Question 19

A customer's computer is powered on and working, but the customer is unable to get to any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?

Correct Answer:A

Question 20

A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error. Which of the following tools should the technician use?

Correct Answer:D

Question 21

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?

Correct Answer:B

Question 22

A technician has been dispatched to resolve a malware problem on a user’s workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT?

Correct Answer:C

Question 23

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

Correct Answer:C

Question 24

A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

Correct Answer:CF

START 220-1002 EXAM