Certification Practice Test Sample Questions For CompTIA Network + (N10-008)

QuickStart is now offering sample questions for CompTIA Network + (N10-008). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice test to better aid in certification. 100% of the questions are real test questions; from a recent version of the CompTIA Network + (N10-008) exam.


Arrow

CompTIA Network+ N10-008 + Certification Exam Bundle

Enroll now today and get 30% off using discount code PRACTICE30 at checkout.

 
proceed to the next question. Correct answers will be displayed when you complete exam.

CompTIA Network + (N10-008) Sample Exam Questions

1

A Company decides to build new facilities to add more offices and warehouses in order to expand the corporate buildings and the facility overall. The distance between buildings in around 4 kilometers. Converted into miles it becomes around 2.5 miles. The buildings must be connected with a high bandwidth link in order to maintain fast connectivity. If you are a networking professional hired by the company, what kind of cable would you suggest the company use?

A. Cat 7
Incorrect.
B. Single mode fiber
Correct!
C. Multimode fiber
Incorrect.
D. Cat 5e
Incorrect.
2

In a company, a site-to-site VPN link is required to be configured between two offices and users in each office must be able to access resources in the other office. Resources may include shared folders and network services. Can you identify the type of VPN that would suit the company needs best?

A. TLS VPN
Incorrect.
B. PPTP VPN
Incorrect.
C. SSL VPN
Incorrect.
D. IPSec VPN
Correct!
3

There is a problem reported by a user who is unable to connect to Server A. When the on-site technician is approached, he identifies a physical issue with the fiber patch code but is not sure about it. With a specific tool, he can be sure about his intuition. Can you identify a tool that the technician can use to confirm if he is right about the problem?

A. Tone generator
Incorrect.
B. TDR
Incorrect.
C. OTDR
Correct!
D. Multimeter
Incorrect.
4

A wireless LAN, also called WLAN, is planned to be deployed in a new office space. It is specified by the network design that 80MHz is the minimum channel bandwidth requirement. Can you identify the standard that the access points must support?

A. 802.11b
Incorrect.
B. 802.11a
Incorrect.
C. 802.11g
Incorrect.
D. 802.11ac
Correct!
5

If you want to facilitate touchless payments, and use passive embedded chips and smart devices to do that, which Internet of Things technology is suitable?

A. Z-Ware
Incorrect.
B. Bluetooth
Incorrect.
C. NFC
Correct!
D. RFID
Incorrect.
6

A group of in-house technicians want to identify the services that are running on the network and they plan to carry a penetration attempt. Choose an option that they must use?

A. Traffic analysis
Incorrect.
B. Vulnerability scanning
Incorrect.
C. Packet analysis
Incorrect.
D. Port scanning
Correct!
7

Upon the rapid increase of wireless devices supported by a wireless network that is configured with a single WAP, following problems are being reported by the users: Lagging performance, connecting errors, and randomly being kicked out of the network. Increase in wireless devices resulted from the company implementing a BYOD policy. Can you identify what could be the problem?

A. Overcapacity
Correct!
B. Interference
Incorrect.
C. Attenuation
Incorrect.
D. Reflection
Incorrect.
8

If a company wants to switch from LAN to MAN, and wants all of its offices to be connected to it, what device would be best for the company to use? Here are some facts that will help out: Single-mode fiber backbone is used by the MAN, and all offices are required to be connected to that. Now there is a wired router in each office and each router is wired with UTP cable. There is a 10/100/1000 switch and each office also has a wireless access point connected to the switch. Can you identify the device company should use to connect to the MAN?

A. VPN concentrator
Incorrect.
B. Multilayer switch
Incorrect.
C. CSU/DSU
Incorrect.
D. Media converter
Correct!
9

A company carries regular on-sight inspection to check if everything is in place. Manufacturers recommend a standard bend size for fiber optic cables. One day, it is discovered by the inspection team that the bend radius of a certain fiber optic cable exceeds the recommended bend size. Can you identify the main concern of the company?

A. Duplex
Incorrect.
B. Attenuation
Correct!
C. EMI
Incorrect.
D. Near end crosstalk
Incorrect.
10

There is a backup type that benefits on two most important fronts when backing up data. It saves a lot of time and uses the least amount of disk space? Can you identify which type of backup is it?

A. Differential
Incorrect.
B. Incremental
Correct!
C. Full
Incorrect.
D. Copy
Incorrect.
11

Upon implementing a bring your own device policy in a company, security controls are to be strengthened on the personal devices of employees. One of those security protocols included the personal devices to be made unable to access a few managed applications and company data once they are out of the office boundaries. Can you identify an option from below, which you think is the right option to implement in this situation?

A. Geotagging
Incorrect.
B. EAP-FAST
Incorrect.
C. WPA2
Incorrect.
D. Geofencing
Correct!
12

Initially, an organization configures a wireless local area network (WLAN) with one access point (AP). It is named AP1 and has an SSID of AP1. It is configured to use channel 1 and is configured for WPA2-PSK. Later, another AP is configured, and is named AP2, with an SSID of AP2. This AP is configured to use channel 6 and is configured for WPA2-PSK. The second AP is configured with a unique IP address range. No other configurations have been customized. If the remaining configuration settings are left at default, and it is detected that attempts are being made to hack into AP2, what steps can be taken to secure the it?

13

You are a network technician who configures a new SSID on an access point (AP). You are using the 5Ghz frequency. A mobile phone device is connected to that AP, but it does not appear in the list of available networks when tried to be detected by a test laptop. Can you identify from the options below the most probable reason for this?

14

You want to identify and locate web servers in a network. Choose from the options below which DNS resource record type will be used?

A. SRV
Correct!
B. MX
Incorrect.
C. CNAME
Incorrect.
D. NS
Incorrect.
15

Can you identify the mechanism that manages and monitors virtual machine instances?

A. VLAN
Incorrect.
B. vNIC
Incorrect.
C. Hypervisor
Correct!
D. VIP
Incorrect.
16

You are a network administrator. You have been given a task of deploying a new wireless LAN controller. Identify the suitable protocol you would recommend for integrity checking and encryption.

A. AES-based CCMP
Correct!
B. SHA512 with AES
Incorrect.
C. PSK-TKIP
Incorrect.
D. TLS
Incorrect.
17

From the options below, choose two actions your team should perform if tasked with hardening the L2 infrastructure. (opt any two)

18

As shown in the exhibit, network design for a company is getting changed. A web server and a honeypot in the DMZ is planned by the company to be deployed. Identify the two documents you think the company must update in this case. (opt any two)

19

A company plans on cross training its network administrators who are Windows operating system specialists. These network administrators re planned to be trained on Linux servers so they can help perform periodic management and administrative tasks on them. A mix of command-line and graphic utilities in included in the training. Location for some administrators is remote, but the trainers are all in the company's head office. The trainees are connected to locally connected Linux server and the trainers are connected to the Linux server from a client computer. If the requirement asks both trainees’and trainers’ computers to display the same screen where both parties are allowed to use commands and utilities from either computer, identify the remote connection technology that should be used.

A. SSH
Incorrect.
B. VNC
Correct!
C. Telenet
Incorrect.
D. RDP
Incorrect.
20

An organization was to bring in content filtering and intrusion detection in one single device, in an attempt to upgrade its network security. It is also aimed to add data loss prevention (DLP) as an additional security functionality. Can you identify the best suitable device to be used in this situation?

A. UTM appliance
Correct!
B. Proxy server
Incorrect.
C. Multilayer switch
Incorrect.
D. VoIP gateway
Incorrect.
21

Can you identify what step should be taken first if you are about to troubleshoot a network problem.

22

If you want to elect a root bridge in the network, which of these mechanisms would you choose?

A. 802.1x
Incorrect.
B. VTP
Incorrect.
C. Root guard
Incorrect.
D. BPDU
Correct!
23

There are unexpected communication problems detected in the network devices in one area of the building. Upon trying to detect the issue, it is established that the RX pairs is showing signals to be lower than expected. This indicates what?

A. Crosstalk
Incorrect.
B. Latency
Incorrect.
C. Attenuation
Correct!
D. EMI
Incorrect.
24

An organization carries regular security audits. In a recent network audit, the security issues on the access point are highlighted, as shown in the exhibit. Identify the step the organization should take?

25

An SDN process is deployed recently. A security audit highlights some concerns related to its security. If currently, one of the scripts checks the image integrity using the verify md5 command and uploads the file to the server using FTP, what do you think should the company do instead, to dodge the security issues and concerns?

26

An organization needs to meet the compliance requirements related to work done for new customers. For that it must implement additional monitoring and analysis. The company is planning to implement a solution that can use a variety of sources to collect log event and other security information. It will then analyze, corelate and identify patterns in the the data to find security threats if any. To make it more effective, the solution should be able to store data for long periods and identify a trending pattern to be able to identify threats more effectively. Can you identify the type of device solution organization should use?

A. SNMP
Incorrect.
B. SIEM
Correct!
C. IDS
Incorrect.
D. Server Log
Incorrect.
27

You are a consultant and want to set up a SOHO for a customer. The customer’s ISP is the local cable TV provider. Which device would you use to connect to the cable signal?

A. Switch
Incorrect.
B. Bridge
Incorrect.
C. Modem
Correct!
D. Media converter
Incorrect.
28

You are responsible to create a site-to-site VPN for an organization. Security is required to be maximum. Which set of protocols would you use?

29

Identify the policy that defines guidelines for employees to do work related tasks using their own personal devices.

A. SLA
Incorrect.
B. BYOD
Correct!
C. AUP
Incorrect.
D. NDA
Incorrect.
30

A multinational organization has offices spread across the globe. Each location has a separate network and administration department. If the organization needs to have a consistent set of instructions followed across all locations and offices, what from the following should be used to ensure that?

A. Network configuration baselines
Incorrect.
B. Standard operating procedures
Correct!
C. AUP
Incorrect.
D. SLA
Incorrect.

N10-008 Sample Question - CompTIA Network plus

$99.00

More Information:

  • Learning Style: On Demand
  • Learning Style: Practice Exam
  • Difficulty: Beginner
  • Course Duration: 1 Hour
  • Course Info: Download PDF
  • Certificate: See Sample

Need Training for 5 or More People?

Customized to your team's need:

  • Annual Subscriptions
  • Private Training
  • Flexible Pricing
  • Enterprise LMS
  • Dedicated Customer Success Manager

Outline

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Hit button to validate captcha