- (Exam Topic 3)
Which of the following topologies is designed to fully support applications hosted in on-premises data centers, public or private clouds, and SaaS services?
Correct Answer:A
- (Exam Topic 3)
A network administrator is testing performance improvements by configuring channel bonding on an 802.Hac AP. Although a site survey detected the majority of the 5GHz frequency spectrum was idle, being used only by the company's WLAN and a nearby government radio system, the AP is not allowing the administrator to manually configure a large portion of the 5GHz frequency range. Which of the following would be BEST to configure for the WLAN being tested?
Correct Answer:C
- (Exam Topic 1)
Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?
Correct Answer:B
A reservation should be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP. A reservation is a feature of DHCP that allows an administrator to assign a fixed IP address to a device based on its MAC address. This way, the device will always receive the same IP address from the DHCP server, even if it is powered off or disconnected from the network for a long time. References: https://docs.microsoft.com/en-us/windows-server/troubleshoot/configure-dhcp-reservations
- (Exam Topic 3)
A network engineer is monitoring a fiber uplink to a remote office and notes the uplink has been operating at 100
Correct Answer:A
When a fiber uplink is operating at 100
- (Exam Topic 3)
Which of the following describes when an active exploit is used to gain access to a network?
Correct Answer:A
Penetration testing is a type of security testing that is used to assess the security of a system or network by actively exploiting known vulnerabilities. It is used to simulate an attack on the system and identify any weaknesses that may be exploited by malicious actors. As stated in the CompTIA Security+ Study Guide, "penetration testing is a type of security assessment that attempts to gain unauthorized access to networks and systems by exploiting security vulnerabilities."