⚡️Lightning Sale: 50% off Lifetime Membership!⚡️
CompTIA Network+ N10-008 (Practice Test)

CompTIA Network+ covers the configuration, management, and troubleshooting of common wired and wireless network devices. Also included are emerging technologies such as unified communications, mobile, cloud, and virtualization technologies. The CompTIA Network+ N10-008 covers several objectives: Networking Fundamentals, Network Implementations, Network Operations, Network Security, Network Troubleshooting. CompTIA Network+ validates the technical skills needed to securely establish, maintain and troubleshoot the essential networks that businesses rely on.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)
  • Included Objectives:
    • Network Troubleshooting
    • Networking Fundamentals
    • Network Implementations
    • Network Operations
    • Network Security

Which cable type would be a cost effective choice for a data center with large amounts of servers?

  • Fiber
  • STP
  • RJ-11
  • UTP

RIP and OSPF are examples of what?

  • Encryption algorithms
  • Authentication protocols
  • hashing algorithms
  • routing protocols

What software tool will save a packet for later review?

  • TLS
  • TCP/IP Scanner
  • Port Scanner
  • Protocol Analyzer

A malicious AP that appears as a legitimate wireless access point, is known as what?

  • Phishing point
  • Evil Twin
  • MITM
  • War driving

What type of filtering allows for blocking or allowing access to specific domain names?

  • Program
  • URL
  • MAC
  • Port

You are configuring the ability to remotely retrieve files. To protect the files from compromise you want to send them over a secure channel so you setup a SFTP client and server. Which system port would the service need to run on?

  • 20
  • 22
  • 23
  • 21

Which of the following options is capable of detecting malicious activity on a single machine, but will not attempt to stop said activity?

  • NIPS
  • HIDS
  • HIPS
  • NIDS

Which type of files pose the greatest risk related to the distribution of malware?

  • .pdf
  • .exe
  • .txt
  • .png

Which of the following could be used to estimate Round-Trip Time (RTT) across a router?

  • uptime
  • arp
  • tracert
  • dig

Which of the following security solutions allows for discarding ARP packets with invalid IP-to-MAC address bindings?

  • SIEM
  • RARP
  • DCS
  • DAI

You are troubleshooting the connectivity of a Windows desktops. You go into command-line and you want to pull up the TCP/IP protocol information for the device. What command would get you the information?

  • ping
  • arp
  • hostname
  • ipconfig

Which of the following solutions enables combining several physical ports into a single logical channel?

  • RSTP
  • VRRP
  • LACP
  • HSRP

Which Windows command line utility will use ICMP echo/reply packets to test a connection to a remote host?

  • ping
  • nslookup
  • netstat
  • dxdiag

An employee connects to her desktop from her home computer, using the built in Windows Remote Desktop feature. What port is she most likely using?

  • 89
  • 23
  • 443
  • 3389

A standard MAC Address consists of how many bits?

  • 48
  • 32
  • 8
  • 16

In which type of network topology do the main network cables become a single point of failure?

  • Full mesh
  • Partial mesh
  • Bus
  • Star

What would the default subnet mask for the IP be?


Which of these default ports, when disabled, will disallow TFTP traffic?

  • 69
  • 80
  • 21
  • 20

You need to run cable through the airspace between offices, what type of cable is required to do this safely?

  • STP
  • EMI
  • UTP
  • Plenum

Which of the following is the prefix for a link-local IPv6 address?

  • FE80::/10
  • 2FFE::/16
  • FEEF:/12
  • FF00::/8

Remaining Time: