1.
A technician arrives at a job site to troubleshoot a copier. Which of the following safely procedures are MOST appropriate for this task?
2.
A user frequently experiences local profile corruption on a Windows OS computer. After the user makes a fourth call to the help desk, a field service technician is sent to assess and resolve the issue. Once on-site, the technician notices the computer, monitor, and locally attached MFD are connected to the same surge suppressor, and the power button has the writing worn off. Which of the following is MOST likely the root cause of the profile corruptions?
3.
A user reports no Internet access from a laptop at the office. Other users within the company are also reporting Internet outage. A desktop technician verifies the Internet access is not available, however, the technician is able to access applications and files from the corporate intranet. Which of the following is the NEXT step for the desktop technician to take in this scenario?
4.
A user is getting an "Invalid Certificate" error when browsing to secure sites on the Internet. The error appears for every secure site the user visits. Which of the following should the user do?
5.
A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take?
6.
Which of the following is the BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment?
7.
In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed FIRST?
8.
Which of the following explains why it is important to secure Personally Identifiable Information (PII)?
9.
A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician?
10.
A virtualization technician in an organization has been notified of a potential vulnerability in a software application running on a virtual machine. Which of the following represents the best practice the technician should take regarding this notification?