Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?A . SSOB . Permission propagationC . InheritanceD . MFAView AnswerAnswer: A

November 8, 2019No CommentsREAD MORE +

Which of the following settings or features is responsible for the problems Ann is experiencing?

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset,...

November 8, 2019No CommentsREAD MORE +

Which of the following should the technician do FIRST?

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?A...

November 8, 2019No CommentsREAD MORE +

Which of the following needs to be adjusted on the workstation to fix the issue?

A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?A . Date and timeB . UEFI boot modeC ....

November 8, 2019No CommentsREAD MORE +

Which of the following operations would be the BEST to resolve this issue with minimal expense?

An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)A . Remove applications from startupB . Defragment the hard driveC . Install additional RAMD . Install a faster hard driveE ....

November 7, 2019No CommentsREAD MORE +

Which of the following would explain why Joe cannot access his personal shares?

Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?A . An IP...

November 6, 2019No CommentsREAD MORE +

Which of the following would MOST likely fix the issue?

A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the...

November 5, 2019No CommentsREAD MORE +

Which of the following threats uses personalized information in an attempt at obtaining information?

Which of the following threats uses personalized information in an attempt at obtaining information?A . WhalingB . ImpersonationC . SpoofingD . Spear phishingView AnswerAnswer: D

November 5, 2019No CommentsREAD MORE +

Which of the following authentication methods is being requested?

Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?A . Single-factorB . MultifactorC . RADIUSD . TACACSView AnswerAnswer: A

November 5, 2019No CommentsREAD MORE +

Which of the following should the technician do NEXT?

A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem. Which of the...

November 3, 2019No CommentsREAD MORE +