Which of the following should a technician perform befo…
A user has been granted permission to access the corporate network from a personal smartphone. Which of
the following should a technician perform before configuring the phone for access?
Which of the following is the BEST action to troublesho…
Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slow
performance after a couple of hours and that the problem worsens as the day goes by. If Ann restarts the
device, it works fine for a couple of hours and then starts to run slow again. Which of the following is the BEST
action to troubleshoot this problem?
Which of the following is the BEST option to modify the…
A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following is the
BEST option to modify the size of the partition?
Which of the following Windows tools should the technic…
A technician has just installed a video card in a PC. The video card is not working, although it was working fine
on the test bench. Which of the following Windows tools should the technician use to start troubleshooting the
problem?
Which of the following is the FIRST thing the technicia…
A technician has decided to upgrade all users’ iPhones to the latest model. Which of the following is the FIRST
thing the technician should advise the users to do with the old phones before turning them in?
Which of the following file formats does Android use fo…
Which of the following file formats does Android use for application installation?
which of the following policies?
An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social
security number. The end user should immediately contact the IT department and report a violation of which of
the following policies?
Which of the following configurations will allow the us…
A user is configuring the email settings on a smartphone. Which of the following configurations will allow the
user to synchronize email from multiple devices?
Which of the following commands should be run on the wo…
A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the
following commands should be run on the workstation?
Which of the following is the BEST option to prevent da…
Which of the following is the BEST option to prevent data breaches on lost mobile devices?