Which of the following should the technician do FIRST in troubleshooting this problem?
A Windows desktop PC user states that they have sent several print jobs to their locally
connected printer, yet none have printed. The printer has no error conditions on the control
panel. Which of the following should the technician do FIRST in troubleshooting this
problem?
which of the following can be used to secure ONLY the unused ports?
When securing a small office home office (SOHO) that has empty cubicles with unused
network ports, which of the following can be used to secure ONLY the unused ports?
Which of the following items would address this problem?
A user states that their old Windows XP notebook loses time when they power it off. Which
of the following items would address this problem?
Which of the following should a technician do LAST after cleaning up a virus infection?
Which of the following should a technician do LAST after cleaning up a virus infection?
Which of the following BEST prevents attackers from accessing network equipment?
Which of the following BEST prevents attackers from accessing network equipment?
Which of the following types of accounts should the user set up in Windows 7?
A user does not want their kids to be able to install software on their home desktop. Which of
the following types of accounts should the user set up in Windows 7?
Which of the following would the technician do FIRST when securing the network?
A technician is setting up a new wireless router at a client’s home. Which of the following
would the technician do FIRST when securing the network?
Which of the following are examples of physical security?
Which of the following are examples of physical security? (Select TWO).
Which of the following should the technician perform in order to BEST resolve this issue?
A user states that they have noticed longer wait times when opening applications. Which of
the following should the technician perform in order to BEST resolve this issue?
Which of the following scenarios BEST defines phishing?
Which of the following scenarios BEST defines phishing?