Certification Practice Test Sample Questions For CompTIA Network + (N10-008)
QuickStart is now offering sample questions for CompTIA Network + (N10-008). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice test to better aid in certification. 100% of the questions are real test questions; from a recent version of the CompTIA Network + (N10-008) exam.
CompTIA Network+ N10-008 + Certification Exam Bundle
Enroll now today and get 30% off using discount code PRACTICE30 at checkout.
CompTIA Network + (N10-008) Sample Exam Questions
A Company decides to build new facilities to add more offices and warehouses in order to expand the corporate buildings and the facility overall. The distance between buildings in around 4 kilometers. Converted into miles it becomes around 2.5 miles. The buildings must be connected with a high bandwidth link in order to maintain fast connectivity. If you are a networking professional hired by the company, what kind of cable would you suggest the company use?
- A. Cat 7
-
Incorrect.
- B. Single mode fiber
-
Correct!
- C. Multimode fiber
-
Incorrect.
- D. Cat 5e
-
Incorrect.
In a company, a site-to-site VPN link is required to be configured between two offices and users in each office must be able to access resources in the other office. Resources may include shared folders and network services. Can you identify the type of VPN that would suit the company needs best?
There is a problem reported by a user who is unable to connect to Server A. When the on-site technician is approached, he identifies a physical issue with the fiber patch code but is not sure about it. With a specific tool, he can be sure about his intuition. Can you identify a tool that the technician can use to confirm if he is right about the problem?
A wireless LAN, also called WLAN, is planned to be deployed in a new office space. It is specified by the network design that 80MHz is the minimum channel bandwidth requirement. Can you identify the standard that the access points must support?
If you want to facilitate touchless payments, and use passive embedded chips and smart devices to do that, which Internet of Things technology is suitable?
A group of in-house technicians want to identify the services that are running on the network and they plan to carry a penetration attempt. Choose an option that they must use?
- A. Traffic analysis
-
Incorrect.
- B. Vulnerability scanning
-
Incorrect.
- C. Packet analysis
-
Incorrect.
- D. Port scanning
-
Correct!
Upon the rapid increase of wireless devices supported by a wireless network that is configured with a single WAP, following problems are being reported by the users: Lagging performance, connecting errors, and randomly being kicked out of the network. Increase in wireless devices resulted from the company implementing a BYOD policy. Can you identify what could be the problem?
- A. Overcapacity
-
Correct!
- B. Interference
-
Incorrect.
- C. Attenuation
-
Incorrect.
- D. Reflection
-
Incorrect.
If a company wants to switch from LAN to MAN, and wants all of its offices to be connected to it, what device would be best for the company to use? Here are some facts that will help out: Single-mode fiber backbone is used by the MAN, and all offices are required to be connected to that. Now there is a wired router in each office and each router is wired with UTP cable. There is a 10/100/1000 switch and each office also has a wireless access point connected to the switch. Can you identify the device company should use to connect to the MAN?
- A. VPN concentrator
-
Incorrect.
- B. Multilayer switch
-
Incorrect.
- C. CSU/DSU
-
Incorrect.
- D. Media converter
-
Correct!
A company carries regular on-sight inspection to check if everything is in place. Manufacturers recommend a standard bend size for fiber optic cables. One day, it is discovered by the inspection team that the bend radius of a certain fiber optic cable exceeds the recommended bend size. Can you identify the main concern of the company?
There is a backup type that benefits on two most important fronts when backing up data. It saves a lot of time and uses the least amount of disk space? Can you identify which type of backup is it?
Upon implementing a bring your own device policy in a company, security controls are to be strengthened on the personal devices of employees. One of those security protocols included the personal devices to be made unable to access a few managed applications and company data once they are out of the office boundaries. Can you identify an option from below, which you think is the right option to implement in this situation?
Initially, an organization configures a wireless local area network (WLAN) with one access point (AP). It is named AP1 and has an SSID of AP1. It is configured to use channel 1 and is configured for WPA2-PSK. Later, another AP is configured, and is named AP2, with an SSID of AP2. This AP is configured to use channel 6 and is configured for WPA2-PSK. The second AP is configured with a unique IP address range. No other configurations have been customized. If the remaining configuration settings are left at default, and it is detected that attempts are being made to hack into AP2, what steps can be taken to secure the it?
- A. Disable SSID broadcast on both APs.
-
Incorrect.
- C. Change AP2 to use channel 1.
-
Incorrect.
- D. Reconfigure both APs to use WPA2-Enterprise.
-
Incorrect.
You are a network technician who configures a new SSID on an access point (AP). You are using the 5Ghz frequency. A mobile phone device is connected to that AP, but it does not appear in the list of available networks when tried to be detected by a test laptop. Can you identify from the options below the most probable reason for this?
- B. The laptop has a single-band wireless card.
-
Correct!
- C. The laptop has a driver issue.
-
Incorrect.
- D. There is an issue with the AR
-
Incorrect.
You want to identify and locate web servers in a network. Choose from the options below which DNS resource record type will be used?
Can you identify the mechanism that manages and monitors virtual machine instances?
You are a network administrator. You have been given a task of deploying a new wireless LAN controller. Identify the suitable protocol you would recommend for integrity checking and encryption.
From the options below, choose two actions your team should perform if tasked with hardening the L2 infrastructure. (opt any two)
- A. Implement SPI.
-
Incorrect.
- B. Change the native VLAN.
-
Correct!
- C. Change RSTP to STP.
-
Incorrect.
- D. Shut down unused ports.
-
Correct!
As shown in the exhibit, network design for a company is getting changed. A web server and a honeypot in the DMZ is planned by the company to be deployed. Identify the two documents you think the company must update in this case. (opt any two)
- A. Logical network diagram
-
Correct!
- B. Rack diagram
-
Incorrect.
- C. Physical network diagram
-
Correct!
- D. Standard operating procedure
-
Incorrect.
A company plans on cross training its network administrators who are Windows operating system specialists. These network administrators re planned to be trained on Linux servers so they can help perform periodic management and administrative tasks on them. A mix of command-line and graphic utilities in included in the training. Location for some administrators is remote, but the trainers are all in the company's head office. The trainees are connected to locally connected Linux server and the trainers are connected to the Linux server from a client computer. If the requirement asks both trainees’and trainers’ computers to display the same screen where both parties are allowed to use commands and utilities from either computer, identify the remote connection technology that should be used.
An organization was to bring in content filtering and intrusion detection in one single device, in an attempt to upgrade its network security. It is also aimed to add data loss prevention (DLP) as an additional security functionality. Can you identify the best suitable device to be used in this situation?
- A. UTM appliance
-
Correct!
- B. Proxy server
-
Incorrect.
- C. Multilayer switch
-
Incorrect.
- D. VoIP gateway
-
Incorrect.
Can you identify what step should be taken first if you are about to troubleshoot a network problem.
- A. Change the most obvious potential cause
-
Incorrect.
- B. Establish a probable cause theory
-
Incorrect.
- C. Identify the problem
-
Correct!
- D. Establish a plan to action
-
Incorrect.
If you want to elect a root bridge in the network, which of these mechanisms would you choose?
There are unexpected communication problems detected in the network devices in one area of the building. Upon trying to detect the issue, it is established that the RX pairs is showing signals to be lower than expected. This indicates what?
An organization carries regular security audits. In a recent network audit, the security issues on the access point are highlighted, as shown in the exhibit. Identify the step the organization should take?
- A. Change the channel bandwidth to 40MHz only.
-
Incorrect.
- B. Change the authentication method to WPA2-AES.
-
Correct!
- C. Change the channel bandwidth to 20MHz only
-
Incorrect.
- D. Enable the Hide SSID option.
-
Incorrect.
An SDN process is deployed recently. A security audit highlights some concerns related to its security. If currently, one of the scripts checks the image integrity using the verify md5 command and uploads the file to the server using FTP, what do you think should the company do instead, to dodge the security issues and concerns?
- A. Use SHA256 for file integrity and TFTP for uploads.
-
Incorrect.
- B. Use SSL for file integrity and FTPS for uploads
-
Incorrect.
- C. Use SHA256 for file integrity and TFTP for uploads.
-
Incorrect.
An organization needs to meet the compliance requirements related to work done for new customers. For that it must implement additional monitoring and analysis. The company is planning to implement a solution that can use a variety of sources to collect log event and other security information. It will then analyze, corelate and identify patterns in the the data to find security threats if any. To make it more effective, the solution should be able to store data for long periods and identify a trending pattern to be able to identify threats more effectively. Can you identify the type of device solution organization should use?
You are a consultant and want to set up a SOHO for a customer. The customer’s ISP is the local cable TV provider. Which device would you use to connect to the cable signal?
You are responsible to create a site-to-site VPN for an organization. Security is required to be maximum. Which set of protocols would you use?
- A. 3DES for encryption and MD5 for hashing
-
Incorrect.
- B. AES for encryption and SHA512 for hashing
-
Correct!
- C. DES for encryption and SHA512 for hashing
-
Incorrect.
- D. SSL for encryption and MD5 for hashing
-
Incorrect.
Identify the policy that defines guidelines for employees to do work related tasks using their own personal devices.
A multinational organization has offices spread across the globe. Each location has a separate network and administration department. If the organization needs to have a consistent set of instructions followed across all locations and offices, what from the following should be used to ensure that?
- A. Network configuration baselines
-
Incorrect.
- B. Standard operating procedures
-
Correct!
- C. AUP
-
Incorrect.
- D. SLA
-
Incorrect.
Tell Us About You:
- Home
- N10-008 Sample Question - CompTIA Network plus
N10-008 Sample Question - CompTIA Network plus
More Information:
- Learning Style: On Demand
- Learning Style: Practice Exam
- Difficulty: Beginner
- Course Duration: 1 Hour
- Course Info: Download PDF
- Certificate: See Sample
Contact a Learning Consultant
Need Training for 5 or More People?
Customized to your team's need:
- Annual Subscriptions
- Private Training
- Flexible Pricing
- Enterprise LMS
- Dedicated Customer Success Manager
Course Information