Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA Network Plus N10 006 Test 1

This practice exam covers basic computer networking, to include the installation and configuration of networks, media types, configuration types, and network security. Passing this exam will require knowledge in the Ethernet Protocol, IPv4, and some IPv6, MAC addressing, TCP/UDP, the OSI Layer, and various other protocols such as SNMP, SSH, FTP, SSL/TLS, and more.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

Which of the following is the prefix for a link-local IPv6 address?

  • FF00::/8
  • FEEF:/12
  • FE80::/10
  • 2FFE::/16

Jennifer, a technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check?

  • The route table of the new customer's router
  • The arp table of the ISP's gateway router.
  • The route table of the next-hop router
  • The arp table of the network user

In which of the following layers of the OSI model does the TCP protocol operate?

  • Session
  • Data link
  • Transport
  • Network

When configuring a wireless access point, Alex, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address?

  • ping
  • mac-table
  • arp
  • dig

Which of the following is a Class A private IP address?


Which of the following network tools is used to identify running services on host devices?

  • IDS
  • Firewall
  • NMAP
  • IPS

Rachael, a network administrator, has disabled STP on the local network. Which of the following is MOST likely the cause of a recent spike in duplicate traffic?

  • Incorrect subnet mask
  • Switching loop
  • VLAN mismatch
  • Mismatch MTU

Which of the following technologies would be used in a small office area that has a lot of 2.4GHz noise?

  • 802.1q
  • 802.3af
  • MIMO
  • 802.11a

Which of the following protocols is used by the ping command?

  • ICMP
  • ARP
  • FTP
  • STP

Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?

  • Router
  • Switch
  • VPN Concentrator
  • Hub

Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this?

  • VPN Client and Concentrator
  • Smart jacks installed for each network jack
  • Port Mirroring
  • Proxy server with content filter

Which of the following commands could Philip, a network administrator, use to determine the IP address of a Linux server?

  • nbtstat
  • netstat
  • ipconfig
  • ifconfig

You suspect an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?

  • Packet sniffer
  • Toner Probe
  • OTDR
  • Packet Scoping

Lin, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?

  • PKI
  • Kerberos

Which of the following could be used to estimate Round-Trip Time (RTT) across a router?

  • arp
  • uptime
  • tracert
  • dig

Which of the following OSI model layers is between the Network and Session layers?

  • Physical
  • Data link
  • Transport
  • Presentation

Philip, a technician, has been asked to configure the WAN interface connecting to the ISP's router. Which of the following interfaces on the router will be modified?

  • Console 0
  • FastEthernet 0/0
  • Serial 0/0/0
  • AUX 0

Lin, a network technician, needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?

  • VLAN tagging
  • PoE
  • Port forwarding
  • VTP trunking

Philip, an administrator, is responsible for one Linux and two Windows servers. He would like to review all server logs centrally. Which of the following services could Philip use in this scenario?

  • Syslog
  • Event logs
  • Change Management
  • Baselines

Managing a network device on a dedicated channel that is not used for regular network traffic is known as:

  • In-Band management
  • Backdoor access
  • Man-in-the-middle
  • Out-of-band management