00:20:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 20

The core layer of a three-tier hierarchical network design primarily manages security processes, including firewall management and intrusion detection.

  • True

  • False

Question 2 of 20

In computer networking, what is the primary function performed by a proxy server on a network?

  • To establish direct point-to-point connections

  • To increase the speed of the internet connection

  • To serve as an intermediary between clients and other servers

  • To provide additional storage for network data

Question 3 of 20

Which of the following best describes the purpose of the TTL field in an IP packet?

  • To authenticate the source of the packet

  • To limit the number of hops a packet can traverse before being discarded

  • To encrypt data payload in the packet for secure transmission

  • To determine the priority of a packet in a congested network

Question 4 of 20

What is the primary function of port security on network switches?

  • Encrypt data transmitted from one port to another

  • Limit the bandwidth usage on a network

  • Monitor traffic patterns to detect anomalies

  • Limit the number of MAC addresses allowed on a switch port

Question 5 of 20

What is the primary function of a scope in a DHCP server configuration?

  • To restrict internet access to certain devices

  • To assign specific gateway addresses to devices

  • To define a range of IP addresses that can be assigned to client devices

  • To manage bandwidth allocation among connected devices

Question 6 of 20

Which of the following is the BEST reason to implement GRE in a network environment?

  • To prioritize certain types of network traffic and improve Quality of Service (QoS)

  • To encapsulate a wide variety of network layer protocol packet types inside IP tunnels

  • To increase the security of network traffic by encrypting data

  • To reduce the complexity of managing IP addresses

Question 7 of 20

A network technician is investigating a report that users in the marketing department (VLAN 20) can access servers in the finance department's network segment (VLAN 30). According to security policy, these two segments should be completely isolated from each other. The technician verifies that devices in both departments are receiving correct IP addresses from the DHCP server. What is the most likely cause of this security breach?

  • A broadcast storm is occurring on the network due to a routing loop.

  • One or more switch ports for the marketing department have been assigned to the finance department's VLAN.

  • An access control list (ACL) is missing from the core router's configuration.

  • The default gateway is misconfigured on the marketing department's workstations.

Question 8 of 20

What type of data is primarily used in performance monitoring to assess network efficiency and identify potential issues?

  • Usage statistics

  • Error logs

  • Security alerts

  • Traffic analysis data

Question 9 of 20

A network administrator needs to update an A record for the company's public website. The DNS infrastructure consists of one primary server and two secondary servers that provide redundancy. To ensure the change is correctly replicated, on which server must the administrator make the modification?

  • On any of the secondary DNS servers.

  • On the authoritative recursive server.

  • On both the primary and all secondary DNS servers simultaneously.

  • On the primary DNS server.

Question 10 of 20

Which design approach best utilizes a screened subnet for enhancing network security, considering its strategic placement in network architecture?

  • Utilizing it to separate the internal network from the external internet, placing only externally accessible services such as a web server within it.

  • Implementing it for all employee workstations to ensure uniform security policies across the company.

  • Deploying it as the primary network for internal operations with high-speed connectivity requirements.

  • Configuring it to serve as the main hub for internal routing and switching, optimizing the network's core performance.

Question 11 of 20

What is a 'runt' in the context of Ethernet communications?

  • A frame that is smaller than the allowed minimum frame size

  • A frame that is larger than the allowed maximum frame size

  • A frame sent from one switch to another

  • A frame that meets the exact size requirements

Question 12 of 20

A network technician is deploying a 5 GHz wireless network in a location near a weather radar installation. To comply with regulations and prevent interference, the access points must be able to automatically detect the radar signals and switch to a different channel. Which IEEE standard provides this capability through mechanisms like Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC)?

  • 802.11i

  • 802.11h

  • 802.11e

  • 802.11ac

Question 13 of 20

What is a primary benefit of implementing MFA within an organization's security framework?

  • It decreases the time it takes for users to access network resources.

  • It simplifies the user authentication process.

  • It reduces dependency on passwords alone, enhancing access security.

  • It allows users to choose any form of identity verification as per convenience

Question 14 of 20

An organization wants to add an extra authentication factor that produces a numeric code derived from a shared secret and the current time. The code changes every 30 seconds and becomes invalid once that interval expires. Which authentication factor best meets this requirement?

  • Event-based one-time password (HOTP)

  • Biometric fingerprint scan

  • Time-based one-time password (TOTP)

  • Static personal identification number (PIN)

Question 15 of 20

A company is implementing a zero trust architecture to bolster their network security. As part of this initiative, what approach should be primarily taken to ensure that authorized users are allowed access to network resources?

  • Offer access based on network segment location, supplemented by user credential checks

  • Grant access based on policy-based authorization

  • Provide network access to devices following a preliminary security assessment

  • Allow access based on user location within the enterprise premises, subject to additional verifications

Question 16 of 20

What is the primary purpose of implementing a spanning tree protocol in a network?

  • To expand network coverage area

  • To manage collision domains within the network

  • To prevent switching loops in a broadcast domain

  • To improve network performance by selecting the fastest paths

Question 17 of 20

A network administrator begins receiving reports that several users in the company cannot access the corporate website hosted internally. The users affected are from different departments but seated in the same area of the building. Before escalating the issue, what should the administrator's first step be in identifying the problem?

  • Ask the users if they have installed new software

  • Immediately begin replacing network cables in the affected area

  • Gather information

  • Run a virus scan on each user's computer in the affected area

Question 18 of 20

Which default port does the Telnet protocol use for its operations?

  • 25

  • 22

  • 23

  • 21

Question 19 of 20

What is the primary purpose of using TCP port 636 in a network environment?

  • For secure file transfers such as SFTP or FTPS

  • To carry standard web (HTTP) traffic over SSL/TLS

  • To secure LDAP communications with SSL/TLS encryption

  • To transfer multimedia messages across the network

Question 20 of 20

A network engineer needs to connect two buildings that are 10 kilometers apart with a high-speed and reliable link. Which of the following transmission media would BEST suit this need?

  • Multimode fiber optic cable

  • Category 6 twisted pair cable

  • Single-mode fiber optic cable

  • Coaxial cable