Eligibility Candidates MUST have:
An active Network+ CE certification earned by passing exam N10-005 or earlier.
Received an email from CompTIA containing a Private Access Code (PAC).
The CompTIA Network+ Recertification Exam covers these domains:
1.0 Network Architecture (17% of total)
2.0 Network Operations (15% of total)
3.0 Network Security (20% of total)
4.0 Troubleshooting (28% of total)
5.0 Industry standards, practices, and network theory (20% of total)
Number of Questions 45
Type of Questions Multiple choice questions (single and multiple response)
Length of Test 75 Minutes
Passing Score 720 (on a scale of 100-900)
Only candidates with an active Network+ CE certification will receive CEU credit.
Passing the exam will automatically renew your existing Network+ CE. Please allow 1-3 days for your record to be updated.
The CompTIA Network
Re certification Exam is one way for CompTIA certified professionals to keep their Network+ certification active. A CompTIA Network+ certification earned on or after January 1st, 2011 is valid for three years from the date the certification was earned. The certification must be renewed within three years in order for the individual to remain certified. To remain certified, individuals may:
Re-take (and pass) the current certification exam (N10-006)
Participate in continuing education activities
Take (and pass) the Network+ recertification exam (RC0-N06)
The CompTIA Network+ Recertification Exam RC0-N06 bridges the competencies measured by the Network+ N10-005 series and the N10-006 series. The exam (RC0-N06) blueprint includes the objectives new to the N10-006 series and also assesses the highest weighted competencies that appear on the exam (i.e., the knowledge and skills rated by SMEs as most relevant for on-the-job -performance).
NOTE: Availability of RC0-N06 is LIMITED TO THOSE who have kept their Network+ certification active and have not taken and passed the current N10-006 series exam.
CompTIA Network+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives. The following CompTIA Network+ Recertification RC0-N06 exam objectives result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an entry-level IT technical support professional.
This examination blueprint includes domain weighting, test objectives, and example content. Example topics and concepts are included to clarify the test objectives and should not be construed as a
comprehensive listing of all the content of this examination.
Candidates are encouraged to use this document to guide their studies. The table below lists the domains measured by this examination and the extent to which they are represented. The CompTIA Network+ RC0-N06 exam is based on these objectives
QUESTION 1 – (Topic 1)
A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?
The loopback address is a special IP address that is designated for the software loopback interface of a computer. The loopback interface has no hardware associated with it, and it
is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which willpoint back to the computer’s TCP/IP network configuration.
In IPv4, the loopback address is 127.0.0.1.
In IPv6, the loopback address is 0:0:0:0:0:0:0:1, more commonly notated as follows. ::1
QUESTION 2 – (Topic 1)
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?
B. Helper addresses
A reservation is used in DHCP to ensure that a computer always receives the same IP address. To create a reservation, you need to know the hardware MAC address ofthe network interface card that should receive the IP address.
For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always get 192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address to configure reservation.
QUESTION 3 – (Topic 1)
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?
An IPv4 addressconsists bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address and from that, we can calculate how many bits are used for the host addresses.
In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for network addressing and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n – 2. The “n” in the host’s formula represents the number of bits used for host addressing. If we apply the formula (22 – 2), a /30 subnet mask will provide 2 IP addresses.
QUESTION 4 – (Topic 1)
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?
A. Multilayer switch
B. Access point
C. Analog modem
D. DOCSIS modem
Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By today’s standards, analog modems are very slow typically offering a maximum bandwidth Kbps.
An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computerto an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer.
An analog modem uses an RJ-11 connector to connect to a phone line (POTS)in the same way a phone does.
QUESTION 5 – (Topic 1)
A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?
APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is unavailable.
When a client computer configured to use DHCP boots up, it first looks for a DHCP server to provide the client with IP address and subnet mask. If the client is unable to contact a DHCP server, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The client also configures itself with a default class Bsubnet mask .255.0.0. The client will use the self-configured IP address until a DHCP server becomes available.
QUESTION 6 – (Topic 1)
A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?
Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite being called a Ring topology, the ring is logical and the physical network structure often forms a ‘star’ topology with all computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before it transmits to the next node. Therefore, although the cables are physically connected in a star, the data path takes the form of a ring. If any computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment.
To ensure that the computers need to wait to talk on the network to avoid congestions, a Token Ring network uses a ‘token’. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data beforereleasing the token. Only a computer in possession of the token can transmit data onto the network.