Go Back on 220-1102 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

220-1102 Practice Test


Page 14 out of 148 Pages

Topic 5: Exam Pool E

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?


A. .bat


B. .dll


C. .ps1


D. .txt





A.
  .bat

Explanation: The .bat file type would be used in the Windows Startup folder to automate copying a personal storage table (.pst) file to a network drive at log-in. A .bat file is a batch file that contains a series of commands that can be executed by the command interpreter. A .bat file can be used to perform various tasks, such as copying, moving, deleting, or renaming files or directories. A .bat file can be placed in the Windows Startup folder to run automatically when a user logs in to the system. A .bat file can use the copy command to copy a .pst file from a local drive to a network drive. A .pst file is a personal storage table file that contains email messages, contacts, calendars, and other data from Microsoft Outlook. A .pst file can be backed up to a network drive for security or recovery purposes. The .dll, .ps1, and .txt file types are not used in the Windows Startup folder to automate copying a .pst file to a network drive at log-in. A .dll file is a dynamic link library file that contains code or data that can be shared by multiple programs. A .dll file cannot be executed directly by the user or the system. A .ps1 file is a PowerShell script file that contains commands or expressions that can be executed by the PowerShell interpreter. A .ps1 file can also perform various tasks, such as copying files or directories, but it requires PowerShell to be installed and configured on the system. A .txt file is a plain text file that contains unformatted text that can be read by any text editor or word processor. A .txt file cannot contain commands or expressions that can be executed by the system.

Which of the following Linux commands would be used to install an application?


A. yum


B. grep


C. Is


D. sudo





D.
  sudo

Explanation:
The Linux command used to install an application is sudo. The sudo command allows users to run programs with the security privileges of another user, such as the root user. This is necessary to install applications because it requires administrative privileges1.

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?


A. Rights management


B. Audit trail


C. Chain of custody


D. Data integrity





C.
  Chain of custody

Explanation:
The process of documenting who had possession of evidence at every step of the process is called chain of custody.

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?


A. Install and run Linux and the required application in a PaaS cloud environment


B. Install and run Linux and the required application as a virtual machine installed under the Windows OS


C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed


D. Set up a dual boot system by selecting the option to install Linux alongside Windows





B.
  Install and run Linux and the required application as a virtual machine installed under the Windows OS

The user should install and run Linux and the required application as a virtual machine installed under the Windows OS. This solution would allow for parallel execution of the Linux application and Windows applications2.
The MOST efficient solution that allows for parallel execution of the Linux application and Windows applications is to install and run Linux and the required application as a virtual machine installed under the Windows OS. This is because it allows you to run both Linux and Windows together without the need to keep the Linux portion confined to a VM window3.

Which of the following is a proprietary Cisco AAA protocol?


A. TKIP


B. AES


C. RADIUS


D. TACACS+





D.
  TACACS+

Explanation:
TACACS+ is a proprietary Cisco AAA protocol.


Page 14 out of 148 Pages
Previous