Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. What should the technician do first?

A.

Implement the change

B.

Approve the change

C.

Document the change

D.

Schedule the change

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?

A.

Implement the change

B.

Approve the change

C.

Propose the change

D.

Schedule the change

An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches. Which of the following is the most likely reason?

A.

Support from the computer’s manufacturer is expiring

B.

The OS will be considered end of life

C.

The built-in security software is being removed from the next OS version

D.

A new version of the OS will be released soon

An employee is using a photo editing program. Certain features are disabled and require a log-in, which the employee does not have. Which of the following is a way to resolve this issue?

A.

License assignment

B.

VPN connection

C.

Application repair

D.

Program reinstallation

Multiple users clicked a phishing link from a compromised email account. The security team isolates and removes the threat. Then, the management team provides security awareness training to the company. What step is this?

A.

Provide user education.

B.

Compile lessons learned.

C.

Update the antivirus software.

D.

Perform additional scans.

Which of the following authentication methods is the best way to prevent users from frequently entering their credentials?

A.

Access control list

B.

Single sign-on

C.

Multifactor authentication

D.

One-time password

A help desk technician needs to remove RAM from retired workstations and upgrade other workstations that have applications that use more memory with this RAM. Which of the following actions would the technician most likely take?

A.

Demagnetize memory for security.

B.

Use antistatic bags for storage and transport.

C.

Plug in the power supply to ground each workstation.

D.

Install memory in identical pairs.

Which of the following methods would make data unrecoverable but allow the drive to be repurposed?

A.

Deleting the partitions

B.

Implementing EFS

C.

Performing a low-level format

D.

Degaussing the device