⚡️Lightning Sale: 25% off Lifetime Membership ⚡️

9 hours, 13 minutes remaining!
CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

CompTIA Network Plus N10 006 Test 5

Free CompTIA Network+ N10-006 practice test, CompTIA Network Plus N10 006 Test 5. This practice exam covers basic computer networking, to include the installation and configuration of networks, media types, configuration types, and network security. Passing this exam will require knowledge in the Ethernet Protocol, IPv4, and some IPv6, MAC addressing, TCP/UDP, the OSI Layer, and various other protocols such as SNMP, SSH, FTP, SSL/TLS, and more.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

Address Resolution Protocol (ARP) is a telecommunication protocol that provides what kind of resolution?

  • Domain name to IP

  • IP to MAC

  • MAC to IP

  • IPv6 to IPv4

The end-to-end security scheme Internet Protocol Security (IPsec) resides at which layer of the OSI model?

  • Transport layer of the OSI model

  • Network layer of the OSI model

  • Session layer of the OSI model

  • Presentation layer of the OSI model

What command would you use to display a MAC address if the administrator is using a Linux machine?

  • ipconfig

  • ipconfig -a

  • ipconfig /all

  • ifconfig

A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers is known as Software as a Service (SaaS).

  • False

  • True

Which option could be used when describing Thinnet or Thinnwire?

  • 10Base2

  • 20 Mbit/s

  • Twisted-pair cabling

  • Maximum cable segment length of 100 meters

In which type of network topology do the main network cables become a single point of failure?

  • Bus

  • Partial mesh

  • Full mesh

  • Star

A standalone malicious computer program that replicates itself over a computer network is known as:

  • Spam

  • Spyware

  • Trojan

  • Worm

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is commonly referred to as:

  • WLAN

  • VLAN

  • LAN

  • MAN

Which of the following devices resides at the data link layer of the Open Systems Interconnections (OSI) model?

  • Passive Hub

  • Router

  • Repeater

  • Ethernet switch

A system that uses a public network (Internet) as a means for creating private encrypted connections between remote locations is known as:

  • Virtual Private Network (VPN)

  • Integrated Services Digital Network (ISDN)

  • Personal Area Network (PAN)

  • Virtual Local Area Network (VLAN)

What type of filtering allows for controlling specific types of network traffic (such as web traffic, mail, file transfer)?

  • IP

  • URL

  • MAC

  • Port

In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:

  • Proxy list

  • Chain of custody

  • Access log

  • Order of volatility

What would the administrator adjust in the WAP configuration settings so a user could not access the wireless signal from the parking lot?

  • Power level controls

  • Quality of Service (QoS)

  • Wi-Fi Protected Setup (WPS)

  • Fair access policy

Which of the following solutions hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?

  • DHCP

  • QoS

  • NAT

  • DNS

A field in an IP datagram that specifies how many more hops a packet can travel before being discarded is called:

  • SPB

  • VTC

  • MTU

  • TTL

A software module on a managed device that sends Simple Network Management Protocol (SNMP) notifications to the managing station is called:

  • Agent

  • ICS server

  • UC gateway

  • Proxy

Multi-link Point-to-Point Protocol (MLPPP) provides a method for combining two or more physical communication links into one logical interface to improve speed and redundancy.

  • True

  • False

The process of combining multiple physical network adapters into a single logical interface is known as:

  • Virtualization

  • Device pairing

  • NIC teaming

  • Route aggregation

A command-line utility in MS Windows used for displaying protocol statistics and current TCP/IP network connections is called:

  • traceroute

  • tracert

  • netstat

  • nslookup

A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the corporate network is known as:

  • Honeynet

  • Flood guard

  • Honeypot

  • Rogue access point



Remaining Time 00:15:00