- (Topic 3)
A desktop support department has observed slow wireless speeds for a new line of laptops using the organization's standard image. No other devices have experienced the same issue. Which of the following should the network administrator recommend troubleshooting FIRST to resolve this issue?
Correct Answer:D
Wireless drivers can affect the performance and compatibility of your wireless connection5. If only a new line of laptops using the organization’s standard image has experienced slow wireless speeds, it could be that their wireless drivers are outdated or incompatible with the network. Updating the device wireless drivers could resolve this issue.
Wireless drivers play an important role in the performance of a wireless connection, as they control how the device interacts with the wireless network. If the laptops in question are using an outdated version of the wireless driver, it could be causing the slow speeds. The network administrator should recommend updating the device wireless drivers first to see if this resolves the issue.
- (Topic 3)
Which of the following DHCP settings would be used to ensure a device gets the same IP address each time it is connected to the network?
Correct Answer:A
- (Topic 1)
A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?
Correct Answer:B
Port 23 should be blocked when checking firewall configuration to prevent outside users from telnetting into any of the servers at the datacenter. Port 23 is the default port for Telnet, which is an insecure protocol that allows remote access to servers and network devices. Telnet sends data in clear text, which can be easily intercepted and compromised by attackers. A more secure alternative is SSH, which uses port 22 and encrypts data. References: https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.html
- (Topic 1)
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?
Correct Answer:D
Site-to-site VPN provides the best security for connecting a new datacenter to an old one because it creates a secure tunnel between the two locations, protecting data in transit. References: CompTIA Network+ Certification Study Guide, Chapter 5: Network Security.
- (Topic 3)
An application team is deploying a new application. The application team would like the network team to monitor network performance and create alerts if fluctuations in the round- trip time occur for that traffic. Which of the following should the network team monitor to meet this requirement?
Correct Answer:B
Latency, also known as round-trip time (RTT), is the time it takes for a data packet to travel from a source to its destination and back again. It is a key indicator of network performance and can be used to identify fluctuations that may impact the user experience of an application.
Bandwidth, loss, and cyclic redundancy check (CRC) are other important network performance metrics, but they are not directly related to the application team's requirement to monitor for fluctuations in RTT.
References:
✑ CompTIA Network+ N10-008 Exam Objectives, Objective 1.6: Network Performance Monitoring
✑ CompTIA Network+ N10-008 Study Guide, Chapter 10: Network Performance Monitoring and Troubleshooting
Additional Notes:
✑ The network team can use a variety of tools and techniques to monitor RTT, such as ping, traceroute, and network monitoring software.
✑ When setting up alerts, the network team should consider the acceptable range of RTT for the application. They should also configure alerts to trigger at different levels of severity, so that they can take prompt action to resolve any issues.
- (Topic 3)
A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access?
Correct Answer:A