CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
00:15:00

Free CompTIA Network+ N10-009 Practice Test

Prepare for the CompTIA Network+ N10-009 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Network Operations
    • Network Security
    • Network Implementation
    • Network Troubleshooting
    • Networking Concepts
Question 1 of 15

A network administrator is tasked with interconnecting several high-speed servers and switches located within the same rack in a data center. Which type of cable is most suitable for achieving high-speed, cost-effective connectivity for distances up to 10 meters?

  • CAT6 Ethernet cable

  • Coaxial cable

  • Single-mode fiber optic cable

  • Direct attach copper (DAC) cable

Question 2 of 15

The IT team at a large retail company is reviewing their disaster recovery strategy to align it with the organization's requirement for moderate downtime in event recovery scenarios. They are considering implementing a warm site. Which of the following best describes the state of a warm site that they should expect?

  • Lacks any pre-installed hardware and is primarily an empty data center reserved for emergency use.

  • Partially equipped with servers, network connections, and possibly some live data feeds, but requires some configuration to become fully operational.

  • Fully operational with all services, applications, and data mirrored from the primary site running in real-time.

  • Equipped only with the physical infrastructure and requires all servers, applications, and data to be restored before operations can resume.

Question 3 of 15

Which of the following is a common form factor used for network transceivers that supports Ethernet protocol?

  • Bayonet Neill-Concelman (BNC)

  • Portable Network Graphics (PNG)

  • Subscriber Connector (SC)

  • Small Form-factor Pluggable (SFP)

Question 4 of 15

A company is overhauling its network security measures to adhere to best practices. As part of this initiative, you are directed to modify user permissions to enhance defenses against potential breaches. What approach should you take to align with the new security guidelines?

  • Enabling personnel to self-grant permissions when faced with access restrictions

  • Implementing role-based access control (RBAC) to define user permissions

  • Consolidating high-level privileges into a shared management account for convenience

  • Providing all staff with equivalent comprehensive privileges to streamline operations

Question 5 of 15

A Forward DNS zone is responsible for linking hostnames to IP addresses.

  • True

  • False

Question 6 of 15

A network engineer is tasked with configuring a new router in a large multinational corporation's headquarters. This router needs to exchange routing information with routers from other autonomous systems. Which routing protocol should the engineer use?

  • Border Gateway Protocol (BGP)

  • Routing Information Protocol version 2 (RIPv2)

  • Enhanced Interior Gateway Routing Protocol (EIGRP)

  • Open Shortest Path First (OSPF)

Question 7 of 15

What is the primary purpose of using a console connection for network devices?

  • To monitor network performance using SNMP

  • To configure network devices using RADIUS

  • To provide direct management access regardless of network connectivity

  • To manage user authentication with LDAP

Question 8 of 15

In an effort to secure corporate data, a network administrator is tasked with configuring network architecture to separate highly sensitive data systems from general office networks. Which setup would best achieve a secure segmentation between trusted zones, where high-value assets are located, and untrusted zones used by regular employees?

  • Regularly change network device passwords and increase the encryption level for traffic between segments.

  • Deploy Network Access Control (NAC) across all network points to restrict user access based on credentials.

  • Configure distinct subnets for sensitive systems and office networks without additional security controls.

  • Implement a DMZ that separates the corporate network from the sensitive systems, monitored by security systems.

  • Place all sensitive systems and office networks behind the same firewall, with high-security configurations.

Question 9 of 15

A honeynet is primarily used to strengthen the network perimeter directly by filtering out malicious traffic.

  • False

  • True

Question 10 of 15

A network administrator is configuring a company's wireless router to prevent unauthorized access and enhance security. In addition to changing the default password, what is the most effective additional device hardening step the administrator should take?

  • Disable unused ports and services on the router

  • Schedule regular firmware updates

  • Change the network's SSID to a generic name

Question 11 of 15

A network administrator is configuring an ACL on a router to ensure only devices from the sales department can access the financial server located at IP 192.168.5.5. Which of the following ACL rules is the BEST option to achieve this?

  • Block 192.168.20.0 0.0.0.255 to 192.168.5.5 0.0.0.0

  • Allow all traffic to 192.168.5.5

  • Permit 192.168.5.5 0.0.0.0 to any

  • Permit 192.168.10.0 0.0.0.255 to 192.168.5.5 0.0.0.0

Question 12 of 15

A network manager is setting up automated notifications for certain network events such as unexpected shutdowns or resource threshold breaches on network devices. Which feature should be configured to meet this need for immediate notifications?

  • Community strings

  • Management information base (MIB)

  • Authentication

  • Traps

Question 13 of 15

What best describes the relationship between IoT and IIoT regarding their implementation environments?

  • IIoT and IoT both refer exclusively to consumer electronics such as smartwatches and home security systems.

  • IIoT is primarily implemented in industrial environments whereas IoT is used across various non-industrial contexts.

  • IoT devices are exclusively used in home environments, whereas IIoT is limited to governmental infrastructure.

  • Both IoT and IIoT are typically used interchangeably in terms of technology and application areas.

Question 14 of 15

A network administrator receives alerts that several users are experiencing connectivity issues. The administrator decides to perform a ping operation to test the reachability of these users' computers. Which protocol does the ping command primarily utilize to verify network connectivity?

  • Hypertext Transfer Protocol (HTTP)

  • Hypertext Transfer Protocol Secure (HTTPS)

  • Internet Control Message Protocol (ICMP)

  • Simple Network Management Protocol (SNMP)

Question 15 of 15

Which configuration is the BEST to allow a multilayer switch to route traffic between different VLANs?

  • Set the native VLAN on a trunk link.

  • Configure an IP helper address on the switch.

  • Create an SVI for each VLAN and assign appropriate IP addresses.

  • Assign an IP address to each switch physical interface.