1.
A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?
2.
Users are reporting web browsers are not working. A technician confirms that the end users can navigate to websites using the site's IP address. Which of the following is MOST likely causing this issue?
3.
A help desk technician receives a call from a user stating a program was installed and now random pop-ups are appearing on the computer. The technician notices a lot of suspicious network traffic generated by the user's computer. The technician quarantines the computer and disables System Restore. Which of the following is the NEXT step technician should take?
4.
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hotspot and gets 2000 Kbps. Ann, Joe's coworker with whom he is travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15 Mbps. The technician checks the hotspot settings on Joe's phone and sees the following: Network name:Joe's Hotspot Security:WPA2/PSK Password:hotspot Band:2.4 GHz Client DHCP start address:192.168.23.1 Which of the following is the MOST likely cause of the problem?
5.
A technician wants to deploy a solution that will detect and prevent sensitive information from being saved on external storage. Which of the following should the technician implement?
6.
When starting a computer, a technician notices the computer displays a blue screen and reboots after POST. The technician completed several updates prior to encountering the blue screen. Which of the following tools would the technician use to resolve this issue?
7.
The office of admissions at a university has requested that all staff desktops be replaced with laptops. The staff members frequently go off-site for recruitment purposes and handle sensitive information. The technician is concerned about data leaks if a laptop is stolen. Which of the following is the BEST practice to use in this scenario?
8.
In Windows 8.1, \\E$ is an example of which of the following types of share?
9.
A home server rack is being installed in the computer room and is outfitted with a power distribution block. Which of the following safety precautions is required?
10.
As part of a BYOD program, the organization requires BYOD users to register devices prior to using them on the organization's network. The registration process logs a unique identifier assigned to every mobile phone produced. Which of the following must be collected during the registration process?