A systems administrator needs to access a hypervisor that went offline. After doing a port scan, the administrator notices that company policy is blocking the RDP default port. Which of the following ports should the administrator use to access the machine?
A company downloads a large number of files over the internet daily. The company needs a way to ensure the files have not been modified or corrupted during the download process. Which of the following should the company do to verify the files?
A technician thinks a customer's computer may have a malware infection and wants to determine whether the computer is in communication with any other machines. Which of the following commands should the technician use?
A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer. Which of the following specifications will help the specialist determine which OS architecture to use?
A technician installs a Bluetooth headset for a user. During testing, the sound is still coming from the speaker on the computer. The technician verifies the headset shows up in Device Manager. Which of the following would the technician most likely do to fix this issue?
A technician needs to join a Windows client to a domain. Which of the following is required?
A technician runs a command and gets the following output:
Ethernet adapter Ethernet 3:
Connection-specific DNS Suffix . :reddog.microsoft.com
Link-local IPv6 Address .......... :fe80::de3d:9283:4f00:856a%5
IPv4 Address.......................:10.203.10.16
Subnet Mask ...................... :255.255.255.0
Default Gateway .................. :10.203.10.1
Which of the following commands did the technician use?
A technician needs to import a new digital certificate and place it in the proper location. Which of the following Control Panel utilities should the technician use to import the certificate?
An MDM report shows that a user's company cell phone has unauthorized applications installed. The device has recently checked into the MDM server, and the company still has access to remotely wipe the device. Which of the following describes the action the user has performed?
Which of the following is natively used with Active Directory?
A company wants to reduce the negative ecological impacts of its business and has decided to hire an e-waste company to dispose of equipment. Which of the following should the e-waste company provide the business7
Employees at comptia.org are reporting getting an usual amount of emails from a coworker. A technician discovers the emails were sent from the following address:
john@cOmptia.org
Which of the following social engineering attacks is this an example of?
Which of the following filesystems supports journaling?
A user reports that a device with a statically defined IP is unable to connect to the internet. The technician runs the ipconfig /all command and sees the following output:
IPv4 Address............ 192.168.0.74
Subnet Mask.............255.255.255.255
Default Gateway......... 192.168.0.1
Which of the following is most likely the reason for the issue?
Which of the following commands should a technician use to change user permissions?