Network+
The CompTIA Network+ (N10-008) course is designed to provide a comprehensive understanding of networking and network technologies. It serves as an introduction to the foundational concepts of networking. The course encompasses a wide range of topics, including network architectures, network media and topologies, network devices, security measures, TCP/IP configuration, and various networking protocols like Ethernet, 802.11 Wireless, SONET/SDH, WiMAX, and IPv6.
By completing this assessment, you can gain the skills to design and configure simple networks, as well as acquire knowledge about the installation and support of basic network technologies.
Take this assessment to gauge your familiarity with these topics.
Click the Rewards tab for eligibility requirements.
Read the FAQs tab carefully for Instructions before beginning the assessment.
NYXPoints are used to generate the Leaderboard (coming soon). They are awarded for achieving a certain score.
- 200 nyxpoints for a passing score of 80% or more
- 300 nyxpoints for a perfect score of 100%
- Didn’t pass? You still get 30 nyxpoints for attempting the assesment
IMPORTANT instructions for taking the Assessment
- The timer starts when you click Start Assessment
- DO NOT refresh/reload the page or use the back button to navigate away from the page.
- Navigating away from the assessment page DOES NOT stop/pause the timer and the will restart the assessment when you come back to it. The answers are NOT saved.
General
- There are NO pre-requisites to take this assessment. Take this assessment even if you are completely new to Linux.
- The assessment is completely FREE.
- Preferably take it in a closed book mode.
- DO NOT copy/paste, share or upload questions elsewhere.
Eligible Rewards
300 NyxCoins*
* NyxCoins vary on score
Assessment Summary
0 of 30 Questions completed
Questions:
Information
You have already completed the assessment before. Hence you can not start it again.
Assessment is loading…
You must sign in or sign up to start the assessment.
You must first complete the following:
Results
Results
0 of 30 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 30
1. Question
How would you break up broadcast domains in a Layer 2 switched network?
CorrectIncorrect -
Question 2 of 30
2. Question
What is the purpose of the Spanning Tree Protocol by default?
CorrectIncorrect -
Question 3 of 30
3. Question
Which of the following describes a VLAN?
CorrectIncorrect -
Question 4 of 30
4. Question
Select the correct one from below
CorrectIncorrect -
Question 5 of 30
5. Question
Layer 2 of the OSI model is named ________
CorrectIncorrect -
Question 6 of 30
6. Question
Which of the following RG rating of coax is used for cable modems?
CorrectIncorrect -
Question 7 of 30
7. Question
What are the two ways to help secure your wireless APs from unauthorized access?
CorrectIncorrect -
Question 8 of 30
8. Question
IPSec works at which layer of the OSI model?
CorrectIncorrect -
Question 9 of 30
9. Question
Which of the following services would you use if you want your users to log in and authenticate before they can access your network?
CorrectIncorrect -
Question 10 of 30
10. Question
Someone calls you and asks for your social security number because your health service record has to be updated. You give them this information and later find out that it was a scam. What type of attack is this?
CorrectIncorrect -
Question 11 of 30
11. Question
Host A sends a SYN packet to Host B. What is the next packet that host B will send as response?
CorrectIncorrect -
Question 12 of 30
12. Question
Which of protocols given below can be classified as WAN protocols or technologies? (Choose all that apply.)
CorrectIncorrect -
Question 13 of 30
13. Question
Which layer of OSI Model is responsible for end-to-end delivery of data segments?
CorrectIncorrect -
Question 14 of 30
14. Question
What is the range of IPv4 addresses that we can use to configure multicasting?
CorrectIncorrect -
Question 15 of 30
15. Question
What addresses are a part of private IP address range referred to as RFC 1918?
CorrectIncorrect -
Question 16 of 30
16. Question
What is the definition of zero trust in security?
CorrectIncorrect -
Question 17 of 30
17. Question
What default port number corresponds to secure web access in network?
CorrectIncorrect -
Question 18 of 30
18. Question
What is the subnetwork address of a host with IP address 200.10.5.168/28?
CorrectIncorrect -
Question 19 of 30
19. Question
What is considered as three pillars of Information Security triad?
CorrectIncorrect -
Question 20 of 30
20. Question
Which of the following are the correct sequence of steps for DHCP process?
CorrectIncorrect -
Question 21 of 30
21. Question
Which of the protocols given below is an example of a hybrid/advanced distance vector routing protocol?
CorrectIncorrect -
Question 22 of 30
22. Question
Which ipconfig command option/switch will provide the most comprehensive information about IP configuration for a desktop/server?
CorrectIncorrect -
Question 23 of 30
23. Question
Which is the following is NOT correct category for Unshielded Twisted Pair cables?
CorrectIncorrect -
Question 24 of 30
24. Question
Which of the following is NOT a correct combination for using cross-over cable ?
CorrectIncorrect -
Question 25 of 30
25. Question
Which frequency range does the wireless standard IEEE 802.11g work/run on?
CorrectIncorrect -
Question 26 of 30
26. Question
To ensure that data is secure during transit, which practice should be followed by organizations?
CorrectIncorrect -
Question 27 of 30
27. Question
Which of the following is NOT a correct classification of access control list (ACL)?
CorrectIncorrect -
Question 28 of 30
28. Question
Which Data-link layer protocol can provide a loop-free layer-2 topology/network?
CorrectIncorrect -
Question 29 of 30
29. Question
By default, the administrative distance (AD) value used for OSPF is ______?
CorrectIncorrect -
Question 30 of 30
30. Question
Which of the following subnet should you use on point-to-point WAN links to reduce wastage of IP addresses?
CorrectIncorrect