Which of the following is the BEST tool for a technician to use to make sure the network cable is securely fas
Which of the following is the BEST tool for a technician to use to make sure the network cable is
securely fastened in the RJ-45 connector?
Which of the following is the NEXT step in the troubleshooting theory?
A technician is using the troubleshooting theory to help resolve a problem that is occurring with a
client’s machine. The technician has verified system functionally. Which of the following is the
NEXT step in the troubleshooting theory?
Which of the following is the FIRST action to try to resolve this problem?
A client reports that their VoIP phone screen displays duplicate IP address. Which of the following
is the FIRST action to try to resolve this problem?
Which of the following Windows 7 functions will resolve this?
After an installation of a video adapter, the screen on a Windows 7 system cannot be seen. Which
of the following Windows 7 functions will resolve this?
Which of the following can be done to resolve this from the client desktop?
A user gets an error message that the trust relationship to the domain has been broken. Which of
the following can be done to resolve this from the client desktop?
Which of the following resources is MOST important for accessing remote virtual environments on a client machi
Which of the following resources is MOST important for accessing remote virtual environments on
a client machine?
A computer program that functions normally while quietly installing malicious software on a machine is known a
A computer program that functions normally while quietly installing malicious software on a
machine is known as a:
Which of the following security threats is BEST mitigated through proper user training?
Which of the following security threats is BEST mitigated through proper user training?
Which of the following commands in the command prompt would a technician use to verify if the computer is on a
A user sent an email requesting that a technician check if a computer is on and connected to the
Internet so the user can login from home. Which of the following commands in the command
prompt would a technician use to verify if the computer is on and connected without having to go
to the computer?
Which of the following tools would a technician use to verify all system files are intact and in their origina
A technician recently removed spyware from a computer and now the user is getting error
messages about system files. Which of the following tools would a technician use to verify all
system files are intact and in their original versions?