220-1002 Exam Question 46

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.
Click on individual tickers to see the ticket details. View attachments to determine the problem.
Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

220-1002 Exam Question 47

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.
The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be
256,000 MB in size and mapped to drive
F. The second partition must be 512,000 MB in size and mapped to
drive G.
The new partitions must be formatted to ensure that user's files can be secured from other users and that the disk must be configured to account for future redundancy.
Make sure to maintain a consistent file system.
INSTRUCTIONS:
Conduct the necessary steps within the Disk Manager to accomplish these tasks.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

220-1002 Exam Question 48

A technician is repairing a computer. Which of the following should the technician do to protect the computer from accidental voltage spikes?
  • 220-1002 Exam Question 49

    A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:
    There are 1033 infected files on this computer. Click here to disinfect.
    The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?
  • 220-1002 Exam Question 50

    A new policy requires all users to log on to their corporate workstations using smart card authentication.
    Which of the following best practices should be implemented to further secure access to workstations?