DojoLab Network Premium Edition
DojoLab Network Premium Edition
CompTIA
N10-008 Network+
Practice Exams
PBQs & Labs
by DojoLab
Contents
3
https://www.dojolab.org
All rights reserved. No part of this book may be reproduced or
transmitted in any form or by any means, electronic or mechan-
ical, including photocopying, recording, or by any information
storage and retrieval system, without written permission from
the publisher.
Trademark Acknowledgments
All product names and trademarks are the property of their re-
spective owners, and are in no way associated or a liated with
DojoLab Ltd.
4
fi
ffi
The CompTIA N10-008 Network+ Certi cation
5
fi
fi
fi
fi
fi
fi
PRACTICE EXAM A (QUESTIONS)
Performance-Based Questions
Networking tools:
Cable stripper Multimeter
Cable tester Crimper
Select a
networking tool
Select a
networking tool
Select a
networking tool
Select a
networking tool
2. Drag and drop the various 802.11 wireless standards into the
frequencies of its use.
Wireless standards:
Protocols:
SFTP POP3
NTP IMAP
22 Select a protocol
7
Network types:
LAN WAN
PAN MAN
fi
5. Drag each port to the protocol of its use.
Ports:
67 69
80 22
Wireless standards:
Devices:
10
Cloud models:
On-demand access to a
complete, ready-to-use,
cloud-hosted platform for
Select a wireless standard
developing, running,
maintaining, and managing
applications
On-demand access to cloud-
hosted physical and virtual
Select a wireless standard
servers, storage, and
networking
On-demand access to ready-
to-use, cloud-hosted applica- Select a wireless standard
tion software
C:\> ______________
10. Next to each port number, type the protocol of its use.
11
fi
fi
1. Port 21 - ______________
2. Port 23 - ______________
3. Port 25 - ______________
4. Port 53 - ______________
Networking devices:
Router Hub
Switch Repeater
Select a device
Select a device
Select a device
Select a device
12
SSID: ______________
13
fi
fi
fi
fi
ffi
Networking devices:
Select a device
Select a device
Select a device
Select a device
14
14. Drag and drop the various 802.11 wireless standards into
the frequencies of its use.
Wireless standards:
C:\> ______________
15
fi
PRACTICE EXAM A (ANSWERS)
Performance-Based Questions - Answers
Networking tools:
Cable tester
Crimper
Cable stripper
Multimeter
16
2. Drag and drop the various 802.11 wireless standards into the
frequencies of its use.
Wireless standards:
2.4GHz 802.11g
5 GHz 802.11a
17
Protocols:
SFTP POP3
NTP IMAP
143 IMAP
123 NTP
110 POP3
22 SFTP
18
Network types:
LAN WAN
PAN MAN
19
fi
5. Drag each port to the protocol of its use.
Ports:
67 69
80 22
HTTP 80
TFTP 69
DHCP 67
SSH 22
20
Wireless standards:
Up to 54Mbps 802.11a
Up to 11Mbps 802.11b
Up to 600Mbps 802.11n
21
Devices:
DEVICE A
DEVICE B
DEVICE C
22
8. Match each cloud model to its corresponding de nition.
Cloud models:
On-demand access to a
complete, ready-to-use,
cloud-hosted platform for
PaaS
developing, running,
maintaining, and managing
applications
On-demand access to cloud-
hosted physical and virtual
IaaS
servers, storage, and
networking
On-demand access to ready-
to-use, cloud-hosted applica- SaaS
tion software
23
fi
Ping command can test whether your computer can reach an-
other device—like your router—on your local network, or
whether it can reach a device on the Internet. This can help you
determine if a network problem is somewhere on your local
network, or somewhere beyond. The time it takes packets to
return to you can help you identify a slow connection, or if
you’re experiencing packet loss.
10. Next to each port number, type the protocol of its use.
1. Port 21 - FTP
2. Port 23 - Telnet
3. Port 25 - SMTP
4. Port 53 - DNS
24
fi
Networking devices:
Router Hub
Switch Repeater
Hub
Repeater
Router
Switch
25
SSID: Veronica-Wireless
Network ID: 192.168.1.0
Subnet Mask: 255.255.255.0
Wireless Channel: 1
From the Network ID 192.168.1.0/24, you can easily nd out that the
Subnet mask is 255.255.255.0.
26
fi
fi
fi
fi
ffi
fi
In the 2.4 GHz band, 1, 6, and 11 are the only non-overlapping chan-
nels. The channels that are already in use are 6 and 11. So, channel 1
is available for use.
Networking devices:
RG-59
RS-232
RJ-11
RJ-45
27
14. Drag and drop the various 802.11 wireless standards into
the frequencies of its use.
Wireless standards:
5 GHz 802.11ac
28
C:\> ipconfig/all
Parame Description
ter
29
fi
fi
fi
fi
fi
1. Match the network topology to the description.
Network topologies:
30
Networking devices:
31
Pin numbers:
32
1. IMAP - ______________
2. LDAP - ______________
3. HTTPS - ______________
4. SMTP TLS - ______________
33
34
fi
9. Match the pin numbers with their wire colors to create
the 568B Standard.
Pin numbers:
35
10. Sort the layers (from layer 1 to layer 7) to form the OSI
Model.
Data link
Network
Physical
Transport
Application
Session
Presentation
11. Fill up the table by typing the class, the network IDs, and
the network broadcast from the following IP addresses.
Network
IP Address Class Network ID
broadcast
2.3.4.1
130.1.2.3
209.7.8.9
36
12. Drag each IPv4 message to the description of its use.
IPv4 messages:
R1# ______________
37
14. Drag each social engineering attack to the description
of its use.
Social engineering attacks:
38
SC Connector ST Connector
39
40
Administrative distance is the feature that routers use in order to
select the best path when there are at least two di erent routes to
the same destination from two di erent routing protocols. Admin-
istrative distance de nes the reliability of a routing protocol. Each
routing protocol is prioritized in order of most to least reliable (be-
lievable) with the help of an administrative distance value.
Connected 0
Static 1
IGRP 100
OSPF 110
IS-IS 115
RIP 120
Unusable 250
41
fi
ff
ff
Networking devices:
42
Pin numbers:
0 0 0
43
10000000 128 1
11000000 192 2
11100000 224 3
11110000 240 4
11111000 248 5
11111100 252 6
11111110 254 7
11111111 255 8
23.1.1.0 255.0.0.0
181.1.1.2 255.255.0.0
195.2.4.5 255.255.255.0
44
7. Next to each protocol type the port number of its use.
1. IMAP - 143
2. LDAP - 389
3. HTTPS - 443
4. SMTP TLS - 587
45
fi
9. Match the pin numbers with their wire colors to create
the 568B Standard.
Pin numbers:
10. Sort the layers (from layer 1 to layer 7) to form the OSI
Model.
1. Physical
2. Data link
3. Network
4. Transport
5. Session
6. Presentation
7. Application
46
11. Fill up the table by typing the class, the network IDs, and
the network broadcast from the following IP addresses.
Network
IP Address Class Network ID
broadcast
47
48
14. Drag each social engineering attack to the description
of its use.
Social engineering attacks:
49
SC Connector ST Connector
MTRJ Connector
ST Connector
LC Connector
SC Connector
50
C:\> ______________
C:\> ______________
51
student@dojolab:~$ ______________
C:\> ______________
C:\> ______________
52
fi
student@dojolab:~$ ______________
C:\> ______________
student@dojolab:~$ ______________
53
fi
student@dojolab:~$ ______________
C:\> ______________
C:\> ______________
student@dojolab:~$ ______________
54
fi
fi
fi
fi
13. Type the Windows command-line utility that produces
the following output.
C:\> ______________
student@dojolab:~$ ______________
55
fi
15. You need to verify the connection to 192.168.0.10 on
port 25 and the connection to 192.168.0.11 on port 80 with
the help of the telnet command. Type the Windows com-
mand-line utility to verify the connections.
C:\> ______________
C:\> ______________
56
C:\> nslookup
57
C:\> netstat
student@dojolab:~$ hostname
58
fi
C:\> arp -d
59
You can also use this command to test both the computer name
and the IP address of the computer. If pinging the IP address is suc-
cessful, but pinging the computer name isn’t, you might have a
name resolution problem. In this case, make sure the computer
name you are specifying can be resolved through the local Hosts
le, by using Domain Name System (DNS) queries, or through Net-
BIOS name resolution techniques.
60
fi
fi
C:\> netstart -r
61
fi
ffi
The command screen will scroll up until you interrupt and when we
execute the tcpdump command it will capture from all the inter-
faces, however with -i switch only captures from the desired inter-
face.
# tcpdump -i eth0
62
ff
fi
fi
11:33:31.977243 ARP, Request who-has tecmint.com
tell 172.16.25.126, length 28
11:33:31.977359 ARP, Reply tecmint.com is-at
00:14:5e:67:26:1d (oui Unknown), length 46
11:33:31.977367 IP 172.16.25.126.54807 > tecmint.-
com: 4240+ PTR? 125.25.16.172.in-addr.arpa. (44)
11:33:31.977599 IP tecmint.com >
172.16.25.126.54807: 4240 NXDomain 0/1/0 (121)
11:33:31.977742 IP 172.16.25.126.44519 > tecmint.-
com: 40988+ PTR? 126.25.16.172.in-addr.arpa. (44)
11:33:32.028747 IP 172.16.20.33.netbios-ns >
172.16.31.255.netbios-ns: NBT UDP PACKET(137):
QUERY; REQUEST; BROADCAST
11:33:32.112045 IP 172.16.21.153.netbios-ns >
172.16.31.255.netbios-ns: NBT UDP PACKET(137):
QUERY; REQUEST; BROADCAST
11:33:32.115606 IP 172.16.21.144.netbios-ns >
172.16.31.255.netbios-ns: NBT UDP PACKET(137):
QUERY; REQUEST; BROADCAST
11:33:32.156576 ARP, Request who-has 172.16.16.37
tell old-oraclehp1.midcorp.mid-day.com, length 46
11:33:32.348738 IP tecmint.com >
172.16.25.126.44519: 40988 NXDomain 0/1/0 (121)
63
fi
fi
To display the startup con guration, enter the show con g
command in User Exec mode or Privileged Exec mode.
C:\> tracert
C:\> arp -a
64
ff
fi
fi
fi
Using the arp command allows you to display and modify the Ad-
dress Resolution Protocol (ARP) cache. An ARP cache is a simple
mapping of IP addresses to MAC addresses. Each time a comput-
er’s TCP/IP stack uses ARP to determine the Media Access Control
(MAC) address for an IP address, it records the mapping in the ARP
cache so that future ARP lookups go faster.
C:>arp -a 192.168.168.22
Interface: 192.168.168.21 --- 0x10004
Internet Address Physical Address Type
192.168.168.22 00-60-08-39-e5-a1 dynamic
C:>arp -a
Interface: 192.168.168.21 --- 0x10004
Internet Address Physical Address Type
192.168.168.9 00-02-e3-16-e4-5d dynamic
192.168.168.10 00-50-04-17-66-90 dynamic
192.168.168.22 00-60-08-39-e5-a1 dynamic
192.168.168.254 00-40-10-18-42-49 dynamic
65
fi
student@dojolab:~$ ifconfig
C:\> tracert
fi
fi
To-Live (TTL) values. Because each router along the path is re-
quired to decrement the packet’s TTL by at least 1 before forward-
ing the packet, the TTL is e ectively a hop counter. When the TTL
on a packet reaches zero (0), the router sends an ICMP “Time Ex-
ceeded” message back to the source computer.
The Nmap tool o ers various methods to scan a system. In this ex-
ample, we are performing a scan using the hostname server1.dojo-
lab.org to nd out all open ports, services and MAC address on the
system.
67
fi
ff
fi
ff
telnet 192.168.0.10 25
68
69
fi