00:15:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 15

A company's web server has been configured to allow secure transactions for their online store. The security administrator wants to ensure that the data exchanged between the web server and clients is encrypted. Which port should the firewall be configured to allow so that secure web traffic can pass through?

  • Port 22

  • Port 443

  • Port 80

  • Port 53

Question 2 of 15

In a network interface configuration, setting the speed incorrectly can cause performance degradation. What is the potential impact of configuring a gigabit switch port to 100 Mbps when connected devices support gigabit speeds?

  • It leads to total loss of data transfer between devices

  • It creates a bottleneck, limiting the data rate to less than what the devices are capable of handling

  • It makes the devices use an outdated protocol for communication

  • It increases the noise level on the physical medium

Question 3 of 15

Your company is expanding its internal data center setup, which includes multiple servers that handle sensitive information. These servers require configuration to ensure they are isolated from direct internet access. What type of network address should be assigned to maintain their inaccessibility from the global web?

  • APIPA addresses

  • Private network addresses

  • Externally routable RFC 1918 addresses

  • Public network addresses

Question 4 of 15

Which of the following accurately describes a network intrusion detection system (IDS) when compared with an intrusion prevention system (IPS)?

  • An IDS and an IPS both operate inline and both can automatically block malicious traffic.

  • An IDS blocks malicious traffic in real time, whereas an IPS only logs the activity for administrators.

  • An IDS can replace a firewall because it performs stateful packet inspection and enforces access-control lists, unlike an IPS.

  • An IDS operates out of band, generates alerts, and does not block traffic, whereas an IPS sits inline and can automatically drop malicious packets.

Question 5 of 15

Which of the following best describes a network that modifies its behavior based on the type of application traffic it detects?

  • A network that uses the same routing protocol for all data packets flowing through it.

  • A network that employs a standard firewall rule set applied uniformly to all traffic.

  • A network with fixed QoS policies that strictly segments bandwidth based on VLAN IDs regardless of traffic type.

  • A network that prioritizes video streaming over regular browsing to ensure quality service.

Question 6 of 15

When initially addressing a network outage, what should be done FIRST according to the standard troubleshooting methodology?

  • Duplicate the problem

  • Gather information

  • Establish a theory of probable cause

  • Question users

Question 7 of 15

A network technician is troubleshooting an application that is experiencing glitches and dropouts. What is the most direct symptom of network packet loss?

  • Enhanced bandwidth utilization

  • Implementation of new encryption protocols

  • Intermittent data transmission errors

  • Increased network latency

Question 8 of 15

Within an enterprise firewall configuration, interfaces are mapped to different security zones. Which statement BEST differentiates a trusted zone from an untrusted zone?

  • Trusted zones allow traffic only on ports above 1024 by default, while untrusted zones allow traffic on any port.

  • A trusted zone is an internal, organization-controlled network with the highest trust level, whereas an untrusted zone is an external network (such as the Internet) with no inherent trust.

  • Devices in trusted zones use only MAC filtering for access control, whereas devices in untrusted zones use only IP-based filtering.

  • Trusted zones consist solely of public-facing servers placed between two firewalls, while untrusted zones sit behind the internal firewall with user workstations.

Question 9 of 15

Considering a standard Class C network with the address 192.168.15.0, what would be the broadcast address for this network?

  • 192.168.255.255

  • 192.168.15.255

  • 192.168.15.1

  • 192.168.15.0

Question 10 of 15

A network administrator needs to configure a secure connection that allows individual employees working from home to access the corporate network over the internet. Which VPN configuration is most appropriate for this scenario?

  • Full tunnel

  • Client-to-site

  • Split tunnel

  • Site-to-site

Question 11 of 15

A company requires its employees to access sensitive systems only during their assigned shifts. The network administrator needs to implement a security mechanism that restricts employee access to these systems based solely on the current time and their shift schedule. Which type of authentication mechanism would be most appropriate to meet this requirement?

  • Multifactor authentication (MFA)

  • Time-based authentication

  • Role-based access control

  • LDAP

Question 12 of 15

A network administrator at a medium-sized enterprise plans to upgrade the firmware on several critical routers. To ensure a systematic approach compliant with best practices for network management, which of these actions should most appropriately initiate the change management process?

  • Directly implement the changes during a scheduled maintenance window

  • Submit a change request to the change advisory board (CAB) for review and approval

  • Informally discuss the change with colleagues to gather feedback before proceeding

  • Start with a thorough risk assessment before proposing any specific actions

Question 13 of 15

When a computer configured to obtain an IP address automatically is unable to reach a Dynamic Host Configuration Protocol (DHCP) server, which IP address range will it most likely assign to itself?

  • 255.255.255.0 network subnet mask

  • 127.0.0.1 to 127.255.255.254

  • 192.168.0.1 to 192.168.255.254

  • 169.254.0.1 to 169.254.255.254

Question 14 of 15

A network administrator is troubleshooting connectivity issues in a newly installed network segment. After examining the installation, the administrator notices that there is excessive noise near some of the cables. Which cable type is most likely in use and would be most vulnerable to electromagnetic interference (EMI)?

  • Shielded Twisted Pair (STP)

  • Fiber optic

  • Unshielded Twisted Pair (UTP)

  • Coaxial

Question 15 of 15

A network administrator at a broadcasting company needs to ensure that video streams and audio feeds are synchronized across various devices on the network. Which protocol would be most effective for achieving the high-precision time synchronization required for this scenario?

  • Global Positioning System (GPS) time synchronization

  • Precision Time Protocol (PTP)

  • Network Time Protocol (NTP)

  • Dynamic Host Configuration Protocol (DHCP)