How long has this sandwich been in here?
Which of these situations would be the best use of BitLocker?
Which of these situations would be the best use of BitLocker?
One of the computers in your organization appears to have been infected with malware. Which of these steps should be done to help quarantine the infected system?
You need a way to securely connect back to your corporate resources while you are away from the office. Which of these network technologies would be the best choice for this requirement?
Let’s start this meeting with a grande drip of the bold Read More »
Which of these wireless security techniques would prevent an unauthorized workstation from getting an IP address from your access point? Pick two.
You need to configure your firewall to allow mail traffic between your mail server and the Internet. Which of these ports would be the most appropriate to open in your firewall?
Our specialized application protocols make it very easy for us to surf the net, transfer files, and send our email messages. In this video, you’ll learn about common application protocols used by HTTP, IMAP, and VoIP applications.
CompTIA Network+ N10-005: 1.6 – Application Protocols Read More »
Our advanced network management systems use specialized protocols to perform their tasks. In this video, you’ll learn how SNMP, SSH, ICMP, and other protocols are used to keep our networks running at peak efficiency.
CompTIA Network+ N10-005: 1.6 – Management Protocols Read More »
The TCP/IP protocol suite is the backbone of modern networks. In this video, you’ll learn how these fundamental protocols are used on today’s global Internet.
CompTIA Network+ N10-005: 1.6 – Networking Protocols Read More »
When you work on a network, you’ll see a lot of applications using many different port numbers. In this video, you’ll learn the about the most popular ports that are used on our networks every day.
CompTIA Network+ N10-005: 1.5 – Common TCP and UDP Ports Read More »