CompTIA Network+ N10-006 (Practice Test)

CompTIA Network+ covers the configuration, management, and troubleshooting of common wired and wireless network devices. Also included are emerging technologies such as unified communications, mobile, cloud, and virtualization technologies. The official exam objectives are 1.0 Network Architecture, 2.0 Network operations, 3.0 Network security, 4.0 Troubleshooting, and 5.0 Industry standards, practices, and network theory.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)
  • Included Objectives:
    • Network operations
    • Network Architecture
    • Network security
    • Troubleshooting
    • Industry standards, practices, and network theory

A standard MAC Address consists of how many bits?

  • 8
  • 16
  • 48
  • 32

Which protocol periodically uses a 3-way handshake to authenticate a connection?

  • Kerberos
  • PPP
  • PAP
  • CHAP

What would the administrator adjust in the WAP configuration settings so a user could not access the wireless signal from the parking lot?

  • Power level controls
  • Wi-Fi Protected Setup (WPS)
  • Fair access policy
  • Quality of Service (QoS)

You suspect an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?

  • Toner Probe
  • Packet Scoping
  • OTDR
  • Packet sniffer

A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the corporate network is known as:

  • Flood guard
  • Rogue access point
  • Honeynet
  • Honeypot

A software module on a managed device that sends Simple Network Management Protocol (SNMP) notifications to the managing station is called:

  • ICS server
  • Agent
  • Proxy
  • UC gateway

What type of filtering allows for controlling specific types of network traffic (such as web traffic, mail, file transfer)?

  • Port
  • IP
  • MAC
  • URL

Which devices can block ports and filter data on a network?

  • Hub
  • Switch
  • Repeater
  • Firewall

A standalone malicious computer program that replicates itself over a computer network is known as:

  • Spam
  • Worm
  • Spyware
  • Trojan

Which option could be used when describing Thinnet or Thinnwire?

  • 10Base2
  • 20 Mbit/s
  • Maximum cable segment length of 100 meters
  • Twisted-pair cabling

What is the effect of increasing antenna gain on an access point?

  • Throughput decreases
  • Frequency increases
  • Cell size increases
  • Connection speeds decrease

Which type of cabling would not be affected by interference from other nearby cables?

  • UTP
  • STP
  • Coaxial
  • Fiber-optic

An employee connects to her desktop from her home computer, using the built in Windows Remote Desktop feature. What port is she most likely using?

  • 443
  • 89
  • 3389
  • 23

Lin, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?

  • PKI
  • Kerberos

An E1 line supports how many Mbps?

  • 2 Mbps
  • 64 Mbps
  • 1.544 Mbps
  • 44.736 Mbps

Philip, a technician, has been asked to configure the WAN interface connecting to the ISP's router. Which of the following interfaces on the router will be modified?

  • FastEthernet 0/0
  • AUX 0
  • Console 0
  • Serial 0/0/0

Which wireless encryption protocol supports the AES cipher?

  • 802.3
  • WEP
  • TKIP
  • WPA2

Which of the following technologies would be used in a small office area that has a lot of 2.4GHz noise?

  • 802.1q
  • MIMO
  • 802.3af
  • 802.11a

Which of the following solutions hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?

  • DHCP
  • QoS
  • NAT
  • DNS

Which term refers to the amount of time a client is able to use an IP address given from a DHCP server?

  • Availability
  • Lease
  • Scope
  • Reservation

Remaining Time: