CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
00:15:00

Free CompTIA Network+ N10-008 Practice Test

Prepare for the CompTIA Network+ N10-008 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Network Implementations
    • Networking Fundamentals
    • Network Operations
    • Network Security
    • Network Troubleshooting
Question 1 of 15

Which authentication protocol uses tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner?

  • LDAP

  • Kerberos

  • TACACS+

  • RADIUS

Question 2 of 15

Which type of files pose the greatest risk related to the distribution of malware?

  • .png

  • .exe

  • .pdf

  • .txt

Question 3 of 15

What is the primary purpose of maintaining baseline configurations in network operations?

  • To ensure all network devices are operating at their maximum speed and capacity.

  • To provide a reference point for optimal network performance and configurations for comparison over time.

  • To facilitate failover in the event of a device failure by providing real-time backups of data.

  • To serve as a legal document for compliance and auditing purposes.

Question 4 of 15

A technician is troubleshooting a reported issue where a device is unable to establish a network connection. After inspecting the physical port on the switch where the device is connected, the technician observes the LED indicator is not lit when the device is powered on and connected with a known good cable. Which of the following is the MOST likely cause of this issue?

  • Duplex mismatch

  • Bad port

  • Incorrect pinout

  • Crossover cable requirement

Question 5 of 15

What Cisco-developed authentication protocol supersedes prior versions by utilizing TCP to manage AAA services?

  • Kerberos

  • XTACACS

  • TACACS+

  • RADIUS

Question 6 of 15

A network administrator is investigating a high number of input errors on an interface of a router. The issue is causing slow network performance. Upon closer inspection, the administrator notices that the CRC counter is incrementing. What is the most likely cause of the CRC errors?

  • Duplex mismatch between the router interface and the switch port.

  • Excessive broadcast traffic overloading the interface buffer.

  • Faulty cables, ports, or network interface cards (NICs).

  • Incorrect clock rate configured on the router interface.

Question 7 of 15

Your company has recently experienced an incident where sensitive data was leaked. The management team wants to assess the effectiveness of the current security measures and the potential for further incidents. They have decided to conduct an assessment that simulates an attacker targeting the network to identify vulnerabilities. Which type of assessment is most appropriate for this scenario?

  • Risk analysis

  • Vulnerability scanning

  • Penetration testing

  • Posture assessment

Question 8 of 15

NTP requires bidirectional communication on both TCP and UDP port 123 to synchronize time across devices.

  • This statement is incorrect.

  • This statement is correct.

Question 9 of 15

What feature of managed switches allows network traffic to be separated into distinct broadcast domains, enhancing security and reducing traffic congestion?

  • NAT

  • VRF

  • PAT

  • VLAN

Question 10 of 15

Which communication medium is least susceptible to EMI?

  • UTP

  • Coax

  • STP

  • Fiber-Optic

Question 11 of 15

Which of the following solutions enables combining several physical ports into a single logical channel?

  • VRRP

  • LACP

  • RSTP

  • HSRP

Question 12 of 15

This device sends every packet received out of every port on the device except the one it was received on. It is an early multi-port networking device that is basically obsolete. This is what device?

  • Router

  • Hub

  • Bridge

  • Switch

Question 13 of 15

Your company network includes several VLANs to segregate different departmental data and to maintain secure communication channels. An attacker within the network managed to send packets from one VLAN to another despite the absence of a router facilitating inter-VLAN communication. Which technique is MOST likely being used by the attacker?

  • Switch spoofing

  • ARP spoofing

  • DNS poisoning

  • Double tagging

Question 14 of 15

You have been asked to install a new switch onto the network. This switch does not have routing capabilities, which OSI Model layer does this switch belong to?

  • Layer 3

  • Layer 4

  • Layer 2

  • Layer 5

Question 15 of 15

You are the network administrator for a large company with numerous connected LANs but one ASN. Which of the following would you use to route between the different LANs?

  • EBGP

  • EIGRP

  • EGP

  • BGP