00:15:00

Free CompTIA Network+ N10-008 Practice Test

Prepare for the CompTIA Network+ N10-008 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Networking Fundamentals
    • Network Implementations
    • Network Troubleshooting
    • Network Operations
    • Network Security
Question 1 of 15

A network administrator is setting up a new centralized authentication system for the company's multi-vendor network infrastructure. Security policies require individual accountability and the ability to implement command authorization based on roles. Which authentication protocol would BEST meet these requirements?

  • Terminal Access Controller Access-Control System Plus (TACACS+)

  • Remote Authentication Dial-In User Service (RADIUS)

  • Lightweight Directory Access Protocol (LDAP)

  • Kerberos

Question 2 of 15

Your company is located in an area of the country where tornadoes are a possibility. What type of plan would the company have to maintain business critical systems in the event a tornado affected operations?

  • SOP

  • IRP

  • BCP

  • DRP

Question 3 of 15

Your company's VoIP system experiences occasional quality issues during peak hours, which is most likely caused by network congestion. As the network administrator, you have been tasked with improving the quality of VoIP traffic across the network. Which method is BEST suited for prioritizing VoIP traffic to mitigate the observed issues?

  • Implement Quality of Service (QoS) policies to prioritize VoIP traffic

  • Increase the overall bandwidth of the internet connection

  • Implement stronger encryption protocols for data transmission

  • Apply traffic shaping to limit unnecessary data flows during peak hours

Question 4 of 15

What is the primary purpose of a Virtual Private Network (VPN)?

  • To create a secure and encrypted connection over a less secure network, such as the internet.

  • To increase the speed and performance of network communications.

  • To provide a public IP address to devices on a private network.

  • To reduce the cost of network infrastructure by replacing physical connections.

Question 5 of 15

A network engineer is attempting to connect two switches directly to each other to facilitate inter-switch communication. However, after using a straight-through Ethernet cable, they find that the link is not active, and the switch ports are not lighting up appropriately. Which type of cable should the engineer use instead to correct this issue?

  • Straight-through cable

  • Rollover cable

  • Fiber optic cable

  • Crossover cable

Question 6 of 15

What is the purpose of using STP ethernet cables instead of UTP ethernet cables?

  • STP cables allow data to travel farther distances

  • Protects against optical interference

  • STP cables are fire resistant

  • Protects against EMI

Question 7 of 15

A company has recently implemented a wireless network for their guests to provide internet access without compromising internal resources. Which of the following configurations ensures that guests cannot access the company's private internal network resources while connected to the guest network?

  • Configure Quality of Service (QoS) profiles to keep guest network traffic at a lower priority

  • Enforce a complex Wi-Fi Protected Setup (WPS) PIN for the guest network

  • Implement separate VLANs for the guest network and the internal network

  • Modify firewall rules to include an explicit deny rule for guest IPs to internal resources

Question 8 of 15

A campus network consists of multiple subnets for various departments. Students in the dormitory subnet need to obtain network configuration automatically from a centralized configuration server located in the IT department's subnet. The network engineer's task is to ensure these requests reach the right destination. Which configuration should the engineer apply to the router to facilitate this process?

  • Enable proxy ARP on the dormitory segment’s router interface to allow clients to discover the server across subnets.

  • Set the router interface for the dormitory segment to forward requests to the configuration server using an appropriate helper address.

  • Activate broadcast forwarding on the router to ensure that all broadcasts reach all subnets within the campus network.

  • Establish a VLAN access list (VACL) that permits traffic from the dormitory network to the server’s network.

Question 9 of 15

A network technician is tasked with installing a new switch in an enterprise data center that requires a connection to a legacy multimode fiber running at 1 Gbps. Which of the following transceivers should the technician install in the switch to ensure compatibility with the existing infrastructure?

  • 1000BASE-TX SFP

  • 1000BASE-SX SFP

  • 1000BASE-LX SFP

  • 10GBASE-LR SFP+

Question 10 of 15

A company has recently set up an email server and users are reporting they can send emails but cannot receive them. While troubleshooting, you observe that the email client settings are configured to connect to the server using the default port for receiving email. Which port should be open on the server to allow the reception of emails via the most common protocol for email retrieval?

  • 143

  • 110

  • 587

  • 25

Question 11 of 15

After detecting an unauthorized intrusion into the company's network, which of the following steps should be prioritized in the incident response plan to best contain the breach?

  • Notifying the company leadership and legal advisors

  • Isolating the affected systems from the network

  • Restoring all systems from the most recent backups

  • Immediately documenting all actions taken after the breach

Question 12 of 15

Which technology utilizes a spread-spectrum technique that allows each user to occupy the entire bandwidth simultaneously, distinguished by unique digital codes?

  • Code-division multiple access (CDMA)

  • Frequency-division multiple access (FDMA)

  • Time-division multiple access (TDMA)

  • Orthogonal frequency-division multiple access (OFDMA)

  • Frequency-division duplex (FDD)

  • Time-division duplex (TDD)

Question 13 of 15

A network administrator is investigating a high number of input errors on an interface of a router. The issue is causing slow network performance. Upon closer inspection, the administrator notices that the CRC counter is incrementing. What is the most likely cause of the CRC errors?

  • Faulty cables, ports, or network interface cards (NICs).

  • Excessive broadcast traffic overloading the interface buffer.

  • Duplex mismatch between the router interface and the switch port.

  • Incorrect clock rate configured on the router interface.

Question 14 of 15

When configuring a switch to combine several ports to increase throughput and provide redundancy, which protocol would be most suitable?

  • Rapid Spanning Tree Protocol (RSTP)

  • Link Aggregation Control Protocol (LACP)

  • Port security

  • Spanning Tree Protocol (STP)

Question 15 of 15

A network administrator notices slow network response times and suspects a high volume of unexpected traffic within the network. To confirm this suspicion, which software tool should the administrator use to monitor and analyze the network traffic?

  • IP scanner

  • WiFi analyzer

  • Protocol analyzer/packet capture tool

  • Bandwidth speed tester