COMPTIA NETWORK+ (N10-008)
CERTIFICATION EXAM ACTUAL PREP
QUESTIONS AND WELL REVISED ANSWERS -
LATEST AND COMPLETE UPDATE WITH
VERIFIED SOLUTIONS – ASSURES PASS
1. Which protocol is primarily used to assign IP addresses automatically to
devices on a network?
A. DNS
B. FTP
C. DHCP
D. SNMP
Answer: C
Rationale: DHCP (Dynamic Host Configuration Protocol) automatically
assigns IP addresses and other network configuration settings to devices.
2. What is the purpose of a VLAN?
A. To connect different networks
B. To monitor network traffic
C. To segment a network logically
D. To encrypt data
Answer: C
Rationale: A VLAN (Virtual LAN) separates a physical network into multiple
logical networks, improving traffic management and security.
3. Which layer of the OSI model is responsible for logical addressing?
A. Physical
,2|Page
B. Network
C. Data Link
D. Transport
Answer: B
Rationale: The Network layer handles logical addressing such as IP
addresses and routing between networks.
4. What device is used to forward traffic between different IP networks?
A. Switch
B. Hub
C. Router
D. Access Point
Answer: C
Rationale: Routers connect different networks and make forwarding
decisions based on IP addresses.
5. Which port does HTTPS use by default?
A. 20
B. 23
C. 80
D. 443
Answer: D
Rationale: HTTPS (Hypertext Transfer Protocol Secure) uses port 443 for
secure web traffic.
6. Which of the following topologies uses a single central device to connect all
devices?
A. Ring
B. Bus
C. Star
,3|Page
D. Mesh
Answer: C
Rationale: In a star topology, all devices connect to a central switch or hub,
making management easier.
7. What is the maximum length of a Cat5e cable for 1000BASE-T?
A. 10 meters
B. 50 meters
C. 100 meters
D. 100 meters
Answer: D
Rationale: Ethernet standards recommend a maximum cable length of 100
meters for Cat5e to ensure reliable data transmission.
8. Which protocol resolves domain names to IP addresses?
A. SMTP
B. DNS
C. DHCP
D. SNMP
Answer: B
Rationale: DNS (Domain Name System) translates human-readable domain
names into IP addresses.
9. What type of attack involves intercepting communication between two
devices?
A. Phishing
B. DDoS
C. Man-in-the-middle
D. Spoofing
Answer: C
, 4|Page
Rationale: A man-in-the-middle attack intercepts or alters communication
between two parties without their knowledge.
10.Which device operates at the Data Link layer of the OSI model?
A. Router
B. Switch
C. Hub
D. Firewall
Answer: B
Rationale: Switches forward traffic based on MAC addresses and operate
primarily at Layer 2.
11.Which type of WAN connection uses dedicated leased lines?
A. MPLS
B. DSL
C. Cable
D. T1
Answer: D
Rationale: T1 lines are dedicated leased lines providing consistent
bandwidth for WAN connections.
12.What is the purpose of a firewall?
A. To provide IP addresses
B. To forward packets between networks
C. To filter traffic based on rules
D. To encrypt data
Answer: C
Rationale: Firewalls control traffic entering and leaving a network based on
predefined security rules.