N10-008 COMPTIA NETWORK+ (N+) EXAM QUESTIONS AND ANSWERS PDF
CompTIAN10 008Exam
EDUSUM.COM
![](https://assets.isu.pub/document-structure/220919110820-84063ed0da829b831e9e34e2c5862118/v1/febe44a50da3fa7143b1cd5f6482a553.jpeg)
GetcompletedetailonN10 008examguidetocrackCompTIANetwork+.Youcancollectall informationonN10 008tutorial,practicetest,books,studymaterial,examquestions,andsyllabus. FirmyourknowledgeonCompTIANetwork+andgetreadytocrackN10 008certification.Explore allinformationonN10 008examwithnumberofquestions,passingpercentageandtimeduration tocompletetest.
![](https://assets.isu.pub/document-structure/220919110820-84063ed0da829b831e9e34e2c5862118/v1/1ac968ed2e02e10dbc23a9afb4e6cdd7.jpeg)
The CompTIA N10-008 Exam is challenging and thorough preparation is essential for success. This exam study guide is designed to help you prepare for the Network+ certification exam. It contains a detailed list of the topics covered on the Professional exam, as well as a detailed list of preparation resources. This study guide for the CompTIA Network+ will help guide you through the study process for your certification.
![](https://assets.isu.pub/document-structure/220919110820-84063ed0da829b831e9e34e2c5862118/v1/5f0d90f2642631b5e763bfc1560efe68.jpeg)
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 1
Introduction to CompTIA Certified Network+ Exam
N10-008 CompTIA Network+ Exam Summary ● Exam Name: CompTIA Network+ ● Exam Code: N10 008 ● Exam Price: $358 (USD) ● Duration: 90 mins ● Number of Questions: 90 ● Passing Score: 720 / 900 ● Reference Books: ● Schedule Exam: ○ CompTIA Marketplace ○ Pearson VUE ● Sample Questions: CompTIA Network+ Sample Questions ● Recommended Practice: CompTIA N10-008 Certification Practice Exam
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 2
Metropolitan area network (MAN)
Layer 1 Physical Layer 2 Data link Layer 3 Network
Wide area network (WAN)
TCP flags Payload
- Bus - Ring - Hybrid - Network types and characteristics
Peer to peer Client-server
- Data encapsulation and decapsulation within the OSI model context
Network+
Compare and contrast the Open InterconnectionSystems (OSI)
Topic Details
Networking Fundamentals - 24%
Ethernet header
Internet Protocol (IP) header
Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) headers
- Mesh - Star/hub-and-spoke
Exam Syllabus: N10-008 CompTIA Certified
Local area network (LAN)
OSI model
Explain the characteristics of network topologies and network types.
model layers encapsulationandconcepts.
Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 – Application
Maximum transmission unit (MTU)
Leased line Metro optical
Twisted pair Cat 5 5e 6 Cat 6a 6 Twinaxial
1.
Virtual network interface card (vNIC) Network function virtualization (NFV)
2. Cat
Wireless local area network (WLAN)
5. Cat 7 6. Cat 8 Coaxial/RG
ProviderHypervisorlinks
Personal area network (PAN)
Copper
Campus area network (CAN)
- Service-related entry point
VirtualSmartjacknetworkconcepts
Summarize the types of cables and connectors and explain which is the appropriate type for a solution.
4.
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 3
Software defined wide area network (SDWAN)
vSwitch
3. Cat
Topic Details
Multipoint generic routing encapsulation (mGRE)
Demarcation point
Multiprotocol label switching (MPLS)
Storage area network (SAN)
Satellite Digital subscriber line (DSL) Cable
2.
3.
4.
4.
1.
1. Small form-factor pluggable (SFP) Enhanced form factor pluggable (SFP+)
Local connector (LC), straight tip (ST), subscriber connector (SC), mechanical transfer (MT), registered jack (RJ)
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 4
2.
1. TIA/EIA 568A TIA/EIA-568B
Transceiver type
Termination standards
Topic Details
2. Ultra-physical contact (UPC) RJ11
- Fiber Single-mode
RJ45
2.
F type connector
Patch panel/patch bay Fiber distribution panel Punchdown block 66 110 Krone Bix Ethernet standards T 100BASE-TX 1000BASE T
3.
2.
ConnectorMultimodetypes
1. Angled physical contact (APC)
- Cable management
-
1.Copper10BASE
Transceivers/media converters
3. Quad small form-factor pluggable (QSFP) Enhanced quad small form factor pluggable (QSFP+)
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 5 Topic Details 4. 10GBASE-T 5. 40GBASE T 7.6.5.4.3.2.1.Fiber100BASE-FX100BASESX1000BASE-SX1000BASELX10GBASESR10GBASELRCoarsewavelength division multiplexing (CWDM) 8. Dense wavelength division multiplexing (DWDM) 9. Bidirectional wavelength division multiplexing (WDM) Given a scenario, configure a subnet and use appropriate IP addressing schemes. - Public vs. private RFC1918 Network address translation (NAT) Port address translation (PAT) - IPv4 vs. IPv6 Automatic Private IP Addressing (APIPA) Extended unique identifier (EUI 64) Multicast Unicast Anycast Broadcast Link local Loopback Default gateway IPv4 subnetting Classless (variable length subnet mask) 5.4.3.2.1.ClassfulABCDE Classless Inter-Domain Routing (CIDR) notation
Lightweight Directory Access Protocol (over SSL) (LDAPS) 636 IMAP over SSL 993
HTTPS [Transport Layer Security (TLS)] 443 Server Message Block (SMB) 445 Syslog 514
File Transfer Protocol (FTP) 20/21 Secure Shell (SSH) 22
Virtual IP (VIP) - Subinterfaces
Explain common ports and protocols, their application, and encrypted alternatives.
Tunneling
- IPv6 concepts
Post Office Protocol v3 (POP3) 110 Network Time Protocol (NTP) 123 Internet Message Access Protocol (IMAP) 143
Protocol sand Ports
Secure File Transfer Protocol (SFTP) 22 Telnet 23
Simple Mail Transfer Protocol (SMTP) 25 Domain Name System (DNS) 53
Dynamic Host Configuration Protocol (DHCP) 67/68 Trivial File Transfer Protocol (TFTP) 69 Hypertext Transfer Protocol (HTTP) 80
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 6
Dual stack Shorthand notation Router advertisement Stateless address autoconfiguration (SLAAC)
Topic Details
Simple Network Management Protocol (SNMP) 161/162
SMTP TLS 587
Lightweight Directory Access Protocol (LDAP) 389 Hypertext Transfer Protocol Secure (HTTPS) [Secure Sockets Layer (SSL)] 443
IP
Explain the use and of DHCP ranges assignment assignment time options leases relay helper/UDP forwarding DNS
DHCP
Topic Details
POP3 over SSL 995
4. Start
3. Mail
2. TCP 3. UDP 4.
Authentication
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 7
8. Name
Scope
Reservation Dynamic
IP protocol types
Static
Payload
Internet
1. Control Message Protocol (ICMP) Generic Routing Encapsulation (GRE) Protocol Security (IPSec) Header (AH)/Encapsulating Security (ESP)
6. Text
Scope Exclusion
5. Internet
-
SQLnet
Record types
Structured Query Language (SQL) Server 1433 1521 3306
1. Address (A vs. AAAA) Canonical name (CNAME) exchange (MX) of authority (SOA) (PTR) (TXT) (SRV) server (NS)
7. Service
Available
2.
5. Pointer
purpose
network services. -
Lease
Remote Desktop Protocol (RDP) 3389 Session Initiation Protocol (SIP) 5060/5061
- Connectionless vs. connection-oriented
MySQL
Branch office vs. on premises datacenter vs. colocation Storage area networks
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 8
Three tiered Distribution/aggregation layer Access/edge
TrafficBackboneflows
- Software-defined networking
Zone
Infrastructure
Control
NTP
Core
Clients Servers
Management
Software defined network Top-of-rack switching
1. Root DNS servers
Global hierarchy
Reverse DNS/reverse lookup/forward lookup Recursive lookup/iterative lookup
North South East West
Spine and leaf
Stratum
Time to live (TTL) DNS caching
Internal vs. external transfers
Topic Details
Explain basic corporate and datacenter network architecture.
Application layer layer layer plane
Authoritative name servers
Connection types
2. Fibre Channel
Layer 2 switch
- Service models
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 9
Access point
- Deployment models Public Private Hybrid Community
- SecurityScalabilityimplications
Compare and contrast various devices, their features, and their appropriate placement on the network.
Software as a service (SaaS) Infrastructure as a service (IaaS) Platform as a service (PaaS) Desktop as a service (DaaS)
Infrastructure as code
1. Fibre Channel over Ethernet (FCoE)
Topic Details
Summarize cloud concepts and connectivity options.
Virtual private network (VPN) Private direct connection to cloud provider
Network Implementations - 19%
ConnectivityAutomation/orchestrationoptions
3. Internet Small Computer Systems Interface (iSCSI)
- ElasticityMultitenancy
Networking devices
Layer 3 capable switch Router Hub
Cameras
2. Link state vs. distance vector vs. hybrid
4.
-
1. Refrigerator Smart speakers Smart thermostats Smart doorbells
2.
Industrial control systems/supervisory control and data acquisition (SCADA)
Heating, ventilation, and air conditioning (HVAC) sensors
Proxy server Cable modem
Printer
Bridge
Intrusion prevention system (IPS)/intrusion detection system (IDS) device Firewall VPN
Voice gateway Media converter
DSL modem Repeater
Networkedheadenddevices
Wireless LAN controller Load balancer
Topic Details
3.
Physical access control devices
Compare and contrast routing technologies and bandwidth management concepts. Routing
Voice over Internet Protocol (VoIP) phone
Dynamic routing
Internet of Things (IoT)
Static routing
Default route
1. Protocols [Routing Internet Protocol (RIP), Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), Border Gateway Protocol (BGP)]
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 10
Time to live Bandwidth management
1. Link Aggregation Control Protocol (LACP) Duplex Speed
control (MAC) address tables
Administrative distance
Data virtual local area network (VLAN) Voice VLAN
MediaX)access
Given a scenario, install and configure the appropriate wireless standards technologies.and - 802.11 standards a b g n (WiFi 4) ac (WiFi 5)
Port aggregation
Carrier sense multiple access with collision detection -(CSMA/CD)AddressResolution Protocol (ARP) Neighbor Discovery Protocol
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 11
Port security
Port mirroring
Port tagging/802.1Q
Topic Details
Jumbo frames
Auto medium dependent interface crossover (MDI
Flow control
Quality of service (QoS)
- Power over Ethernet (PoE)/Power over Ethernet plus -(PoE+)Spanning Tree Protocol
Exterior vs. interior
Traffic shaping
- Port configurations
Given a scenario, configure and deploy common Ethernet switching features.
Topic Details
Basic service set
EncryptionDirectionalstandards
Channel bonding - Service set identifier (SSID)
- Frequencies and range 2.4GHz
AntennaRoamingtypes Omni
Cellular technologies Code-division multiple access (CDMA) Global System for Mobile Communications (GSM) Long Term Evolution (LTE) 3G, 4G, 5G
Channels5GHz
Extended service set Independent basic service set (Ad hoc)
Multiple input, multiple output (MIMO) and multi user MIMO (MU MIMO)
Network Operations - 16%
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 12
Regulatory impacts
ax (WiFi 6)
WiFi Protected Access (WPA)/WPA2 Personal [Advanced Encryption Standard (AES)/Temporal Key Integrity Protocol (TKIP)] WPA/WPA2 Enterprise (AES/TKIP)
Given a scenario, use the appropriate statistics and Performance metrics/sensors
Interface statistics/status
2.
SNMP
3. Memory
Environmental factors and sensors
Management information bases (MIBs)
2.1.Device/chassisTemperatureCentralprocessing unit (CPU) usage
3.
sensors
3.
Logging levels/severity levels
- Network device logs
ensure network availability.
1. Traffic logs Audit logs Syslog
Object identifiers (OIDs)
Traps
Link state (up/down) Speed/duplex
Log reviews
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 13
Cyclic redundancy checks (CRCs)
Protocol packet and byte counts
1. Bandwidth Latency Jitter
Network metrics
2.
Send/receive traffic
- Interface errors or alerts
CRC errors errors
Giants Runts Encapsulation
Topic Details to
Temperature Humidity
Acceptable use policy
Site survey report
Common documentation
Plans and procedures
2.
Security policy
Physical network diagram
Wiring diagram
Business continuity plan
Incident response plan
- Uptime/downtime
Password policy
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 14
Change management
1. Floor plan Rack diagram
Topic Details Electrical
System life cycle
Standard operating procedures
Baseline configurations
Hardening and security policies
3. Intermediate distribution frame (IDF)/main distribution frame (MDF) documentation
NetFloBaselinesFloodingwdata
Common agreements
Bring your own device (BYOD) policy
Remote access policy
Onboarding and offboarding policy
Data loss prevention
Audit and assessment report
Explain the purpose of organizational documents and policies.
Logical network diagram
Disaster recovery plan
Routers
Recovery point objective (RPO)
Active-active vs. active-passive
Power distribution units (PDUs) Generator
Non-disclosure agreement (NDA) Service level agreement (SLA) Memorandum of understanding (MOU)
FacilitiesFirewallsandinfrastructure support
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 15
2.pathsVirtual
Uninterruptible power supply (UPS)
Router Redundancy Protocol (VRRP)/First Hop Redundancy Protocol (FHRP)
Network device backup/restore
State Configuration
1. Multiple Internet service providers (ISPs)/diverse
Cloud site
availability (HA) concepts
Topic Details
Switches
Cold site Warm site
Mean time to repair (MTTR)
Mean time between failure (MTBF)
Fire Redundancysuppressionandhigh
Load NetworkMultipathingbalancinginterface card (NIC) teaming Redundant hardware/clusters
Recovery time objective (RTO)
Explain high availability and disaster recovery concepts and summarize which is the best solution.
HVAC
Hot site
Topic Details
- Confidentiality, integrity, availability (CIA)
- Authentication methods
Common vulnerabilities and exposures (CVE) Zero day
Terminal Access Controller Access Control System Plus (TACACS+)
Network Security - 19%
- Role-based access Zero DefenseTrustin depth
Single sign-on (SSO) Remote Authentication Dial-in User Service (RADIUS) LDAP Kerberos
Extensible Authentication Protocol (EAP) Risk Management
Multifactor
- Threats Internal External
Local authentication 802.1X
- Vulnerabilities
Screened subnet [previously known as demilitarized zone (DMZ)]
Network segmentation enforcement
Separation of duties
Network access control Honeypot
-
LeastExploitsprivilege
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 16
Explain common security concepts.
Evil twin Ransomware
4. Posture assessment
2.
4. Shoulder surfing
Topic Details
Compare and contrast common types of attacks. - Technology-based
Rogue access point (AP)
2. Dictionary MAC spoofing IP spoofing
ARP spoofing
VLAN hopping
Deauthentication
Social engineering
HumanMalwareandenvironmental
3.
Denial of service (DoS)/distributed denial of service 1.(DDoS)Botnet/command and control
On path attack (previously known as man in the middle attack)
Security risk assessments
3.
Rogue DHCP
DNS poisoning
Password attacks
1. Brute force
1. Phishing Tailgating Piggybacking
1. Threat assessment
Security information and event management (SIEM)
2. Vulnerability assessment Penetration testing
Business risk assessments
1. Process assessment 2. Vendor assessment
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 17
Guest network isolation
Site to site VPN
Client to site VPN
Given a scenario, apply network techniques.hardening
1. Explicit deny
IoT access considerations
Geofencing
2. Implicit deny
Firewall rules
Router Advertisement (RA) Guard
Change default passwords
MAC filtering
Enable DHCP snooping
Antenna placement
EAP
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 18
Dynamic ARP inspection
Compare and contrast remote access methods and security implications.
Password complexity/length
Role based access
- Best practices
Disable unneeded network services
Change default VLAN
Patch and firmware management
Port security
Topic Details
Control plane policing
Disable unneeded switchports
Wireless client isolation
- Wireless security
Preshared keys (PSKs)
Secure SNMP
Private VLANs
Access control list
Captive portal
Power levels
Network Troubleshooting - 22%
Explain the importance of physical security.
Clientless VPN
Prevention methods
Employee training
Detection methods detection tags
Asset
Virtual desktop
configuration Sanitize devices for disposal
Split tunnel vs. full tunnel
Access control hardware control vestibule known as reset/wipe
- Virtual network computing (VNC)
Camera Motion
a mantrap) Smart lockers Asset disposal Factory
- Remote desktop connection
Remote desktop gateway
SSH
(previously
Explain the methodology.troubleshootingnetwork
Gather
Question users
Topic Details
Identify the problem information
Tamper detection
- Authentication and authorization considerations band vs. out of band management
1. Badge readers 2. Biometrics Locking racks Locking cabinets Access
In
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 19
1. Top to bottom/bottom to top OSI model
- Verify full system functionality and, if applicable, implement preventive measures
Given a troubleshootscenario,common cable connectivity issues and select the appropriate tools. Specifications and limitations Throughput Speed CableDistanceconsiderations Shielded and unshielded Plenum and riser rated Cable application Rollover cable/console cable Crossover cable Power over Ethernet
2. Divide and conquer
If the theory is not confirmed, reestablish a new theory or escalate
Topic Details
Duplicate the problem, if possible
Establish a theory of probable cause
Test the theory to determine the cause
Question the obvious
Identify symptoms
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 20
Approach multiple problems individually
Consider multiple approaches
If the theory is confirmed, determine the next steps to resolve the problem
Establish a plan of action to resolve the problem and identify potential effects
Implement the solution or escalate as necessary
- Document findings, actions, outcomes, and lessons learned
Determine if anything has changed
Snips/cutters
Topic Details
Given a scenario, use the appropriate network software tools and commands.
Bandwidth speed tester
Port scanner
Attenuation Interference
Spectrum analyzers
- Common issues
Protocol analyzer/packet capture
Loopback adapter
Cable tester
Cable stripper
Dirty optical cables
Duplexing issues
Optical time domain reflectometer (OTDR)
Light-emitting diode (LED) status indicators Incorrect transceivers
Incorrect pinout
Fusion splicers
Transmit and receive (TX/RX) reversed
Common tools
Multimeter
Decibel (dB) loss
Punchdown tool
Tone generator
WiFi analyzer
Cable crimper
- Software tools
Bad ports
Open/short
Fiber light meter
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 21
Wire map Tap
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 22 Topic Details iperf NetFlow analyzers Trivial File Transfer Protocol (TFTP) server Terminal emulator IP Commandscannerlinetool ping ipconfig/ifconfig/ip nslookup/dig traceroute/tracert arp netstat hostname route telnet tcpdump Basicnmapnetwork platform commands show interface show config show route Given a issues.wirelesstroubleshootscenario,commonconnectivity - Specifications and limitations Throughput Speed Distance Received signal strength indication (RSSI) signal strength Effective isotropic radiated power (EIRP)/power settings - Considerations 1.AntennasPlacement
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 23 Topic Details 2. Type 3. Polarization Channel utilization AP association time Site survey - Common issues 1.InterferenceChanneloverlap Antenna cable attenuation/signal loss RF attenuation/signal loss Wrong SSID Incorrect passphrase Encryption protocol mismatch Insufficient wireless coverage Captive portal issues Client disassociation issues Given a networkingtroubleshootscenario,generalissues. - Considerations Device configuration review Routing tables Interface status VLAN assignment Network performance baselines Common issues Collisions Broadcast storm Duplicate MAC address Duplicate IP address Multicast flooding Asymmetrical routing Switching loops Routing loops Rogue DHCP server DHCP scope exhaustion
To make you familiar with CompTIA Network+ (N10 008) certification exam structure, we have prepared this sample question set. We suggest you to try our Sample Questions for N+ N10-008 Certification to test your understanding of CompTIA N10 008 process with real CompTIA certification exam environment.
Low optical link budget
01. During a discussion with your ISP’s technical support representative, she mentions that you might have been using the wrong FQDN. Which TCP/IP-based network service is she referring to?
Missing route
Blocked services, ports, or addresses
BYOD challenges
Topic Details
IncorrectIncorrectIncorrectIncorrectissuesgatewaysubnetmaskIPaddressDNS
CompTIA N10-008 Certification Sample Questions and Answers
c)
Certificate issues
a) DHCP WINS SNMP DNS
Network performance issues
NTP issues
IP setting
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 24
b)
DNS issues
d)
Hardware failure
Incorrect VLAN
Host based/network based firewall settings
Licensed feature issues
N10-008 CompTIA Network+ Sample Questions:-
05. TCP is an example of what kind of transport protocol?
a) Connection oriented b) Connection reliant c) Connection dependent d) Connectionless
02. A client on your network has had no problems accessing the wireless network in the past, but recently she moved to a new office. Since the move, she cannot access the network. Which of the following is most likely the cause of the problem?
a) The SSIDs on the client and the AP are different. b) The SSID has been erased. c) The client has incorrect broadcast settings. d) The client system has moved too far from the AP.
03. You suspect that an intruder has gained access to your network. You want to see how many failed logon attempts were made in one day to help determine how the person got in. Which of the following might you do?
04. One of the programmers has asked that DHCP always issue his workstation the same IP address. What feature of DHCP enables you to accomplish this? a) Stipulation b) Rider c) Reservation d) Provision
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 25
07. Logical unit numbers (LUNs) came from the SCSI world and use “targets” that hold up to how many devices?
06. When a WAN is confined to a certain geographic area, such as a city, it is known as a. a) LAN b) MAN c) VAN d) VPN
a) Review the history logs. b) Review the security logs. c) Review the logon logs. d) Review the performance logs.
c)
d)
b)
09. What are two features supported in SNMPv3 and not previous versions?
d)
c)
10. In an Ethernet network, what technology is being implemented when a system wants to send data to another system and first checks to see whether the network medium is free?
a) Authentication b) Dynamic mapping Platform independence Encryption
WWW.EDUSUM.COM PDF N10 008: CompTIA Network+ (N+) 26
a) QoS b) MDI-X c) Jumbo frames d) CSMA/CD
Answers:Answer 01:- d Answer 02:- d Answer 03:- b Answer 04:- c Answer 05:- a Answer 06:- b Answer 07:- c Answer 08:- a Answer 09:- a, d Answer 10:- d
a) 4 6 8 128
08. Because of a recent security breach, you have been asked to design a security strategy that will allow data to travel encrypted through both the Internet and intranet. Which of the following protocols would you use?
a) IPSec b) SST c) CHAP d) FTP