00:20:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

CompTIA Network+ N10-009 (V9) Logo
  • Free CompTIA Network+ N10-009 (V9) Practice Test

  • 20 Questions
  • Unlimited
  • Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 20

To enhance security by ensuring that domain name resolutions are authenticated and verifiable, which technology should be implemented?

  • DNS over HTTPS (DoH)

  • SSL

  • DNS over TLS (DoT)

  • DNSSEC

Question 2 of 20

A network administrator notices that an IP camera, which is PoE-capable, is not powering up despite being connected to a PoE switch. The switch supports 802.3af and the camera is located 115 meters from the switch using a Cat5e cable. What could be the most probable cause?

  • The switch is not supplying enough power due to a high number of connected devices.

  • The camera and switch are incompatible with each other's PoE standards.

  • The camera requires PoE+, which the switch does not support.

  • The cable used is too long, leading to a voltage drop significant enough to affect power delivery.

Question 3 of 20

A network administrator needs to create a tunnel between two offices so that different Layer 3 protocols (for example, IPv4, IPv6, or routing updates) can traverse the public Internet. The solution should add minimal overhead and does not require built-in encryption or authentication. Which tunneling protocol best meets these requirements?

  • IPSec

  • GRE

  • MPLS

  • SSL/TLS

Question 4 of 20

A network administrator needs to configure a DNS record to associate a domain name with a mail server for their organization. Which DNS record type should they use to achieve this?

  • CNAME (Canonical Name)

  • A (Address)

  • MX (Mail Exchange)

  • TXT (Text)

Question 5 of 20

A network engineer needs to segment a network into multiple broadcast domains without using additional hardware. Which Layer 2 technology should be implemented to achieve this?

  • Routing

  • NAT

  • Subnetting

  • VLAN

Question 6 of 20

Which of the following best describes a network that modifies its behavior based on the type of application traffic it detects?

  • A network with fixed QoS policies that strictly segments bandwidth based on VLAN IDs regardless of traffic type.

  • A network that prioritizes video streaming over regular browsing to ensure quality service.

  • A network that employs a standard firewall rule set applied uniformly to all traffic.

  • A network that uses the same routing protocol for all data packets flowing through it.

Question 7 of 20

A network administrator notices that devices on the local network are unable to access external websites. After verifying that internet services from the ISP are operational and that internal resources are accessible, the administrator suspects an issue with the network's routing configuration. What configuration error is likely causing the devices to fail connecting to external websites?

  • Incorrect subnet masks are configured on the devices.

  • The routing table contains incorrect entries for local subnets.

  • The default gateway is not correctly configured on the router.

  • ACLs are blocking access to external network addresses.

Question 8 of 20

A network administrator notices that a switch port, which connects to a server, is no longer active and upon checking, finds that the port has been put into an 'error disabled' state. What is the MOST likely cause for this state?

  • The switch experienced a temperature anomaly exceeding operational thresholds.

  • The DHCP server has run out of IP addresses to assign to clients.

  • The port security settings have been violated, such as exceeding the maximum number of allowed MAC addresses.

  • There was an incorrect cable type used between the server and the switch.

Question 9 of 20

A branch office has deployed an SD-WAN solution that performs deep-packet inspection to recognize individual applications such as VoIP, Office 365, or peer-to-peer traffic. The device can then automatically prioritize latency-sensitive voice traffic, route cloud-SaaS traffic over the best-performing link, or block unauthorized file-sharing flows based on predefined policies. Which SD-WAN capability best describes this behavior?

  • Application aware

  • Multitenancy

  • Zero-touch provisioning

  • Transport agnostic

Question 10 of 20

A network administrator is configuring a server to ensure secure file transfers between the server and client machines. The administrator wants to use a protocol that encrypts the data transfer using SSH. Which port should the administrator ensure is open on the firewall?

  • Port 21

  • Port 22

  • Port 23

  • Port 443

Question 11 of 20

What is typically the goal of an unauthorized server that assigns network configurations to clients?

  • To increase network efficiency by providing backup configuration services

  • To monitor network performance and traffic

  • To filter and secure network traffic

  • To disrupt network operations by issuing incorrect network information

Question 12 of 20

An IT specialist is tasked with configuring a company's new email server. The team wants to ensure that outbound email is encrypted using the method most commonly negotiated on TCP port 587. Which configuration setting should the specialist enable to meet this requirement?

  • Enable STARTTLS

  • Configure IMAP to listen on port 587

  • Use plain SMTP only on port 587

  • Require implicit SSL/TLS on port 587

Question 13 of 20

Your team is tasked with diagnosing intermittent network traffic issues on a high-speed corporate network. You decide to use a network tap to monitor traffic between two critical switches. When installing the tap, what is crucial to ensure effective monitoring and minimal impact on network performance?

  • Use an active tap

  • Deploy an extra switch dedicated to monitoring the traffic

  • Use a passive tap

  • Implement an additional hub between the switches

Question 14 of 20

A network technician is investigating a report that users in the marketing department (VLAN 20) can access servers in the finance department's network segment (VLAN 30). According to security policy, these two segments should be completely isolated from each other. The technician verifies that devices in both departments are receiving correct IP addresses from the DHCP server. What is the most likely cause of this security breach?

  • A broadcast storm is occurring on the network due to a routing loop.

  • The default gateway is misconfigured on the marketing department's workstations.

  • One or more switch ports for the marketing department have been assigned to the finance department's VLAN.

  • An access control list (ACL) is missing from the core router's configuration.

Question 15 of 20

Which of the following best describes the concept of configuration drift in network management?

  • A strategy to periodically update network devices to the latest firmware versions

  • The unintended changes to system configurations over time that result in divergence from initial settings

  • The manual process of aligning system configurations with compliance requirements

  • The backup and storage of configuration settings at regular intervals

Question 16 of 20

An IT technician is tasked with upgrading the network infrastructure of a small business to support higher speed applications such as video conferencing and large file transfers. The current network uses Cat 5e Ethernet cables. Which type of cable should the technician recommend to significantly increase the speed capacity of the network?

  • Cat 6

  • Cat 6a

  • Cat 7

  • Cat 5e

Question 17 of 20

A network technician is preparing a network diagram that showcases all the physical transmission mediums, including cables and hardware connections, within the company's network infrastructure. Which type of network diagram is MOST appropriate for this purpose?

  • Logical diagram

  • Layer 1 diagram

  • Layer 2 diagram

  • Layer 3 diagram

Question 18 of 20

A network technician suspects that several issues in the network are due to unmarked cables that might be incorrectly patched. What is the BEST tool to use to trace and identify these specific cables within a bundled and unmarked group?

  • Wi-Fi analyzer

  • Toner

  • Wire strippers

  • Cable tester

Question 19 of 20

Which of the following best describes a primary function of the OSI model's Session layer?

  • Encoding and decoding data streams in a network

  • Ensuring data packets are delivered in sequence and without errors via error recovery features

  • Routing packets between different networks based on destination IP address

  • Managing sessions or dialogs between applications, including control over opening and closing connections

Question 20 of 20

An organization wishes to enforce policies that restrict access to sensitive resources from unauthorized network segments. Which security rule should primarily be configured to manage this access?

  • Disable unused ports

  • MAC filtering

  • Access control list (ACL)

  • Content filtering