- (Topic 3)
Which of the following should be implemented to allow remote users to access network resources while only redirecting necessary traffic?
Correct Answer:
A
A split-tunnel VPN is a VPN feature that allows remote users to access network resources while only redirecting necessary traffic through the VPN tunnel. A split-tunnel VPN enables users to choose which applications or websites to secure with the VPN and which to connect normally through the internet. This can improve performance, conserve bandwidth, and avoid compatibility issues with some services that depend on the user’s location. A split-tunnel VPN can also allow users to access local devices or resources that are not accessible through the VPN.
- (Topic 3)
A security engineer wants to provide a secure, dedicated, alternate access method into an IT network infrastructure to administer connected devices and IT assets. Which of the following is the engineer most likely to implement?
Correct Answer:
C
Out-of-band management is a method of accessing network devices and IT assets through a dedicated channel that is separate from the normal data traffic. This provides a secure and alternate way to administer the network infrastructure, especially in case of failures or emergencies. Remote desktop gateway is a service that allows remote access to desktops and applications on a network. Authentication and authorization controls are mechanisms that verify the identity and permissions of users and devices on a network. Secure Shell is a protocol that encrypts the communication between a client and a server on a network.
- (Topic 1)
A technician is writing documentation regarding a company’s server farm. The technician needs to confirm the server name for all Linux servers. Which of the following commands should the technician run?
Correct Answer:
B
The nslookup command should be run to confirm the server name for all Linux servers. Nslookup is a tool that queries DNS servers to resolve hostnames to IP addresses or vice versa. It can also provide other information about DNS records, such as MX, NS, SOA, etc. By running nslookup with the IP address of a Linux server, the technician can obtain its hostname. References: https://www.howtogeek.com/663056/how- to-use-the-nslookup-command-on-linux/
- (Topic 3)
Which or the following devices and encapsulations are found at me data link layer? (Select TWO)
Correct Answer:
BD
The data link layer is responsible for defining the format of data on the network and providing physical transmission of data. Devices that operate at this layer include switches and network interface cards (NICs). Encapsulations that are used at this layer include frames, which are units of data that contain a header, payload, and trailer. Frames are used to identify the source and destination of data on the network and to perform error detection. References: CompTIA Network+ N10-008 Certification Study Guide, page 9; The Official CompTIA Network+ Student Guide (Exam N10-008), page 1-6.
- (Topic 2)
A network administrator is talking to different vendors about acquiring technology to support a new project for a large company. Which of the following documents will MOST likely need to be signed before information about the project is shared?
Correct Answer:
B
NDA stands for Non-Disclosure Agreement, which is a legal contract between two or more parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to by others. A network administrator may need to sign an NDA before sharing information about a new project with different vendors, as the project may involve sensitive or proprietary data that the company wants to protect from competitors or unauthorized use. References: https://www.adobe.com/sign/esignature-resources/sign-nda.html