00:15:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 15

A network technician suspects that several issues in the network are due to unmarked cables that might be incorrectly patched. What is the BEST tool to use to trace and identify these specific cables within a bundled and unmarked group?

  • Toner

  • Wi-Fi analyzer

  • Cable tester

  • Wire strippers

Question 2 of 15

A network administrator suspects a server has been compromised and an unauthorized service is listening for incoming connections. Which of the following command-line tools would be the most effective for the administrator to use to view the server's open ports and active connections?

  • tracert

  • netstat

  • ipconfig

  • ping

Question 3 of 15

A network administrator suspects that an incorrect DNS record might be causing a website to be unreachable from the corporate network. They decide to use nslookup to check the DNS records for the domain example.com. What command should the administrator use to specifically retrieve the mail server records for the domain?

  • nslookup -query=a example.com

  • nslookup -type=soa example.com

  • nslookup -query=mx example.com

  • nslookup example.com -mx

Question 4 of 15

What term describes the technique where an attacker gains physical access to a building by following closely behind a person who has legitimate access?

  • Dumpster diving

  • Tailgating

  • Phishing

  • Vishing

Question 5 of 15

What is geofencing primarily used for in network security?

  • Creating a virtual boundary that triggers a response when crossed

  • Filtering content based on network policies

  • Encrypting data stored on mobile devices

  • Hardening devices by disabling unused ports and services

Question 6 of 15

A network administrator notices that an IP camera, which is PoE-capable, is not powering up despite being connected to a PoE switch. The switch supports 802.3af and the camera is located 115 meters from the switch using a Cat5e cable. What could be the most probable cause?

  • The switch is not supplying enough power due to a high number of connected devices.

  • The camera and switch are incompatible with each other's PoE standards.

  • The camera requires PoE+, which the switch does not support.

  • The cable used is too long, leading to a voltage drop significant enough to affect power delivery.

Question 7 of 15

A university campus with multiple buildings has received numerous complaints from students about dropped video calls and intermittent connectivity issues on their devices as they move between lecture halls. The network administrator suspects problems in the wireless network settings associated with client roaming. What is the most effective adjustment that can address these roaming issues and enhance connectivity stability?

  • Modify the RSSI threshold settings

  • Optimize the SCTP settings on the network controllers

  • Increase the transmit power on all access points

  • Adjust the Quality of Service (QoS) configurations

Question 8 of 15

A network administrator is setting up an internal network which requires isolation from external internet access. Which designation should the addressing schema fall under?

  • Private addressing

  • Public addressing

  • APIPA addressing

  • Loopback addressing

Question 9 of 15

A company stores confidential client information in a centralized database that employees access daily. The database administrator has been tasked with enhancing the security of the stored data. Which of the following measures would be MOST effective in ensuring the data remains confidential?

  • Separate data by clearance level

  • Implement strong firewall rules

  • Encrypt all stored data

  • Require regular password changes

Question 10 of 15

A network administrator is tasked with upgrading the cabling of a corporate network to support a new 10GBase-T installation in a cost-effective manner. The current infrastructure uses CAT5e cables. Which type of cable should the administrator select to ensure compatibility with 10GBase-T specifications and optimal network performance over standard infrastructure distances?

  • CAT3

  • CAT6a

  • CAT7

  • CAT5e

Question 11 of 15

Which scenario best represents a typical use case for implementing VXLAN in an enterprise network?

  • Reducing the number of required IP addresses in a small office

  • Encrypting data transmission between two endpoints in the same data center

  • Managing Quality of Service (QoS) for streaming media

  • Extending Layer 2 domains across multiple data centers

Question 12 of 15

An IT specialist is tasked with configuring a company's new email server. The team wants to ensure that outbound email is encrypted using the method most commonly negotiated on TCP port 587. Which configuration setting should the specialist enable to meet this requirement?

  • Require implicit SSL/TLS on port 587

  • Enable STARTTLS

  • Use plain SMTP only on port 587

  • Configure IMAP to listen on port 587

Question 13 of 15

What is the best practice when addressing multiple network issues to ensure effective troubleshooting?

  • Address each issue separately

  • Ignore minor issues and focus only on major ones

  • Escalate all problems at once to higher level support

  • Combine similar issues to save time

Question 14 of 15

Which connection method allows network administrators to remotely manage network devices using encrypted communication?

  • API

  • Console

  • Telnet

  • SSH

Question 15 of 15

Which of the following options BEST describes the role of a honeynet in a network security strategy?

  • A separate network system designed to resemble genuine production systems, configured to lure attackers by exposing seemingly vulnerable services, to monitor their activities.

  • A set of redundant network configurations that bewilder attackers by constantly changing DHCP configurations.

  • An isolated network that prevents access to production services and data for users or entities appearing risky or unverified.

  • A real segment of the network that is intentionally weakened to attract attackers and study their behavior in a live environment.