Network+ N10-008 practice test

Our Network+ N10-008 practice test consists of 20 Network+ N10-008 practice questions. These are all multiple choice however, in our exam simulators you would experience all the other questions types that are on the exam including the Performance Based Questions – PBQ. The Network+ N10-008 practice test includes questions from each CompTIA main domain and each question includes both the correct answer as well as an explanation.

These questions are presented here in the order of the CompTIA five main domains for Network+ N10-008 with four questions per domain.

Button to click for a walkthrough of a performance based question

Network+ N10-008 Main Domain 1.0 – Network Fundamentals

Question 1. Your current network uses MLPS for secure transactions. You want to move to Secure SDWAN in the interest of security. Which of these choices best justifies your case?

Secure SDWAN is cheaper to implement
Secure SDWAN provides better security than MLPS
MLPS only blocks malware and exploits
MLPS provides greater performance
SDWAN technology does not support MLPS

Answer: Secure SDWAN provides better security than MLPS

Explanation: When comparing MLPS (Multiprotocol label switching) to Secure SDWAN (Software-defined wide area network), SDWAN provides a more secure, less expensive, and faster solution. MLPS communications and transactions are supported in the SDWAN environment. Although Secure SDWAN is indeed cheaper, making it a correct answer, that is not the best answer as the “best interest of security” here will trump cost.

Subobjective: 1.2 Explain the characteristics of network topologies and network types

Question 2. An Angled physical contact (APC) on a fiber optic cable provides which of the following advantages over a UPC connection?

Saves space in the rack
Tolerates extremely high vibrations
Provides superior performance
All of these

Answer: Provides superior performance

Explanation: APC connections have an endpoint consisting of an 8-degree polished ferrule which significantly reduces return loss to greater than -65dB. A standard UPC (Ultra Physical Contact) connection has a return loss of around -55dB, making it less efficient than the APC. In a high vibration environment, the FC connection is superior. There is no significant space reduction with APC connections.

Subobjective: 1.3 Summarize the types of cables and connectors and explain which type is appropriate to solve your issue.

Question 3. When the route for an IP message to reach a destination is not known, where is the message forwarded to?

The WINS server
The DNS server
The ARP cache
The default gateway

Answer: The default gateway

Explanation: The Internet Protocol (IP) is responsible for moving packets of data from node to node. IP forwards each packet based on a four-byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates with routers (often called gateways in the original TCP/IP specifications) that move data from department to organization to region and then around the world. This is referred to as “IP routing.” The router that connects to a LAN and provides internetwork routing is called the “default route” or “default gateway”.

Subobjective: 1.4 Given a scenario, configure a subnet and use appropriate IP addressing schemes

Question 4. Which transmission type is used in streaming and can be sent specifically to multiple network nodes simultaneously?

PDU
Multicast
MTU
Broadcast

Answer: Multicast

Explanation: Multicast is a term used to identify packets sent specifically to multiple nodes. This is different from a broadcast transmission which transmits to all nodes. A Maximum Transmission Unit (MTU) operates at the network layer and specifies the maximum Protocol Data Unit (PDU) size. A Protocol Data Unit (PDU) is a message or group of bits containing data and addressing information.

Subobjective: 1.4 Given a scenario, configure a subnet and use appropriate IP addressing schemes.

Network+ N10-008 Main Domain 2.0 – Network Implementations

Question 1. When wireless devices connect with each other without any infrastructure, for example without routers, switches, or hubs, they are referred to as ________________ networks.

WAN
MAN
Ad hoc
CAN

Answer: Ad hoc

Explanation: An ad hoc network has no central or common hardware. The devices communicate directly with each other. Wireless networks take advantage of this capability. A WAN (Wide Area Network) consists of multiple LANs covering a large area, e.g. the Internet. A MAN (Metropolitan Area Network) consists of multiple LANs confined to a certain geographic area. Depending on the scope, you may see a MAN called a CAN (Campus Area Network), e.g. a group of Government offices

Subobjective: 2.4 Given a scenario, install and configure the appropriate wireless standards and technologies.

Question 2. Your wireless network is configured to support 2.4 Ghz and 5 Ghz connections. A laptop upgrade gave several users 802.11ax network cards which by default use the 5 Ghz band. Will these users be able to connect to your wireless network?

Yes, 802.11ax devices can also use the 2.4 or 5 Ghz bands
Yes, they will connect at 2.4 Ghz only
Yes, they will connect at 5 Ghz only
No, they will need a compatible wireless adapter

Answer: Yes, 802.11ax devices can also use the 2.4 or 5 GHz bands

Explanation: Wi-Fi 6 (802.11ax) devices are designed to run optimally in the unlicensed 6 GHz band however, they are compatible with the 2.4 GHz and 5 GHz bands. Wi-Fi 6 devices will connect to most available Wi-Fi routers. Wi-Fi 5 (802.11ac) is also backward compatible.

Subobjective: 2.4 Given a scenario, install and configure the appropriate wireless standards and technologies.

Question 3. Which of these choices introduced the Long-Term Evolution (LTE) wireless broadband communication standard?

2G
3G
4G
5G

Answer: 3G

Explanation: LTE offers improved capacity and speed of wireless broadband communications and was introduced originally to 3G devices. LTE uses a different frequency range and technology than its predecessors. Marketing descriptions may call this LTE Advanced or WiMAX. Modern cellphones are generally backwards compatible with earlier generation technologies.

Subobjective: 2.4 Given a scenario, install and configure the appropriate wireless standards and technologies.

Question 4. This mobile technology was introduced to U.S. consumers in 2018 and represented the state-of-the-art in cellular communication.

4G
4G LTE
5G
6G

Answer: 5G

Explanation: 5G technology began its rollout in select areas in 2018 and has been growing ever since. 5G support required significant infrastructure upgrades. Since 5G is backward compatible with 4G LTE and earlier, cellular service was uninterrupted. 6G is expected to roll out in 2030.

Subobjective: 2.4 Given a scenario, install and configure the appropriate wireless standards and technologies.

Network+ N10-008 Main Domain 3.0 – Network Operations

Question 1. Packet delay variation (PDV) is a problem in which network packets arrive late or out of order with other packets in any given transmission. What is a common term for this condition?

Latency
Jabber
Jitter
Mismatch

Answer: Jitter

Explanation: Commonly called jitter, it is a measurable condition. Latency is the common cause and can, depending on the degree, cause transmissions to become dropped, stalled, or jumpy. This would be most evident in streaming voice and video communications.

Subobjective: 3.1 Given a scenario, use the appropriate statistics and sensors to ensure network availability.

Question 2. This document clearly defines a provider’s requirements for a company. It will contain specific criteria to ensure that both parties understand the expected performance level.

SLA
MOU
AUP
SDA

Answer: SLA

Explanation: A Service Level Agreement (SLA) is designed to establish a service provider’s guarantee that the specified areas will perform according to the agreement. This usually means network uptime but can also relate to hardware and equipment.

Subobjective: 3.2 Explain the purpose of organizational documents and policies

Question 3. Every change to the network should be made for a reason, then discussed and documented. What is the starting point for a change?

Configuration procedures
Change request
Change notification
Potential impact assessment

Answer: Change request

Explanation: Any change to the network should start as a change request. This request will move through the various stages of the approval process and should include all those pieces of information (including but not limited to the risk/rewards of the change) that will guide those tasked with the approval or disapproval of the requested change.

Subobjective: 3.2 Explain the purpose of organizational documents and policies.

Question 4. When comparing uninterruptable power supplies, which of the following the most important factor to consider when purchasing a UPS?
How long to keep a device running?
What is the amount of power needed?
Do I need line conditioning?
How much will it cost?

Answer: What is the amount of power needed?

Explanation: The most important step in your UPS selection and the shopping process is to sit down and chart out your power needs before spending money on equipment that is overpowered (or worse, underpowered) for your situation. Begin by thinking about all the systems that need the extended power protection supplied by a UPS unit, to stay online in the event of power outages. The more power required by the device the more powerful the UPS needs to be. Electrical power is measured in volt-amperes or VA (the product of voltage and current measured in amps).

Subobjective: 3.3 Explain high availability and disaster recovery concepts and summarize which is the best solution.

Network+ N10-008 Main Domain 4 – Network Security

Question 1. When examining your network security, you use the CIA model to help your understanding and improve your design. Which part of the model covers access, control lists, and encryption?
Confidentiality
Integrity
Availability
All of these

Answer: Confidentiality

Explanation: The CIA model provides a model for security policy development that covers Confidentiality, Integrity, and Availability. It has provisions for the handling of user information. Confidentiality covers access levels, disk and file encryption, and file permissions in the Linux environment. Integrity covers dealing with unauthorized access and activity, providing the capability to reverse any damage even if it was caused by an authorized party. Availability is also an important component to consider since a system shouldn’t be so secure that performance and usability suffer. High availability system designs specifically address issues, such as power and hardware failures, by providing system designs that mitigate problems and reroute traffic around problematic situations

Subobjective: 4.1 Explain common security concepts

Question 2. What source of information checks logs for unwanted behavior and details about IDS/IPS, UTM, SNMP, and firewalls in real-time?

Utilization
SIEM
MIB
Event Viewer

Answer: SIEM

Explanation: SIEM (Security Information and Event Management) systems can monitor logs in real-time and can be configured to issue alerts when one of its rules is violated. Log reviewing via the event viewer is a manual process and is not as fast and accurate as SIEM. The MIB (Management Information Base) retrieves and stores the information gathered by its agents. Not only does it store the managed objects and their descriptions, it can gather performance information from SNMP (Simple Network Management Protocol). Utilization, with regards to gathered data, refers to the values contained in the log files which are then compared to the network baseline

Subobjective: 4.1 Explain common security concepts

Question 3. A router will allow or deny network traffic based upon several criteria. Which of these A) works on the router at the Network layer, and B) can examine and restrict packets based upon their Network layer addressing information?

ACL
Port blocker
Iptables
IDS

Answer: ACL

Explanation: The router’s ACL (Access Control List) examines each packet for its Network layer addressing information such as the source IP address, destination IP address, TCP/UDP port number, and the protocols being used, e.g. TCP, UDP, IP, or ICMP. Port blockers are usually 3rd party applications installed on a network node. Iptables is a Linux computer-based firewall utility. An IDS is a standalone device capable of using its own ACLs.

Subobjective: 4.3 Given a scenario, apply network hardening techniques

Question 4. When connecting wirelessly to a network as a Guest, you are directed to a page that requires you to agree to the terms and conditions of that network before you can proceed. What term best describes this connection?

Client isolation
Sandbox
ACL bypass
Captive portal

Answer: Captive portal

Explanation: A Captive portal replaces the Guest network with a page that lists the conditions of the connection and should contain warnings that the connection is not secure as well as the fact that the user can be identified by their IP address. A Sandbox is a temporary VM. Client isolation allows connection to the gateway and internet, but not to any network resources.

Subobjective: 4.3 Given a scenario, apply network hardening techniques

Network+ N10-008 Main Domain 5 – Network Troubleshooting

Question 1. Which choice best describes the intended use for a standard wire mapper?

Check device locations
Check connection path
Check twisted pair cable for open/shorts
Check for POE support

Answer: Check twisted pair cable for open/shorts

Explanation: A wire mapper checks a copper cable for any problems such as open or shorted wires (continuity) or issues with the connector pin-out. The standard wire mapper is a device that detects faults with a cable however, it cannot detect the routing or location of devices. In POE environments, a different or more specialized device called an AC wire mapper is used.

Subobjective: 5.2 Given a scenario, troubleshoot common cable connectivity issues and select the appropriate tools.

Question 2. You’re working the help desk when a user calls in to report she cannot connect to the Internet. She thinks her password has been stolen. You ask if anyone else around her is having the same problem and she reports that they are not and can access websites with no difficulty. You reset her password and attempt to remote into her workstation and cannot log in. You log into your workstation with her credentials and have no problem with either logging in or connecting to the Internet. Which of the following is the most likely problem?

Problem with authentication to the server
Firewall permissions
Incorrect username or password
A bad patch cable or switch port

Answer: Bad patch cable or switch port

Explanation: No other users are having an issue so that rules out the server being unavailable. The username and password have been reset and you can log into her account from your workstation so it’s not an authentication issue either. The logical choice is that it’s a bad patch cable or switch port because the problem seems to be isolated to her workstation’s connectivity, therefore the patch cable is a good place to begin troubleshooting this issue.

Subobjective: 5.2 Given a scenario, troubleshoot common cable connectivity issues and select the appropriate tools.

Question 3. What is the CLI command iperf used for?

Test disk throughput
Test network throughput
Test graphic adapter throughput
None of these

Answer: Test network throughput

Explanation: iperf is a cross-platform network tool that runs from the Command Prompt (or Terminal). It can be configured to measure network speed and throughput. It is capable of taking these measurements through ports and protocols and runs in client or server modes.

Subobjective: 5.3 Given a scenario, use the appropriate network software tools and commands.

Question 4. Your network has suffered a catastrophic loss of connectivity. You cannot reach your routers, switches, and other network nodes. Which would you use to open a CLI on your local router?

Terminal services
Remote Desktop
Terminal console
None of these will work

Answer: Terminal console

Explanation: Network outages are troublesome because most of the tools we use will not work. The terminal console allows access to linked devices through a special remote management port on the device. Remote Desktop and Terminal services cannot be relied upon in an outage.

Subobjective: 5.3 Given a scenario, use the appropriate network software tools and commands.

End of the Network+ N10-008 practice test

And that completes our Network+ N10-008 practice test. We hope it helped you get a sense of what type of questioning you can expect at the exam.

Reasons given in a survey by employers for requiring certification.
Reasons given by employers for requiring certification.
Trust Guard Security Scanned
Share This
CertBlaster
Real Time Web Analytics