CompTIA Network+ Question B-61

The backups server connects to a NAS device using block-level storage over Ethernet. The performance is very slow, however, and the network technician suspects the performance issues are network related. Which of the following should the technician do to improve performance?

A. Utilize UDP to eliminate packet overhead
B. Turn off MDIX settings on the NAS and server switchports
C. Enable jumbo frames on the NAS and server
D. Encapsulate the storage traffic in a GRE tunnel

Correct Answer: C

CompTIA Network+ Question B-60

A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows clients can connect to the network. Which of the following components should the technician check on the Windows workstations? (Choose two.)

A. Start the Wired AutoConfig service in the Services console
B. Enable IEEE 802.1q Authentication in Network Interface Card Properties
C. Enable IEEE 802.1x Authentication in Network Interface Card Properties
D. Start the Wireless AutoConfig service in the Services console
E. Enable IEEE 802.3 Ethernet IPv6 in Network Interface Card Properties

Correct Answer: AC

CompTIA Network+ Question B-58

An organization is involved in a civil court action and needs to ensure email messages are retained. Which of the following describes the requirement to archive and retain email traffic and other correspondence?

A. Chain of custody
B. Legal hold
C. Divide and conquer
D. Persistent agents

Correct Answer: B

CompTIA Network+ Question B-57

Which of the following should current network performance be compared against to determine network anomalies?

A. Baseline
B. Traffic analysis
C. Packet capture
D. Logs

Correct Answer: A

CompTIA Network+ Question B-56

An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely mitigation for this reported item?

A. Ensure patches are deployed
B. Install an IDS on the network
C. Configure the firewall to block traffic on port 443
D. Implement a VPN for employees

Correct Answer: A

Explanation:
As vulnerabilities are discovered, the vendors of the operating systems or applications often respond by releasing a patch. A patch is designed to correct a known bug or fix a known vulnerability, such as in this case to be able to read SSL traffic, in a piece of software.
A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one or more features to the software being updated.

CompTIA Network+ Question B-55

The Chief Information Officer (CIO) wants to improve the security of the company’s data. Which of the following is a management control that should be implemented to ensure employees are using encryption to transmit sensitive information?

A. Policies
B. VPN
C. HTTPS
D. Standards

Correct Answer: A

CompTIA Network+ Question B-54

Which of the following is used to classify network data for the purpose of providing QoS?

A. STP
B. VLANs
C. SIP
D. DSCP

Correct Answer: D

CompTIA Network+ Question B-53

A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable?

A. PoE
B. Port bonding
C. VLAN
D. Trunking

Correct Answer: A

Explanation:
Power over Ethernet (PoE) is defined by the IEEE 802.3af and 802.3at standards.
PoE allows an Ethernet switch to provide power to an attached device (for example, a wireless access point, security camera, or IP phone) by applying power to the same wires in a UTP cable that are used to transmit and receive data.

CompTIA Network+ Question B-52

An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device and when the device was reassigned. Which of the following BEST describes these actions?

A. Network map
B. Asset management
C. Change management
D. Baselines

Correct Answer: B

Explanation:
Documenting the location, the user of the device and the date of the reassignment would be part of the asset management.
The best way to keep track of your computers and their configurations is to document them yourself. Large enterprise networks typically assign their own identification numbers to their computers and other hardware purchases as part of an asset management process that controls the entire life cycle of each device, from recognition of a need to retirement or disposal.