CompTIA 220-1102 Practice Test - Questions Answers, Page 67
List of questions
Related questions
An administrator's change was approved by the change management review board. Which of the following should the administrator do next?
When a user is in the office, web pages are loading slowly on the user's phone. Which of the following best explains this issue?
A customer needs to purchase a desktop capable of rendering video. Which of the following should the customer prioritize?
Users report that a network printer intermittently goes offline during the day. Which of the following commands should the technician use to confirm whether the printer has connectivity issues?
A user reports the following issues:
* Their computer is constantly running slowly.
* The default home page of the web browser has changed to a suspicious search engine.
* They have been receiving pop-up ads on the screen.
Which of the following should a technician do first to address these issues?
A user is attempting to access a shared drive from a company-issued laptop while working from home. The user is unable to access any files and notices a red X next to each shared drive. Which of the following needs to be configured in order to restore the user's access to the shared drives?
A technician is implementing the latest application security updates for endpoints on an enterprise network. Which of the following solutions should the technician use to ensure device security on the network while adhering to industry best practices?
A home office user wants to ensure a PC is backed up and protected against local natural disasters and hardware failures. Which of the following would meet the user's requirements?
An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable?
A user's work PC has been the target of multiple phishing attacks. Which of the following is a way for the user to prevent further attacks?
Question