CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA Network+ N10-008 Practice Test

Prepare for the CompTIA Network+ N10-008 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)
  • Included Objectives:
    • Network Security
    • Networking Fundamentals
    • Network Implementations
    • Network Operations
    • Network Troubleshooting

What type of authentication requires users to first enter their username and password and subsequently input a verification code sent via SMS?

  • TACACS+

  • Kerberos

  • Single Sign-On

  • Multi-factor Authentication

Lin, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?

  • MS-CHAP

  • Kerberos

  • TACACS+

  • PKI

Which of the following dynamic routing protocols uses a path vector mechanism and is often used between Internet Service Providers (ISPs) for routing between autonomous systems?

  • Enhanced Interior Gateway Routing Protocol (EIGRP)

  • Open Shortest Path First (OSPF)

  • Border Gateway Protocol (BGP)

  • Routing Information Protocol (RIP)

A network administrator is setting up a new centralized authentication system for the company's multi-vendor network infrastructure. Security policies require individual accountability and the ability to implement command authorization based on roles. Which authentication protocol would BEST meet these requirements?

  • Terminal Access Controller Access-Control System Plus (TACACS+)

  • Remote Authentication Dial-In User Service (RADIUS)

  • Lightweight Directory Access Protocol (LDAP)

  • Kerberos

Which of the following devices resides at the data link layer of the Open Systems Interconnections (OSI) model?

  • Repeater

  • Passive Hub

  • Router

  • Ethernet switch

What are Management Information Bases commonly utilized for in network management systems?

  • Encrypting data traffic between SNMP managers and network devices.

  • Directly managing user authentication processes on network devices.

  • Physically altering network configurations and settings in real-time.

  • Storing structured information about network device objects for access and management via SNMP protocols.

A company has decided to decommission a batch of old servers that contain sensitive client information. As part of the decommissioning process, the company wants to ensure that the data cannot be recovered after disposal. Which of the following methods should be employed to sanitize the servers before disposal?

  • Physically destroy the storage devices

  • Reformat the storage drives

  • Overwrite drives with non-sensitive data

  • Delete all partitions on the hard drives

You are troubleshooting the connectivity of a Windows desktop. You go into command-line and you want to pull up the TCP/IP protocol information for the device. What command would get you the information?

  • hostname

  • ping

  • arp

  • ipconfig

A medium-sized company wants to maintain control over their sensitive data but also wishes to utilize cloud resources for some of their services, such as CRM and email. Which deployment model should they implement to best serve their needs while keeping critical data on-premises?

  • Private cloud

  • Dual cloud

  • Public cloud

  • On Premise Cloud

  • BYOD

  • Hybrid cloud

What term best supports a network technician's reason for setting up redundant infrastructure?

  • Virtual Private Compute (VPC) Networks

  • Quality of Service

  • Bandwidth shaping

  • Fault tolerance

A group of developers are working on a confidential software product. Which agreement would the company have them sign to attempt to ensure the developers doesn’t release any information about the software?

  • MOU

  • SLA

  • SOP

  • NDA

When using the show route command on a router, what information are you most likely seeking?

  • To display the device's routing table.

  • To view the device's configuration file.

  • To examine the device's physical port states.

  • To show the list of firewall rules currently applied.

If you observe a green padlock and a check mark next to your bank's URL in your browser, signifying that a TLS-secured connection has been established, which port has most likely been used for the connection?

  • 80

  • 344

  • 443

  • 8080

An enterprise network administrator has been notified by multiple users that they have been redirected to malicious websites despite entering the correct URLs. Upon investigation, it was discovered that the local DNS server's cache may have been poisoned. Which of the following actions should the network administrator prioritize to mitigate this issue?

  • Change the local DNS server's cache settings to refuse responses from unauthorized or external sources.

  • Implement DNSSEC for all DNS queries.

  • Flush the DNS cache on all affected machines.

  • Immediately switch to a different DNS provider.

What term is used to describe Ethernet frames that are smaller than the minimum size requirement of 64 bytes and are therefore considered a type of network error?

  • Runts

  • Collisions

  • Giants

  • Checksum errors



Remaining Time 00:15:00