0% found this document useful (0 votes)
149 views

DojoLab Network Premium Edition

Uploaded by

andipema
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views

DojoLab Network Premium Edition

Uploaded by

andipema
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 69

1

CompTIA
N10-008 Network+
Practice Exams
PBQs & Labs
by DojoLab

2
Contents

Practice Exam A (Questions) ..........................................6


Practice Exam A (Answers).............................................16
Practice Exam B (Questions) ..........................................30
Practice Exam B (Answers) .............................................40
Practice Exam C (Questions) ..........................................51
Practice Exam C (Answers).............................................57

3
DojoLab’s CompTIA Network+ (N10-008) Written by DojoLab
Ltd.
Copyright © 2022 by DojoLab Ltd.

https://www.dojolab.org
All rights reserved. No part of this book may be reproduced or
transmitted in any form or by any means, electronic or mechan-
ical, including photocopying, recording, or by any information
storage and retrieval system, without written permission from
the publisher.

Trademark Acknowledgments

All product names and trademarks are the property of their re-
spective owners, and are in no way associated or a liated with
DojoLab Ltd.

“CompTIA” and “Network+” are registered trademarks of


CompTIA, Inc.

Warning and Disclaimer

This book is designed to provide information about the Comp-


TIA N10-008 Network+ certi cation exam. However, there may
be typographical and/or content errors. Therefore, this book
should serve only as a general guide and not as the ultimate
source of subject information. The author shall have no liability
or responsibility to any person or entity regarding any loss or
damage incurred, or alleged to have incurred, directly or indi-
rectly, by the information contained in this book.

4
fi
ffi
The CompTIA N10-008 Network+ Certi cation

CompTIA's Network+ certi cation validates the technical skills


needed to securely establish, maintain and troubleshoot the
essential networks that businesses rely on.

Earning the Network+ certi cation requires the completion of


one exam covering a broad range of networking topics. After
completing the certi cation, a CompTIA Network+ certi ed
professional will have an understanding of troubleshooting,
con guring, and managing networks and much more.

Here's the breakdown of each domain and the percentage of


each topic on the N10-008 exam:

Domain 1.0 - Networking Fundamentals - 24%


Domain 2.0 - Network Implementations - 19%
Domain 3.0 - Network Operations - 16%
Domain 4.0 - Network Security - 19%
Domain 5.0 - Network Troubleshooting - 22%

5
fi
fi
fi
fi
fi
fi
PRACTICE EXAM A (QUESTIONS)
Performance-Based Questions

1. Drag each networking tool into its respective places.

Networking tools:
Cable stripper Multimeter
Cable tester Crimper

Select a
networking tool

Select a
networking tool

Select a
networking tool

Select a
networking tool

6
2. Drag and drop the various 802.11 wireless standards into the
frequencies of its use.

Wireless standards:

802.11g 802.11n 802.11a

2.4GHz Select a wireless standard

2.4 GHz / 5 GHz Select a wireless standard

5 GHz Select a wireless standard

3. Drag each protocol to the port of its use.

Protocols:

SFTP POP3

NTP IMAP

143 Select a protocol

123 Select a protocol

110 Select a protocol

22 Select a protocol

7
4. Match each network type to its corresponding de ni-
tion.

Network types:

LAN WAN

PAN MAN

A network that connects


computers within a
Select a network type
metropolitan area, which
could be a single large city
A computer network for
interconnecting electronic
Select a network type
devices within an individual
person's workspace
A network that extends over a
large geographic area for the
Select a network type
primary purpose of computer
networking
A collection of devices
connected together in one
Select a network type
physical location, such as a
building

8
fi
5. Drag each port to the protocol of its use.

Ports:

67 69

80 22

HTTP Select a port

TFTP Select a port

DHCP Select a port

SSH Select a port

6. Drag and drop the various 802.11 wireless standards into


the speeds of its use.

Wireless standards:

802.11n 802.11b 802.11a

Up to 54Mbps Select a wireless standard

Up to 11Mbps Select a wireless standard

Up to 600Mbps Select a wireless standard

9
7. Complete the network by dragging the required devices
into the diagram.

Devices:

DEVICE A Select device

DEVICE B Select device

DEVICE C Select device

10
8. Match each cloud model to its corresponding de nition.

Cloud models:

IaaS PaaS SaaS

On-demand access to a
complete, ready-to-use,
cloud-hosted platform for
Select a wireless standard
developing, running,
maintaining, and managing
applications
On-demand access to cloud-
hosted physical and virtual
Select a wireless standard
servers, storage, and
networking
On-demand access to ready-
to-use, cloud-hosted applica- Select a wireless standard
tion software

9. The network administrator has changed the IP address


of ComputerA from 192.168.1.1 to 192.6.7.8 and now
George, a user, is unable to connect to internal le shares
on ComputerA from ComputerB. Type the command to
test the connectivity between ComputerB and Comput-
erA.

C:\> ______________

10. Next to each port number, type the protocol of its use.

11
fi
fi
1. Port 21 - ______________
2. Port 23 - ______________
3. Port 25 - ______________
4. Port 53 - ______________

11. Drag and drop the common networking hardware de-


vices into their respective places.

Networking devices:

Router Hub

Switch Repeater

Select a device

Select a device

Select a device

Select a device

12
12. Veronica, a customer, has instructed you to con-
gure her home o ce wireless access point. Veroni-
ca has requested that the network have to be set up
with the highest encryption possible and she wants
to assign the rst possible IP address to her laptop.
Additionally, Veronica knows that her neighbors have
wireless networks and wants to ensure that her net-
work is not being interfered with by the other net-
works.

Wireless network details


Network ID: 192.168.1.0/24
SSID: Veronica-Wireless
Neighbors channels: 6,11

Con gure Veronica’s wireless network using the Wireless


network details.

Wireless con guration.

SSID: ______________

Network ID: ______________

Subnet Mask: ______________

Wireless Channel: ______________

13
fi
fi
fi
fi
ffi
13. Drag each connector type into its respective place.

Networking devices:

RS-232 RJ-45 RG-59 RJ-11

Select a device

Select a device

Select a device

Select a device

14
14. Drag and drop the various 802.11 wireless standards into
the frequencies of its use.

Wireless standards:

802.11n 802.11ac 802.11b

5 GHz Select a wireless standard

2.4 GHz / 5 GHz Select a wireless standard

2.4 GHz Select a wireless standard

15. The network administrator has changed the DHCP


settings and now your computer is unable to get an
IP address, subnet mask, and default gateway IP ad-
dress. The network administrator asks you to send
him a screenshot of your TCP/IP con guration val-
ues.
Type the command to reveal the network details of
your workstation.

C:\> ______________

15
fi
PRACTICE EXAM A (ANSWERS)
Performance-Based Questions - Answers

1. Drag each networking tool into its respective places.

Networking tools:

Cable stripper Multimeter

Cable tester Crimper

Cable tester

Crimper

Cable stripper

Multimeter

16
2. Drag and drop the various 802.11 wireless standards into the
frequencies of its use.

Wireless standards:

802.11g 802.11n 802.11a

2.4GHz 802.11g

2.4 GHz / 5 GHz 802.11n

5 GHz 802.11a

The table below highlights the characteristics of the various 802.11


wireless standards.

IEEE Standards Frequency/Medium Speed

802.11 2.4 GHz 1 to 2Mbps

802.11a 5 GHz Up to 54Mbps

802.11b 2.4 GHz Up to 11Mbps

802.11g 2.4 GHz Up to 54Mbps

802.11n 2.4 GHz / 5 GHz Up to 600Mbps

802.11ac 5 GHz Up to 1.3Gbps

17
3. Drag each protocol to the port of its use.

Protocols:

SFTP POP3

NTP IMAP

143 IMAP

123 NTP

110 POP3

22 SFTP

18
4. Match each network type to its corresponding de ni-
tion.

Network types:

LAN WAN

PAN MAN

A network that connects


computers within a
MAN
metropolitan area, which
could be a single large city
A computer network for
interconnecting electronic
PAN
devices within an individual
person's workspace
A network that extends over a
large geographic area for the
WAN
primary purpose of computer
networking
A collection of devices
connected together in one
LAN
physical location, such as a
building

19
fi
5. Drag each port to the protocol of its use.

Ports:

67 69

80 22

HTTP 80

TFTP 69

DHCP 67

SSH 22

20
6. Drag and drop the various 802.11 wireless standards into
the speeds of its use.

Wireless standards:

802.11n 802.11b 802.11a

Up to 54Mbps 802.11a

Up to 11Mbps 802.11b

Up to 600Mbps 802.11n

The table below highlights the characteristics of the various


802.11 wireless standards.

IEEE Standards Frequency/Medium Speed

802.11 2.4 GHz 1 to 2Mbps

802.11a 5 GHz Up to 54Mbps

802.11b 2.4 GHz Up to 11Mbps

802.11g 2.4 GHz Up to 54Mbps

802.11n 2.4 GHz / 5 GHz Up to 600Mbps

802.11ac 5 GHz Up to 1.3Gbps

21
7. Complete the network by dragging the required devices
into the diagram.

Devices:

DEVICE A

DEVICE B

DEVICE C

22
8. Match each cloud model to its corresponding de nition.

Cloud models:

IaaS PaaS SaaS

On-demand access to a
complete, ready-to-use,
cloud-hosted platform for
PaaS
developing, running,
maintaining, and managing
applications
On-demand access to cloud-
hosted physical and virtual
IaaS
servers, storage, and
networking
On-demand access to ready-
to-use, cloud-hosted applica- SaaS
tion software

IaaS: On-demand access to cloud-hosted physical and virtual


servers, storage, and networking

PaaS: On-demand access to a complete, ready-to-use, cloud-host-


ed platform for developing, running, maintaining, and managing
applications

SaaS: On-demand access to ready-to-use, cloud-hosted applica-


tion software.

23
fi
9. The network administrator has changed the IP address
of ComputerA from 192.168.1.1 to 192.6.7.8 and now
George, a user, is unable to connect to internal le shares
on ComputerA from ComputerB. Type the command to
test the connectivity between ComputerB and Comput-
erA.

C:\> ping 192.6.7.8

Ping command can test whether your computer can reach an-
other device—like your router—on your local network, or
whether it can reach a device on the Internet. This can help you
determine if a network problem is somewhere on your local
network, or somewhere beyond. The time it takes packets to
return to you can help you identify a slow connection, or if
you’re experiencing packet loss.

10. Next to each port number, type the protocol of its use.

1. Port 21 - FTP
2. Port 23 - Telnet
3. Port 25 - SMTP
4. Port 53 - DNS

24
fi
11. Drag and drop the common networking hardware de-
vices into their respective places.

Networking devices:

Router Hub

Switch Repeater

Hub

Repeater

Router

Switch

25
12. Veronica, a customer, has instructed you to con-
gure her home o ce wireless access point. Veroni-
ca has requested that the network have to be set up
with the highest encryption possible and she wants
to assign the rst possible IP address to her laptop.
Additionally, Veronica knows that her neighbors have
wireless networks and wants to ensure that her net-
work is not being interfered with by the other net-
works.

Wireless network details


Network ID: 192.168.1.0/24
SSID: Veronica-Wireless
Neighbors channels: 6,11

Con gure Veronica’s wireless network using the Wireless


network details.

Wireless con guration.

SSID: Veronica-Wireless
Network ID: 192.168.1.0
Subnet Mask: 255.255.255.0
Wireless Channel: 1

From the Network ID 192.168.1.0/24, you can easily nd out that the
Subnet mask is 255.255.255.0.

26
fi
fi
fi
fi
ffi
fi
In the 2.4 GHz band, 1, 6, and 11 are the only non-overlapping chan-
nels. The channels that are already in use are 6 and 11. So, channel 1
is available for use.

13. Drag each connector type into its respective place.

Networking devices:

RS-232 RJ-45 RG-59 RJ-11

RG-59

RS-232

RJ-11

RJ-45

27
14. Drag and drop the various 802.11 wireless standards into
the frequencies of its use.

Wireless standards:

802.11n 802.11ac 802.11b

5 GHz 802.11ac

2.4 GHz / 5 GHz 802.11n

2.4 GHz 802.11b

The table below highlights the characteristics of the various


802.11 wireless standards.

IEEE Standards Frequency/Medium Speed

802.11 2.4 GHz 1 to 2Mbps

802.11a 5 GHz Up to 54Mbps

802.11b 2.4 GHz Up to 11Mbps

802.11g 2.4 GHz Up to 54Mbps

802.11n 2.4 GHz / 5 GHz Up to 600Mbps

802.11ac 5 GHz Up to 1.3Gbps

28
15. The network administrator has changed the DHCP
settings and now your computer is unable to get an
IP address, subnet mask, and default gateway IP ad-
dress. The network administrator asks you to send
him a screenshot of your TCP/IP con guration val-
ues.
Type the command to reveal the network details of
your workstation.

C:\> ipconfig/all

The ipcon g command displays all current TCP/IP network con g-


uration values and refreshes Dynamic Host Con guration Protocol
(DHCP) and Domain Name System (DNS) settings. Used without
parameters, ipcon g displays Internet Protocol version 4 (IPv4) and
IPv6 addresses, subnet mask, and default gateway for all adapters.

Parame Description
ter

/all Displays the full TCP/IP configuration for all


adapters. Adapters can represent physical interfaces,
such as installed network adapters, or logical
interfaces, such as dial-up connections.

29
fi
fi
fi
fi
fi
PRACTICE EXAM B (QUESTIONS)
Performance-Based Questions

1. Match the network topology to the description.

Network topologies:

Star Topology Mesh Topology

Bus Topology Ring Topology

Each computer and network


device is interconnected with Select a networking device
one another
All the nodes are connected
Select a networking device
to a single cable
Each node connects to exact-
Select a networking device
ly two other nodes
Each node connects to exact-
Select a networking device
ly two other nodes

2. Type next to each route type the default Administrative


Distances (AD).

1. EIGRP (internal routes) - ______________


2. OSPF - ______________
3. EIGRP (external routes) - ______________
4. BGP - ______________

30
3. Match the networking device to the description.

Networking devices:

Proxy server Load balancer

Access point Cable modem

A type of network bridge that


provides bi-directional data
communication via radio Select a networking device
frequency channels on a
hybrid fiber-coaxial
A device that creates a
wireless local area network, or
Select a networking device
WLAN, usually in an office or
large building
The process of distributing a
set of tasks over a set of re- Select a networking device
sources
A server application that acts
as an intermediary between a
client requesting a resource Select a networking device
and the server providing that
resource

31
4. Match the pin numbers with their wire colors to create
the 568A Standard.

Pin numbers:

Pin #1 Pin #2 Pin #3 Pin #4

Pin #5 Pin #6 Pin #7 Pin #8

32
5. Convert the following decimal masks to binary masks.

Decimal mask: 255.255.192.0


Binary mask: ______________

Decimal mask: 240.0.0.0


Binary mask: ______________

6. Match the IP addresses to their default subnet mask

Default subnet masks:

255.255.255.0 255.0.0.0 255.255.0.0

23.1.1.0 Select a default mask

181.1.1.2 Select a default mask

195.2.4.5 Select a default mask

7. Next to each protocol type the port number of its use.

1. IMAP - ______________
2. LDAP - ______________
3. HTTPS - ______________
4. SMTP TLS - ______________

33
8. Drag each type of attack to the description of its use.

Type of attacks:

ARP spoofing VLAN hopping

DNS poisoning IP spoofing

A computer security exploit, a


method of attacking
Select a type of attack
networked resources on a
virtual local area networks
Fake information is entered
into the cache of a domain Select a type of attack
name server
A type of attack in which a
malicious actor sends falsi ed
Address Resolution Protocol Select a type of attack
messages over a local area
network
The creation of Internet Pro-
tocol packets with a false
source IP address, for the pur- Select a type of attack
pose of impersonating anoth-
er computing system

34
fi
9. Match the pin numbers with their wire colors to create
the 568B Standard.

Pin numbers:

Pin #1 Pin #2 Pin #3 Pin #4

Pin #5 Pin #6 Pin #7 Pin #8

35
10. Sort the layers (from layer 1 to layer 7) to form the OSI
Model.

Data link

Network

Physical

Transport

Application

Session

Presentation

11. Fill up the table by typing the class, the network IDs, and
the network broadcast from the following IP addresses.

Network
IP Address Class Network ID
broadcast

2.3.4.1

130.1.2.3

209.7.8.9

36
12. Drag each IPv4 message to the description of its use.

IPv4 messages:

Unicast Multicast Broadcast

Messages are sent to a group


Select an IPv4 message
of stations
The message is only sent to
Select an IPv4 message
one station on the network
Messages are sent to all sta-
Select an IPv4 message
tions in the network

13. Type the command that produces the following output

R1# ______________

37
14. Drag each social engineering attack to the description
of its use.

Social engineering attacks:

Shoulder surfing Phishing Tailgating

A type of social engineering


attack often used to steal user
Select a social
data, including login
engineering attack
credentials and credit card
numbers
Thieves steal your personal
data by spying over your
Select a social
shoulder as you use a laptop,
engineering attack
ATM, public kiosk, or another
electronic device in public
Attackers seeking entry to a
restricted area without proper
authentication. In it, the per- Select a social
petrators can simply follow an engineering attack
authorized person into a re-
stricted location

38
15. Drag each connector type into its respective place.

Connector types:

LC Connector MTRJ Connector

SC Connector ST Connector

Select a connector type

Select a connector type

Select a connector type

Select a connector type

39
PRACTICE EXAM B (ANSWERS)
Performance-Based Questions - Answers

1. Match the network topology to the description.

Network topologies:

Star Topology Mesh Topology

Bus Topology Ring Topology

Each computer and network


device is interconnected with Mesh topology
one another
All the nodes are connected
Bus topology
to a single cable
Each node connects to exact-
Ring topology
ly two other nodes
Each node connects to exact-
Star topology
ly two other nodes

2. Type next to each route type the default Administrative


Distances (AD).

1. EIGRP (internal routes) - 90


2. OSPF - 110
3. EIGRP (external routes) - 170
4. BGP - 200

40
Administrative distance is the feature that routers use in order to
select the best path when there are at least two di erent routes to
the same destination from two di erent routing protocols. Admin-
istrative distance de nes the reliability of a routing protocol. Each
routing protocol is prioritized in order of most to least reliable (be-
lievable) with the help of an administrative distance value.

The default Administrative Distances (AD) from the given route


types are:

Route type Administrative distances

Connected 0

Static 1

BGP (external routes [eBGP]) 20

EIGRP (internal routes) 90

IGRP 100

OSPF 110

IS-IS 115

RIP 120

EIGRP (external routes) 170

BGP (internal routes [iBGP]) 200

DHCP default route 254

Unusable 250

41
fi
ff
ff
3. Match the networking device to the description.

Networking devices:

Proxy server Load balancer

Access point Cable modem

A type of network bridge that


provides bi-directional data
communication via radio Cable modem
frequency channels on a
hybrid fiber-coaxial
A device that creates a
wireless local area network, or
Access point
WLAN, usually in an office or
large building
The process of distributing a
set of tasks over a set of re- Load balancer
sources
A server application that acts
as an intermediary between a
client requesting a resource Proxy server
and the server providing that
resource

42
4. Match the pin numbers with their wire colors to create
the 568A Standard.

Pin numbers:

Pin #1 Pin #2 Pin #3 Pin #4

Pin #5 Pin #6 Pin #7 Pin #8

5. Convert the following decimal masks to binary masks.

Decimal mask: 255.255.192.0


Binary mask: 11111111.11111111.11000000.00000000

Decimal mask: 240.0.0.0


Binary mask: 11100000.00000000.00000000.00000000

There are only nine possible values in one octet of a subnet


mask as shown in the table below.

Binary Mask Octet Decimal Equivalent Number of Binary 1s

0 0 0

43
10000000 128 1

11000000 192 2

11100000 224 3

11110000 240 4

11111000 248 5

11111100 252 6

11111110 254 7

11111111 255 8

6. Match the IP addresses to their default subnet mask

Default subnet masks:

255.255.255.0 255.0.0.0 255.255.0.0

23.1.1.0 255.0.0.0

181.1.1.2 255.255.0.0

195.2.4.5 255.255.255.0

44
7. Next to each protocol type the port number of its use.
1. IMAP - 143
2. LDAP - 389
3. HTTPS - 443
4. SMTP TLS - 587

8. Drag each type of attack to the description of its use.

Type of attacks:

ARP spoofing VLAN hopping

DNS poisoning IP spoofing

A computer security exploit, a


method of attacking
VLAN hopping
networked resources on a
virtual local area networks
Fake information is entered
into the cache of a domain DNS poisoning
name server
A type of attack in which a
malicious actor sends falsi ed
Address Resolution Protocol ARP spoofing
messages over a local area
network
The creation of Internet Pro-
tocol packets with a false
source IP address, for the pur- IP spoofing
pose of impersonating anoth-
er computing system

45
fi
9. Match the pin numbers with their wire colors to create
the 568B Standard.

Pin numbers:

Pin #1 Pin #2 Pin #3 Pin #4

Pin #5 Pin #6 Pin #7 Pin #8

10. Sort the layers (from layer 1 to layer 7) to form the OSI
Model.

1. Physical

2. Data link

3. Network

4. Transport

5. Session

6. Presentation

7. Application

46
11. Fill up the table by typing the class, the network IDs, and
the network broadcast from the following IP addresses.

Network
IP Address Class Network ID
broadcast

2.3.4.1 A 2.0.0.0 2.255.255.255

130.1.2.3 B 130.1.0.0 130.1.255.255

209.7.8.9 C 209.7.8.0 209.7.8.255

12. Drag each IPv4 message to the description of its use.

IPv4 messages:

Unicast Multicast Broadcast

Messages are sent to a group


Multicast
of stations

The message is only sent to


Unicast
one station on the network

Messages are sent to all sta-


Broadcast
tions in the network

47
13. Type the command that produces the following output

R1# show interface

The show interface command provides tons of useful


information about the configuration and status of the IP
protocol and its services, on all interfaces. The show ip
interface brief command provides a quick status of the
interfaces on the router, including their IP address, Layer 2
status, and L.

48
14. Drag each social engineering attack to the description
of its use.

Social engineering attacks:

Shoulder surfing Phishing Tailgating

A type of social engineering


attack often used to steal user
data, including login Phishing
credentials and credit card
numbers
Thieves steal your personal
data by spying over your
shoulder as you use a laptop, Shoulder surfing
ATM, public kiosk, or another
electronic device in public
Attackers seeking entry to a
restricted area without proper
authentication. In it, the per-
Tailgating
petrators can simply follow an
authorized person into a re-
stricted location

49
15. Drag each connector type into its respective place.

Connector types:

LC Connector MTRJ Connector

SC Connector ST Connector

MTRJ Connector

ST Connector

LC Connector

SC Connector

50
PRACTICE EXAM C (QUESTIONS)
Performance-Based Questions

1. You are at a Windows 10 workstation and have a com-


mand prompt open. Type the command to view resource
record information on a particular DNS server.

C:\> ______________

2. Type the Windows command-line utility that produces


the following output.

C:\> ______________

51
3. You are working at a Linux command prompt. You need
to nd the name that is given to your computer and is at-
tached to the network. Type the command to obtain the
system hostname.

student@dojolab:~$ ______________

4. Type the command-line utility to delete the ARP cache


on your Windows workstation.

C:\> ______________

5. Type the Windows command-line utility that produces


the following output.

C:\> ______________
52
fi
6. You are working at a Linux command prompt. You need
to nd the A record from the website dojolab.org to trou-
bleshoot DNS-related issues. Type the command to display
the records from the dojolab DNS server.

student@dojolab:~$ ______________

7. You are at a Windows 10 workstation and have a com-


mand prompt open. Type the command that displays the
routing table on the local computer.

C:\> ______________

8. You are working at a Linux command prompt. You need


to capture and analyze packets from the ethernet inter-
face 0 using the tcpdump command. Type the command to
start capturing the packets.

student@dojolab:~$ ______________

53
fi
9. You are working on a Cisco Router. You are in User Exec
mode and you need to display the startup con guration to
troubleshoot an issue. Type the command to display the
startup con guration settings.

student@dojolab:~$ ______________

10. You are troubleshooting a faulty network. You need to


illustrate the route packets take through the inter-network
in order to identify the weak spot. Assuming you are work-
ing on a Windows environment, type the command to nd
where the packets are dropped.

C:\> ______________

11. Type the Windows command-line utility to view the ARP


table stored in memory.

C:\> ______________

12. Type the command to view the Internet Protocol (IP)


con guration on a Linux host.

student@dojolab:~$ ______________

54
fi
fi
fi
fi
13. Type the Windows command-line utility that produces
the following output.

C:\> ______________

14. You need to perform a nmap scan using the hostname


server1.dojolab.org to nd out all open ports, services and
MAC address on that system. Type the command to initiate
the scan.

student@dojolab:~$ ______________

55
fi
15. You need to verify the connection to 192.168.0.10 on
port 25 and the connection to 192.168.0.11 on port 80 with
the help of the telnet command. Type the Windows com-
mand-line utility to verify the connections.

C:\> ______________

C:\> ______________

56
PRACTICE EXAM C (ANSWERS)
Performance-Based Questions - Answers

1. You are at a Windows 10 workstation and have a com-


mand prompt open. Type the command to view resource
record information on a particular DNS server.

C:\> nslookup

The nslookup command displays information that you can use


to diagnose Domain Name System (DNS) infrastructure. Before
using this tool, you should be familiar with how DNS works. The
nslookup command-line tool is available only if you have in-
stalled the TCP/IP protocol.

The nslookup command-line tool has two modes: interactive


and noninteractive.

57
2. Type the Windows command-line utility that produces
the following output.

C:\> netstat

The netstat command displays active TCP connections, ports on


which the computer is listening, Ethernet statistics, the IP routing
table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and
IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over
IPv6 protocols). Used without parameters, this command displays
active TCP connections.

3. You are working at a Linux command prompt. You need


to nd the name that is given to your computer and is at-
tached to the network. Type the command to obtain the
system hostname.

student@dojolab:~$ hostname
58
fi
The hostname command in Linux is used to obtain the DNS (Do-
main Name System) name and set the system’s hostname or
NIS(Network Information System) domain name. A hostname is a
name that is given to a computer and is attached to the network.
Its main purpose is to uniquely identify over a network.

Example: We obtain the system hostname by just typing hostname


without any attributes.

4. Type the command-line utility to delete the ARP cache


on your Windows workstation.

C:\> arp -d

The arp -d command is for deleting cache entries, and by running it


with the asterisk wildcard, the command deletes all of the entries
in the cache.

59
5. Type the Windows command-line utility that produces
the following output.

C:\> ping 1.2.3.4

The ping command veri es IP-level connectivity to another TCP/IP


computer by sending Internet Control Message Protocol (ICMP)
echo Request messages. The receipt of corresponding echo Reply
messages are displayed, along with round-trip times. ping is the
primary TCP/IP command used to troubleshoot connectivity,
reachability, and name resolution. Used without parameters, this
command displays Help content.

You can also use this command to test both the computer name
and the IP address of the computer. If pinging the IP address is suc-
cessful, but pinging the computer name isn’t, you might have a
name resolution problem. In this case, make sure the computer
name you are specifying can be resolved through the local Hosts
le, by using Domain Name System (DNS) queries, or through Net-
BIOS name resolution techniques.

60
fi
fi
6. You are working at a Linux command prompt. You need
to nd the A record from the website dojolab.org to trou-
bleshoot DNS-related issues. Type the command to display
the records from the dojolab DNS server.

student@dojolab:~$ dig dojolab.org

The dig command stands for Domain Information Groper. It is used


for retrieving information about DNS name servers. It is basically
used by network administrators. It is used for verifying and trou-
bleshooting DNS problems and to perform DNS lookups.

7. You are at a Windows 10 workstation and have a com-


mand prompt open. Type the command that displays the
routing table on the local computer.

C:\> netstart -r

The netstat command is used to show network status. Traditionally,


it is used more for problem determination than for performance
measurement. However, the netstat command can be used to de-
termine the amount of tra c on the network to ascertain whether
performance problems are due to network congestion and can
display the routing table.

61
fi
ffi
8. You are working at a Linux command prompt. You need
to capture and analyze packets from the ethernet inter-
face 0 using the tcpdump command. Type the command to
start capturing the packets.

student@dojolab:~$ tcpdump -i eth0

The dig command stands for Domain Information Groper. It tcp-


dump is a most powerful and widely used command-line packets
sni er or package analyzer tool which is used to capture or lter
TCP/IP packets that are received or transferred over a network on
a speci c interface.

The command screen will scroll up until you interrupt and when we
execute the tcpdump command it will capture from all the inter-
faces, however with -i switch only captures from the desired inter-
face.

# tcpdump -i eth0

tcpdump: verbose output suppressed, use -v or -vv


for full protocol decode
listening on eth0, link-type EN10MB (Ethernet),
capture size 65535 bytes
11:33:31.976358 IP 172.16.25.126.ssh >
172.16.25.125.apwi-rxspooler: Flags [P.], seq
3500440357:3500440553, ack 3652628334, win 18760,
length 196
11:33:31.976603 IP 172.16.25.125.apwi-rxspooler >
172.16.25.126.ssh: Flags [.], ack 196, win 64487,
length 0

62
ff
fi
fi
11:33:31.977243 ARP, Request who-has tecmint.com
tell 172.16.25.126, length 28
11:33:31.977359 ARP, Reply tecmint.com is-at
00:14:5e:67:26:1d (oui Unknown), length 46
11:33:31.977367 IP 172.16.25.126.54807 > tecmint.-
com: 4240+ PTR? 125.25.16.172.in-addr.arpa. (44)
11:33:31.977599 IP tecmint.com >
172.16.25.126.54807: 4240 NXDomain 0/1/0 (121)
11:33:31.977742 IP 172.16.25.126.44519 > tecmint.-
com: 40988+ PTR? 126.25.16.172.in-addr.arpa. (44)
11:33:32.028747 IP 172.16.20.33.netbios-ns >
172.16.31.255.netbios-ns: NBT UDP PACKET(137):
QUERY; REQUEST; BROADCAST
11:33:32.112045 IP 172.16.21.153.netbios-ns >
172.16.31.255.netbios-ns: NBT UDP PACKET(137):
QUERY; REQUEST; BROADCAST
11:33:32.115606 IP 172.16.21.144.netbios-ns >
172.16.31.255.netbios-ns: NBT UDP PACKET(137):
QUERY; REQUEST; BROADCAST
11:33:32.156576 ARP, Request who-has 172.16.16.37
tell old-oraclehp1.midcorp.mid-day.com, length 46
11:33:32.348738 IP tecmint.com >
172.16.25.126.44519: 40988 NXDomain 0/1/0 (121)

9. You are working on a Cisco Router. You are in User Exec


mode and you need to display the startup con guration to
troubleshoot an issue. Type the command to display the
startup con guration settings.

student@dojolab:~$ show config

63
fi
fi
To display the startup con guration, enter the show con g
command in User Exec mode or Privileged Exec mode.

10. You are troubleshooting a faulty network. You need to


illustrate the route packets take through the inter-network
in order to identify the weak spot. Assuming you are work-
ing on a Windows environment, type the command to nd
where the packets are dropped.

C:\> tracert

The tracert diagnostic utility determines the route to a destination


by sending Internet Control Message Protocol (ICMP) echo packets
to the destination. In these packets, tracert uses varying IP Time-
To-Live (TTL) values. Because each router along the path is re-
quired to decrement the packet’s TTL by at least 1 before forward-
ing the packet, the TTL is e ectively a hop counter. When the TTL
on a packet reaches zero (0), the router sends an ICMP “Time Ex-
ceeded” message back to the source computer.

11. Type the Windows command-line utility to view the ARP


table stored in memory.

C:\> arp -a

64
ff
fi
fi
fi
Using the arp command allows you to display and modify the Ad-
dress Resolution Protocol (ARP) cache. An ARP cache is a simple
mapping of IP addresses to MAC addresses. Each time a comput-
er’s TCP/IP stack uses ARP to determine the Media Access Control
(MAC) address for an IP address, it records the mapping in the ARP
cache so that future ARP lookups go faster.

If you use the arp command without any parameters, you get a list
of the command’s parameters. To display the ARP cache entry for a
speci c IP address, use an -a switch followed by the IP address. For
example:

C:>arp -a 192.168.168.22
Interface: 192.168.168.21 --- 0x10004
Internet Address Physical Address Type
192.168.168.22 00-60-08-39-e5-a1 dynamic

You can display the complete ARP cache by using -a without speci-
fying an IP address, like this:

C:>arp -a
Interface: 192.168.168.21 --- 0x10004
Internet Address Physical Address Type
192.168.168.9 00-02-e3-16-e4-5d dynamic
192.168.168.10 00-50-04-17-66-90 dynamic
192.168.168.22 00-60-08-39-e5-a1 dynamic
192.168.168.254 00-40-10-18-42-49 dynamic

ARP is sometimes useful when diagnosing duplicate IP assign-


ments.

65
fi
12. Type the command to view the Internet Protocol (IP)
con guration on a Linux host.

student@dojolab:~$ ifconfig

The ifcon g (interface con guration) command is used to con g-


ure the kernel-resident network interfaces. It is used at the boot
time to set up the interfaces as necessary. After that, it is usually
used when needed during debugging or when you need system
tuning. Also, this command is used to assign the IP address and
netmask to an interface or to enable or disable a given interface.

13. Type the Windows command-line utility that produces


the following output.

C:\> tracert

The tracert diagnostic utility determines the route to a destination


by sending Internet Control Message Protocol (ICMP) echo packets
to the destination. In these packets, tracert uses varying IP Time-
66
fi
fi
fi
fi
To-Live (TTL) values. Because each router along the path is re-
quired to decrement the packet’s TTL by at least 1 before forward-
ing the packet, the TTL is e ectively a hop counter. When the TTL
on a packet reaches zero (0), the router sends an ICMP “Time Ex-
ceeded” message back to the source computer.

14. You need to perform a nmap scan using the hostname


server1.dojolab.org to nd out all open ports, services and
MAC address on that system. Type the command to initiate
the scan.

student@dojolab:~$ nmap server1.dojolab.org

The Nmap tool o ers various methods to scan a system. In this ex-
ample, we are performing a scan using the hostname server1.dojo-
lab.org to nd out all open ports, services and MAC address on the
system.

Starting Nmap 4.11 ( http://www.insecure.org/


nmap/ ) at 2021-11-11 15:42 EST
Interesting ports on server1.dojolab.org
(192.168.0.22):
Not shown: 1674 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
111/tcp open rpcbind
957/tcp open unknown
3306/tcp open mysql
8888/tcp open sun-answerbook

67
fi
ff
fi
ff
MAC Address: 08:00:27:D9:8E:D7 (Cadmus Computer
Systems)

Nmap finished: 1 IP address (1 host up) scanned in


0.415 seconds
You have new mail in /var/spool/mail/root

15. You need to verify the connection to 192.168.0.10 on


port 25 and the connection to 192.168.0.11 on port 80 with
the help of the telnet command. Type the Windows com-
mand-line utility to verify the connections.

C:\> telnet 192.168.0.10 25

C:\> telnet 192.168.0.11 80

One of the biggest perks of Telnet is with a simple command you


can test whether a port is open. Issuing the Telnet command telnet
[domainname or ip] [port] will allow you to test connectivity to a
remote host on the given port.
Put the IP address or domain name of the server you’re trying to
connect to in place of [domain name or ip], and replace the second
brackets with the port number on the remote machine, connection
to which you want to test.

For example, to verify connection to 192.168.0.10 on port 25, issue


the command:

telnet 192.168.0.10 25

68
Continue your journey on
dojolab.org

Online Test Bank


Register to gain one month of FREE access after activation to
the online interactive PBQs & Labs bank to help you study for
your CompTIA Security+ certi cation exam— included with
your purchase of this book! All of the domain-by-domain ques-
tions and the practice exams in this book are included in the
online test bank so you can practice in a timed and graded set-
ting.

Register and Access


the Online PBQs & Labs
To register your book and get access to the online test bank,
follow these steps:

1. Got to: https://dojolab.org/registration/

2. Complete the required registration information

3. Send your registered email address to info@dojolab.org

69
fi

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy