A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming
convention formats should the technician follow?
Users are reporting web browsers are not working. A technician confirms that the end users can navigate to websites using the site's IP address. Which of the
following is MOST likely causing this issue?
A help desk technician receives a call from a user stating a program was installed and now random pop-ups are appearing on the computer. The technician notices
a lot of suspicious network traffic generated by the user's computer. The technician quarantines the computer and disables System Restore. Which of the following
is the NEXT step technician should take?
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed
test from a laptop connected to the hotspot and gets 2000 Kbps. Ann, Joe's coworker with whom he is travelling, also has a hotspot on her phone, and the speed
test result on that hotspot is 15 Mbps. The technician checks the hotspot settings on Joe's phone and sees the following:
Network name:Joe's Hotspot
Security:WPA2/PSK
Password:hotspot
Band:2.4 GHz
Client DHCP start address:192.168.23.1
Which of the following is the MOST likely cause of the problem?
A technician wants to deploy a solution that will detect and prevent sensitive information from being saved on external storage. Which of the following should the
technician implement?
When starting a computer, a technician notices the computer displays a blue screen and reboots after POST. The technician completed several updates prior to
encountering the blue screen. Which of the following tools would the technician use to resolve this issue?
The office of admissions at a university has requested that all staff desktops be replaced with laptops. The staff members frequently go off-site for recruitment
purposes and handle sensitive information. The technician is concerned about data leaks if a laptop is stolen. Which of the following is the BEST practice to use in
this scenario?
A home server rack is being installed in the computer room and is outfitted with a power distribution block. Which of the following safety precautions is required?
As part of a BYOD program, the organization requires BYOD users to register devices prior to using them on the organization's network. The registration process
logs a unique identifier assigned to every mobile phone produced. Which of the following must be collected during the registration process?