⚡️Lightning Sale: 25% off Lifetime Membership ⚡️

16 hours, 59 minutes remaining!
CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

CompTIA Network Plus N10 006 Test 6

Free CompTIA Network+ N10-006 practice test, CompTIA Network Plus N10 006 Test 6. This practice exam covers basic computer networking, to include the installation and configuration of networks, media types, configuration types, and network security. Passing this exam will require knowledge in the Ethernet Protocol, IPv4, and some IPv6, MAC addressing, TCP/UDP, the OSI Layer, and various other protocols such as SNMP, SSH, FTP, SSL/TLS, and more.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

What is the leading octet value range for an IPv4 address belonging to a class B network?

  • 1 - 126

  • 128 - 191

  • 192 - 223

  • 224 - 239

Your employer has implemented a policy to verify the hash of a file after downloading whenever possible. What is the purpose of verifying a file's hash after downloading?

  • Ensures data deduplication

  • Validating data confidentiality

  • Verifying file integrity

  • Verifying file contents are encrypted

Which option is used to manage virtual operating systems?

  • KVM

  • Hypervisor

  • Virtual switch

  • Cloud PC

A device designed to provide emergency power during an unexpected main power source outage is called:

  • PoE

  • PSU

  • SVC

  • UPS

Which term refers to the amount of time a client is able to use an IP address given from a DHCP server?

  • Availability

  • Lease

  • Reservation

  • Scope

Which device will manipulate network traffic to ensure reliability and performance of some types of network traffic over other types?

  • Router

  • Traffic Classifier

  • Packet shaper

  • Load Balancer

You are a Network Architect and Administrator at a large company. The business has asked for a solution that will allow them to freely move around the headquarter campus without losing wireless connectivity and without having to reconnect or re authenticate. Which technology could serve as a solution?

  • Roaming

  • Routing

  • Hot-swapping

  • Switching

Which of the following security solutions allows for discarding ARP packets with invalid IP-to-MAC address bindings?

  • SIEM

  • DAI

  • DCS

  • RARP

The practice of connecting to an open port on a remote server to gather more information about the service running on that port is known as:

  • Bluejacking

  • Session hijacking

  • Banner grabbing

  • eDiscovery

In the Open Systems Interconnect (OSI) model, data compression takes place at the:

  • Presentation layer

  • Session layer

  • Physical layer

  • Network layer

Which of the following solutions enables combining several physical ports into a single logical channel?

  • RSTP

  • LACP

  • VRRP

  • HSRP

A situation in which multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is called:

  • Channel bonding

  • Channel overlapping

  • Cross-talk

  • Collision

Which malicious attack or exploit involves spoofing OSI layer 2 addressing?

  • ARP poisoning

  • DNS poisoning

  • DDOS attack

  • Bluejacking

In the OSI model layer 4 is known as:

  • Application

  • Session

  • Physical

  • Transport

Which choice is a NID placed at the demarcation point between an ISP and customer's networks that can be used as a troubleshooting tool when diagnosing a network issue?

  • Smart jack

  • Line validator

  • Protocol Analyzer

  • DMZ

What would an administrator use the IEEE 802.1X standard for implementing across a network?

  • VLAN tagging

  • Wireless networks

  • Port-based network access control

  • Token ring networks

Which type of files pose the greatest risk related to the distribution of malware?

  • .txt

  • .pdf

  • .exe

  • .png

You have been asked to identify the MAC address for the default gateway for a device's subnet. Which Windows command will help you identify this?

  • ipconfig /all

  • netstat -n

  • nslookup

  • arp -a

Your supervisor has asked you to try and identify the network device causing increased latency between a client's PC and a server located in a different physical location but on the same enterprise network. Which tool is best suited for identifying the problematic device?

  • traceroute6

  • pathping

  • nbtstat

  • tracert

Which of the following network topologies is most commonly used in contemporary Ethernet LANs?

  • Star topology

  • Mesh topology

  • Ring topology

  • Bus topology



Remaining Time 00:15:00