00:15:00

Free CompTIA Network+ N10-008 Practice Test

Prepare for the CompTIA Network+ N10-008 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Networking Fundamentals
    • Network Implementations
    • Network Operations
    • Network Security
    • Network Troubleshooting
Question 1 of 15

A network administrator is investigating intermittent issues on a web application server. The administrator wants to capture packets on interface eth0 that are part of established TCP sessions, not the initial TCP handshakes. Which tcpdump command will correctly filter out packets that do not have the SYN flag set, ensuring that only established connections are monitored?

  • tcpdump -i eth0 'tcp[tcpflags] & (tcp-syn) == 0'

  • tcpdump -i eth0 'tcp[tcpflags] & (tcp-syn) != 0'

  • tcpdump -i eth0 'tcp'

  • tcpdump -i eth0 'tcp[tcpflags] & (tcp-ack) == 0'

Question 2 of 15

Which mechanism do devices use to automatically configure their own network addresses on an IPv6 network based on router advertisements, negating the necessity for a server-based address allocation service?

  • Router Advertisement (RA)

  • Stateless address autoconfiguration (SLAAC)

  • Neighbor Discovery Protocol (NDP)

  • Address Resolution Protocol (ARP)

Question 3 of 15

Which of the following is a loopback address?

  • ::0

  • 00-21-86-5C-B4-6C

  • 127.0.0.1

  • ::127:0:0:1

Question 4 of 15

A network technician needs to measure the available bandwidth between two servers on the same network. Which tool is most appropriate for conducting a test to determine the performance of the network between the servers?

  • NetFlow analyzers

  • iperf

  • Wireshark

  • Ping

Question 5 of 15

An organization is facing an attack where multiple compromised systems are being used to flood their web servers with traffic, preventing legitimate users from accessing online services. Which of the following would BEST describe this type of attack?

  • A SYN flood attack targeting the TCP handshake process to consume server resources.

  • Traffic shaping configured incorrectly, leading to unintentional disruption of service.

  • A distributed denial-of-service attack where multiple systems are targeting the servers.

  • A denial-of-service attack emanating from a single IP address to block service availability.

Question 6 of 15

A network administrator is using an analysis protocol to gain insights into traffic traversing network devices, with the objective of detecting unusual traffic patterns and identifying potential threats. Which type of information should the administrator analyze to achieve this goal?

  • Endpoints of communication, timings, and application identifiers

  • Hardware addresses of endpoints

  • Mediums used to connect network components

  • Segmentation and tagging details of network traffic

Question 7 of 15

An energy company utilizes a SCADA system for monitoring their power distribution network. They are updating their network infrastructure to improve communication reliability and data throughput. The network engineer has been asked to identify a network device that can segment network traffic to reduce broadcast domains and provide the best performance for the SCADA network components. Which device should the engineer recommend?

  • Layer 3 capable switch

  • Wireless LAN controller

  • Repeater

  • Hub

Question 8 of 15

An organization has deployed several routers and switches within a secured server room. They want to ensure that any unauthorized physical access to these devices is immediately detected and reported. Which of the following solutions would provide the most effective tamper detection for this scenario?

  • Putting case locks on all hardware equipment

  • Using RFID tags on devices and scanning them regularly to check for unauthorized movements

  • Setting up CCTV with motion detection around the server racks

  • Installing an intrusion detection alarm system with sensors attached to the network devices

Question 9 of 15

A network administrator is setting up a wireless local area network in a busy office space that already has multiple wireless networks. The administrator needs to configure the new wireless access points to minimize interference with existing networks. Considering the characteristics of the 2.4GHz frequency band, which of the following channels should the administrator choose to achieve this goal?

  • Channel 10

  • Channel 3

  • Channel 5

  • Channel 1, 6, or 11

Question 10 of 15

Which protocol provides centralized authentication, authorization, and accounting services for users who are attempting to gain access to network resources and uses TCP port 49?

  • RADIUS

  • LDAP

  • Kerberos

  • TACACS+

Question 11 of 15

A Krone punchdown block can be used interchangeably with a 110 punchdown tool without any impact on the quality of the connection.

  • True

  • False

Question 12 of 15

Which Windows command line utility will use ICMP echo/reply packets to test a connection to a remote host?

  • ping

  • nslookup

  • netstat

  • dxdiag

Question 13 of 15

During a routine network maintenance check, you notice an increase in complaints about network slowdown from a department that had no issues the previous week. What is one of the first steps you should take in troubleshooting this issue?

  • Check if there have been any recent changes to the network configuration, devices, or infrastructure in that department

  • Advise the department to stop using the internet until the issue is resolved

  • Increase the bandwidth limit for the affected department

  • Replace all the network cables in the department

Question 14 of 15

A company is looking to increase network availability by ensuring that in case a single switch fails, the network will still remain operational without a significant performance decrease. Which solution is BEST recommended for this scenario?

  • Replace existing switch power supplies with higher-rated ones to ensure uninterrupted power delivery.

  • Use switches in a stacked configuration to work as a single switch unit.

  • Implement Spanning Tree Protocol to prevent switching loops.

  • Install a protocol analyzer on the network to identify potential switch faults.

Question 15 of 15

A network device designed to manage the distribution of a network's workload between near-identical resources is called:

  • Router

  • DNS Server

  • Load Balancer

  • Firewall