Which of the following commands should a technician run FIRST to identify the issue?
A customer is not able to connect to any websites. Which of the following commands should a
technician run FIRST to identify the issue?
Which of the following commands would the technician use?
A technician wants to know the MAC address of a computer. Which of the following commands
would the technician use?
Which of the following OS command line tools should be used?
A technician would like to dispose of a hard drive that is no longer needed. According to company
policy, all contents on the disk should be deleted before disposal. Which of the following OS
command line tools should be used?
which of the following should be changed FIRST?
When securing a new wireless router, which of the following should be changed FIRST?
Which of the following should the technician use to troubleshoot this issue?
A computer starts to boot then quickly shuts down. Which of the following should the technician use
to troubleshoot this issue?
Which of the following should the technician perform FIRST before spyware removal?
A client has a computer that is infected with several viruses and spyware. Which of the following
should the technician perform FIRST before spyware removal?
Which of the following tools would BEST diagnose the possible bottleneck?
A PC is running slower than usual. Which of the following tools would BEST diagnose the possible
bottleneck?
Which of the following switches should a technician use with the PING command to resolve an IP address to a ho
Which of the following switches should a technician use with the PING command to resolve an IP
address to a hostname?
Which of the following utilities should the technician use to identify the criteria?
A technician is trying to setup a non-domain user account on a workstation, but receives the
following error message “Password does not meet the complexity requirements.” Which of the
following utilities should the technician use to identify the criteria?
which of the following prevents unauthorized users from accessing confidential data?
In a SOHO wireless network, which of the following prevents unauthorized users from accessing
confidential data?