Network+ N10-008 – 2.0 Infrastructure

Network+ N10-008 – 2.0 Infrastructure

1 / 156

What is the purpose of the ’Learning’ port state in a switch?

2 / 156

How is the speed of a port on a switch measured?

3 / 156

What is the function of Class of Service (CoS) within the layer 2 802.1Q frame?

4 / 156

What are the enhancements introduced in Rapid Spanning Tree Protocol (RSTP) compared to the original Spanning Tree Protocol (STP)?

5 / 156

Which among the following is a key difference between network devices and networked devices?

6 / 156

What is one functionality of a smart thermostat?

7 / 156

Which of the following statements accurately describes the 802.11 standards?

8 / 156

What is the purpose of a virtual phone in a VoIP system?

9 / 156

Which of the following is considered an exterior routing protocol?

10 / 156

Which of the following statements is true about wireless system installation based on the text?

11 / 156

Which type of routing is useful in stub networks where all destination networks are reachable through a particular gateway or interface?

12 / 156

What is the function of the DSCP Assured Forwarding (AF) values in DiffServ?

13 / 156

Which of the following best describes the functionality of a hub in a network?

14 / 156

What is the role of a wireless LAN controller (WLC or WLAN Controller) when deploying access points?

15 / 156

What primary metric is used by OSPF in its routing decisions and to construct the initial shortest path tree?

16 / 156

What does the 802.1Q trunking protocol do?

17 / 156

What is the purpose of a Blocking Port in the STP (802.1D) protocol?

18 / 156

What role does the Supervisory System play in an industrial environment?

19 / 156

Which layers of the OSI model can QoS be achieved at?

20 / 156

What is the key difference between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)?

21 / 156

What does BGP use the BGP Best Path Selection algorithm for?

22 / 156

What is the primary mechanism to segment networks?

23 / 156

Which frequencies are governed by the Unlicensed National Information Infrastructure (U-NII) radio band?

24 / 156

What are the two main networks within an HVAC control system?

25 / 156

In the context of port states in a switch’s STP processes, what is the purpose of the ’Listening’ state?

26 / 156

What is the successor to WPA and what encryption standard does it use to protect data?

27 / 156

What are the common actions that are triggered when firewall conditions are met?

28 / 156

What does the term ’Root Bridge’ in Spanning Tree Protocol (STP) refer to?

29 / 156

What is one of the main uses of VLANs in a network?

30 / 156

What happens to the switch with the higher cost in STP operations?

31 / 156

Which component of an HVAC system controls the on/off functions and related controls?

32 / 156

Why should VoIP take a higher precedence in the network than simple web browsing or file-based access?

33 / 156

Which of the following describes the operation of a port in full-duplex mode?

34 / 156

What are some key characteristics of the 802.11b wireless protocol standard?

35 / 156

What is a collision domain and how does it affect network communications?

36 / 156

In the context of wireless network security, what is the role of the Extensible Authentication Protocol (EAP)?

37 / 156

What is a disadvantage of an Ad Hoc wireless network?

38 / 156

What is true about the 802.11a standard?

39 / 156

Which frequency allows for higher speed in a wireless system?

40 / 156

What is the special functionality that a layer 3 switch brings compared to a layer 2 switch?

41 / 156

What is the main challenges associated with channel bonding?

42 / 156

What is a soft phone in the context of Voice over IP (VoIP)?

43 / 156

What vital function do routers perform in network architecture?

44 / 156

Which of the following is true regarding VoIP PBX?

45 / 156

Which of the following statements about Internet of Things (IoT) in the context of home networks is incorrect?

46 / 156

What is the difference between a tagging port and an untagging port in an 802.1Q trunk system?

47 / 156

What is the throughput rate possible with the introduction of 802.11ac that allows eight 20 MHz channels to be bonded together?

48 / 156

What is the function of a Voice VLAN in a network?

49 / 156

Which of the following is a TRUE statement regarding wireless networks?

50 / 156

Which of the following is true about Global System for Mobile Communications (GSM)?

51 / 156

What is a key difference between WPA and WPA2?

52 / 156

Which standards operate on the 5 GHz frequency in WLANs?

53 / 156

What are the roles of modulation and demodulation in a modem?

54 / 156

What is the function of an Access Control Server (ACS) in an access control system?

55 / 156

What is a unique feature of smart speakers in a home network?

56 / 156

What does a router use to make routing decisions?

57 / 156

What are some of the disadvantage of ad hoc wireless networks compared to infrastructure mode?

58 / 156

What is the primary role of a wireless LAN controller in a mesh network?

59 / 156

What is the primary function of the Security Console in an access control system?

60 / 156

What is the function of POTS modems in network architecture?

61 / 156

What is the function of flow control in Ethernet?

62 / 156

What is the purpose of port mirroring in a network switch?

63 / 156

In the context of industrial control systems, which characteristic of a Remote Terminal Unit (RTU) distinguishes it from a Programmable Logic Controller (PLC)?

64 / 156

What happens during the STP convergence in a network?

65 / 156

What is the key difference between the operation of the IPv4 Address Resolution Protocol (ARP) and the IPv6 Neighbor Discovery Protocol (NDP)?

66 / 156

Which type of routing reduces the amount of administrator intervention and optimizes routing decisions through the use of routing protocols ?

67 / 156

What is the main characteristic of decentralized printing?

68 / 156

Which of the following is a feature on a managed switch that can be used to secure your network?

69 / 156

What is the main difference between a traditional refrigerator and a smart refrigerator in terms of IoT features?

70 / 156

What is a key difference between a physical VoIP phone and a soft phone?

71 / 156

What are the three defining characteristics of a switchport?

72 / 156

Which of the following best describes the RIP (Routing Information Protocol)?

73 / 156

Which of the following correctly describes the first step of the network printing process?

74 / 156

What is the function of the Access Control Panel in a network security system?

75 / 156

What is the maximum data throughput for LTE/4G?

76 / 156

What is the purpose of the command switchport port-security mac-address sticky in Port Security?

77 / 156

What is the purpose of traffic shaping in networking?

78 / 156

What is a Reader in the context of access control systems?

79 / 156

What does a Programmable Logic Controller (PLC) in an industrial control system do?

80 / 156

What is the role of a VoIP gateway in the context of a telephone network?

81 / 156

What is the main purpose of the Supervisory System in SCADA?

82 / 156

What is the best method to handle collisions in a network?

83 / 156

What does Temporal Key Integrity Protocol (TKIP) use in conjunction with message integrity checks (MICs) to check the integrity of messages received by the access point?

84 / 156

Which of the following describes the role of the HVAC Control Application in a HVAC system?

85 / 156

What is a notable characteristic of Non-Root Bridges in the context of Spanning Tree Protocol?

86 / 156

What is a characteristic of static routing?

87 / 156

What can be used to reduce the impact of broadcast traffic in a network?

88 / 156

What is a significant weakness of using a shared passphrase with the Wired Equivalent Privacy (WEP) standard?

89 / 156

What is geofencing in the context of mobile device security?

90 / 156

What function does a media converter serve in a network setup?

91 / 156

What does the Bridge ID in the Spanning Tree Protocol represent?

92 / 156

What are the three basic functions of a switch related to the MAC address?

93 / 156

What is the role of the Root Port in the Spanning Tree Protocol (STP)?

94 / 156

Within the context of Ethernet and IP Communications, what effect does a collision have on a network?

95 / 156

Which statement accurately describes the characteristics of the Distance-vector routing protocol, RIP?

96 / 156

Which of the following is NOT a feature or characteristic of 5G technology?

97 / 156

What process does OSPF use to construct the initial shortest path tree and calculate routes?

98 / 156

What is the primary reason that the Supervisory System isn’t usually located in the cloud within Industrial control systems?

99 / 156

Which of the following statements about Repeaters is correct based on the provided text?

100 / 156

What is the role of a Forwarding Port in the Spanning Tree Protocol (STP)?

101 / 156

Which of the following are two aspects of wireless security that should be focused on according to the text?

102 / 156

What is the functionality of the Auto-Medium-Dependent Interface Crossover (MDI-X)?

103 / 156

Which of the following is NOT correct about a path-vector protocol?

104 / 156

What is the main function of a Wireless Access Point (WAP)?

105 / 156

What is the primary benefit of using a caching proxy server?

106 / 156

What is the purpose of MAC filtering in wireless network systems?

107 / 156

What is the function of HVAC Control Server in an HVAC system?

108 / 156

What is a Service Set Identifier (SSID) in wireless networking?

109 / 156

What is the main purpose of port aggregation?

110 / 156

What is the primary use of a preshared key (PSK) in network security?

111 / 156

What is the function of a cable modem in network architecture?

112 / 156

What functionality is performed by bridges?

113 / 156

What is the function of a DSL modem?

114 / 156

What is a major drawback of using a wireless range extender?

115 / 156

What is the purpose of using Cellular connectivity methods?

116 / 156

What is the function of the Spanning Tree Algorithm (STA) in the STP (802.1D) protocol?

117 / 156

What is the role of a VPN headend (or concentrator) in a network?

118 / 156

What is the role of the ’Forwarding’ state in a switch port transition?

119 / 156

Which wireless standards operate on 2.4 GHz frequencies?

120 / 156

What does ’Disabled’ state indicate in port transitions of a switch?

121 / 156

What is the purpose of the Address Resolution Protocol (ARP) in a network?

122 / 156

What are the two networks that access control systems have?

123 / 156

What are the main differences between unidirectional and omnidirectional antennas?

124 / 156

What is the principal characteristic when EAP-TLS is deployed in conjunction with a certificate authority?

125 / 156

Which of the following correctly describes the 802.11ac standard?

126 / 156

What is the primary purpose of the Spanning Tree Protocol (STP)?

127 / 156

What is the key difference between the encryption method used in WPA and the one used in WPA2?

128 / 156

What is the function of the MIC in CCMP-AES?

129 / 156

At which layers do load balancers typically function and make their decisions?

130 / 156

What is the purpose of the ’blocking’ state in a switch port transition?

131 / 156

What is the maximum data speed that the CDMA protocol can deliver?

132 / 156

Which of the following functions do switches perform at layer 2 (Data Link Layer)?

133 / 156

What is the main purpose of using MIMO technology in wireless devices?

134 / 156

What is a unique feature of the 802.11ax standard?

135 / 156

What is the function of Transport Layer Security (TLS) in the context of Protected Extensible Authentication Protocol (PEAP)?

136 / 156

What is the purpose of the blocking state in STP port states?

137 / 156

What crucial information does a site survey provide when designing a wireless network?

138 / 156

What is the maximum hop count in EIGRP?

139 / 156

What is the purpose of Phase 2 in the EAP-FAST protocol?

140 / 156

What is the primary function of Smart Doorbells in the context of IoT?

141 / 156

What is the main function of the Collision Detection (CD) in the Carrier Sense Multiple Access with Collision Detection (CSMA/CD)?

142 / 156

What is default routing primarily useful for in a network setup?

143 / 156

What are the two types of camera that can be used in physical security and what are their primary uses?

144 / 156

What is the role of the port cost in the Spanning Tree Protocol (STP)?

145 / 156

Why is EIGRP not considered a true distance-vector routing protocol?

146 / 156

Which of the following statements accurately describes the standards for Power over Ethernet (PoE)?

147 / 156

What is the maximum speed and frequency of 802.11g?

148 / 156

What are the three basic functions of MAC address?

149 / 156

Which of the following best describes the function of the Human Machine Interface (HMI) in an industrial control system?

150 / 156

What is a unique feature of a next-generation firewall (NGFW) compared to traditional firewalls?

151 / 156

Which of the following options correctly describes the HVAC control application?

152 / 156

Which of the following features was introduced with the 802.11n wireless standard?

153 / 156

What is a possible disadvantage of using jumbo frames in a network?

154 / 156

Which legacy cellular network protocol that provided 2G network services has been incorporated into GSM cellular network protocols?

155 / 156

Which of the following types of VoIP phones can be described as a networked device, supplied with power over Ethernet, and contains a small switch inside itself?

156 / 156

What is the role of a door lock in an access control system?

Your score is

đź”’ Hands-On IT Course (Start a New Career in 8-12 Weeks!) đź”’

Visit IT Course 
 

Boost Your Skills with Free Anki Flashcards

Click the download button to get the Network+ N10-008 Anki deck.

Anki deck images

Boost your IT skills with our free CompTIA Network+ practice test focusing on 2.0 Infrastructure. Whether you’re entering the IT industry or advancing in cyber security, our resources are here to help.

Why Choose Our Practice Test?

  • Skill Enhancement: Covers essential infrastructure concepts for the CompTIA Exam and vulnerability management.
  • Career Advancement: Passing the CompTIA Network+ exam can open doors to new job opportunities and career changes in the IT industry.
  • Vulnerability Management: Master managing network vulnerabilities, a key skill in cyber security.

Free Anki Deck Download

Download our free Anki Deck, reviewed by industry expert Josh Madakor, who has extensive experience in IT and cyber security, including work with Microsoft and government sectors. Learn more about Anki on the official site.

Get Started Today!

Visit the CompTIA Network+ official site to learn more. Prepare, practice, and succeed with our resources, supporting your IT career change in the IT industry and cyber security.

 

Explore our other free mock exams:

Share the Post:

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!