⚡️Lightning Sale: 25% off Lifetime Membership ⚡️

15 hours, 41 minutes remaining!
CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

CompTIA Network Plus N10 006 Test 1

Free CompTIA Network+ N10-006 practice test, CompTIA Network Plus N10 006 Test 1. This practice exam covers basic computer networking, to include the installation and configuration of networks, media types, configuration types, and network security. Passing this exam will require knowledge in the Ethernet Protocol, IPv4, and some IPv6, MAC addressing, TCP/UDP, the OSI Layer, and various other protocols such as SNMP, SSH, FTP, SSL/TLS, and more.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

Which of the following could be used to estimate Round-Trip Time (RTT) across a router?

  • uptime

  • arp

  • tracert

  • dig

Which of the following technologies would be used in a small office area that has a lot of 2.4GHz noise?

  • MIMO

  • 802.11a

  • 802.1q

  • 802.3af

Jennifer, a technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check?

  • The route table of the next-hop router

  • The arp table of the network user

  • The arp table of the ISP's gateway router.

  • The route table of the new customer's router

Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this?

  • Proxy server with content filter

  • Smart jacks installed for each network jack

  • Port Mirroring

  • VPN Client and Concentrator

Managing a network device on a dedicated channel that is not used for regular network traffic is known as:

  • Backdoor access

  • Out-of-band management

  • Man-in-the-middle

  • In-Band management

Lin, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?

  • MS-CHAP

  • PKI

  • TACACS+

  • Kerberos

When configuring a wireless access point, Alex, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address?

  • dig

  • ping

  • mac-table

  • arp

Which of the following is the prefix for a link-local IPv6 address?

  • 2FFE::/16

  • FEEF:/12

  • FF00::/8

  • FE80::/10

Lin, a network technician, needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?

  • VLAN tagging

  • VTP trunking

  • Port forwarding

  • PoE

Which of the following protocols is used by the ping command?

  • ICMP

  • ARP

  • FTP

  • STP

Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?

  • Router

  • VPN Concentrator

  • Hub

  • Switch

Which of the following network tools is used to identify running services on host devices?

  • NMAP

  • Firewall

  • IDS

  • IPS

Philip, a technician, has been asked to configure the WAN interface connecting to the ISP's router. Which of the following interfaces on the router will be modified?

  • Serial 0/0/0

  • Console 0

  • AUX 0

  • FastEthernet 0/0

In which of the following layers of the OSI model does the TCP protocol operate?

  • Transport

  • Network

  • Session

  • Data link

You suspect an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?

  • Packet Scoping

  • OTDR

  • Packet sniffer

  • Toner Probe

Which of the following OSI model layers is between the Network and Session layers?

  • Physical

  • Transport

  • Data link

  • Presentation

Philip, an administrator, is responsible for one Linux and two Windows servers. He would like to review all server logs centrally. Which of the following services could Philip use in this scenario?

  • Event logs

  • Baselines

  • Change Management

  • Syslog

Which of the following commands could Philip, a network administrator, use to determine the IP address of a Linux server?

  • ifconfig

  • nbtstat

  • ipconfig

  • netstat

Rachael, a network administrator, has disabled STP on the local network. Which of the following is MOST likely the cause of a recent spike in duplicate traffic?

  • Switching loop

  • Incorrect subnet mask

  • VLAN mismatch

  • Mismatch MTU

Which of the following is a Class A private IP address?

  • 192.168.1.1

  • 10.1.45.3

  • 4.4.4.4

  • 172.31.45.189



Remaining Time 00:15:00