Which of the following protocols will the technician MOST likely utilize?
A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?A . DHCP B. SMTP C. DNS D. RDPView AnswerAnswer: A...
Which of the following should be done NEXT?
Which of the following should be done NEXT?A . Send an email to Telecom to inform them of the issue and prevent reoccurrence. B. Close the ticket out. C. Tell the user to take time to fix it themselves next time. D. Educate the user on the solution that was...
Which of the following should the technician MOST likely have done to prevent damage?
A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?A . Removed all jewelry B. Completed an inventory of tools before use C. Practiced electrical fire...
Which of the following Wi-Fi protocols is the MOST secure?
Which of the following Wi-Fi protocols is the MOST secure?A . WPA3 B. WPA-AES C. WEP D. WPA-TKIPView AnswerAnswer: A Explanation: https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives-(3-0)
Which of the following would BEST resolve the issue?
A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?A . Application updates B. Anti-malware software C. OS reinstallation D. File restoreView AnswerAnswer: C Explanation: If a rootkit has caused a deep infection, then the only way to...
the user do to resolve the issue?
A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the...
Which of the following should the technician implement?
A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?A . MSRA B. VNC C. VPN D. SSHView AnswerAnswer: C Explanation: A technician needs to interconnect two offices to the main branch while...
Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.?
Before leaving work, a user wants to see the traffic conditions for the commute home. Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.?A . taskschd.msc B. perfmon.msc C. lusrmgr.msc D. Eventvwr.mscView AnswerAnswer: A Explanation: The user...
Which of the following tools should the technician use to resolve this issue?
A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the following tools should the technician use to resolve this issue?A . taskschd.msc B. eventvwr.msc C. de vmgmt. msc D. diskmgmt.mscView AnswerAnswer: C Explanation: The tool that the technician should use to resolve...
Which of the following log-in options meets these requirements?
A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements?A . PIN B. Username and password C. SSO D. FingerprintView AnswerAnswer: A Explanation: This is because a PIN is a fast and secure...