Which of the following command line tools would be BEST to identify the root cause of the connection problem?
A technician is able to connect to a website: however, the technician receives the following error, when alternating to access a different website: Page cannot be displayed. Which of the following command line tools would be BEST to identify the root cause of the connection problem?A . ipconfigB . tracertC...
Which of the following is the BEST option to make the software functional again?
technician performed an in-place upgrade to 10 on a customer laptop. following the upgrade, a proprietary software application no longer works. The technician realizes the software is not compatible with Windows 10. Which of the following is the BEST option to make the software functional again?A . Apply all known...
Which of the following wireless encryption standards uses 802.1X In its process to secure a wireless network?
Which of the following wireless encryption standards uses 802.1X In its process to secure a wireless network?A . WPSB . WPA2-PSKC . WPA-EnterpriseD . WEPView AnswerAnswer: C
After completing a malware scan, which of the following command line utilities would the technician MOST likely run before enabling Windows Update?
A technician discovers a user's home computer has Windows Update disabled and suspects malware has replaced several Windows OS files. After completing a malware scan, which of the following command line utilities would the technician MOST likely run before enabling Windows Update?A . xcopyB . chkdskC . steD . gpupdateView...
Which of the following would provide the BEST security for the room?
A systems administrator needs to add security to the server room. Which of the following would provide the BEST security for the room? (Choose two.)A . Universal serial bus locksB . Personal identity verification cardsC . Privacy screenD . Entry control rosterE . Door locksF . Privacy windowView AnswerAnswer: E,F
Which of the following would enable the technician to use BitLocker on these machines?
A technician is encrypting the company's laptops using BitLocker, but some of the laptops do not have a built-in TPM. Which of the following would enable the technician to use BitLocker on these machines?A . A USB keyB . A firmware updateC . A local diskD . Two-factor authenticationView AnswerAnswer:...
Which of the following devices provides protection against brownouts?
Which of the following devices provides protection against brownouts?A . battery backupB . surge suppressorC . rack groundingD . line conditionerView AnswerAnswer: A
Which of the following authentication methods was designed to be used primarily for administration purposes, such as giving users access to manage switches and routers?
Which of the following authentication methods was designed to be used primarily for administration purposes, such as giving users access to manage switches and routers?A . RADIUSB . LDAPC . TACACSD . Active DirectoryView AnswerAnswer: A
A special type of ESD-sale vacuum cleaner may be necessary to safely clean large spills of:
A special type of ESD-sale vacuum cleaner may be necessary to safely clean large spills of:A . toner.B . battery acid.C . ink.D . filamentView AnswerAnswer: A
Which of the following should be changed to resolve this issue?
A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following: Which of the following...