Which of the following tools should the technician use NEXT in order to continue troubleshooting this issue?
A user states that their workstation is showing limited or no connectivity and they are unable
to access any network shares. The technician verifies that the workstation is configured
correctly. They also replace the Ethernet cable from the workstation to the wall port. Which
of the following tools should the technician use NEXT in order to continue troubleshooting
this issue?
Which of the following would be the BEST way to combat social engineering?
Which of the following would be the BEST way to combat social engineering?
which of the following ways can they manipulate the file?
A user has Share permissions of “Allow – Full Control” and NTFS permissions of “Allow –
Read, Allow – Write, Deny – Modify” to a shared file. In which of the following ways can they
manipulate the file?
Which of the following is considered a method of physical security?
Which of the following is considered a method of physical security?
Which of the following is the BEST step the user could take to make this possible?
A user has a work laptop configured with a static IP. The user wants to be able to take the
laptop home and connect it to their router which uses DHCP. However, the user does not
want to manually change their settings every day. Which of the following is the BEST step
the user could take to make this possible?
Which of the following options can be selected from the Windows Update website?
A user wants to quickly install the most recent security patch released. Which of the
following options can be selected from the Windows Update website?
Which of the following is the FIRST troubleshooting step for the technician to try?
A network printer has quit printing from all connected customers. No error messages are
displayed on the printer and the network connection is working. Which of the following is the
FIRST troubleshooting step for the technician to try?
Which of the following has the HIGHEST level rights?
Which of the following has the HIGHEST level rights?
Which of the following commands would be used?
A technician has a list of IP addresses that the technician’s manager needs the network
names for. Which of the following commands would be used?
Which of the following allows a user to reset their password with a series of security questions that only the
Which of the following allows a user to reset their password with a series of security
questions that only the user should know?