Network+ (N10-009) Practice Exam #1
Network+ (N10-009) Practice Exam #1
Questions
A) Encrypting data
B) Preventing rogue router advertisements
C) Managing IP addresses
D) Configuring VLANs
A) Source IP address
B) Destination IP address
C) Type of Service (ToS) field
D) Data payload
A) SCSI
B) SATA
C) NVMe
D) SFP
A) 192.168.1.1
B) 256.256.256.256
C) 123.456.78.90
D) 192.168.1.256
9. You are integrating multiple smart devices into your network. Which term best describes this
collection of devices?
A) SCADA
B) VPN
C) IoT
D) DMVPN
A) ::
B) ::1
C) fe80::
D) ff02::
A) Misconfigured devices
B) Weak passwords
C) Outdated software
D) All of the above
16. You need to provide directional coverage for a long corridor. Which type of WLAN antenna
would you use?
A) Omnidirectional
B) Dipole
C) Yagi
D) Parabolic
A) To simplify configuration
B) To ensure the secure generation, storage, and distribution of cryptographic keys
C) To reduce hardware costs
D) To increase network speed
20. Which protocol is commonly used for transporting voice over IP networks?
A) ICMP
B) RTP
C) SMTP
D) SNMP
A) Increased throughput
B) Reduced signal strength
C) Enhanced security
D) Slow network performance
A) Encrypting data
B) Providing high-speed Internet access via cable television networks
C) Managing IP addresses
D) Converting fiber optic signals
26. Which wireless security protocol introduced 192-bit AES encryption for enterprise Wi-Fi
networks?
A) WEP
B) WPA
C) WPA2
D) WPA3
A) Encrypting data
B) Manually mapping domain names to IP addresses
C) Managing DNS servers
D) Assigning IP addresses
A) fe80::1
B) ff02::1
C) 2001:db8::1
D) ::1
A) On-premises infrastructure
B) Static resource allocation
C) Limited scalability
D) Pay-as-you-go pricing model
A) Phishing email
B) SQL injection
C) Port scanning
D) Man-in-the-Middle
A) Manual configuration
B) Consistent and repeatable deployments
C) Increased physical hardware requirements
D) Limited automation
34. Which feature can help secure the Spanning Tree Protocol (STP) in a network?
A) Port security
B) BPDU Guard
C) VLAN tagging
D) Link aggregation
35. Which of the following is a method used by Extensible Authentication Protocol (EAP) for
network access authentication?
A) Password-based
B) Certificate-based
C) Token-based
D) All of the above
37. Which type of IPv4 address is used for a single device on a network?
A) Multicast
B) Broadcast
C) Anycast
D) Unicast
38. Which of the following is a key feature of virtual IP addresses used with First Hop
Redundancy Protocols (FHRPs)?
A) Port mapping
B) High availability
C) Fixed routing
D) Requires DNS AAAA records
39. Which of the following connectors is typically used with twisted pair copper cabling?
A) LC
B) SC
C) RJ-45
D) ST
41. Which of the following is a primary use case for IPv4 multicast addresses?
A) Encrypting data
B) Managing and tracking changes to code
C) Assigning IP addresses
D) Monitoring network performance
43. You want to detect and respond to network threats in real-time. Which device is best suited
for this purpose?
44. What tool can be used to measure network bandwidth and throughput capacity?
A) SolarWinds
B) Wireshark
C) iperf
D) Nessus
45. Which of the following is true about a Local Area Network (LAN)?
46. Which of the following best describes the purpose of port mirroring in a network?
47. Which of the following is a best practice for rack management in a data center?
50. You are in a remote location without a traditional network infrastructure. Which technology
can provide Internet access?
A) Ethernet
B) Fiber optic
C) Satellite data
D) DSL
51. Which of the following frequency bands is not commonly used for WLANs?
A) 900 MHz
B) 2.4 GHz
C) 6 GHz
D) 5 GHz
55. Why are standards, policies, and rules important in network management?
56. SCADA systems are commonly used in which of the following environments?
A) Personal computing
B) Industrial control
C) Office automation
D) Home networking
57. Which of the following is a benefit of using APIs for network management?
A) 8.8.8.8
B) 172.16.0.1
C) 192.0.2.1
D) 203.0.113.1
A) 192.168.1.1 - 192.168.1.14
B) 192.168.1.1 - 192.168.1.30
C) 192.168.1.1 - 192.168.1.62
D) 192.168.1.1 - 192.168.1.126
61. Which CLI utility is used to test the reachability of a host on a network?
A) netstat
B) traceroute
C) ping
D) ifconfig
62. How many subnets can be created with a subnet mask of 255.255.255.192 in a Class C
network?
A) 2
B) 4
C) 8
D) 16
64. Which of the following describes a primary function of Network Address Translation (NAT)?
A) Assigning IP addresses
B) Encrypting data transmissions
C) Managing email traffic
D) Mapping private IP addresses to public IP addresses
65. Which of the following is a key characteristic of Precision Time Protocol (PTP)?
A) Phishing
B) Denial of Service
C) Man-in-the-Middle
D) SQL injection
A) Encrypting data
B) Assigning IP addresses
C) Managing domain names
D) Identifying and mapping network devices and topology
68. Which of the following is a key feature of Security Assertion Markup Language (SAML)?
A) Assigning IP addresses
B) Providing single sign-on (SSO) capabilities
C) Managing domain names
D) Encrypting network traffic
69. Which type of IPv4 address is used to send data to all devices on a network segment?
A) Unicast
B) Multicast
C) Broadcast
D) Anycast
A) OSPF
B) EIGRP
C) BGP
D) RIP
A) Static tunnels
B) Dynamic, multipoint connectivity
C) Manual configuration
D) Limited scalability
75. What is a primary advantage of using fiber optic cables over copper cables?
A) Lower cost
B) Greater resistance to electromagnetic interference
C) Easier installation
D) Longer transmission delays
76. You need to synchronize the clocks of all devices on your network. Which protocol could you
use?
A) DNS
B) DHCP
C) NTP
D) SNMP
A) Assigning IP addresses
B) Providing a mechanism for routing packets based on labels
C) Encrypting data
D) Managing domain names
A) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
B) 2001:db8:85a3::8a2e:370:7334
C) ::1
D) All of the above
80. Which of the following is a common issue that can affect a Local Area Network (LAN)?
A) IP address conflicts
B) High latency
C) Signal attenuation
D) All of the above
A) Telnet
B) FTP
C) SSH
D) TFTP
82. Which command would you use on a Cisco router to display the routing table?
A) show ip route
B) show interfaces
C) show running-config
D) show version
A) Encrypting data
B) Preventing rogue router advertisements
C) Managing IP addresses
D) Configuring VLANs
A) Source IP address
B) Destination IP address
C) Type of Service (ToS) field
D) Data payload
Explanation: IP Precedence markings are found in the Type of Service (ToS) field of an IP packet
header, indicating priority levels for traffic.
Explanation: A site survey assesses coverage and potential interference, ensuring optimal
placement of access points and reliable wireless network performance.
Explanation: DAC (Direct Attach Copper) cables provide high-speed, short-distance connectivity,
typically used for connecting servers and switches within a data center.
A) SCSI
B) SATA
C) NVMe
D) SFP
Answer: D) SFP
Explanation: SFP (Small Form-factor Pluggable) transceivers are commonly used in Ethernet
networks to provide modular interfaces for network devices, supporting various media types
and speeds.
A) 192.168.1.1
B) 256.256.256.256
C) 123.456.78.90
D) 192.168.1.256
Answer: A) 192.168.1.1
Explanation: A valid IPv4 address consists of four octets, each ranging from 0 to 255.
192.168.1.1 is a valid IPv4 address.
Explanation: An MPO (Multi-Fiber Push On) connector is used to connect multiple fibers in a
single connector, simplifying cabling and supporting high-density, high-speed fiber optic
connections.
9. You are integrating multiple smart devices into your network. Which term best describes this
collection of devices?
A) SCADA
B) VPN
C) IoT
D) DMVPN
Answer: C) IoT
Explanation: IoT (Internet of Things) refers to a network of interconnected smart devices that
can communicate and share data with each other.
Explanation: A Campus Area Network (CAN) connects multiple buildings within a campus, such
as a university or business complex, providing centralized network services.
Answer: B) Spoofing ARP messages to associate the attacker's MAC address with a target IP
address
Explanation: An ARP poisoning attack involves spoofing ARP messages to associate the
attacker's MAC address with a target IP address, allowing the attacker to intercept or redirect
traffic.
A) ::
B) ::1
C) fe80::
D) ff02::
Answer: A) ::
Explanation: The IPv6 unspecified address is ::, used to indicate the absence of an IPv6 address.
A) Misconfigured devices
B) Weak passwords
C) Outdated software
D) All of the above
Explanation: Voice VLANs prioritize voice traffic over other types of traffic, ensuring high-quality
voice communication by reducing latency and jitter.
Explanation: A network loop can cause a broadcast storm, where broadcast frames are
continuously forwarded in the loop, overwhelming the network and degrading performance.
A) Omnidirectional
B) Dipole
C) Yagi
D) Parabolic
Answer: C) Yagi
Explanation: A Yagi antenna provides directional coverage, making it suitable for covering long
corridors or specific areas with focused signal strength. While a Parabolic antenna also provides
directional coverage, it is used for longer range applications.
Explanation: Wearing ESD protection helps prevent damage to sensitive electronic components
from electrostatic discharge, ensuring the safety of network engineers and equipment.
18. Which of the following best describes the purpose of network forensics?
Explanation: Network forensics involves investigating network security incidents to identify the
cause, gather evidence, and determine the impact of the incident.
A) To simplify configuration
B) To ensure the secure generation, storage, and distribution of cryptographic keys
C) To reduce hardware costs
D) To increase network speed
Answer: B) To ensure the secure generation, storage, and distribution of cryptographic keys
Explanation: Key management is crucial for network security as it ensures the secure
generation, storage, and distribution of cryptographic keys, protecting sensitive data and
communications.
20. Which protocol is commonly used for transporting voice over IP networks?
A) ICMP
B) RTP
C) SMTP
D) SNMP
Answer: B) RTP
Explanation: RTP (Real-time Transport Protocol) is commonly used for transporting voice and
video over IP networks, providing end-to-end network transport functions.
Explanation: IPv6 link-local addresses are used for communication within a single network
segment and are not routable beyond that segment. These addresses are similar to APIPA
addresses used in IPv4 addressing.
A) Increased throughput
B) Reduced signal strength
C) Enhanced security
D) Slow network performance
A) Encrypting data
B) Providing high-speed Internet access via cable television networks
C) Managing IP addresses
D) Converting fiber optic signals
Explanation: NAT64 is a protocol that translates IPv6 addresses to IPv4 addresses, enabling
communication between IPv6-only and IPv4-only devices.
Explanation: A load-balancer distributes incoming network traffic across multiple servers (or
other network devices) to ensure no single server is overwhelmed, enhancing performance and
reliability.
26. Which wireless security protocol introduced 192-bit AES encryption for enterprise Wi-Fi
networks?
A) WEP
B) WPA
C) WPA2
D) WPA3
Answer: D) WPA3
Explanation: WPA3 provides the highest level of security for Wi-Fi networks, offering stronger
encryption and improved protection against brute force attacks compared to earlier protocols.
A) Encrypting data
B) Manually mapping domain names to IP addresses
C) Managing DNS servers
D) Assigning IP addresses
Explanation: A host file manually maps domain names to IP addresses, providing a local method
for domain resolution without querying a DNS server.
A) fe80::1
B) ff02::1
C) 2001:db8::1
D) ::1
Answer: C) 2001:db8::1
Explanation: The address 2001:db8::1 is a global unicast address, which is globally routable and
unique across the entire Internet.
Explanation: A wireless range extender increases the coverage area of a wireless network by
receiving and retransmitting wireless signals, helping eliminate dead spots.
30. What is a common issue that can affect a wireless LAN (WLAN)?
Explanation: Interference from other devices, such as microwaves and cordless phones, can
affect a wireless LAN (WLAN), causing connectivity and performance issues.
A) On-premises infrastructure
B) Static resource allocation
C) Limited scalability
D) Pay-as-you-go pricing model
A) Phishing email
B) SQL injection
C) Port scanning
D) Man-in-the-Middle
A) Manual configuration
B) Consistent and repeatable deployments
C) Increased physical hardware requirements
D) Limited automation
A) Port security
B) BPDU Guard
C) VLAN tagging
D) Link aggregation
Explanation: BPDU Guard helps secure STP by disabling ports that receive unexpected Bridge
Protocol Data Units (BPDUs), preventing potential STP attacks and misconfigurations.
35. Which of the following is a method used by Extensible Authentication Protocol (EAP) for
network access authentication?
A) Password-based
B) Certificate-based
C) Token-based
D) All of the above
Explanation: A threat is a potential danger to network security that could exploit vulnerabilities
and cause harm or unauthorized access.
A) Multicast
B) Broadcast
C) Anycast
D) Unicast
Answer: D) Unicast
Explanation: A unicast IPv4 address is assigned to a single device on a network, allowing direct
communication with that device.
38. Which of the following is a key feature of virtual IP addresses used with First Hop
Redundancy Protocols (FHRPs)?
A) Port mapping
B) High availability
C) Fixed routing
D) Requires DNS AAAA records
Explanation: Virtual IP addresses used with FHRPs (First Hop Redundancy Protocols) provide
high availability by allowing multiple routers to share a virtual IP address, helping provide
continuous network service.
39. Which of the following connectors is typically used with twisted pair copper cabling?
A) LC
B) SC
C) RJ-45
D) ST
Answer: C) RJ-45
Explanation: The RJ45 connector is commonly used with twisted pair copper cabling for
Ethernet networking.
Explanation: High bandwidth usage can cause network congestion, leading to slower network
performance and increased contention for available resources.
41. Which of the following is a primary use case for IPv4 multicast addresses?
Explanation: Multicast addresses are used to send data to a group of devices, allowing efficient
communication with multiple recipients.
A) Encrypting data
B) Managing and tracking changes to code
C) Assigning IP addresses
D) Monitoring network performance
Explanation: Version control in IaC is used to manage and track changes to infrastructure code,
ensuring that modifications are documented, reversible, and easily manageable.
Explanation: An IPS not only detects but also prevents network threats in real-time by taking
actions such as blocking or dropping malicious traffic.
44. What tool can be used to measure network bandwidth and throughput capacity?
A) SolarWinds
B) Wireshark
C) iperf
D) Nessus
Answer: C) iperf
Explanation: iperf is a tool used to measure network bandwidth and throughput capacity,
providing insights into the network's performance capabilities.
45. Which of the following is true about a Local Area Network (LAN)?
Explanation: A LAN connects devices within a limited geographic area, such as a home, office, or
building, allowing for high-speed local communication.
Explanation: Port mirroring copies network traffic from one port to another for monitoring and
analysis, helping administrators diagnose and troubleshoot network issues.
47. Which of the following is a best practice for rack management in a data center?
Explanation: Using rack units to organize equipment helps maintain an orderly and efficient
data center environment, facilitating easier management and maintenance.
Explanation: Securing network equipment in locked rooms helps protect against physical
tampering and unauthorized access, enhancing physical network security.
50. You are in a remote location without a traditional network infrastructure. Which technology
can provide Internet access?
A) Ethernet
B) Fiber optic
C) Satellite data
D) DSL
Explanation: Satellite data technology provides Internet access in remote locations where
traditional network infrastructure, such as cable modem access, is unavailable.
51. Which of the following frequency bands is not commonly used for WLANs?
A) 900 MHz
B) 2.4 GHz
C) 6 GHz
D) 5 GHz
Explanation: Most Wi-Fi standards support 2.4 GHz and/or 5 GHz frequency bands, with support
for the 6 GHz band being added in Wi-Fi 6e.
Explanation: A MAC flooding attack aims to overwhelm a switch's MAC address table, causing
the switch to flood traffic to all ports and potentially allowing attackers to intercept data.
Explanation: Some transceivers can convert electrical signals to optical signals (and vice versa),
enabling communication between devices using different media types.
Explanation: Implementing strong access control policies is an effective strategy for defending
against network attacks by restricting unauthorized access to network resources. Also, while
software updates should be regularly applied, a weekly schedule is considered more secure than
a monthly schedule.
Explanation: Standards, policies, and rules ensure consistency and compliance in network
management, helping maintain a reliable and secure network environment.
56. SCADA systems are commonly used in which of the following environments?
A) Personal computing
B) Industrial control
C) Office automation
D) Home networking
Explanation: SCADA (Supervisory Control and Data Acquisition) systems are used in industrial
control environments to monitor and control industrial processes remotely.
57. Which of the following is a benefit of using APIs for network management?
Explanation: Using APIs for network management enables automation and programmability,
allowing for more efficient and flexible network operations.
Explanation: A key principle of Zero Trust Architecture (ZTA) is enforcing least privilege access,
ensuring that users and devices have only the minimum permissions needed to perform their
tasks.
A) 8.8.8.8
B) 172.16.0.1
C) 192.0.2.1
D) 203.0.113.1
Answer: B) 172.16.0.1
Explanation: Private IPv4 addresses are reserved for internal use within a network. 172.16.0.1 is
a private IPv4 address, as defined in RFC 1918.
60. What is the usable IP address range for a subnet with a network address of 192.168.1.0/27?
A) 192.168.1.1 - 192.168.1.14
B) 192.168.1.1 - 192.168.1.30
C) 192.168.1.1 - 192.168.1.62
D) 192.168.1.1 - 192.168.1.126
Explanation: A subnet with a /27 mask provides 32 IP addresses, with 30 usable addresses
ranging from 192.168.1.1 to 192.168.1.30.
A) netstat
B) traceroute
C) ping
D) ifconfig
Answer: C) ping
Explanation: The `ping` utility tests the reachability of a host on a network by sending ICMP
Echo Requests and measuring the response time.
62. How many subnets can be created with a subnet mask of 255.255.255.192 in a Class C
network?
A) 2
B) 4
C) 8
D) 16
Answer: B) 4
Explanation: A jump box provides a secure entry point for remote management of network
devices, acting as a gateway to access and manage network resources.
A) Assigning IP addresses
B) Encrypting data transmissions
C) Managing email traffic
D) Mapping private IP addresses to public IP addresses
Explanation: NAT (Network Address Translation) can be used to map private IP addresses to
public IP addresses. A variation of NAT, called Port Address Translation (PAT), allows multiple
devices on a local network to share a single public IP.
65. Which of the following is a key characteristic of Precision Time Protocol (PTP)?
Explanation: PTP (Precision Time Protocol) provides high-accuracy time synchronization for
networked devices, ensuring precise timekeeping and coordination.
66. Which type of attack involves intercepting and/or altering communications between two
parties without their knowledge?
A) Phishing
B) Denial of Service
C) Man-in-the-Middle
D) SQL injection
Answer: C) Man-in-the-Middle
Explanation: A Man-in-the-Middle (MitM) attack involves intercepting and potentially altering
communications between two parties without their knowledge.
A) Encrypting data
B) Assigning IP addresses
C) Managing domain names
D) Identifying and mapping network devices and topology
Explanation: Network discovery identifies and maps network devices and topology, providing an
up-to-date view of the network for better management and troubleshooting.
68. Which of the following is a key feature of Security Assertion Markup Language (SAML)?
A) Assigning IP addresses
B) Providing single sign-on (SSO) capabilities
C) Managing domain names
D) Encrypting network traffic
Explanation: SAML (Security Assertion Markup Language) provides single sign-on (SSO)
capabilities, allowing users to authenticate once and access multiple services without re-
entering credentials.
69. Which type of IPv4 address is used to send data to all devices on a network segment?
A) Unicast
B) Multicast
C) Broadcast
D) Anycast
Answer: C) Broadcast
Explanation: A broadcast IPv4 address is used to send data to all devices on a network segment,
typically for announcements or segment-wide messages.
A) OSPF
B) EIGRP
C) BGP
D) RIP
Answer: D) RIP
Explanation: RIP (Routing Information Protocol) is a distance-vector routing protocol that uses
hop count as its metric for path selection.
Explanation: Packet loss can result in reduced throughput, as lost packets need to be
retransmitted, decreasing overall data transfer rates and network performance.
72. What does it mean when a network port is in an 'error disabled' state?
A) Static tunnels
B) Dynamic, multipoint connectivity
C) Manual configuration
D) Limited scalability
Explanation: DMVPN (Dynamic Multipoint VPN) allows for dynamic, multipoint connectivity
between remote sites, reducing the need for static tunnels and manual configuration.
75. What is a primary advantage of using fiber optic cables over copper cables?
A) Lower cost
B) Greater resistance to electromagnetic interference
C) Easier installation
D) Longer transmission delays
Explanation: Fiber optic cables are less susceptible to electromagnetic interference compared to
copper cables, allowing for cleaner and more reliable data transmission over long distances.
A) DNS
B) DHCP
C) NTP
D) SNMP
Answer: C) NTP
Explanation: NTP (Network Time Protocol) is used to synchronize the clocks of networked
devices to a reference time source, ensuring accurate timekeeping.
A) Assigning IP addresses
B) Providing a mechanism for routing packets based on labels
C) Encrypting data
D) Managing domain names
Explanation: MPLS (Multiprotocol Label Switching) routes packets based on labels instead of IP
addresses, improving speed and efficiency in a network.
A) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
B) 2001:db8:85a3::8a2e:370:7334
C) ::1
D) All of the above
Explanation: All listed options are valid IPv6 addresses, with different levels of abbreviation and
special use cases (e.g., the ::1 loopback address).
Explanation: DNS Security Extensions (DNSSEC) secure DNS queries and responses by adding
cryptographic signatures, ensuring the integrity and authenticity of DNS data.
80. Which of the following is a common issue that can affect a Local Area Network (LAN)?
A) IP address conflicts
B) High latency
C) Signal attenuation
D) All of the above
Explanation: Common LAN troubleshooting issues include IP address conflicts, high latency, and
signal attenuation, each impacting network performance and connectivity.
A) Telnet
B) FTP
C) SSH
D) TFTP
Answer: C) SSH
Explanation: SSH (Secure Shell) provides secure remote access to network devices, encrypting
communication and protecting against unauthorized access.
A) show ip route
B) show interfaces
C) show running-config
D) show version
Explanation: The `show ip route` command displays the routing table on a Cisco router,
providing information about the available routes, including information such as the routing
information source, metric, cost, and next-hop IP address.