CompTIA Network+

Here you have the best CompTIA N10-006 practice exam questions

  • You have 686 total questions to study from
  • Each page has 5 questions, making a total of 138 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 1, 2025
  • This site is not affiliated with or endorsed by CompTIA.
Question 1 of 686
A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other.
Which of the following options would satisfy these requirements?
    Correct Answer: B

    The correct choice is to add a layer 3 switch and create a VLAN. VLANs (Virtual Local Area Networks) allow for logical segmentation of a network, where each VLAN acts as its own broadcast domain, thereby reducing broadcast traffic. A layer 3 switch is capable of routing between these VLANs, thus allowing different network segments to communicate with each other. While routers and layer 3 switches both handle inter-VLAN routing, a layer 3 switch is specifically designed for this purpose in a switched network environment.

Question 2 of 686
Which of the following network devices use ACLs to prevent unauthorized access into company systems?
    Correct Answer: B

Question 3 of 686
Which of the following is used to define how much bandwidth can be used by various protocols on the network?
    Correct Answer:

    Traffic shaping is used to define how much bandwidth can be allocated to different protocols on the network. By prioritizing certain types of traffic and delaying others, it ensures that the network bandwidth is used efficiently, optimizing the performance of critical applications.

Question 4 of 686
Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).
    Correct Answer: D, E

    To authenticate remote workers who connect from offsite, RADIUS and 802.1x are commonly used. RADIUS is a protocol that centralizes authentication, authorization, and accounting for users accessing a network. It is often employed by ISPs and enterprises to manage remote access. 802.1x is a standard for network access control that provides an authentication mechanism for devices wishing to connect to the network, ensuring that only authenticated clients can access the network resources. These two options complement each other in providing secure authentication for remote users.

Question 5 of 686
Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?
    Correct Answer: C