00:15:00

Free CompTIA Network+ N10-009 Practice Test

Prepare for the CompTIA Network+ N10-009 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Change
Question 1 of 15

A company with operations across remote areas globally needs real-time data sharing and communication amongst its sites. What type of connectivity would best serve this requirement, considering the geographical challenges?

  • 4G LTE Cellular network

  • Satellite connectivity

  • RF systems

  • Dedicated fiber-optic cables

Question 2 of 15

A network administrator observes that two departments, which are supposed to operate on separate network segments, are unexpectedly able to interact with each other. Upon inspection, it is found that several devices meant for secure departmental communication are wrongly grouped with general office network traffic. What could be the most probable cause of this configuration error?

  • Configuration errors in the switch port settings.

  • A loop in the routing configuration causing traffic misdirection.

  • Incorrect zone records maintained by the DNS server.

  • Misconfigurations in the DHCP server settings.

Question 3 of 15

A network administrator notices that a switch port, which connects to a server, is no longer active and upon checking, finds that the port has been put into an 'error disabled' state. What is the MOST likely cause for this state?

  • The switch experienced a temperature anomaly exceeding operational thresholds.

  • The DHCP server has run out of IP addresses to assign to clients.

  • There was an incorrect cable type used between the server and the switch.

  • The port security settings have been violated, such as exceeding the maximum number of allowed MAC addresses.

Question 4 of 15

When ensuring physical security of a server room, which type of lock is most effective at limiting access?

  • Combination locks

  • Traditional key locks

  • Biometric locks

  • Keypad locks

Question 5 of 15

Your company has implemented a new content filtering policy which includes blocking access to specific harmful websites known for malware distribution. As an IT administrator, you notice that users are unable to connect to reputable news sites that occasionally include user-generated content. What is the most probable explanation for this issue?

  • Content filtering rules are inadvertently blocking these sites due to their allowance of user-generated content.

  • The Internet bandwidth has been exceeded for the month leading to a preventive shutdown of high traffic sites.

  • A Distributed Denial-of-Service (DDoS) attack is currently preventing access to these sites.

  • The web filtering hardware is malfunctioning and randomly blocking websites.

Question 6 of 15

Encrypting data while it is being transmitted over the internet ensures that the data remains confidential if intercepted.

  • False

  • True

Question 7 of 15

A network administrator detects that a Windows workstation is unable to reach other systems within the same segment. Which method should be used to confirm if the workstation's network address correctly correlates to its hardware address?

  • Checking the complete network configuration with ifconfig

  • Use shutdown /clear /force to restart the device and wipe any cached network information

  • Examining the routing table on the router using show ip route

  • Viewing the ARP cache with the arp -a command

Question 8 of 15

In a high-security data center, management is reviewing options to enhance the security of the server room entrance. They are seeking a solution that drastically minimizes the risk of unauthorized entry due to duplicated or stolen access credentials. Which locking system should they implement?

  • Biometric locks

  • Key locks

  • Numerical keypad systems

  • Keycard systems

  • Electronic keys

Question 9 of 15

What typically causes an area within a wireless network environment to have a weak signal or no connectivity?

  • Use of mismatched wireless standards

  • Placement of the wireless access points too far apart

  • Incorrect subnet mask configuration

  • High network traffic

Question 10 of 15

Which metric in a disaster recovery plan is crucial to determine the acceptable downtime for critical systems before significant operational impact occurs?

  • Recovery Time Objective (RTO)

  • Mean Time to Repair (MTTR)

  • Mean Time Between Failures (MTBF)

  • Recovery Point Objective (RPO)

Question 11 of 15

SSH is exclusively used for remote shell access and file transfers between a client and a server.

  • True

  • False

Question 12 of 15

An IT administrator is setting up a web server for a company's internal site where financial reports will be shared. The administrator must ensure encrypted connections for this site. Which protocol and port should be correctly configured on the server to meet this requirement?

  • FTP on port 21

  • HTTPS on port 443

  • HTTP on port 80

  • SMTP on port 25

Question 13 of 15

A network administrator needs to ensure that a critical server consistently maintains the same network address from the server responsible for dynamically assigning addresses to avoid disruptions in connectivity. Which of the following methods is the BEST solution to meet this requirement?

  • Create a reservation for the server's MAC address on the dynamic address assignment server.

  • Adjust the pool of available addresses to set aside certain addresses.

  • Conduct a capacity test on the network address assignment abilities of the server.

  • Manually set a network address on the server within the assignable range.

Question 14 of 15

Is the IP address 192.168.1.1 as defined by RFC 1918 designated for public Internet usage?

  • Yes

  • No

Question 15 of 15

When troubleshooting a network issue, a technician decides to employ a bottom-to-top approach using the OSI model. Which layer would they start their troubleshooting from?

  • Transport layer

  • Physical layer

  • Network layer

  • Application layer