N10-008 CompTIA Network+ (N+) Exam Questions and Answers PDF

Page 1

N10-008 COMPTIA NETWORK+ (N+) EXAM QUESTIONS AND ANSWERS PDF

CompTIAN10 008Exam

EDUSUM.COM

GetcompletedetailonN10 008examguidetocrackCompTIANetwork+.Youcancollectall informationonN10 008tutorial,practicetest,books,studymaterial,examquestions,andsyllabus. FirmyourknowledgeonCompTIANetwork+andgetreadytocrackN10 008certification.Explore allinformationonN10 008examwithnumberofquestions,passingpercentageandtimeduration tocompletetest.

The CompTIA N10-008 Exam is challenging and thorough preparation is essential for success. This exam study guide is designed to help you prepare for the Network+ certification exam. It contains a detailed list of the topics covered on the Professional exam, as well as a detailed list of preparation resources. This study guide for the CompTIA Network+ will help guide you through the study process for your certification.

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 1

Introduction to CompTIA Certified Network+ Exam

N10-008 CompTIA Network+ Exam Summary ● Exam Name: CompTIA Network+ ● Exam Code: N10 008 ● Exam Price: $358 (USD) ● Duration: 90 mins ● Number of Questions: 90 ● Passing Score: 720 / 900 ● Reference Books: ● Schedule Exam: ○ CompTIA Marketplace ○ Pearson VUE ● Sample Questions: CompTIA Network+ Sample Questions ● Recommended Practice: CompTIA N10-008 Certification Practice Exam

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 2

Metropolitan area network (MAN)

Layer 1 Physical Layer 2 Data link Layer 3 Network

Wide area network (WAN)

TCP flags Payload

- Bus - Ring - Hybrid - Network types and characteristics

Peer to peer Client-server

- Data encapsulation and decapsulation within the OSI model context

Network+

Compare and contrast the Open InterconnectionSystems (OSI)

Topic Details

Networking Fundamentals - 24%

Ethernet header

Internet Protocol (IP) header

Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) headers

- Mesh - Star/hub-and-spoke

Exam Syllabus: N10-008 CompTIA Certified

Local area network (LAN)

OSI model

Explain the characteristics of network topologies and network types.

model layers encapsulationandconcepts.

Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 – Application

Maximum transmission unit (MTU)

Leased line Metro optical

Twisted pair Cat 5 5e 6 Cat 6a 6 Twinaxial

1.

Virtual network interface card (vNIC) Network function virtualization (NFV)

2. Cat

Wireless local area network (WLAN)

5. Cat 7 6. Cat 8  Coaxial/RG

ProviderHypervisorlinks

Personal area network (PAN)

Copper

Campus area network (CAN)

- Service-related entry point

VirtualSmartjacknetworkconcepts

Summarize the types of cables and connectors and explain which is the appropriate type for a solution.

4.

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 3

Software defined wide area network (SDWAN)

vSwitch

3. Cat

Topic Details

Multipoint generic routing encapsulation (mGRE)

Demarcation point

Multiprotocol label switching (MPLS)

Storage area network (SAN)

Satellite Digital subscriber line (DSL) Cable

2.

3.

4.

4.

1.

1. Small form-factor pluggable (SFP) Enhanced form factor pluggable (SFP+)

Local connector (LC), straight tip (ST), subscriber connector (SC), mechanical transfer (MT), registered jack (RJ)

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 4

2.

1. TIA/EIA 568A TIA/EIA-568B

Transceiver type

Termination standards

Topic Details

2. Ultra-physical contact (UPC) RJ11

- Fiber Single-mode

 RJ45 

2.

F type connector

Patch panel/patch bay Fiber distribution panel Punchdown block 66 110 Krone Bix Ethernet standards T 100BASE-TX 1000BASE T

3.

2.

 ConnectorMultimodetypes 

1. Angled physical contact (APC)

- Cable management

-

 1.Copper10BASE

Transceivers/media converters

3. Quad small form-factor pluggable (QSFP) Enhanced quad small form factor pluggable (QSFP+)

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 5 Topic Details 4. 10GBASE-T 5. 40GBASE T  7.6.5.4.3.2.1.Fiber100BASE-FX100BASESX1000BASE-SX1000BASELX10GBASESR10GBASELRCoarsewavelength division multiplexing (CWDM) 8. Dense wavelength division multiplexing (DWDM) 9. Bidirectional wavelength division multiplexing (WDM) Given a scenario, configure a subnet and use appropriate IP addressing schemes. - Public vs. private  RFC1918  Network address translation (NAT)  Port address translation (PAT) - IPv4 vs. IPv6  Automatic Private IP Addressing (APIPA)  Extended unique identifier (EUI 64)  Multicast  Unicast  Anycast  Broadcast  Link local  Loopback  Default gateway IPv4 subnetting  Classless (variable length subnet mask)  5.4.3.2.1.ClassfulABCDE  Classless Inter-Domain Routing (CIDR) notation

Lightweight Directory Access Protocol (over SSL) (LDAPS) 636 IMAP over SSL 993

HTTPS [Transport Layer Security (TLS)] 443 Server Message Block (SMB) 445 Syslog 514

File Transfer Protocol (FTP) 20/21 Secure Shell (SSH) 22

Virtual IP (VIP) - Subinterfaces

Explain common ports and protocols, their application, and encrypted alternatives.

Tunneling

- IPv6 concepts

Post Office Protocol v3 (POP3) 110 Network Time Protocol (NTP) 123 Internet Message Access Protocol (IMAP) 143

Protocol sand Ports

Secure File Transfer Protocol (SFTP) 22 Telnet 23

Simple Mail Transfer Protocol (SMTP) 25 Domain Name System (DNS) 53

Dynamic Host Configuration Protocol (DHCP) 67/68 Trivial File Transfer Protocol (TFTP) 69 Hypertext Transfer Protocol (HTTP) 80

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 6

Dual stack Shorthand notation Router advertisement Stateless address autoconfiguration (SLAAC)

Topic Details

Simple Network Management Protocol (SNMP) 161/162

SMTP TLS 587

Lightweight Directory Access Protocol (LDAP) 389 Hypertext Transfer Protocol Secure (HTTPS) [Secure Sockets Layer (SSL)] 443

 IP

Explain the use and of DHCP ranges assignment assignment time options leases relay helper/UDP forwarding DNS

 DHCP

Topic Details

POP3 over SSL 995

4. Start

3. Mail

2. TCP 3. UDP 4.

Authentication

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 7

8. Name

 Scope

 Reservation  Dynamic

IP protocol types

 Static

Payload

Internet

1. Control Message Protocol (ICMP) Generic Routing Encapsulation (GRE) Protocol Security (IPSec) Header (AH)/Encapsulating Security (ESP)

6. Text

 Scope  Exclusion

5. Internet

-

 SQLnet

Record types

Structured Query Language (SQL) Server 1433 1521 3306

1. Address (A vs. AAAA) Canonical name (CNAME) exchange (MX) of authority (SOA) (PTR) (TXT) (SRV) server (NS)

7. Service

 Available

2.

5. Pointer

purpose

network services. -

 Lease

Remote Desktop Protocol (RDP) 3389 Session Initiation Protocol (SIP) 5060/5061

- Connectionless vs. connection-oriented

 MySQL

Branch office vs. on premises datacenter vs. colocation Storage area networks

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 8

Three tiered Distribution/aggregation layer Access/edge

TrafficBackboneflows

- Software-defined networking

 Zone

 Infrastructure

 Control

NTP 

 Core 

 Clients  Servers

 Management

Software defined network Top-of-rack switching

1. Root DNS servers

Global hierarchy

Reverse DNS/reverse lookup/forward lookup Recursive lookup/iterative lookup

North South East West

Spine and leaf

Stratum

Time to live (TTL) DNS caching

Internal vs. external transfers

Topic Details

Explain basic corporate and datacenter network architecture.

Application layer layer layer plane

Authoritative name servers

Connection types

2. Fibre Channel

Layer 2 switch

- Service models

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 9

Access point

- Deployment models Public Private Hybrid Community

- SecurityScalabilityimplications

Compare and contrast various devices, their features, and their appropriate placement on the network.

Software as a service (SaaS) Infrastructure as a service (IaaS) Platform as a service (PaaS) Desktop as a service (DaaS)

Infrastructure as code

1. Fibre Channel over Ethernet (FCoE)

Topic Details

Summarize cloud concepts and connectivity options.

Virtual private network (VPN) Private direct connection to cloud provider

Network Implementations - 19%

ConnectivityAutomation/orchestrationoptions

3. Internet Small Computer Systems Interface (iSCSI)

- ElasticityMultitenancy

Networking devices

Layer 3 capable switch Router Hub

Cameras

2. Link state vs. distance vector vs. hybrid

4.

-

1. Refrigerator Smart speakers Smart thermostats Smart doorbells

2.

Industrial control systems/supervisory control and data acquisition (SCADA)

Heating, ventilation, and air conditioning (HVAC) sensors

Proxy server Cable modem

Printer

Bridge

Intrusion prevention system (IPS)/intrusion detection system (IDS) device Firewall VPN

Voice gateway Media converter

DSL modem Repeater

Networkedheadenddevices 

Wireless LAN controller Load balancer

Topic Details

3.

Physical access control devices

Compare and contrast routing technologies and bandwidth management concepts. Routing

Voice over Internet Protocol (VoIP) phone

Dynamic routing

Internet of Things (IoT)

Static routing

Default route

1. Protocols [Routing Internet Protocol (RIP), Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), Border Gateway Protocol (BGP)]

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 10

Time to live Bandwidth management

1. Link Aggregation Control Protocol (LACP) Duplex Speed

control (MAC) address tables

Administrative distance

Data virtual local area network (VLAN) Voice VLAN

MediaX)access

Given a scenario, install and configure the appropriate wireless standards technologies.and - 802.11 standards a b g n (WiFi 4) ac (WiFi 5)

Port aggregation

Carrier sense multiple access with collision detection -(CSMA/CD)AddressResolution Protocol (ARP) Neighbor Discovery Protocol

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 11

Port security

Port mirroring

Port tagging/802.1Q

Topic Details

Jumbo frames

Auto medium dependent interface crossover (MDI

Flow control

Quality of service (QoS)

- Power over Ethernet (PoE)/Power over Ethernet plus -(PoE+)Spanning Tree Protocol

Exterior vs. interior

Traffic shaping

- Port configurations

Given a scenario, configure and deploy common Ethernet switching features.

Topic Details

Basic service set

EncryptionDirectionalstandards

Channel bonding - Service set identifier (SSID)

- Frequencies and range 2.4GHz

AntennaRoamingtypes Omni

Cellular technologies Code-division multiple access (CDMA) Global System for Mobile Communications (GSM) Long Term Evolution (LTE) 3G, 4G, 5G

Channels5GHz

Extended service set Independent basic service set (Ad hoc)

Multiple input, multiple output (MIMO) and multi user MIMO (MU MIMO)

Network Operations - 16%

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 12

Regulatory impacts

 ax (WiFi 6)

WiFi Protected Access (WPA)/WPA2 Personal [Advanced Encryption Standard (AES)/Temporal Key Integrity Protocol (TKIP)] WPA/WPA2 Enterprise (AES/TKIP)

Given a scenario, use the appropriate statistics and Performance metrics/sensors

Interface statistics/status

2.

SNMP 

3. Memory

Environmental factors and sensors

Management information bases (MIBs)

2.1.Device/chassisTemperatureCentralprocessing unit (CPU) usage

3.

sensors

3.

Logging levels/severity levels

- Network device logs

ensure network availability. 

1. Traffic logs Audit logs Syslog

Object identifiers (OIDs)

Traps

Link state (up/down) Speed/duplex

Log reviews

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 13

Cyclic redundancy checks (CRCs)

Protocol packet and byte counts

1. Bandwidth Latency Jitter

Network metrics

2.

Send/receive traffic

- Interface errors or alerts

CRC errors errors

 Giants  Runts  Encapsulation

Topic Details to

 Temperature  Humidity

Acceptable use policy

Site survey report

Common documentation

Plans and procedures

2.

Security policy

Physical network diagram

Wiring diagram

Business continuity plan

Incident response plan

- Uptime/downtime

Password policy

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 14

Change management

1. Floor plan Rack diagram

Topic Details Electrical

System life cycle

Standard operating procedures

Baseline configurations

Hardening and security policies

3. Intermediate distribution frame (IDF)/main distribution frame (MDF) documentation

NetFloBaselinesFloodingwdata

Common agreements

Bring your own device (BYOD) policy

Remote access policy

Onboarding and offboarding policy

Data loss prevention

Audit and assessment report

Explain the purpose of organizational documents and policies.

Logical network diagram

Disaster recovery plan

Routers

Recovery point objective (RPO)

Active-active vs. active-passive

Power distribution units (PDUs) Generator

Non-disclosure agreement (NDA) Service level agreement (SLA) Memorandum of understanding (MOU)

FacilitiesFirewallsandinfrastructure support

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 15

2.pathsVirtual

Uninterruptible power supply (UPS)

Router Redundancy Protocol (VRRP)/First Hop Redundancy Protocol (FHRP)

Network device backup/restore

State Configuration

1. Multiple Internet service providers (ISPs)/diverse

Cloud site

availability (HA) concepts

Topic Details

Switches

Cold site Warm site

Mean time to repair (MTTR)

Mean time between failure (MTBF)

Fire Redundancysuppressionandhigh

Load NetworkMultipathingbalancinginterface card (NIC) teaming Redundant hardware/clusters

Recovery time objective (RTO)

Explain high availability and disaster recovery concepts and summarize which is the best solution.

HVAC

Hot site

Topic Details

- Confidentiality, integrity, availability (CIA)

- Authentication methods

Common vulnerabilities and exposures (CVE) Zero day

Terminal Access Controller Access Control System Plus (TACACS+)

Network Security - 19%

- Role-based access Zero DefenseTrustin depth

Single sign-on (SSO) Remote Authentication Dial-in User Service (RADIUS) LDAP Kerberos

Extensible Authentication Protocol (EAP) Risk Management

Multifactor

- Threats Internal External

Local authentication 802.1X

- Vulnerabilities

Screened subnet [previously known as demilitarized zone (DMZ)]

Network segmentation enforcement

Separation of duties

Network access control Honeypot

-

LeastExploitsprivilege

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 16

Explain common security concepts.

Evil twin Ransomware

4. Posture assessment

2.

4. Shoulder surfing

Topic Details

Compare and contrast common types of attacks. - Technology-based

Rogue access point (AP)

2. Dictionary MAC spoofing IP spoofing

ARP spoofing

VLAN hopping

Deauthentication

Social engineering

 HumanMalwareandenvironmental 

3.

Denial of service (DoS)/distributed denial of service 1.(DDoS)Botnet/command and control

On path attack (previously known as man in the middle attack)

Security risk assessments

3.

Rogue DHCP

DNS poisoning

Password attacks

1. Brute force

1. Phishing Tailgating Piggybacking

1. Threat assessment

Security information and event management (SIEM)

2. Vulnerability assessment Penetration testing

Business risk assessments

1. Process assessment 2. Vendor assessment

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 17

Guest network isolation

Site to site VPN

Client to site VPN

Given a scenario, apply network techniques.hardening

1. Explicit deny

IoT access considerations

Geofencing

2. Implicit deny

Firewall rules

Router Advertisement (RA) Guard

Change default passwords

MAC filtering

Enable DHCP snooping

Antenna placement

EAP

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 18

Dynamic ARP inspection

Compare and contrast remote access methods and security implications.

Password complexity/length

Role based access

- Best practices

Disable unneeded network services

Change default VLAN

Patch and firmware management

Port security

Topic Details

Control plane policing

Disable unneeded switchports

Wireless client isolation

- Wireless security

Preshared keys (PSKs)

Secure SNMP

Private VLANs

Access control list

Captive portal

Power levels

Network Troubleshooting - 22%

Explain the importance of physical security.

Clientless VPN

Prevention methods

Employee training

Detection methods detection tags

 Asset

Virtual desktop

configuration  Sanitize devices for disposal

Split tunnel vs. full tunnel

Access control hardware control vestibule known as reset/wipe

- Virtual network computing (VNC)

 Camera  Motion

a mantrap)  Smart lockers Asset disposal  Factory

- Remote desktop connection

Remote desktop gateway

SSH

(previously

Explain the methodology.troubleshootingnetwork

 Gather

 Question users

Topic Details

Identify the problem information

Tamper detection

- Authentication and authorization considerations band vs. out of band management

1. Badge readers 2. Biometrics  Locking racks  Locking cabinets  Access

In

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 19

1. Top to bottom/bottom to top OSI model

- Verify full system functionality and, if applicable, implement preventive measures

Given a troubleshootscenario,common cable connectivity issues and select the appropriate tools. Specifications and limitations  Throughput  Speed  CableDistanceconsiderations  Shielded and unshielded  Plenum and riser rated Cable application  Rollover cable/console cable  Crossover cable  Power over Ethernet

2. Divide and conquer

If the theory is not confirmed, reestablish a new theory or escalate

Topic Details

Duplicate the problem, if possible

Establish a theory of probable cause

Test the theory to determine the cause

Question the obvious

Identify symptoms

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 20

Approach multiple problems individually

Consider multiple approaches

If the theory is confirmed, determine the next steps to resolve the problem

Establish a plan of action to resolve the problem and identify potential effects

Implement the solution or escalate as necessary

- Document findings, actions, outcomes, and lessons learned

Determine if anything has changed

Snips/cutters

Topic Details

Given a scenario, use the appropriate network software tools and commands.

Bandwidth speed tester

Port scanner

Attenuation Interference

Spectrum analyzers

- Common issues

Protocol analyzer/packet capture

Loopback adapter

Cable tester

Cable stripper

Dirty optical cables

Duplexing issues

Optical time domain reflectometer (OTDR)

Light-emitting diode (LED) status indicators Incorrect transceivers

Incorrect pinout

Fusion splicers

Transmit and receive (TX/RX) reversed

Common tools

Multimeter

Decibel (dB) loss

Punchdown tool

Tone generator

WiFi analyzer

Cable crimper

- Software tools

Bad ports

Open/short

Fiber light meter

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 21

Wire map Tap

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 22 Topic Details  iperf  NetFlow analyzers  Trivial File Transfer Protocol (TFTP) server  Terminal emulator  IP Commandscannerlinetool  ping  ipconfig/ifconfig/ip  nslookup/dig  traceroute/tracert  arp  netstat  hostname  route  telnet  tcpdump  Basicnmapnetwork platform commands  show interface  show config  show route Given a issues.wirelesstroubleshootscenario,commonconnectivity - Specifications and limitations  Throughput  Speed  Distance  Received signal strength indication (RSSI) signal strength  Effective isotropic radiated power (EIRP)/power settings - Considerations  1.AntennasPlacement

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 23 Topic Details 2. Type 3. Polarization  Channel utilization  AP association time  Site survey - Common issues  1.InterferenceChanneloverlap  Antenna cable attenuation/signal loss  RF attenuation/signal loss  Wrong SSID  Incorrect passphrase  Encryption protocol mismatch  Insufficient wireless coverage  Captive portal issues  Client disassociation issues Given a networkingtroubleshootscenario,generalissues. - Considerations  Device configuration review  Routing tables  Interface status  VLAN assignment  Network performance baselines Common issues  Collisions  Broadcast storm  Duplicate MAC address  Duplicate IP address  Multicast flooding  Asymmetrical routing  Switching loops  Routing loops  Rogue DHCP server  DHCP scope exhaustion

To make you familiar with CompTIA Network+ (N10 008) certification exam structure, we have prepared this sample question set. We suggest you to try our Sample Questions for N+ N10-008 Certification to test your understanding of CompTIA N10 008 process with real CompTIA certification exam environment.

Low optical link budget

01. During a discussion with your ISP’s technical support representative, she mentions that you might have been using the wrong FQDN. Which TCP/IP-based network service is she referring to?

Missing route

Blocked services, ports, or addresses

BYOD challenges

Topic Details

IncorrectIncorrectIncorrectIncorrectissuesgatewaysubnetmaskIPaddressDNS 

CompTIA N10-008 Certification Sample Questions and Answers

c)

Certificate issues

a) DHCP WINS SNMP DNS

Network performance issues

NTP issues

IP setting

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 24

b)

DNS issues

d)

Hardware failure

Incorrect VLAN

Host based/network based firewall settings

Licensed feature issues

N10-008 CompTIA Network+ Sample Questions:-

05. TCP is an example of what kind of transport protocol?

a) Connection oriented b) Connection reliant c) Connection dependent d) Connectionless

02. A client on your network has had no problems accessing the wireless network in the past, but recently she moved to a new office. Since the move, she cannot access the network. Which of the following is most likely the cause of the problem?

a) The SSIDs on the client and the AP are different. b) The SSID has been erased. c) The client has incorrect broadcast settings. d) The client system has moved too far from the AP.

03. You suspect that an intruder has gained access to your network. You want to see how many failed logon attempts were made in one day to help determine how the person got in. Which of the following might you do?

04. One of the programmers has asked that DHCP always issue his workstation the same IP address. What feature of DHCP enables you to accomplish this? a) Stipulation b) Rider c) Reservation d) Provision

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 25

07. Logical unit numbers (LUNs) came from the SCSI world and use “targets” that hold up to how many devices?

06. When a WAN is confined to a certain geographic area, such as a city, it is known as a. a) LAN b) MAN c) VAN d) VPN

a) Review the history logs. b) Review the security logs. c) Review the logon logs. d) Review the performance logs.

c)

d)

b)

09. What are two features supported in SNMPv3 and not previous versions?

d)

c)

10. In an Ethernet network, what technology is being implemented when a system wants to send data to another system and first checks to see whether the network medium is free?

a) Authentication b) Dynamic mapping Platform independence Encryption

WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 26

a) QoS b) MDI-X c) Jumbo frames d) CSMA/CD

Answers:Answer 01:- d Answer 02:- d Answer 03:- b Answer 04:- c Answer 05:- a Answer 06:- b Answer 07:- c Answer 08:- a Answer 09:- a, d Answer 10:- d

a) 4 6 8 128

08. Because of a recent security breach, you have been asked to design a security strategy that will allow data to travel encrypted through both the Internet and intranet. Which of the following protocols would you use?

a) IPSec b) SST c) CHAP d) FTP

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.