A technician has fixed a reported issue with a heavily used software program and users have verified that the program is working correctly. Which of the following should the technician do NEXT?()
第1题:
A. Identity symptoms and problems
B. Document the process and solutions
C. Establish the most probable cause
D. Escalate if necessary.
第2题:
A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()
第3题:
A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()
第4题:
Which narrative regarding loading software is incorrect?()
第5题:
A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?()
第6题:
A manufacturer has instructed a technician to update the software that resides on the flash ROMchip of an integral system add-in component. Which of the following types of software needs to be updated?()
第7题:
A server administrator implements a solution that should fix an issue. Which of the following should the administrator do NEXT in the troubleshooting process?()
第8题:
A user states that a networked printer is not working today, but yesterday the printer worked fine. The technician checks the user’s print queue and sees several jobs in the queue. The queue is flushed, restarted, and the user is still having the same issue. Which of the following should be verified NEXT on the printer? ()
第9题:
A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()
第10题:
That the WEP key is disabled
That the fuser is not faulty
That the IP is static
That the buffer is not overloaded
第11题:
Allow the user to continue working
Check for viruses
Re-image the hard drive
Document time/date for later reference
Prevent users from accessing the PC
Turn off PC
第12题:
10.76.0.1
127.0.0.1
192.168.0.1
255.255.255.0
第13题:
A support technician wants to help a user, in a different city, navigate a new software program. Which of the following will allow the user and technician to view and control the Windows XP PC desktop simultaneously?()
第14题:
A technician needs to ping a client’s machine that the technician is working on, to ensure that thenetwork card is functioning correctly. Which of the following IP addresses should be used?()
第15题:
The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()
第16题:
A technician finished installing antivirus software. Which of the following should the technician perform NEXT?()
第17题:
A customer reports that the laser printer produces poor quality printouts. Having arrived onsite, the technician has a discussion with the customer and reviews some examples of their print jobs. Which of the following should the technician do NEXT? ()
第18题:
A technician is troubleshooting a lack of Internet connectivity affecting their entire office. The technician suspects the issue is with their Internet Service Provider failing to provide service.Which of the following command line tools should the technician use to BEST test this theory?()
第19题:
A laser printer has a vertically repetitive print defect. Before attempting to repair the printer,a technician should determine:()
第20题:
A technician receives an urgent call that the switch in accounting is down. Which of the followingshould the technician do FIRST to troubleshoot this issue?()
第21题:
Update the antivirus application
Install critical update security patches
Adjust the software firewall settings
Replace the current antivirus program
第22题:
Notify users impacted by the problem
Verify full system functionality
Document the actions and outcomes
Identify the scope of the problem
第23题:
Document the process and update the baseline.
Test the theory of probable cause and verify with the software vendor.
Establish a plan of action to be included in the business impact analysis.
Implement the software manufacturer workaround.