Which of the following environmental impacts should have been considered before determining the location of th
A technician working for a SOHO recently installed a computer tower inside a cabinet. Users
report the computer often shuts down due to overheating. Which of the following
environmental impacts should have been considered before determining the location of the
computer tower to have avoided the overheating issue?
Which of the following tools should the technician use?
A technician needs to verify a set of patch cables in inventory are working properly. Which of
the following tools should the technician use?
Which of the following actions would BEST solve this?
A department’s multifunction printer just had a maintenance kit installed. When Joe prints the
first page after maintenance is performed, the page has random spots and blotches on the
front and back. Which of the following actions would BEST solve this?
Which of the following would the technician do FIRST?
A technician is dispatched to repair a malware infection on a laptop. The user appears
agitated and uneasy about the technician working on the computer without supervision.
Once the malware is mitigated the technician discovers a hidden folder containing
inappropriate materials. Which of the following would the technician do FIRST?
which of the following?
A technician is installing a PCIe wireless card on Joe’s, a customer, desktop computer.
While the technician works, Joe watches and asks questions during the entire process. After
the work order is completed, the technician should do which of the following? (Select TWO).
which of the following protocols?
An achievement in providing worldwide Internet security was the signing of certificates associated
with which of the following protocols?
Which of the following would fulfill the CISO’s requirements?
A Chief Information Security Officer (CISO) wants to implement two-factor authentication within
the company. Which of the following would fulfill the CISO’s requirements?
Which of the following can a security administrator implement on mobile devices that will help prevent unwante
Which of the following can a security administrator implement on mobile devices that will help
prevent unwanted people from viewing the data if the device is left unattended?
Which of the following would a security administrator implement in order to identify a problem between two sys
Which of the following would a security administrator implement in order to identify a problem
between two systems that are not communicating properly?
Which of the following can result in significant administrative overhead from incorrect reporting?
Which of the following can result in significant administrative overhead from incorrect reporting?