Which of the following components would need to be replaced to resolve this issue?
A user reports paper jams at the location of the paper trays. Which of the following components
would need to be replaced to resolve this issue?
Which of the following actions would correct this issue?
A user is required to use a directly connected local printer but is unable to print any documents
properly. Various characters are excessively being printed on the top and bottom of each page.
Which of the following actions would correct this issue?
Which of the following risks is MOST likely to affect the business on a day-to-day basis?
A company is looking to improve their security posture by addressing risks uncovered by a
recent penetration test. Which of the following risks is MOST likely to affect the business on
a day-to-day basis?
Which of the following must be enabled for the accounting department to access this HR application?
A recently deployed VM is running a Human Resource (HR) application on the HR network.
Workstations in the accounting department can access the Internet and other accounting servers,
but are unable to ping the new VM. Which of the following must be enabled for the accounting
department to access this HR application?
Which of the following system tools should be used to troubleshoot this error?
A user has plugged in a mobile phone to a PC and received a message that the driver was not
successfully installed. Which of the following system tools should be used to troubleshoot this error?
Which of the following would be required prior to touching any of the computer parts within the desktop?
A technician needs to replace a PCI card on a desktop safely. Which of the following would be
required prior to touching any of the computer parts within the desktop?
which of the following attacks?
Ann, an employee, is cleaning out her desk and disposes of paperwork containing
confidential customer information in a recycle bin without shredding it first. This is MOST
likely to increase the risk of loss from which of the following attacks?
Which of the following should the network administrator do to test whether web traffic is being sent and recei
An administrator deployed a VM that is hosting an internal website. Users report they are unable to
access the new website. Which of the following should the network administrator do to test whether
web traffic is being sent and received?
which of the following features would be used to redirect network traffic for filtering or monitoring?
On a corporate network, which of the following features would be used to redirect network traffic
for filtering or monitoring?
Which of the following jumper configurations should the technician use for the additional drive, if the drive
A technician wants to install a secondary IDE drive which will be configured for additional user
storage on the same IDE channel of the drive with the operating system. Which of the following
jumper configurations should the technician use for the additional drive, if the drive with the
operating system is set to MA?