CompTIA Network+ N10-008 (Practice Test)

CompTIA Network+ covers the configuration, management, and troubleshooting of common wired and wireless network devices. Also included are emerging technologies such as unified communications, mobile, cloud, and virtualization technologies. The CompTIA Network+ N10-008 covers several objectives: Networking Fundamentals, Network Implementations, Network Operations, Network Security, Network Troubleshooting. CompTIA Network+ validates the technical skills needed to securely establish, maintain and troubleshoot the essential networks that businesses rely on.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)
  • Included Objectives:
    • Network Troubleshooting
    • Networking Fundamentals
    • Network Implementations
    • Network Operations
    • Network Security

A user on a company's network is experiencing network issues. Their IP is, what does this IP indicate?

  • TCP/IP Stack is corrupt
  • WINS Server is down
  • NIC may be faulty
  • APIPA was used

If a CAT5 cable is longer than the standard maximum length, which problem is most likely to be an issue?

  • packet collisions will increase
  • Split cable
  • Increase of EMI
  • Db loss

You are a Network Architect and Administrator at a large company. The business has asked for a solution that will allow them to freely move around the headquarter campus without losing wireless connectivity and without having to reconnect or re authenticate. Which technology could serve as a solution?

  • Routing
  • Hot-swapping
  • Roaming
  • Switching

Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?

  • Router
  • Hub
  • VPN Concentrator
  • Switch

Jennifer, a technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check?

  • The arp table of the network user
  • The route table of the new customer's router
  • The arp table of the ISP's gateway router.
  • The route table of the next-hop router

The end-to-end security scheme Internet Protocol Security (IPsec) resides at which layer of the OSI model?

  • Session layer of the OSI model
  • Network layer of the OSI model
  • Transport layer of the OSI model
  • Presentation layer of the OSI model

What cabling type should be used by an organization hoping to upgrade from 1 Gbps to 10 Gbps connections in the future?

  • Cat 5e
  • Cat 6a
  • 10Base2
  • Cat 5

Lin, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?

  • Kerberos
  • PKI

Which command will give you a list of host names connected to the local network?

  • nslookup
  • arp
  • hostname
  • nbtstat

Which OSI model layer is used for logical addressing?

  • Data Link
  • Network
  • Physical
  • Transport

What command would you use to display a MAC address if the administrator is using a Linux machine?

  • ipconfig -a
  • ifconfig
  • ipconfig /all
  • ipconfig

True or False: It is possible for a CAT 5e cable to span a length of 200 meters without signal degradation or a device to amplify the signal.

  • True
  • False

Which choice is a NID placed at the demarcation point between an ISP and customer's networks that can be used as a troubleshooting tool when diagnosing a network issue?

  • Protocol Analyzer
  • Smart jack
  • DMZ
  • Line validator

You need to view a Windows PC's open TCP connections, which command would you use?

  • Ipconfig
  • Tracert
  • Netstat
  • Ping

A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers is known as Software as a Service (SaaS).

  • False
  • True

Which switch for the ping command, will ping a host a specific number of times?

  • -l
  • -a
  • -t
  • -n

What type of server dynamically assigns Internet Protocol Addresses?

  • SNMP
  • DHCP
  • DNS
  • WINS

An employee connects to her desktop from her home computer, using the built in Windows Remote Desktop feature. What port is she most likely using?

  • 23
  • 3389
  • 443
  • 89

What command will allow you to determine the MAC Address of a local print server?

  • dig
  • nbstat
  • arp
  • ping

A system that uses a public network (Internet) as a means for creating private encrypted connections between remote locations is known as:

  • Integrated Services Digital Network (ISDN)
  • Virtual Private Network (VPN)
  • Virtual Local Area Network (VLAN)
  • Personal Area Network (PAN)