00:20:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

CompTIA Network+ N10-009 (V9) Logo
  • Free CompTIA Network+ N10-009 (V9) Practice Test

  • 20 Questions
  • Unlimited
  • Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 20

Which type of disaster recovery site provides only the basic facility infrastructure-such as building space, power, cooling, and network cabling-but has no pre-installed IT hardware, applications, or real-time data replication, resulting in the longest recovery time when activated after a disaster?

  • Cloud-based DR site

  • Cold site

  • Hot site

  • Warm site

Question 2 of 20

A network technician is experiencing user complaints about intermittent wireless connectivity in a newly expanded office area. Upon initial inspection using a Wi-Fi analyzer, the technician observes fluctuations in signal strength. What is the most likely cause of these fluctuations?

  • Inactive wireless SSID broadcast by the access point

  • Interference from other electronic devices or competing wireless networks

  • Faulty network card in the wireless access point

  • Exceeding the maximum bandwidth capacity allowed by the wireless network

Question 3 of 20

Which IPv4 address class is designated for multicast communications?

  • Class B

  • Class A

  • Class E

  • Class D

Question 4 of 20

During an ARP poisoning (also called ARP spoofing) attack on a local area network, what action by the attacker enables interception of traffic that is intended for another host or the default gateway?

  • The attacker disables port security to allow unauthorized devices to connect to switch ports.

  • The attacker maps their own MAC address to the IP address of a legitimate host, causing that host's traffic to be sent to the attacker first.

  • The attacker encrypts all packets on the wire to prevent anyone else from reading them.

  • The attacker overwhelms the switch with thousands of fake MAC addresses until the CAM table overflows.

Question 5 of 20

A network administrator is setting up a DHCP server for a new subnet. To ensure specific department devices always receive the same IP addresses whenever their devices connect to the network, which DHCP setting should the administrator configure?

  • Exclusions

  • Scope

  • Reservations

  • Lease time

Question 6 of 20

A network engineer is setting up a routed network where multiple routers need to operate together within an enterprise network. What is the primary purpose of a router operating at the network layer in this scenario?

  • To act as a DHCP server distributing IP addresses on the network.

  • To determine the best path for data packet traversal across different networks based on IP addresses.

  • To connect multiple network segments at different physical locations.

  • To assign IP addresses to devices within the network.

Question 7 of 20

A network administrator needs to configure a DNS record to associate a domain name with a mail server for their organization. Which DNS record type should they use to achieve this?

  • TXT (Text)

  • A (Address)

  • MX (Mail Exchange)

  • CNAME (Canonical Name)

Question 8 of 20

Which configuration is the BEST to allow a multilayer switch to route traffic between different VLANs?

  • Create an SVI for each VLAN and assign appropriate IP addresses.

  • Configure an IP helper address on the switch.

  • Assign an IP address to each switch physical interface.

  • Set the native VLAN on a trunk link.

Question 9 of 20

A network technician needs to install a cable in a factory environment with a high concentration of heavy machinery, which generates significant electromagnetic interference (EMI). To ensure the highest level of data integrity and prevent signal degradation, which of the following cable types should be used?

  • Coaxial

  • Shielded Twisted Pair (STP)

  • Optical fiber

  • Unshielded Twisted Pair (UTP)

Question 10 of 20

You are a network administrator tasked with updating the network infrastructure at your company. During the audit, you notice outdated cable maps that do not reflect current network layouts. What is the primary reason for updating these cable maps?

  • To prepare documentation for an upcoming software license audit.

  • To ensure network documentation reflects the current layout for efficient troubleshooting and maintenance.

  • To comply with cabling safety and standards documentation requirements (e.g., ANSI/TIA-568).

  • To reduce paper consumption and storage costs by eliminating old drawings.

Question 11 of 20

Which statement BEST describes how a directional antenna differs from an omnidirectional antenna in a Wi-Fi deployment?

  • It concentrates RF energy into a narrow beam, extending range in that direction and limiting interference from other directions.

  • It radiates RF energy equally in every horizontal direction, providing wide coverage but limited range.

  • It is intended mainly for mobile client devices that change orientation frequently.

  • It always requires higher transmitter power because antenna gain is lower than that of an omnidirectional antenna.

Question 12 of 20

What does the 802.11h wireless standard specifically address to aid in reducing interference in the 5GHz frequency band?

  • Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC)

  • Extended Service Set Identifications (ESSID) and Band Steering

  • Channel aggregation and traffic prioritization

  • Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS)

Question 13 of 20

Which of the following best describes the primary purpose of BGP in network implementations?

  • To increase the internal switching speed within an individual network

  • To manage the exchange of routing information between autonomous systems

  • To encrypt data transferred over the Internet

  • To assign IP addresses to devices within a local network

Question 14 of 20

What describes the reduction in signal strength as it travels through a cable?

  • Interference

  • Attenuation

  • Echo

  • Collision

Question 15 of 20

A network administrator has recently applied several configurations to a core router to enhance its security setup. To ensure these configurations are properly applied and active on the router, which command should the administrator use?

  • show mac-address-table

  • show config

  • show power

  • show interface

Question 16 of 20

Your company's network frequently faces problems with clients being unable to access websites by name using the primary name resolution server, set to query other servers for this information if it doesn't already have it. What is the most likely cause of these connectivity problems?

  • Security protocols on domain querying were activated, blocking all external name requests

  • The presence of a rogue configuration protocol server is disrupting name query processes

  • The connectivity issues stem from having the caching feature disabled on the name resolution server

  • The name resolution server can't reach external servers because of incorrect firewall configurations

Question 17 of 20

A telecommunications provider wants to upgrade its core network infrastructure to improve scalability and reduce operational expenses associated with physical network devices. The solution should enable dynamic management of network services such as VPNs and intrusion prevention systems. Which technology would best fulfill these requirements?

  • Software-defined Networking (SDN)

  • Network Functions Virtualization (NFV)

  • Multiprotocol Label Switching (MPLS)

  • Internet Protocol Security (IPSec)

Question 18 of 20

A DevOps network team is introducing Infrastructure as Code (IaC) to automate switch and firewall deployments across several branch offices. Which technology should they implement first to track every proposed configuration change, maintain a history of revisions, and enable rapid rollbacks when errors are detected?

  • A source control (version-control) system to manage configuration files

  • A next-generation firewall and IDS cluster for added security

  • A high-performance Layer 3 switch to lower network latency

  • A remote power-cycling console to physically manage devices

Question 19 of 20

Which type of DNS zone is responsible for mapping an IP address back to its associated domain name?

  • Forward zone

  • Reverse zone

  • Security zone

  • Redirection zone

Question 20 of 20

An IT administrator at a financial services firm is enhancing the security policy related to user authentication on their network. The goal is to ensure only authorized users can access sensitive financial data. The administrator decides to implement an additional layer of security that involves something the user knows and something the user has. Which of the following authentication methods is the administrator planning to implement?

  • Biometric authentication

  • Single-factor authentication

  • Multifactor authentication (MFA)

  • Hardware token only