Question 13

- (Topic 3)
An auditor assessing network best practices was able to connect a rogue switch into a network Jack and get network connectivity. Which of the following controls would BEST address this risk?

Correct Answer:A

Question 14

- (Topic 3)
A company wants to mitigate unauthorized physical connectivity after implementing a hybrid work schedule. Which of the following will the company most likely configure?

Correct Answer:D
Port security is a feature that allows network administrators to limit the number of devices that can connect to a switch port, based on the MAC address of the device. This can prevent unauthorized physical connectivity by blocking any device that is not on the allowed list or exceeding the maximum number of devices per port. Port security can also trigger an action, such as shutting down the port or sending an alert, when a violation
occurs. References: CompTIA Network+ N10-008 Cert Guide - O’Reilly Media, Chapter 14: Securing a Basic Network, page 512

Question 15

- (Topic 3)
Which of the following would enable a network technician to implement dynamic routing?

Correct Answer:C

Question 16

- (Topic 2)
A Chief Information Officer (CIO) wants to improve the availability of a company's SQL database Which of the following technologies should be utilized to achieve maximum availability?

Correct Answer:A
Clustering is a technique that involves grouping multiple servers or instances together to provide high availability and fault tolerance for a database. Clustering can help improve the availability of a SQL database by allowing automatic failover and load balancing between the cluster nodes. If one node fails or becomes overloaded, another node can take over the database operations without disrupting the service. References: https://www.educba.com/sql-cluster/

Question 17

- (Topic 3)
A technician is configuring a wireless access point in a public space for guests to use. Which of the following should the technician configure so that only approved connections are
allowed?

Correct Answer:B

A captive portal is a web page that requires users to authenticate or accept terms of service before they can access the internet through a wireless access point. A captive portal can be used to control who can use the wireless network, limit the bandwidth or time of usage, or display advertisements or information. A captive portal is a common feature of public wireless networks, such as those in hotels, airports, cafes, or libraries. A captive portal can prevent unauthorized or malicious users from accessing the network or consuming network resources.
ReferencesPublic Wireless Access Points Definition | Law InsiderAre Public Wi-Fi Networks Safe? What You Need To Know

Question 18

- (Topic 3)
A homeowner frequently has guests visit and would like to install a wireless router for their personal devices. The homeowner wants to ensure that the wireless router is compatible with the widest range of devices possible. Which of the following standards should a technician suggest?

Correct Answer:A
* 802.11ac is the latest wireless standard that supports the highest data rates and the most devices. It is backward compatible with previous standards such as 802.11b/g/n, so it can work with older devices as well. 802.11b is the oldest and slowest standard, 802.11g is faster but still outdated, and 802.11n is newer but not as fast or widespread as 802.11ac

START N10-009 EXAM