A user is operating a virtual machine (VM) and discovers it has been infected with malware. Which of the following applies?
A. The host computer will automatically delete the VM.
B. The VM can be shut down with no harm to the host PC.
C. The host computer will quarantine the VM automatically.
D. The VM will crash and cause irreparable damage to the host PC.
Which of the following Control Panel items will allow for easy streaming of pictures, music, and videos to other Windows 7 PCs?
A. Ease of Access Center
B. AutoPlay
C. Sync Center
D. HomeGroup
A user sent an email requesting that a technician check if a computer is on and connected to the Internet so the user can login from home. Which of the following commands in the command prompt would a technician use to verify if the computer is on and connected without having to go to the computer?
A. NSLOOKUP
B. NETSTAT
C. PING
D. IPCONFIG
The manager has requested that their laptop be setup so that a static IP can be assigned to the wireless card while in the office, but have the ability to utilize DHCP when at home. Which of the following Windows 7 options can accomplish this?
A. IPCONFIG Command Utility
B. Client for Microsoft Networks
C. Manage Wireless Networks
D. Alternate Configuration
A user states their workstation will not reach the login screen. Which of the following commands can be used to write a new partition boot sector to the system partition in the Recovery Console?
A. FIXMBR
B. BOOTCFG
C. FIXBOOT
D. DISKPART
A user states when they press certain letters on their laptop's keyboard, a number is displayed on the screen. Which of the following can the technician perform to resolve this issue?
A. Change the character mapping
B. Turn off number lock
C. Replace the keyboard
D. Update the keyboard drivers
A technician needs to format a file system to be compatible with the WIDEST range of operating systems. Which of the following file systems should be used?
A. NTFS
B. FAT16
C. CDFS
D. FAT32
A technician needs to rebuild a computer that had a virus. Which of the following data destruction methods should be used to ensure the virus has been successfully erased before reinstalling the operating system, programs, and all user data?
A. Standard format
B. Low level format
C. Shredder
D. Degaussing tool
Which of the following encryption standards is found on older wireless devices and provides minimal security?
A. WPA
B. WPA2
C. WEP
D. AES
A technician is troubleshooting an issue with a set of services that are running on a computer. Which of the following commands can be used to affect the status of services running on a computer? (Select TWO).
A. Net Computer
B. Net Use
C. Net Pause
D. Net Stop
E. Net Session
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-902 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.