00:20:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

CompTIA Network+ N10-009 (V9) Logo
  • Free CompTIA Network+ N10-009 (V9) Practice Test

  • 20 Questions
  • Unlimited
  • Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 20

What does channel width in wireless networking determine?

  • The security protocol used in wireless communication

  • The range of frequencies a wireless signal uses on a specific channel

  • The maximum distance a wireless signal can travel

  • The number of devices that can connect to a network

Question 2 of 20

Which of the following scenarios BEST describes the use of a public network deployment model?

  • A government agency using a secured network to transmit sensitive data.

  • A company using a network only accessible by its employees to share internal documents.

  • A corporation hosting its website which is accessible to anyone on the internet.

  • An organization using a virtual private network (VPN) for connecting remote employees to its internal network.

Question 3 of 20

A company plans to extend its Wi-Fi coverage to ensure seamless connectivity across its large, multi-floor office building without installing additional cabling. They are considering using a mesh network. Which of the following benefits is a primary reason for choosing a mesh network in this scenario?

  • It ensures fiber optic or ethernet cabling is redundant and fail-safe.

  • It inherently provides better bandwidth utilization.

  • It significantly increases the amount of broadcast traffic.

  • It allows extensive coverage with minimal physical infrastructure.

Question 4 of 20

To minimize the impact of malicious redirection of web traffic within a network, which of the following measures would MOST effectively authenticate legitimate responses?

  • Implement and configure DNSSEC for servers

  • Deploy network firewalls at key perimeter points

  • Increase the complexity of network passwords

  • Regularly update antivirus software on client machines

Question 5 of 20

Which CLI command on a Cisco IOS XE or Catalyst switch displays detailed Power over Ethernet (PoE) status, including how much power each interface is using and the remaining power budget?

  • show environment power

  • show power inline

  • show interfaces status

  • show mac-address-table

Question 6 of 20

What range of IP addresses is automatically assigned by a host when DHCP server communication fails?

  • 192.168.0.1 to 192.168.255.254

  • 10.0.0.1 to 10.255.255.254

  • 169.254.0.1 to 169.254.255.254

  • 172.16.0.1 to 172.31.255.254

Question 7 of 20

A network administrator is investigating why certain web addresses are redirecting users to unintended websites on a specific company workstation. Which method is MOST effective to verify if this issue is stemming from local configurations?

  • Inspect the Hosts file for any hardcoded mappings between hostnames and network addresses.

  • Verify the connectivity by testing the route to another network device.

  • Reinitialize the network interface to force a reload of configuration parameters.

  • Flush the locally stored resolution information using relevant system commands.

Question 8 of 20

A network administrator is configuring SNMP to enhance the security of network monitoring. They need to ensure that the SNMP version they choose supports strong authentication and encryption. Which version of SNMP should they implement?

  • SNMPv1

  • SNMPv3

  • SNMPv2c

Question 9 of 20

What is the primary purpose of conducting a wireless survey and creating a heat map in a network environment?

  • To increase the throughput of wired network connections

  • To visualize and optimize wireless signal strength and coverage

  • To monitor the real-time traffic through the network

  • To enhance the physical security of the network infrastructure

Question 10 of 20

What is the primary function of RADIUS in network security?

  • Encrypting data traffic for all network devices

  • Managing centralized Authentication, Authorization, and Accounting for network services

  • Physically securing network-connected hardware

  • Providing cloud storage solutions for network data

Question 11 of 20

According to PCI DSS version 4.0, what must an organization do to protect cardholder data whenever that data is transmitted across open, public networks such as the Internet, wireless, or cellular links?

  • Transmit the data in clear text if it stays within a private VLAN.

  • Compress the data before sending it to reduce exposure time.

  • Encrypt the data using strong cryptography and secure protocols (e.g., TLS 1.2 or higher) for the entire session.

  • Mask the primary account number by replacing the middle six digits with asterisks but leave the remainder unencrypted.

Question 12 of 20

A network issue has been reported where two computers in the same segment cannot communicate, despite having what appears to be properly configured addresses. Investigation reveals a discrepancy: one machine uses a mask of 255.255.255.0, while the other employs a mask of 255.255.254.0. What is the MOST likely resolution to allow seamless communication between these devices?

  • Standardize the network mask on both computers to 255.255.255.0

  • Adjust the network address of the second machine to match the mask setting of the first

  • Replace the network interfaces of both computers

  • Divide the network into smaller, distinct segments with new masks

Question 13 of 20

Which of the following best defines Mean Time to Repair (MTTR) in a networking or disaster-recovery context?

  • The average time required to repair a failed component and return it to normal operation.

  • The average time between one failure and the next for a given device or system.

  • The maximum acceptable amount of data loss measured in time after an outage.

  • The total time it takes to detect that a failure has occurred, without including repair.

Question 14 of 20

You are tasked with diagnosing an issue where a server is intermittently unreachable from multiple clients across different subnets. You decide to use a command line tool to trace the path packets take through the network to the server. Which command should you use to identify at which hop in the network path the packets are being dropped?

  • tracert (Windows) / traceroute (Unix/Linux)

  • ping

  • netstat

  • ipconfig / ifconfig

Question 15 of 20

What is the primary purpose of using the ping command in network troubleshooting?

  • To determine the speed of the network connection

  • To automatically resolve any detected network connectivity issues

  • To physically map out the network infrastructure

  • To test the reachability of a host on an IP network and measure the round-trip time for messages sent

Question 16 of 20

What does an increase in the CRC counter typically indicate on a network device?

  • Excessive bandwidth usage exceeding the available limit

  • Configuration errors in network addressing

  • Routing loops in the network topology

  • Physical layer issues such as noise or cable problems

Question 17 of 20

A network analyst is troubleshooting an issue where users are unable to access a web application hosted internally. Upon investigation, the analyst detects that the application receives the HTTP request, processes it, but users do not receive any response. At which layer of the OSI model should the analyst first focus their troubleshooting efforts?

  • Network Layer (Layer 3)

  • Transport Layer (Layer 4)

  • Application Layer (Layer 7)

  • Session Layer (Layer 5)

Question 18 of 20

You are a network administrator tasked with updating the network infrastructure at your company. During the audit, you notice outdated cable maps that do not reflect current network layouts. What is the primary reason for updating these cable maps?

  • To comply with cabling safety and standards documentation requirements (e.g., ANSI/TIA-568).

  • To prepare documentation for an upcoming software license audit.

  • To ensure network documentation reflects the current layout for efficient troubleshooting and maintenance.

  • To reduce paper consumption and storage costs by eliminating old drawings.

Question 19 of 20

During an analysis of network traffic patterns, a network administrator detects intermittent latency spikes that are not associated with scheduled backup operations. These spikes coincide with high utilization rates on the database server. Which of the following methods will most effectively further analyze the nature of the traffic causing these spikes?

  • Review firewall logs for denied connections during the times of spikes

  • Implement port mirroring to capture the traffic to and from the database server

  • Set a new Quality of Service (QoS) policy for database-related traffic

  • Optimize database queries to reduce load on the server

Question 20 of 20

During a network audit, an administrator needs to verify the exact model and software version of devices connected directly to a company's primary Cisco switch. Which protocol would be BEST for collecting this detailed information automatically?

  • LLDP

  • Using the command line to manually check each device

  • CDP

  • SNMP