Which of the following port numbers are associated with email traffic? (Select two).
Which of the following would prevent a virtual machine from communicating with any endpoints on a network or the internet?
A company migrates a local application to an internal cloud platform. Which of the following best describes this cloud platform?
A company wants to have fast read speeds for its locally stored data. Which of the following configurations has the lowest cost to fulfill this requirement?
Which of the following can carry data and electricity to network devices? (Select two).
A company policy change requires all computers to be encrypted. Which of the following technologies should a technician configure to meet this new requirement?
Which of the following is a characteristic of an NVMe drive?
A technician observes slow startup times on a laptop. Which of the following is most likely causing the issue?
Laura, a customer, has instructed you to configure her home office wireless access point.
She plans to use the wireless network for finances and has requested that the network be setup with the highest encryption possible.
Additionally, Laura knows that her neighbors have wireless networks and wants to ensure that her network is not being interfered with by the other networks.
She requests that the default settings be changed to the following.
Wireless Name: HomeWiFi
Shared Key: CompTIA
Router Password: Secure$1
Finally, Laura wants to ensure that only her laptop and Smartphone can connect to the network.
Laptop: IP Address 192.168.1.100
Hardware Address: 00:0A:BF:03:C4:54
Smartphone: IP Address 192.168.1.101
Hardware Address: 09:2C:D0:22:3F:11
INSTRUCTIONS
Configure Laura’s wireless network using the network adapter window.
If at any time you would like to bring back the initial state of the situation, please click the Reset All button.
A technician sets up secure print and configures an NFC device that will authenticate users for access. Which of the following will the NFC device most likely use to authenticate?