which of the following tools would need to be used to both install and validate the hardware?
A network consultant needs to redo a CAT5e wall jack that has become unusable due to
recent physical damage. In order to install the replacement jack, which of the following tools
would need to be used to both install and validate the hardware? (Select TWO).
Which of the following tools would BEST reset the computer to how it worked when first purchased?
After being infected with a virus, a user’s computer does not recognize the user as having
local administrator rights to the computer. After troubleshooting the issue, a technician
determines the computer needs to be rebuilt and data needs to be restored from the user’s
backup. Which of the following tools would BEST reset the computer to how it worked when
first purchased?
Which of the following tools would BEST help a technician troubleshoot this issue?
A user reports that their computer restarts at 3:00 PM every day. Which of the following tools
would BEST help a technician troubleshoot this issue?
Which of the following is BEST used to prevent other people from viewing a user’s computer screen?
Which of the following is BEST used to prevent other people from viewing a user’s computer
screen?
Which of the following would BEST help the technician repair the computer?
After installing an updated video card driver in a Windows XP machine, a technician sees a
bluescreen of death (BSOD). Which of the following would BEST help the technician repair
the computer?
Which of the following security threats almost occurred?
A pest exterminator tries to gain access to a company’s computer lab, but the receptionist
does not see an extermination scheduled on the calendar and denies the exterminator
access to the lab. Which of the following security threats almost occurred?
Which of the following PING switches would be used to continue a ping to a host until stopped?
Which of the following PING switches would be used to continue a ping to a host until
stopped?
A computer program that functions normally while quietly installing malicious software on a machine is known a
A computer program that functions normally while quietly installing malicious software on a
machine is known as a:
Which of the following tools would a technician use to test between the wall jack and the PC?
A technician is having connectivity issues with a client’s machine. The client’s wall jack
passed testing and the technician also uses a loopback to test the NIC on the PC and it also
passed testing. Which of the following tools would a technician use to test between the wall
jack and the PC?
Which of the following security threats is BEST mitigated through proper user training?
Which of the following security threats is BEST mitigated through proper user training?