CompTIA N10-008 CompTIA Network+ Certification Exam Practice Test

Page: 1 / 14
Total 857 questions
Question 1

Which of the following synchronizes time on all devices within a network?



Answer : C

Network Time Protocol (NTP): NTP is a widely adopted protocol for synchronizing clocks across network devices. It ensures that all devices have accurate and consistent time. NTP uses a hierarchical system of time sources to maintain synchronization.


Professor Messer - Network+ Certification Course

CompTIA Network+ N10-008 Study Guide

Auvik - Network Time Synchronization: Why and How It Works

Question 2

Which of the following attacks can be effectively protected against by using techniques to check if a connection was made by a human user? (Select two).



Answer : A, B

Techniques to check if a connection was made by a human user, such as CAPTCHAs, are effective against automated attacks like:

A . Brute-force: This attack method involves trying many passwords or passphrases with the hope of eventually guessing correctly.

B . Dictionary: Similar to brute-force, this attack uses a list of words to attempt to guess passwords or encryption keys.

These techniques are not designed to protect against:

C . On-path attack: Previously known as a man-in-the-middle attack, where the attacker intercepts communication between two parties.

D . Phishing: A social engineering attack aiming to trick users into giving up sensitive information.

E . Shoulder surfing: Direct observation techniques, such as looking over someone's shoulder to get information.

F . Evil twin: A rogue Wi-Fi access point that appears legitimate but is set up to eavesdrop on wireless communications.


Question 3

Which of the following is most closely associated with the management plane?



Answer : B

The management plane is responsible for managing and controlling network devices. Let's evaluate the options:

Routing table: Part of the control plane, used for making forwarding decisions.

Current configuration: Part of the management plane. It includes settings, access control lists, and other configuration details.

File operations: Typically part of the management plane. It involves tasks like uploading/downloading configurations, firmware updates, and backups.

Console port: Also part of the management plane. It provides direct access to the device for configuration and troubleshooting.

Among the options, the one most closely associated with the management plane is thecurrent configuration.


Question 4

A network engineer is installing APs for a SOHO where every staff member uses a cordless phone. Which of the following standards would work best to reduce interference?



Answer : A

The network engineer is installing Access Points (APs) for a Small Office/Home Office (SOHO) where every staff member uses a cordless phone. The goal is to reduce interference. Let's evaluate the options:

802.11a: Operates in the 5 GHz frequency band. It provides higher data rates but has shorter range and poorer penetration through walls due to its higher frequency. It is less likely to interfere with cordless phones.

802.11b: Operates in the 2.4 GHz frequency band. It has slower data rates but better range and wall penetration. However, it shares the same frequency band with many cordless phones, microwave ovens, and other devices, leading to potential interference.

802.11g: Also operates in the 2.4 GHz frequency band. It provides higher data rates than 802.11b but maintains backward compatibility with 802.11b devices. Like 802.11b, it shares the same frequency band with cordless phones and other devices.

802.1X: This is not a wireless standard. It is an authentication protocol used for network access control.

Given the scenario,802.11awould work best to reduce interference because it operates in the 5 GHz band, which is less crowded and less likely to overlap with cordless phones.


Question 5

A user is unable to perform a reverse DNS lookup of an IP address to a hostname. Which of the following DNS record types is missing?



Answer : A

When a user is unable to perform a reverse DNS lookup of an IP address to a hostname, the missing DNS record type is thePTR (Pointer)record. Here's what you need to know:

PTR (Pointer) Record:

The PTR record maps an IP address to a hostname (reverse DNS lookup).

It is used to resolve IP addresses back to domain names.

For example, if you have an IP address (e.g., 192.168.1.10), the PTR record would provide the corresponding hostname (e.g., server.example.com).


Question 6

A network administrator for receives a call about a network printer that is not working for a workstation. The network administrator verifies the printer is turned on. Given the following information:

Routers gateway IP: 10.0.0.1/25

Device: Printer

Which of the following should the administrator change to remediate this issue? (Select two).



Answer : B, C

The printer should be on the same subnet as the workstation to communicate.

If the printer's IP address and subnet mask do not align with the workstation's network, it won't connect.

Adjusting the printer's IP address and subnet mask to match the network configuration will likely resolve the issue.


Question 7

A user is trying to map a network fileshare to a local drive and needs to open a firewall port for this traffic. Which of the following ports needs to be opened to accomplish this task?



Answer : B

The correct port to open for mapping a network file share (such as SMB/CIFS) to a local drive isB. 445. Port 445 is used for Microsoft's SMB (Server Message Block) protocol, which facilitates file and printer sharing over a network.

Port 389: This is used for LDAP (Lightweight Directory Access Protocol) communication.

Port 514: This is used for syslog traffic.

Port 636: This is used for secure LDAP (LDAPS) communication.

Port 445: This is the standard port for SMB/CIFS (Common Internet File System) traffic. It allows for file and printer sharing between Windows devices.


CompTIA Network+ Certification Exam Objectives

Page:    1 / 14   
Total 857 questions