. Murky
A. Armored
An armored virus is designed to make itself difficult to detect or analyze.