00:20:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

CompTIA Network+ N10-009 (V9) Logo
  • Free CompTIA Network+ N10-009 (V9) Practice Test

  • 20 Questions
  • Unlimited
  • Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 20

Which of the following measures best supports the integrity component of the CIA triad, ensuring that data remains unaltered during transmission?

  • Implementing robust firewall rules to regulate network traffic

  • Encrypting data using robust encryption algorithms

  • Using hash functions to verify the data integrity

  • Enforcing multi-factor authentication for data access

Question 2 of 20

Which feature best identifies the principal function of the Authentication Header (AH) in IPsec?

  • It provides high-speed transmission of IP packets.

  • It ensures integrity and authentication of IP packets.

  • It encrypts data payload in each IP packet.

  • It optimizes network traffic by prioritizing data packets.

Question 3 of 20

Your company is expanding its internal data center setup, which includes multiple servers that handle sensitive information. These servers require configuration to ensure they are isolated from direct internet access. What type of network address should be assigned to maintain their inaccessibility from the global web?

  • APIPA addresses

  • Externally routable RFC 1918 addresses

  • Public network addresses

  • Private network addresses

Question 4 of 20

A network administrator at a large organization notices a rapid increase in the number of devices needing network access, pushing the network's capacity limits. Which solution best addresses this scenario to prevent running out of network addresses?

  • Applying more stringent subnetting strategies

  • Using Network Address Translation

  • Assigning only private address ranges within the network

  • Implementing IPv6 addressing to expand the network address space

Question 5 of 20

A network engineer needs to update the firmware of several low-storage network devices in a resource-constrained environment. The devices do not require secure file transfers. Which protocol is the most suitable for performing these updates?

  • Secure File Transfer Protocol (SFTP)

  • File Transfer Protocol (FTP)

  • Hypertext Transfer Protocol (HTTP)

  • Trivial File Transfer Protocol (TFTP)

Question 6 of 20

Your company recently implemented a new network monitoring system. As the network administrator, you are responsible for establishing baseline metrics for network performance. Which of the following metrics would be MOST appropriate to use as a baseline metric?

  • Network uptime percentage

  • Packet loss percentage

  • Average CPU usage of network devices

  • Number of active user connections

Question 7 of 20

A company is negotiating a new contract with an Internet Service Provider (ISP) for increased bandwidth and improved uptime. What aspect of the service-level agreement (SLA) should be prioritized to ensure that network downtime impacts are minimized?

  • Early termination rights

  • 24/7 customer support

  • Disaster recovery options

  • Network uptime commitment

Question 8 of 20

What is the primary purpose of implementing link aggregation in a network environment?

  • To increase bandwidth and provide redundancy by combining multiple network links into a single logical link

  • To prevent IP address conflicts between devices on the same network

  • To segment network traffic for security and performance enhancement

  • To act as a traffic handler that determines the most efficient data paths

Question 9 of 20

What best describes static routing in network configurations?

  • Routes are automatically updated based on network traffic and topology changes

  • Routes are manually configured and updated by a network administrator

  • Routes use bandwidth and delay statistics among other factors to determine the best path

  • Routing decisions are made based on the real-time analysis of the network’s state

Question 10 of 20

What is typically the goal of an unauthorized server that assigns network configurations to clients?

  • To increase network efficiency by providing backup configuration services

  • To filter and secure network traffic

  • To disrupt network operations by issuing incorrect network information

  • To monitor network performance and traffic

Question 11 of 20

Which network topology combines elements from multiple different topologies to optimize performance and reliability?

  • Star topology

  • Hybrid topology

  • Mesh topology

  • Point-to-point topology

Question 12 of 20

A company's website suddenly experiences an inordinate amount of traffic, causing it to respond exceedingly slowly or go offline entirely. What type of attack is most likely occurring?

  • MAC flooding

  • ARP poisoning

  • Denial-of-Service (DoS) attack

  • Rogue AP

Question 13 of 20

A network administrator needs to integrate several third-party monitoring tools with the company's proprietary network management system to enable automated data exchange and control. Which of the following would be the BEST option to accomplish this deep integration?

  • Utilizing the APIs provided by the network management system

  • Using a standard GUI for manual data entry

  • Establishing a Syslog server to collect network logs

  • Configuring SNMP traps on network devices

Question 14 of 20

A company's disaster recovery team meets in a conference room to walk through the procedures of a disaster recovery plan after a simulated server failure. The team discusses their roles and the expected sequence of events without using any actual equipment or relocating to a backup site. Which of the following DR concepts does this scenario describe?

  • Hot site cutover

  • RPO validation

  • Full-scale exercise

  • Tabletop exercise

Question 15 of 20

A network administrator is setting up a system to streamline the deployment of repeated tasks across multiple devices in a network. Which of the following options is the BEST solution to achieve this with a focus on infrastructure as code?

  • Upgrading device firmware manually

  • Utilizing network playbooks to automate repeated tasks

  • Increasing bandwidth capacity

  • Implementing a strict network policy

Question 16 of 20

A company is redesigning their data center network architecture to reduce latency and enhance redundancy for handling large volumes of internal traffic. Which topology should they implement to best meet these requirements?

  • Spine and leaf

  • Star

  • Mesh

  • Point to point

Question 17 of 20

A network administrator is planning to update the configurations on several critical network devices. To adhere to best practices in configuration management, what is the most important action that should be performed before applying the new configurations?

  • Increase the network monitoring level

  • Make notes of current performance metrics

  • Back up the current configurations

  • Inform the IT department about the change

Question 18 of 20

A network administrator is reviewing performance metrics of a corporate network and notices that during peak usage times, there is a significant slowdown in data transfer rates between the database server and client computers. The administrator suspects a potential bottleneck in the network. What is the most effective initial action to confirm and locate the bottleneck?

  • View system logs on servers for error messages

  • Replace older network cables with Category 6 cables

  • Immediately implement Quality of Service (QoS) configurations

  • Analyze utilization statistics on network switches

Question 19 of 20

A network administrator is setting up access control for highly sensitive financial records that should be accessible only to the company's executive team. Which of the following methods would be the most appropriate to enforce strict access based on predefined permissions and roles?

  • Discretionary Access Control (DAC)

  • Mandatory Access Control (MAC)

  • Attribute-Based Access Control (ABAC)

  • Role-Based Access Control (RBAC)

Question 20 of 20

A company's IT department noticed suspicious activity indicating that an external party might have unauthorized access to network resources. The IT staff observed unusual outbound traffic patterns, particularly large amounts of data being sent to unfamiliar IP addresses. Which type of network threat is most likely occurring in this scenario?

  • Phishing

  • ARP spoofing

  • Rogue AP

  • Data exfiltration