- (Topic 3)
Which of the following is most likely responsible for the security and handling of personal data in Europe?
Correct Answer:
A
GDPR stands for General Data Protection Regulation, which is a European Union
regulation on information privacy and security. It applies to any organization that collects or processes personal data of individuals in the EU, and it sets out rules and requirements for data protection, consent, breach notification, and enforcement1
References1: https://en.wikipedia.org/wiki/General_Data_Protection_Regulation
- (Topic 3)
A network technician is responding to an issue with a local company. To which of the following documents should the network technician refer to determine the scope of the issue?
Correct Answer:
D
SLA stands for Service Level Agreement, and it is a contract that defines the expectations and responsibilities between a service provider and a customer. SLA can specify the quality, availability, and performance metrics of the service, as well as the penalties for non-compliance and the procedures for resolving issues. SLA can help the network technician determine the scope of the issue by providing the baseline and target values for the service, the escalation process and contacts, and the service credits or remedies for the customer45.
CompTIA Network+ N10-008 Cert Guide - Chapter 15: Network Troubleshooting Methodology35: What is a Service Level Agreement (SLA)? | ITIL | AXELOS
- (Topic 3)
A firewall administrator observes log entries of traffic being allowed to a web server on port 80 and port 443. The policy for this server is to only allow traffic on port 443. The firewall administrator needs to investigate how this change occurred to prevent a reoccurrence. Which of the following should the firewall administrator do next?
Correct Answer:
A
Firewall audit logs are records of the changes made to the firewall configuration, policies, and rules. They can help the firewall administrator to track who, when, and what changes were made to the firewall, and identify any unauthorized or erroneous modifications that could cause security issues or network outages. By consulting the firewall audit logs, the firewall administrator can investigate how the change that allowed traffic on port 80 to the web server occurred, and prevent it from happening again
- (Topic 3)
Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 pm. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network. Which of the following solutions would address these concerns?
Correct Answer:
D
- (Topic 3)
Which of the following most likely determines the size of a rack for installation? {Select two).
Correct Answer:
BF
The size of a rack for installation depends on several factors, such as the available space, the power and cooling requirements, and the dimensions of the equipment to be installed. Two of the most important dimensions to consider are the switch depth and the server height. Switch depth refers to the length of the switch from front to back, which determines how much space is needed inside the rack. Server height refers to the vertical space occupied by the server, which is measured in rack units (RU) or U. One rack unit is equal to 1.75 inches. The height of the rack should be able to accommodate the total number of rack units needed for the servers and other devices, as well as some extra space for cable management and airflow. References: CompTIA Network+ N10-008 Cert Guide, Chapter 2, Section 2.5