- (Topic 1)
Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?
Correct Answer:
D
IDS stands for intrusion detection system, which is a network appliance that monitors network traffic and alerts administrators of any suspicious or malicious activity. An IDS can warn of unapproved devices that are accessing the network by detecting anomalies, signatures, or behaviors that indicate unauthorized access attempts or attacks. References: https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://www.cisco.com/c/en/us/products/security/what-is-an-intrusion-detection-system-ids.html
- (Topic 3)
During an annual review of policy documents, a company decided to adjust its recovery time frames. The company agreed that critical applications can be down for no more than six hours, and the acceptable amount of data loss is no more than two hours. Which of the following should be documented as the RPO?
Correct Answer:
A
“ RPO designates the variable amount of data that will be lost or will have to be re-entered during network downtime. RTO designates the amount of “real time” that can pass before the disruption begins to seriously and unacceptably impede the flow of normal business operations."
- (Topic 3)
Several employees have expressed concerns about the company monitoring their internet activity when they are working from home. The company wants to mitigate this issue and reassure employees that their private internet activity is not being monitored. Which of the following would satisfy company and employee needs?
Correct Answer:
A
Split tunnel is a configuration that allows a remote user to access both the local network and the Internet at the same time. In a split tunnel configuration, only traffic destined for the corporate network is sent through the VPN tunnel, while all other traffic is sent directly to the Internet. This allows the remote user to access the Internet without the company's VPN server being able to monitor or intercept their traffic. Using a split tunnel configuration can help the company to mitigate employee concerns about internet activity being monitored and reassure employees that their private internet activity is not being monitored.
- (Topic 3)
A technician is equipped with a tablet, a smartphone, and a laptop to troubleshoot a switch with the help of support over the phone. However, the technician is having issues interconnecting all these tools in troubleshooting the switch. Which Of the following should the technician use to gain connectivity?
Correct Answer:
A
A PAN stands for Personal Area Network and it is a type of network that connects devices within a small range, such as a few meters. A PAN can use wireless technologies such as Bluetooth or Wi-Fi to interconnect devices such as tablets, smartphones, and laptops. A technician can use a PAN to gain connectivity among these tools and troubleshoot the switch.
References: Network+ Study Guide Objective 1.2: Explain devices, applications, protocols and services at their appropriate OSI layers.
- (Topic 3)
Which of the following network topologies best describes a central device connected to multiple independent devices?
Correct Answer:
C
Hub-and-spoke is the network topology that best describes a central device connected to multiple independent devices. A network topology is the physical or logical arrangement of devices and links on a network. A hub-and-spoke topology is a type of star topology, where a central device, such as a switch or a router, acts as a hub that connects to multiple devices, such as computers or printers, that act as spokes. A hub-and-spoke topology can offer advantages such as simplicity, scalability, and reliability, but also disadvantages such as single point of failure, high dependency on the hub, and increased latency. References: [CompTIA Network+ Certification Exam Objectives], Hub-and-Spoke Topology: What Is It? (Diagram Included) | SolarWinds MSP