00:15:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 15

A network administrator is configuring an Ethernet switch port that will connect to a VoIP desk phone. The phone has a built-in switch so that a user's PC can share the same cable run. Which port configuration will provide separate traffic handling for the phone and the PC while using only one physical interface on the switch?

  • Set the interface to access mode on the data VLAN and configure a separate voice VLAN

  • Configure the interface as a trunk port and allow all VLANs, including voice and data

  • Assign only a voice VLAN to the interface and leave data untagged on the default VLAN

  • Enable Auto-MDI/MDI-X with portfast and leave the VLAN assignment at the default

Question 2 of 15

A company is planning to establish a secure connection between two of their branch offices over the internet. The network administrator has been tasked with choosing a protocol that encrypts and authenticates the data packet for secure transmission. Which protocol should be utilized?

  • IPSec

  • DHCP

  • GRE

  • SSL/TLS

Question 3 of 15

Which security property is primarily provided when data is encrypted as it traverses an untrusted network such as the internet?

  • Integrity - it ensures packets cannot be altered in transit.

  • Availability - it prevents attackers from delaying or blocking the data.

  • Non-repudiation - it proves the sender cannot deny sending the data.

  • Confidentiality - intercepted data remains unreadable without the decryption key.

Question 4 of 15

Which IPv4 address range correctly defines the scope reserved for Class D multicast addresses?

  • 224.0.0.0 to 239.255.255.255

  • 192.0.0.0 to 223.255.255.255

  • 230.0.0.0 to 239.0.0.0

  • 127.0.0.0 to 127.255.255.255

Question 5 of 15

A network engineer is selecting appropriate cabling for a new data center. They need a solution that supports increased bandwidth over long distances and is less susceptible to electrical interference. Which type of cable best meets these requirements?

  • Coaxial cable

  • Multimode fiber

  • Twinaxial cable

  • Single-mode fiber

Question 6 of 15

A network technician is troubleshooting a fiber optic link that is performing below expected levels. The technician suspects that the issue may be related to the signal strength. What is the BEST method to verify and troubleshoot the signal strength related issues?

  • Adjust the wavelength settings on the networking hardware.

  • Measure the dB loss using an Optical Power Meter.

  • Replace the fiber cables with higher category ones to improve signal strength.

  • Check the compatibility of the transceiver with the installed fiber cables.

Question 7 of 15

A company's network engineer is evaluating designs for enhancing the resiliency and fault tolerance of their distributed data center network architecture. They are considering implementing a full mesh topology. What is the primary advantage of selecting a full mesh topology for this purpose?

  • It increases the data transfer speeds across the network.

  • It reduces the need for routing protocols, simplifying the network architecture.

  • It minimizes cabling costs by reducing the total length of cables needed.

  • It provides direct connections between all nodes, enhancing fault tolerance and redundancy.

Question 8 of 15

A network administrator is setting up separate network segments for IP phones on an access switch. Which switch setting should be given priority to optimize call quality and overall performance for these voice devices?

  • Adjust the speed and duplex settings

  • Set up link aggregation

  • Voice VLAN configuration

  • Enable 802.1Q tagging

Question 9 of 15

A corporate environment is planning to expand its wireless network across multiple offices. The network manager wants to ensure centralized control over all wireless access points to streamline configurations and management. Which type of access point should be used?

  • Managed switches

  • Unmanaged switches

  • Lightweight access points

  • Autonomous access points

Question 10 of 15

Within an enterprise firewall configuration, interfaces are mapped to different security zones. Which statement BEST differentiates a trusted zone from an untrusted zone?

  • A trusted zone is an internal, organization-controlled network with the highest trust level, whereas an untrusted zone is an external network (such as the Internet) with no inherent trust.

  • Trusted zones allow traffic only on ports above 1024 by default, while untrusted zones allow traffic on any port.

  • Trusted zones consist solely of public-facing servers placed between two firewalls, while untrusted zones sit behind the internal firewall with user workstations.

  • Devices in trusted zones use only MAC filtering for access control, whereas devices in untrusted zones use only IP-based filtering.

Question 11 of 15

Which of the following best describes the Ethernet frame size specified under the 802.3 standards?

  • 64 to 1518 bytes

  • 1500 to 1522 bytes

  • 100 to 1500 bytes

  • 128 to 1024 bytes

Question 12 of 15

A network technician is tasked with wiring a new office with Ethernet cables. The technician decides to use Cat6 cables for the connections. Which connector type should be used to terminate these cables at the patch panel and network interface cards?

  • RJ11

  • LC

  • RJ45

  • BNC

Question 13 of 15

A company's IT security team is planning to deploy a honeypot to improve their detection of malicious activity within their network. Which of the following best describes the primary function of the honeypot they should implement?

  • To attract attacks in order to study attacker behavior or distract them from more valuable targets.

  • To test network performance under high load to ensure stability and speed.

  • To redirect excess network traffic to optimize bandwidth usage during peak hours.

  • To secure endpoints by deploying strict access control and authentication processes.

Question 14 of 15

Closed-circuit television (CCTV) cameras installed around a data center are typically classified as which type of physical security control?

  • Compensating

  • Detection

  • Corrective

  • Prevention

Question 15 of 15

An enterprise is deploying a new set of network links that will connect data centers located approximately 15 kilometers apart. The project requirements specify that the fiber optic cable used must efficiently support high-speed data transmission over these long distances with minimal signal loss. Which type of fiber optic cable should the technician select to meet these specifications?

  • Shielded twisted pair

  • Multimode fiber

  • Enhanced Cat 5e copper cable

  • Single mode fiber