Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken. Which of the following documentation should the administrator provide?

A.

Knowledge base article

B.

Non-disclosure agreement

C.

Incident report

D.

Standard operating procedure

When a corporate laptop is connected to the company network, it can reach external websites. However, it cannot reach any internal websites, displaying the error message “Cannot reach this page.” Which of the following should a technician configure?

A.

Subnet mask

B.

DNS settings

C.

Default gateway

D.

DHCP

A Chief Executive Officer wants to meet with remote employees in a way that will allow for communication and training. Which of the following software technologies is the best for this situation?

A.

Videoconferencing

B.

Screen sharing

C.

Remote Desktop

D.

Virtual desktop infrastructure

A user’s computer is running slowly. Task Manager shows:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

A.

Clear browser cached data

B.

Upgrade the network connection

C.

Close unnecessary programs

D.

Delete temporary files

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?

A.

Support from the computer's manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

A technician is assigned to offboard a user. Which of the following are common tasks on an offboarding checklist? (Choose two.)

A.

Quarantine the hard drive in the user's laptop.

B.

Deactivate the user's key fobs for door access.

C.

Purge all PII associated with the user.

D.

Suspend the user's email account.

E.

Turn off the network ports underneath the user's desk.

F.

Add the MAC address of the user's computer to a blocklist.

A user recently installed an application that accesses a database from a local server. When launching the application, it does not populate any information. Which of the following command-line tools is the best to troubleshoot the issue?

A.

ipconfig

B.

nslookup

C.

netstat

D.

curl

Which of the following is found in an MSDS sheet for a battery backup?

A.

Installation instructions

B.

Emergency procedures

C.

Configuration steps

D.

Voltage specifications

A user has rooted their corporate phone to load unapproved software. Which of the following tools should the company use to prevent access to the corporate network?

A.

Mobile device management

B.

Encryption

C.

Geofencing

D.

Lock screen

A technician is using a credential manager to safeguard a large number of credentials. Which of the following is important for using this application?

A.

Restricted log-in times

B.

Secure master password

C.

TPM module

D.

Windows lock screen