00:20:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

CompTIA Network+ N10-009 (V9) Logo
  • Free CompTIA Network+ N10-009 (V9) Practice Test

  • 20 Questions
  • Unlimited
  • Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 20

Which security property is primarily provided when data is encrypted as it traverses an untrusted network such as the internet?

  • Non-repudiation - it proves the sender cannot deny sending the data.

  • Availability - it prevents attackers from delaying or blocking the data.

  • Integrity - it ensures packets cannot be altered in transit.

  • Confidentiality - intercepted data remains unreadable without the decryption key.

Question 2 of 20

Which scenario is most likely to result in significant interference in a wireless communication environment?

  • Setting excessively high transmission power on a wireless router

  • Deploying multiple access points with overlapping frequency channels

  • Implementing an incorrect subnet mask

  • Utilizing non-standard antennas for signal transmission

Question 3 of 20

Which open-standard first hop redundancy protocol, defined in RFC 5798, allows multiple routers to share a virtual IP and MAC address so that hosts keep forwarding traffic even if the master router fails?

  • HSRP (Hot Standby Router Protocol)

  • RIP (Routing Information Protocol)

  • EIGRP (Enhanced Interior Gateway Routing Protocol)

  • VRRP (Virtual Router Redundancy Protocol)

Question 4 of 20

A company's IT department is considering migrating their legacy software systems to a SaaS provider. They require a solution that not only reduces management overhead but also integrates seamlessly with their existing workflow tools. Which of the following would be a critical factor to consider while evaluating potential SaaS providers?

  • Availability of mobile support for iOS and Android devices

  • API accessibility and compatibility with their existing tools

  • The ability to scale storage requirements on-demand

  • Level of data encryption offered for stored and in-transit data

Question 5 of 20

Which of the following scenarios represents the BEST approach for applying a newly released patch to critical network infrastructure software?

  • Testing the patch in a non-production environment prior to widespread deployment

  • Ignoring the patch until it has been available for several months to confirm it's stable

  • Applying the patch only to non-critical systems to observe its impacts before deciding on further action

  • Immediately applying it to all devices to ensure all security vulnerabilities are quickly mitigated

Question 6 of 20

A network administrator is setting up a wireless network in a busy office environment. The administrator wants to ensure that employee devices connect seamlessly to the strongest signal within the office without manually switching between multiple access points. What is the BEST configuration to use?

  • Use a single ESSID across all access points.

  • Assign a unique BSSID for each access point.

  • Configure each access point as a separate mesh network.

  • Implement band steering on all access points.

Question 7 of 20

A network engineer is selecting appropriate cabling for a new data center. They need a solution that supports increased bandwidth over long distances and is less susceptible to electrical interference. Which type of cable best meets these requirements?

  • Multimode fiber

  • Coaxial cable

  • Single-mode fiber

  • Twinaxial cable

Question 8 of 20

A network administrator is setting up a network that must support both IPv4 and IPv6. Which configuration approach allows the network devices to process IPv4 and IPv6 packets simultaneously, optimizing the handling of traffic without the need for extra translation mechanisms?

  • Dual stack

  • NAT64

  • Tunneling

Question 9 of 20

A network administrator is setting up a new server and needs to ensure that LDAP services are enabled and accessible over a secure connection. Which port should the administrator ensure is open on the firewall to allow secure LDAP communication?

  • Port 636

  • Port 389

  • Port 443

  • Port 53

Question 10 of 20

A network technician is investigating a report that users in the marketing department (VLAN 20) can access servers in the finance department's network segment (VLAN 30). According to security policy, these two segments should be completely isolated from each other. The technician verifies that devices in both departments are receiving correct IP addresses from the DHCP server. What is the most likely cause of this security breach?

  • One or more switch ports for the marketing department have been assigned to the finance department's VLAN.

  • The default gateway is misconfigured on the marketing department's workstations.

  • An access control list (ACL) is missing from the core router's configuration.

  • A broadcast storm is occurring on the network due to a routing loop.

Question 11 of 20

The IT team at a large retail company is reviewing its disaster-recovery strategy to meet the organization's requirement for moderate downtime after a disruption. They are considering implementing a warm site. Which of the following best describes the state of a warm site that they should expect?

  • Partially equipped with servers, network connections, and possibly some replicated data, but requires additional configuration before it can become fully operational.

  • Equipped only with the physical infrastructure and requires all servers, applications, and data to be restored before operations can resume.

  • Lacks any pre-installed hardware and is primarily an empty data center reserved for emergency use.

  • Fully operational with all services, applications, and data mirrored from the primary site and running in real time.

Question 12 of 20

An organization wishes to enforce policies that restrict access to sensitive resources from unauthorized network segments. Which security rule should primarily be configured to manage this access?

  • Disable unused ports

  • Access control list (ACL)

  • Content filtering

  • MAC filtering

Question 13 of 20

A network administrator discovers that an Ethernet port on a managed switch is in a 'Suspended' state. What is the MOST likely reason for this port status?

  • LACP misconfiguration or negotiation failure

  • The port has exceeded its power over Ethernet (PoE) budget

  • Using an incorrect cable type, such as using UTP instead of STP

  • Mismatched VLAN assignments on the port

Question 14 of 20

A network technician is tasked with setting up a network in a large data center. Given the need for high speed data transfer and distances that exceed 100 meters between devices, which type of cable should the technician use?

  • CAT5e

  • Multimode fiber

  • CAT6

  • Single-mode fiber

Question 15 of 20

During a network upgrade, a technician uses a cable tester to verify the new cabling installations. The tester identifies several failures. What type of issues CANNOT be directly detected using a standard cable tester?

  • Improper cable termination

  • Signal attenuation

  • Crossed wires

  • Short circuits

Question 16 of 20

A technician is configuring a server to send real-time financial data updates to a specific client workstation. What type of traffic should be used for this one-to-one communication to ensure that the data is delivered directly from the server to the specified workstation?

  • Anycast

  • Unicast

  • Broadcast

  • Multicast

Question 17 of 20

Which transmission method uses the destination host's unique IP address and forwards traffic exclusively to that address?

  • Broadcast

  • Multicast

  • Anycast

  • Unicast

Question 18 of 20

While working in a corporate environment as a network administrator, you notice that several devices are unable to communicate with each other despite being connected to what you believe is the same VLAN. What command can you execute to verify VLAN assignments and troubleshoot the issue?

  • show interface

  • show config

  • show mac-address-table

  • show vlan

Question 19 of 20

A company is negotiating a new contract with an Internet Service Provider (ISP) for increased bandwidth and improved uptime. What aspect of the service-level agreement (SLA) should be prioritized to ensure that network downtime impacts are minimized?

  • Disaster recovery options

  • 24/7 customer support

  • Network uptime commitment

  • Early termination rights

Question 20 of 20

A network administrator is troubleshooting issues on a network where newly installed security cameras are intermittently going offline. The PoE switch used supports a total of 185 watts, and there are 10 cameras, each requiring 20 watts. Which of the following actions should the administrator take to BEST resolve the power-budget-exceeded issue?

  • Install an additional PoE switch or replace it with one that supports a higher power budget

  • Adjust the camera settings to lower their power consumption

  • Prioritize power to critical cameras and turn off non-essential ones

  • Replace PoE cameras with non-PoE cameras