CompTIA Network+ N10-008
Which of the following network topology has a single point of failure? [Choose all that apply]
Bus Star
Which of the following are advantages of a Mesh topology? [Choose all that apply]
Ensures high-availability Ensure redundancy of network connectivity
What is the purpose of documenting an incident?
For future reference
Which of the following strategies can be used to identify the cause of an incident? [Choose all that apply]
Gathering Information of the incident Question people involved
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
Identify the problem
What is the first step that needs to be taken when troubleshooting a network incident?
Identify the problem
Which of the following applications could be used to run a website from a server?
Nginx
What are the characteristics of a physical network topology? [Choose all that apply]
Physical network topology displays the actual layout and location of the physical devices on the network
Which of the following is an application layer protocol?
RDP
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
SQL
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star
Which of the following network topology is most commonly used in a network infrastructure?
Star
In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
client-server
In the event of a fire, the most appropriate failure policy is a _______ policy.
fail-open
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
peer-to-peer
Where is the best practice to test theory for the probable cause of the incident?
In a sandbox solution
Which two encryption protocols might be used to provide secure transmissions for email services?
SSL and TLS
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
HTTPS
Which of the following network topology is most expensive to implement and maintain?
Mesh