Which IP protocol is connectionless and unreliable?
CORRECT TEXT
Which IP protocol is connectionless and unreliable? (Please enter only a single answer and
do not enter duplicate answers in this field.)
Which of the following is the address that can be used in this scenario?
An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a
classful address. Which of the following is the address that can be used in this scenario?
Which of the following commands will print line numbers before each line in a file?
Which of the following commands will print line numbers before each line in a file?
which of the following replication approaches is required?
In a highly available SAN configuration that guarantees no data loss, which of the following
replication approaches is required?
What are the differences between the microprocessor of a desktop and that of a laptop?
What are the differences between the microprocessor of a desktop and that of a laptop?
Each correct answer represents a complete solution. Choose two.
Which of the following attacks has taken place?
A user has unknowingly gone to a fraudulent site. The security analyst notices the following
system change on the user’s host:
Old ‘hosts’ file:
127.0.0.1 localhost
New ‘hosts’ file:
127.0.0.1 localhost
5.5.5.5 www.comptia.com
Which of the following attacks has taken place?
Which of the following technologies isolates the internal network from the outside world?
Which of the following technologies isolates the internal network from the outside world?
Which of the following BEST addresses his concerns?
Pete, the system administrator, has concerns regarding users losing their company provided
smartphones. Pete’s focus is on equipment recovery. Which of the following BEST addresses his
concerns?
What is the command to delete the default gateway from the system IP routing table?
CORRECT TEXT
What is the command to delete the default gateway from the system IP routing table?
(Please specify the complete command with arguments, please no duplicate answers in this field.)
Which of the following should be configured on the switch to utilize the IPS?
A technician is setting up an IPS security device. Which of the following should be
configured on the switch to utilize the IPS?