🔥 40% Off Crucial Exams Memberships — This Week Only

19 hours, 13 minutes remaining!
00:20:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

CompTIA Network+ N10-009 (V9) Logo
  • Free CompTIA Network+ N10-009 (V9) Practice Test

  • 20 Questions
  • Unlimited time
  • Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 20

A network administrator notices that devices on the local network are unable to access external websites. After verifying that internet services from the ISP are operational and that internal resources are accessible, the administrator suspects an issue with the network's routing configuration. What configuration error is likely causing the devices to fail connecting to external websites?

  • ACLs are blocking access to external network addresses.

  • Incorrect subnet masks are configured on the devices.

  • The default gateway is not correctly configured on the router.

  • The routing table contains incorrect entries for local subnets.

Question 2 of 20

A corporation requires a method for their employees to securely access specific internal web applications from any location, using their personal devices without installing any additional software. Which technology should the company use?

  • Full VPN client

  • VPN Passthrough

  • IPSec VPN

  • Clientless VPN

Question 3 of 20

A network administrator at a medium-sized enterprise plans to upgrade the firmware on several critical routers. To ensure a systematic approach compliant with best practices for network management, which of these actions should most appropriately initiate the change management process?

  • Directly implement the changes during a scheduled maintenance window

  • Start with a thorough risk assessment before proposing any specific actions

  • Informally discuss the change with colleagues to gather feedback before proceeding

  • Submit a change request to the change advisory board (CAB) for review and approval

Question 4 of 20

A network administrator is configuring a company's wireless router to prevent unauthorized access and enhance security. In addition to changing the default password, what is the most effective additional device hardening step the administrator should take?

  • Disable unused ports and services on the router

  • Schedule regular firmware updates

  • Change the network's SSID to a generic name

Question 5 of 20

An IT technician notices that a specific application is not maintaining a reliable connection between the client and the server. Considering the role of transport layer protocols, which protocol is likely being used if the application requires real-time data transmission but can tolerate some data loss?

  • UDP

  • TCP

  • ICMP

  • SCTP

Question 6 of 20

A network administrator needs to implement a wireless security protocol that provides robust encryption and user authentication over a centralized server for their corporate Wi-Fi. Which is the BEST option to meet these requirements?

  • WPA3-Enterprise

  • WEP (Wired Equivalent Privacy)

  • WPA2-Personal

  • Open network (no encryption)

Question 7 of 20

During an audit of your network management practices, it is evident that multiple network configurations have been applied without proper documentation or version control. What immediate action should be recommended to ensure consistent deployment and easy rollback capabilities in the future?

  • Automate the synchronization of network configurations to the central repository with detailed logging and version control.

  • Establish a protocol for manual version control tagging before any configuration change.

  • Perform periodic backups of configurations without versioning.

  • Manually document changes in a shared spreadsheet at regular intervals.

Question 8 of 20

What feature of QSFP+ modules primarily differentiates them from basic QSFP modules when considering upgrades in a data center?

  • They enable longer cable lengths without signal degradation.

  • They support only single-mode fiber connections.

  • They support a higher data rate, reaching up to 40 Gbps.

  • They reduce power consumption by integrating more efficient cooling systems.

Question 9 of 20

Which protocol and port combination is primarily used for securely transferring web pages from web servers to clients?

  • Telnet | 23

  • FTP | 21

  • SMTP | 25

  • HTTPS | 443

Question 10 of 20

A network team utilizes code to automate configurations and maintain consistency across the network infrastructure. The team needs to ensure that they can track changes, collaborate without overwriting each other's work, and revert to previous configurations if necessary. Which is the BEST solution to meet these requirements?

  • Establishing a central repository with a version control system

  • Implementing a network monitoring tool

  • Applying a strict change management process without tooling support

  • Using a single shared document to store all network scripts

Question 11 of 20

A network administrator is planning to expand the company's infrastructure to include a second data center. They intend to set up a DCI to ensure high availability and optimized disaster recovery processes. Which technology is most appropriate for creating a high-capacity, secure, and scalable interconnect between these data centers?

  • Point-to-Point Protocol (PPP)

  • Multiprotocol Label Switching (MPLS)

  • Dark Fiber

  • Virtual Private Network (VPN)

Question 12 of 20

Which IPv4 address is classified as a public IP address?

  • 172.16.254.3

  • 192.168.1.1

  • 8.8.4.4

  • 10.0.0.1

Question 13 of 20

A company's network administrator discovers that multiple users are complaining about connectivity issues and incorrect network settings. After investigation, the administrator suspects the presence of an unauthorized DHCP server on the network. What is the potential security risk posed by this rogue DHCP server?

  • It encrypts data packets causing delays in data transmission.

  • It serves as a backup server improving network redundancy.

  • It increases the network's broadcast traffic, slowing down network speeds.

  • It can issue incorrect network settings leading to traffic misdirection.

Question 14 of 20

What is the BEST reason for setting a shorter duration for network address assignments in an environment with frequent device turnover and diverse client devices?

  • It improves the efficiency of network management hardware by reducing its operational load.

  • It facilitates quicker recycling of network resources in environments with high device turnover, adjusting swiftly to configuration changes.

  • It strengthens network security by frequently altering network addresses, deterring continuous unauthorized access.

  • It reduces the overall traffic on the network by minimizing the number of requests for new network addresses.

Question 15 of 20

Given an enterprise network that spans multiple geographic locations, which dynamic routing protocol would be the BEST to implement for optimal scalability and interoperability among various vendors' equipment?

  • Routing Information Protocol (RIP)

  • Enhanced Interior Gateway Routing Protocol (EIGRP)

  • Border Gateway Protocol (BGP)

  • Open Shortest Path First (OSPF)

Question 16 of 20

Which open-standard first hop redundancy protocol, defined in RFC 5798, allows multiple routers to share a virtual IP and MAC address so that hosts keep forwarding traffic even if the master router fails?

  • VRRP (Virtual Router Redundancy Protocol)

  • RIP (Routing Information Protocol)

  • EIGRP (Enhanced Interior Gateway Routing Protocol)

  • HSRP (Hot Standby Router Protocol)

Question 17 of 20

Which of the following IPv4 addresses falls within the private address space specified by RFC 1918 and therefore cannot be routed across the public Internet?

  • 203.0.113.10

  • 8.8.8.8

  • 192.168.1.1

  • 172.34.0.5

Question 18 of 20

A network administrator is troubleshooting a newly installed Ethernet network that is experiencing slower than expected data transfer rates and intermittent connectivity issues. After ruling out hardware failures and configuration errors, the administrator suspects that signal interference might be causing the problem. Which of the following would be the BEST next step to confirm if crosstalk is the issue?

  • Use a cable tester to check for crosstalk in the Ethernet cables.

  • Configure a VLAN to separate noisy traffic and decrease broadcast domains.

  • Increase the power settings on the network routers and switches to boost signal strength.

  • Replace the Ethernet cables with fiber-optic cables to test if the issue persists.

Question 19 of 20

A network administrator is troubleshooting issues on a network where newly installed security cameras are intermittently going offline. The PoE switch used supports a total of 185 watts, and there are 10 cameras, each requiring 20 watts. Which of the following actions should the administrator take to BEST resolve the power-budget-exceeded issue?

  • Prioritize power to critical cameras and turn off non-essential ones

  • Install an additional PoE switch or replace it with one that supports a higher power budget

  • Adjust the camera settings to lower their power consumption

  • Replace PoE cameras with non-PoE cameras

Question 20 of 20

A network administrator is setting up a secure email transmission service that encrypts SMTP traffic. Which port should the administrator configure the email server to listen to in order to secure email messages?

  • Port 587

  • Port 993

  • Port 443

  • Port 25