DojoLab Network Premium Edition
DojoLab Network Premium Edition
CompTIA
N10-008 Network+
Practice Exams
PBQs & Labs
by DojoLab
2
Contents
3
DojoLab’s CompTIA Network+ (N10-008) Written by DojoLab
Ltd.
Copyright © 2022 by DojoLab Ltd.
https://www.dojolab.org
All rights reserved. No part of this book may be reproduced or
transmitted in any form or by any means, electronic or mechan-
ical, including photocopying, recording, or by any information
storage and retrieval system, without written permission from
the publisher.
Trademark Acknowledgments
All product names and trademarks are the property of their re-
spective owners, and are in no way associated or a liated with
DojoLab Ltd.
4
fi
ffi
The CompTIA N10-008 Network+ Certi cation
5
fi
fi
fi
fi
fi
fi
PRACTICE EXAM A (QUESTIONS)
Performance-Based Questions
Networking tools:
Cable stripper Multimeter
Cable tester Crimper
Select a
networking tool
Select a
networking tool
Select a
networking tool
Select a
networking tool
6
2. Drag and drop the various 802.11 wireless standards into the
frequencies of its use.
Wireless standards:
Protocols:
SFTP POP3
NTP IMAP
22 Select a protocol
7
4. Match each network type to its corresponding de ni-
tion.
Network types:
LAN WAN
PAN MAN
8
fi
5. Drag each port to the protocol of its use.
Ports:
67 69
80 22
Wireless standards:
9
7. Complete the network by dragging the required devices
into the diagram.
Devices:
10
8. Match each cloud model to its corresponding de nition.
Cloud models:
On-demand access to a
complete, ready-to-use,
cloud-hosted platform for
Select a wireless standard
developing, running,
maintaining, and managing
applications
On-demand access to cloud-
hosted physical and virtual
Select a wireless standard
servers, storage, and
networking
On-demand access to ready-
to-use, cloud-hosted applica- Select a wireless standard
tion software
C:\> ______________
10. Next to each port number, type the protocol of its use.
11
fi
fi
1. Port 21 - ______________
2. Port 23 - ______________
3. Port 25 - ______________
4. Port 53 - ______________
Networking devices:
Router Hub
Switch Repeater
Select a device
Select a device
Select a device
Select a device
12
12. Veronica, a customer, has instructed you to con-
gure her home o ce wireless access point. Veroni-
ca has requested that the network have to be set up
with the highest encryption possible and she wants
to assign the rst possible IP address to her laptop.
Additionally, Veronica knows that her neighbors have
wireless networks and wants to ensure that her net-
work is not being interfered with by the other net-
works.
SSID: ______________
13
fi
fi
fi
fi
ffi
13. Drag each connector type into its respective place.
Networking devices:
Select a device
Select a device
Select a device
Select a device
14
14. Drag and drop the various 802.11 wireless standards into
the frequencies of its use.
Wireless standards:
C:\> ______________
15
fi
PRACTICE EXAM A (ANSWERS)
Performance-Based Questions - Answers
Networking tools:
Cable tester
Crimper
Cable stripper
Multimeter
16
2. Drag and drop the various 802.11 wireless standards into the
frequencies of its use.
Wireless standards:
2.4GHz 802.11g
5 GHz 802.11a
17
3. Drag each protocol to the port of its use.
Protocols:
SFTP POP3
NTP IMAP
143 IMAP
123 NTP
110 POP3
22 SFTP
18
4. Match each network type to its corresponding de ni-
tion.
Network types:
LAN WAN
PAN MAN
19
fi
5. Drag each port to the protocol of its use.
Ports:
67 69
80 22
HTTP 80
TFTP 69
DHCP 67
SSH 22
20
6. Drag and drop the various 802.11 wireless standards into
the speeds of its use.
Wireless standards:
Up to 54Mbps 802.11a
Up to 11Mbps 802.11b
Up to 600Mbps 802.11n
21
7. Complete the network by dragging the required devices
into the diagram.
Devices:
DEVICE A
DEVICE B
DEVICE C
22
8. Match each cloud model to its corresponding de nition.
Cloud models:
On-demand access to a
complete, ready-to-use,
cloud-hosted platform for
PaaS
developing, running,
maintaining, and managing
applications
On-demand access to cloud-
hosted physical and virtual
IaaS
servers, storage, and
networking
On-demand access to ready-
to-use, cloud-hosted applica- SaaS
tion software
23
fi
9. The network administrator has changed the IP address
of ComputerA from 192.168.1.1 to 192.6.7.8 and now
George, a user, is unable to connect to internal le shares
on ComputerA from ComputerB. Type the command to
test the connectivity between ComputerB and Comput-
erA.
Ping command can test whether your computer can reach an-
other device—like your router—on your local network, or
whether it can reach a device on the Internet. This can help you
determine if a network problem is somewhere on your local
network, or somewhere beyond. The time it takes packets to
return to you can help you identify a slow connection, or if
you’re experiencing packet loss.
10. Next to each port number, type the protocol of its use.
1. Port 21 - FTP
2. Port 23 - Telnet
3. Port 25 - SMTP
4. Port 53 - DNS
24
fi
11. Drag and drop the common networking hardware de-
vices into their respective places.
Networking devices:
Router Hub
Switch Repeater
Hub
Repeater
Router
Switch
25
12. Veronica, a customer, has instructed you to con-
gure her home o ce wireless access point. Veroni-
ca has requested that the network have to be set up
with the highest encryption possible and she wants
to assign the rst possible IP address to her laptop.
Additionally, Veronica knows that her neighbors have
wireless networks and wants to ensure that her net-
work is not being interfered with by the other net-
works.
SSID: Veronica-Wireless
Network ID: 192.168.1.0
Subnet Mask: 255.255.255.0
Wireless Channel: 1
From the Network ID 192.168.1.0/24, you can easily nd out that the
Subnet mask is 255.255.255.0.
26
fi
fi
fi
fi
ffi
fi
In the 2.4 GHz band, 1, 6, and 11 are the only non-overlapping chan-
nels. The channels that are already in use are 6 and 11. So, channel 1
is available for use.
Networking devices:
RG-59
RS-232
RJ-11
RJ-45
27
14. Drag and drop the various 802.11 wireless standards into
the frequencies of its use.
Wireless standards:
5 GHz 802.11ac
28
15. The network administrator has changed the DHCP
settings and now your computer is unable to get an
IP address, subnet mask, and default gateway IP ad-
dress. The network administrator asks you to send
him a screenshot of your TCP/IP con guration val-
ues.
Type the command to reveal the network details of
your workstation.
C:\> ipconfig/all
Parame Description
ter
29
fi
fi
fi
fi
fi
PRACTICE EXAM B (QUESTIONS)
Performance-Based Questions
Network topologies:
30
3. Match the networking device to the description.
Networking devices:
31
4. Match the pin numbers with their wire colors to create
the 568A Standard.
Pin numbers:
32
5. Convert the following decimal masks to binary masks.
1. IMAP - ______________
2. LDAP - ______________
3. HTTPS - ______________
4. SMTP TLS - ______________
33
8. Drag each type of attack to the description of its use.
Type of attacks:
34
fi
9. Match the pin numbers with their wire colors to create
the 568B Standard.
Pin numbers:
35
10. Sort the layers (from layer 1 to layer 7) to form the OSI
Model.
Data link
Network
Physical
Transport
Application
Session
Presentation
11. Fill up the table by typing the class, the network IDs, and
the network broadcast from the following IP addresses.
Network
IP Address Class Network ID
broadcast
2.3.4.1
130.1.2.3
209.7.8.9
36
12. Drag each IPv4 message to the description of its use.
IPv4 messages:
R1# ______________
37
14. Drag each social engineering attack to the description
of its use.
38
15. Drag each connector type into its respective place.
Connector types:
SC Connector ST Connector
39
PRACTICE EXAM B (ANSWERS)
Performance-Based Questions - Answers
Network topologies:
40
Administrative distance is the feature that routers use in order to
select the best path when there are at least two di erent routes to
the same destination from two di erent routing protocols. Admin-
istrative distance de nes the reliability of a routing protocol. Each
routing protocol is prioritized in order of most to least reliable (be-
lievable) with the help of an administrative distance value.
Connected 0
Static 1
IGRP 100
OSPF 110
IS-IS 115
RIP 120
Unusable 250
41
fi
ff
ff
3. Match the networking device to the description.
Networking devices:
42
4. Match the pin numbers with their wire colors to create
the 568A Standard.
Pin numbers:
0 0 0
43
10000000 128 1
11000000 192 2
11100000 224 3
11110000 240 4
11111000 248 5
11111100 252 6
11111110 254 7
11111111 255 8
23.1.1.0 255.0.0.0
181.1.1.2 255.255.0.0
195.2.4.5 255.255.255.0
44
7. Next to each protocol type the port number of its use.
1. IMAP - 143
2. LDAP - 389
3. HTTPS - 443
4. SMTP TLS - 587
Type of attacks:
45
fi
9. Match the pin numbers with their wire colors to create
the 568B Standard.
Pin numbers:
10. Sort the layers (from layer 1 to layer 7) to form the OSI
Model.
1. Physical
2. Data link
3. Network
4. Transport
5. Session
6. Presentation
7. Application
46
11. Fill up the table by typing the class, the network IDs, and
the network broadcast from the following IP addresses.
Network
IP Address Class Network ID
broadcast
IPv4 messages:
47
13. Type the command that produces the following output
48
14. Drag each social engineering attack to the description
of its use.
49
15. Drag each connector type into its respective place.
Connector types:
SC Connector ST Connector
MTRJ Connector
ST Connector
LC Connector
SC Connector
50
PRACTICE EXAM C (QUESTIONS)
Performance-Based Questions
C:\> ______________
C:\> ______________
51
3. You are working at a Linux command prompt. You need
to nd the name that is given to your computer and is at-
tached to the network. Type the command to obtain the
system hostname.
student@dojolab:~$ ______________
C:\> ______________
C:\> ______________
52
fi
6. You are working at a Linux command prompt. You need
to nd the A record from the website dojolab.org to trou-
bleshoot DNS-related issues. Type the command to display
the records from the dojolab DNS server.
student@dojolab:~$ ______________
C:\> ______________
student@dojolab:~$ ______________
53
fi
9. You are working on a Cisco Router. You are in User Exec
mode and you need to display the startup con guration to
troubleshoot an issue. Type the command to display the
startup con guration settings.
student@dojolab:~$ ______________
C:\> ______________
C:\> ______________
student@dojolab:~$ ______________
54
fi
fi
fi
fi
13. Type the Windows command-line utility that produces
the following output.
C:\> ______________
student@dojolab:~$ ______________
55
fi
15. You need to verify the connection to 192.168.0.10 on
port 25 and the connection to 192.168.0.11 on port 80 with
the help of the telnet command. Type the Windows com-
mand-line utility to verify the connections.
C:\> ______________
C:\> ______________
56
PRACTICE EXAM C (ANSWERS)
Performance-Based Questions - Answers
C:\> nslookup
57
2. Type the Windows command-line utility that produces
the following output.
C:\> netstat
student@dojolab:~$ hostname
58
fi
The hostname command in Linux is used to obtain the DNS (Do-
main Name System) name and set the system’s hostname or
NIS(Network Information System) domain name. A hostname is a
name that is given to a computer and is attached to the network.
Its main purpose is to uniquely identify over a network.
C:\> arp -d
59
5. Type the Windows command-line utility that produces
the following output.
You can also use this command to test both the computer name
and the IP address of the computer. If pinging the IP address is suc-
cessful, but pinging the computer name isn’t, you might have a
name resolution problem. In this case, make sure the computer
name you are specifying can be resolved through the local Hosts
le, by using Domain Name System (DNS) queries, or through Net-
BIOS name resolution techniques.
60
fi
fi
6. You are working at a Linux command prompt. You need
to nd the A record from the website dojolab.org to trou-
bleshoot DNS-related issues. Type the command to display
the records from the dojolab DNS server.
C:\> netstart -r
61
fi
ffi
8. You are working at a Linux command prompt. You need
to capture and analyze packets from the ethernet inter-
face 0 using the tcpdump command. Type the command to
start capturing the packets.
The command screen will scroll up until you interrupt and when we
execute the tcpdump command it will capture from all the inter-
faces, however with -i switch only captures from the desired inter-
face.
# tcpdump -i eth0
62
ff
fi
fi
11:33:31.977243 ARP, Request who-has tecmint.com
tell 172.16.25.126, length 28
11:33:31.977359 ARP, Reply tecmint.com is-at
00:14:5e:67:26:1d (oui Unknown), length 46
11:33:31.977367 IP 172.16.25.126.54807 > tecmint.-
com: 4240+ PTR? 125.25.16.172.in-addr.arpa. (44)
11:33:31.977599 IP tecmint.com >
172.16.25.126.54807: 4240 NXDomain 0/1/0 (121)
11:33:31.977742 IP 172.16.25.126.44519 > tecmint.-
com: 40988+ PTR? 126.25.16.172.in-addr.arpa. (44)
11:33:32.028747 IP 172.16.20.33.netbios-ns >
172.16.31.255.netbios-ns: NBT UDP PACKET(137):
QUERY; REQUEST; BROADCAST
11:33:32.112045 IP 172.16.21.153.netbios-ns >
172.16.31.255.netbios-ns: NBT UDP PACKET(137):
QUERY; REQUEST; BROADCAST
11:33:32.115606 IP 172.16.21.144.netbios-ns >
172.16.31.255.netbios-ns: NBT UDP PACKET(137):
QUERY; REQUEST; BROADCAST
11:33:32.156576 ARP, Request who-has 172.16.16.37
tell old-oraclehp1.midcorp.mid-day.com, length 46
11:33:32.348738 IP tecmint.com >
172.16.25.126.44519: 40988 NXDomain 0/1/0 (121)
63
fi
fi
To display the startup con guration, enter the show con g
command in User Exec mode or Privileged Exec mode.
C:\> tracert
C:\> arp -a
64
ff
fi
fi
fi
Using the arp command allows you to display and modify the Ad-
dress Resolution Protocol (ARP) cache. An ARP cache is a simple
mapping of IP addresses to MAC addresses. Each time a comput-
er’s TCP/IP stack uses ARP to determine the Media Access Control
(MAC) address for an IP address, it records the mapping in the ARP
cache so that future ARP lookups go faster.
If you use the arp command without any parameters, you get a list
of the command’s parameters. To display the ARP cache entry for a
speci c IP address, use an -a switch followed by the IP address. For
example:
C:>arp -a 192.168.168.22
Interface: 192.168.168.21 --- 0x10004
Internet Address Physical Address Type
192.168.168.22 00-60-08-39-e5-a1 dynamic
You can display the complete ARP cache by using -a without speci-
fying an IP address, like this:
C:>arp -a
Interface: 192.168.168.21 --- 0x10004
Internet Address Physical Address Type
192.168.168.9 00-02-e3-16-e4-5d dynamic
192.168.168.10 00-50-04-17-66-90 dynamic
192.168.168.22 00-60-08-39-e5-a1 dynamic
192.168.168.254 00-40-10-18-42-49 dynamic
65
fi
12. Type the command to view the Internet Protocol (IP)
con guration on a Linux host.
student@dojolab:~$ ifconfig
C:\> tracert
The Nmap tool o ers various methods to scan a system. In this ex-
ample, we are performing a scan using the hostname server1.dojo-
lab.org to nd out all open ports, services and MAC address on the
system.
67
fi
ff
fi
ff
MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer
Systems)
telnet 192.168.0.10 25
68
Continue your journey on
dojolab.org
69
fi