00:15:00

Free CompTIA Network+ N10-008 Practice Test

Prepare for the CompTIA Network+ N10-008 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Networking Fundamentals
    • Network Implementations
    • Network Operations
    • Network Security
    • Network Troubleshooting
Question 1 of 15

A network administrator notices that the connection between a workstation and the wall jack is not establishing a link. The LED indicators on the network interface card (NIC) are not lighting up. After replacing the NIC and confirming the switch port is operational, the administrator uses a cable tester on the suspect Ethernet cable. The cable tester indicates that there is a discontinuity in the wire corresponding to pin 1. What is the most likely issue with this Ethernet cable?

  • The connectors are wired for the wrong Ethernet standard.

  • There is an open fault on pin 1 of the cable.

  • The cable tester being used is faulty.

  • There is a short fault on pin 1 of the cable.

Question 2 of 15

A network administrator is configuring a new server to ensure that potential operational issues are promptly identified and addressed. The administrator needs to choose the correct level of logging to balance between detail and storage efficiency. Select the BEST logging level that would capture warnings that might not be immediately harmful to the network's operation but are significant enough to be monitored.

  • Informational

  • Emergency

  • Warning

  • Alert

Question 3 of 15

Why is it considered a best practice to disable switch ports that are not in use within a network infrastructure?

  • To conserve power consumed by the network infrastructure.

  • To avoid IP address exhaustion due to a limited DHCP scope.

  • To reduce the number of active ports that could potentially serve as entry points for unauthorized users or devices.

  • To decrease network complexity and the associated overhead for network administrators.

  • To increase the speed of the network by preventing unused ports from generating traffic.

Question 4 of 15

A company needs to manage incoming network traffic efficiently to multiple servers in order to ensure optimal performance and minimize downtime. Which of the following devices is best suited for this requirement?

  • VPN headend

  • Switch

  • Router

  • Load balancer

Question 5 of 15

In network operations, what is the primary purpose of maintaining a comprehensive Acceptable Use Policy (AUP)?

  • To ensure all network devices operate with the latest firmware updates

  • To document the physical layout of the organization's network infrastructure

  • To outline the procedure for adding new devices to the network

  • To define what behavior is considered acceptable when using the organization's network and computing resources

Question 6 of 15

What is commonly used in networks to detect errors in data transmissions?

  • Load balancing

  • Network interface card teaming

  • Simple Network Management Protocol

  • Cyclic redundancy checks

Question 7 of 15

A company's firewall has been configured with various rules to allow specific types of traffic into the network. After all the access control rules have been set, what is the BEST practice to ensure that any unspecified traffic is blocked by default?

  • Configure an 'implicit deny' rule at the end of the ACL

  • Configure the firewall to 'ignore unspecified traffic'

  • Remove all 'deny' rules to streamline firewall processing

  • Configure an 'allow by default' rule at the end of the ACL

Question 8 of 15

A small business is expanding its office space and the existing wireless signal does not adequately cover the new area. To extend the wireless network range with minimal cost, which device should be used at the location where the signal begins to weaken?

  • Access point

  • Repeater

  • Media converter

  • Layer 2 switch

Question 9 of 15

An organization is implementing a network access control mechanism and requires a method that accommodates both certificate-based and password-based user authentications within a secure channel. Which protocol should they implement to satisfy this need while integrating with their network's existing access control?

  • EAP Message Digest 5 (EAP-MD5)

  • Lightweight EAP (LEAP)

  • EAP-Tunneled Transport Layer Security (EAP-TTLS)

  • EAP-Flexible Authentication via Secure Tunneling (EAP-FAST)

  • EAP-Transport Layer Security (EAP-TLS)

  • Protected EAP (PEAP)

Question 10 of 15

In the OSI model layer 4 is known as:

  • Transport

  • Application

  • Physical

  • Session

Question 11 of 15

Why is it recommended to separate audio communication traffic from other data on a network switch?

  • To reduce the overall data speed for audio communication, preventing overutilization of network bandwidth

  • To increase the security of audio communication by isolating it from other network traffic

  • To prioritize audio communication, minimizing latency and packet loss for clearer and more reliable VoIP calls

  • To allow for the exclusive use of higher bandwidth channels by audio communication devices

Question 12 of 15

A network technician is tasked with installing a new switch in an enterprise data center that requires a connection to a legacy multimode fiber running at 1 Gbps. Which of the following transceivers should the technician install in the switch to ensure compatibility with the existing infrastructure?

  • 1000BASE-TX SFP

  • 10GBASE-LR SFP+

  • 1000BASE-SX SFP

  • 1000BASE-LX SFP

Question 13 of 15

What type of filtering allows for controlling specific types of network traffic (such as web traffic, mail, file transfer)?

  • MAC

  • IP

  • Port

  • URL

Question 14 of 15

A network administrator needs to implement a wireless security protocol that logs all access attempts and guarantees that user credentials are not compromised even if intercepted. Which authentication mechanism should the administrator deploy?

  • LEAP

  • EAP-FAST

  • EAP-TLS

  • EAP-MD5

Question 15 of 15

When a network engineer is examining interface statistics, they notice an incrementally increasing count of CRC errors. What is indicated by the increment of CRC errors on a network interface?

  • The interface is experiencing a higher than usual traffic load.

  • There is an IP address conflict on the network interface.

  • There is a potential problem with the network cable or interference causing data corruption.

  • The device is running out of buffer space due to memory issues.