- (Topic 3)
Which of the following protocols can be used to change device configurations via encrypted and authenticated sessions? (Select TWO).
Correct Answer:
BD
- (Topic 3)
A company's primary ISP is experiencing an outage. However, the network administrator notices traffic continuing to flow through a secondary connection to the same ISP. Which of the following BEST describes this configuration?
Correct Answer:
A
- (Topic 3)
Which of the following is the DNS feature that controls how long a lookup is stored in cache on a server?
Correct Answer:
B
TTL stands for Time to Live, and it is a field on DNS records that controls how long each record is valid and cached by the DNS resolver before it expires and requests a new one. The TTL value is measured in seconds, and it affects how quickly DNS changes propagate across the Internet. A lower TTL means that the DNS resolver will refresh the record more frequently, but it also increases the load on the DNS servers. A higher TTL means that the DNS resolver will cache the record longer, but it also delays the update of the record.
- (Topic 3)
Which of the following diagrams would most likely include specifications about fiber connector types?
Correct Answer:
B
A physical diagram is a type of diagram that shows the physical layout and connections of the network devices and components, such as routers, switches, cables, and connectors. A physical diagram may include specifications about the fiber connector types, such as LC, SC, FC, ST, MPO, etc., that are used to link the fiber optic cables and devices. A physical diagram can help to visualize the network topology, troubleshoot network problems, and plan network changes
- (Topic 1)
A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?
Correct Answer:
C
Port security is a feature that restricts input to a switch port by limiting and identifying MAC addresses of the devices allowed to access the port. This prevents unintended connections from unauthorized devices or spoofed MAC addresses. Port security can also be configured to take actions such as shutting down the port or sending an alert when a violation occurs. References: https://partners.comptia.org/docs/default- source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-10/configuration_guide/sec/b_1610_sec_9500_cg/b_1610_sec_9500_cg_chapter_010101 0.html