14.4.1.6 Lab – Remote Technician – Fix a Network Problem Answers Lab – Remote Technician – Fix a Network Problem (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Introduction In this lab, you will gather data from the customer and then instruct the customer […]
Continue reading…
ITEv7 – Lab Answers
14.4.1.5 Lab – Remote Technician – Fix an Operating System Problem Answers
14.4.1.5 Lab – Remote Technician – Fix an Operating System Problem Answers Lab – Remote Technician – Fix an Operating System Problem (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Introduction In this lab, you will gather data from the customer and then instruct […]
Continue reading…
14.4.1.4 Lab – Remote Technician – Fix a Hardware Problem Answers
14.4.1.4 Lab – Remote Technician – Fix a Hardware Problem Answers Lab – Remote Technician – Fix a Hardware Problem (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Introduction In this lab, you will gather data from the customer, and then instruct the customer […]
Continue reading…
14.3.1.5 Lab – Investigate Breaches of PII PHI PCI Answers
14.3.1.5 Lab – Investigate Breaches of PII PHI PCI Answers Lab – Investigate Breaches of PII, PHI, and PCI (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives In this lab, you will investigate breaches of PII, PHI, and PCI by searching the Internet […]
Continue reading…
14.1.1.2 Lab – Technician Resources Answers
14.1.1.2 Lab – Technician Resources Answers Lab – Technician Resources (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. In this lab, you will use the Internet to find resources for a specific computer component. Search online for resources that can help you troubleshoot the […]
Continue reading…
13.5.2.2 Lab – Document Customer Information in a Work Order Answers
13.5.2.2 Lab – Document Customer Information in a Work Order Answers Lab – Document Customer Information in a Work Order (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Introduction As a help desk technician, it is your job to gather data from the customer […]
Continue reading…
13.3.4.6 Lab – Configure Windows Firewall Answers
13.3.4.6 Lab – Configure Windows Firewall Answers Lab – Configure Windows Firewall (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Introduction In this lab, you will explore the Windows Firewall and configure some advanced settings. Recommended Equipment Two Windows PCs directly connected or connected […]
Continue reading…
13.3.3.6 Lab – Configure Users and Groups in Windows Answers
13.3.3.6 Lab – Configure Users and Groups in Windows Answers Lab – Configure Users and Groups in Windows (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Introduction In this lab, you will create users and groups and delete users using the Local Users and […]
Continue reading…
13.3.2.5 Lab – Configure Windows Local Security Policy Answers
13.3.2.5 Lab – Configure Windows Local Security Policy Answers Lab – Configure Windows Local Security Policy (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Introduction In this lab, you will configure Windows Local Security Policy. Windows Local Security Policy is used to configure a […]
Continue reading…
13.2.3.7 Lab – Bitlocker and Bitlocker To Go Answers
13.2.3.7 Lab – Bitlocker and Bitlocker To Go Answers Lab – Bitlocker and Bitlocker To Go (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Introduction Encryption can protect the data on your device by making it only accessed by people who have authorization. If […]
Continue reading…