00:20:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

CompTIA Network+ N10-009 (V9) Logo
  • Free CompTIA Network+ N10-009 (V9) Practice Test

  • 20 Questions
  • Unlimited
  • Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 20

Which of the following options BEST describes the primary function of 802.1X in a network environment?

  • Content filtering

  • Port-based Network Access Control

  • Data packet encryption

  • Network Address Translation

Question 2 of 20

A network administrator is configuring a mixed network environment with both high-speed corporate connections and smaller links for remote offices. If the main goal is to minimize packet breakup, which MTU setting on the routers should be considered the BEST?

  • Conform all settings to the smallest link capacity to prevent packet fragmentation

  • Set an average size based on all connected link capacities

  • Maintain default settings for each connection type without adjustments

  • Increase all link sizes to the maximum allowed by the high-speed corporate connections

Question 3 of 20

A network technician is addressing an issue where several applications periodically fail to establish network connections. Which mechanism, crucial for setting up reliable communications between devices, should be evaluated to ensure it is not at fault?

  • Window scaling

  • Keepalive messages

  • Checksum calculation

  • Three-way handshake

Question 4 of 20

What is the primary purpose of key management in network security?

  • To audit and ensure compliance with security policies

  • To securely manage the full lifecycle of cryptographic keys

  • To define and enforce network security rules and policies

  • To authenticate users and devices accessing the network

Question 5 of 20

Which security property is primarily provided when data is encrypted as it traverses an untrusted network such as the internet?

  • Integrity - it ensures packets cannot be altered in transit.

  • Non-repudiation - it proves the sender cannot deny sending the data.

  • Confidentiality - intercepted data remains unreadable without the decryption key.

  • Availability - it prevents attackers from delaying or blocking the data.

Question 6 of 20

A network technician is designing a wireless network for a large office building. The goal is for employees to walk from one end of the building to the other without losing their Wi-Fi connection. To achieve this seamless roaming, multiple access points will be deployed as part of an Extended Service Set (ESS). How should the access points be configured?

  • Configure each access point with the same SSID on different, non-overlapping channels.

  • Configure each access point with a unique SSID and a unique channel.

  • Configure each access point with a unique SSID and the same BSSID.

  • Configure each access point with the same SSID on the same channel.

Question 7 of 20

A small business is configuring their edge router to allow multiple devices to access the internet using a single public IP address. Which of the following techniques should they implement to achieve this?

  • Port address translation (PAT)

  • VLAN tagging

  • Dynamic routing

  • Dynamic Host Configuration Protocol (DHCP)

Question 8 of 20

A network technician is troubleshooting an application that is experiencing glitches and dropouts. What is the most direct symptom of network packet loss?

  • Intermittent data transmission errors

  • Increased network latency

  • Enhanced bandwidth utilization

  • Implementation of new encryption protocols

Question 9 of 20

Which type of documentation would be MOST useful when planning updates for network hardware to ensure all devices are covered under a current warranty?

  • Physical network diagrams

  • IP address management tools

  • Asset inventory

  • Logical network diagrams

Question 10 of 20

A company is upgrading its wireless infrastructure to ensure enhanced security and encryption. Which encryption method should be implemented to provide the highest level of security for their Wi-Fi network?

  • Wired Equivalent Privacy (WEP)

  • Wi-Fi Protected Access 3 (WPA3)

  • Wi-Fi Protected Access with Pre-Shared Key (WPA-PSK)

  • Wi-Fi Protected Access 2 (WPA2)

Question 11 of 20

A network engineer is tasked with configuring a new router in a large multinational corporation's headquarters. This router needs to exchange routing information with routers from other autonomous systems. Which routing protocol should the engineer use?

  • Enhanced Interior Gateway Routing Protocol (EIGRP)

  • Open Shortest Path First (OSPF)

  • Border Gateway Protocol (BGP)

  • Routing Information Protocol version 2 (RIPv2)

Question 12 of 20

When configuring a point-to-point wireless bridge between two buildings, which of the following is the BEST choice to maximize stable connectivity?

  • Use a high-gain antenna without specifying directional or omnidirectional

  • Use a directional antenna

  • Deploy an autonomous access point

  • Use an omnidirectional antenna

Question 13 of 20

Which configuration is BEST for enhancing network security by controlling ingress and egress traffic according to predefined security rules?

  • Configuring a stateful firewall

  • Implementing a simple packet filtering firewall

  • Enabling NAT on the network router

  • Utilizing an access control list at the router

Question 14 of 20

A network manager at a medium-sized enterprise has been tasked to verify that all network management software used is compliant with licensing agreements after an internal audit revealed discrepancies. Which of the following SHOULD the network manager prioritize to best address this compliance issue?

  • Review licenses and their actual usage across the network

  • Automatically update all software to the latest version

  • Renew software licenses irrespective of their current deployment status

  • Implement a retraining program on software management for the IT department

Question 15 of 20

An organization uses a network configured with routers handling multiple subnets. While establishing a route for new data packets, which type of address does the router primarily use to determine the next hop?

  • MAC address

  • Port number

  • Service number

  • IP address

Question 16 of 20

Which of the following best describes the term 'vulnerability' in the context of network security?

  • A weakness in a system that can be exploited

  • A method by which someone takes advantage of a vulnerability

  • Any potential cause of an unwanted impact to a system or organization

  • The potential for loss or damage when a threat exploits a vulnerability

Question 17 of 20

What is the primary purpose of implementing a spanning tree protocol in a network?

  • To expand network coverage area

  • To manage collision domains within the network

  • To improve network performance by selecting the fastest paths

  • To prevent switching loops in a broadcast domain

Question 18 of 20

A company wants to ensure the authenticity, confidentiality, and integrity of its secure communications across its network. What is the BEST method to achieve this?

  • Increasing the complexity of network passwords

  • Enabling firewall rules for incoming and outgoing traffic

  • Implementing a Public Key Infrastructure (PKI) system

  • Applying strict access control lists (ACLs)

Question 19 of 20

A router has learned the exact same 172.16.10.0/24 route from a static configuration, from OSPF, and from RIP. All three advertisements have the identical prefix length and point to valid next hops. To decide which single route to install in its routing table, which attribute will the router compare?

  • Type of routing protocol used

  • Metric value of the route

  • Administrative distance

  • Bandwidth of the outgoing interface

Question 20 of 20

Which of the following best describes the data unit used at Layer 2 of the OSI model?

  • Packet

  • Frame

  • Bit

  • Segment