00:20:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

CompTIA Network+ N10-009 (V9) Logo
  • Free CompTIA Network+ N10-009 (V9) Practice Test

  • 20 Questions
  • Unlimited
  • Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 20

While working in a corporate environment as a network administrator, you notice that several devices are unable to communicate with each other despite being connected to what you believe is the same VLAN. What command can you execute to verify VLAN assignments and troubleshoot the issue?

  • show config

  • show interface

  • show vlan

  • show mac-address-table

Question 2 of 20

When a computer configured to obtain an IP address automatically is unable to reach a Dynamic Host Configuration Protocol (DHCP) server, which IP address range will it most likely assign to itself?

  • 255.255.255.0 network subnet mask

  • 127.0.0.1 to 127.255.255.254

  • 192.168.0.1 to 192.168.255.254

  • 169.254.0.1 to 169.254.255.254

Question 3 of 20

A network administrator notices that devices on the local network are unable to access external websites. After verifying that internet services from the ISP are operational and that internal resources are accessible, the administrator suspects an issue with the network's routing configuration. What configuration error is likely causing the devices to fail connecting to external websites?

  • The routing table contains incorrect entries for local subnets.

  • The default gateway is not correctly configured on the router.

  • Incorrect subnet masks are configured on the devices.

  • ACLs are blocking access to external network addresses.

Question 4 of 20

Which protocol and port combination is primarily used for securely transferring web pages from web servers to clients?

  • HTTPS | 443

  • SMTP | 25

  • FTP | 21

  • Telnet | 23

Question 5 of 20

What would likely be the symptom if a device on a local network has an incorrect default gateway configured?

  • Intermittent wireless disconnections

  • Duplicate IP address error

  • Cannot access external websites or services

  • High latency in intranet communications

Question 6 of 20

What is the primary purpose of implementing a guest network in a corporate environment?

  • To provide secure internet access to untrusted devices

  • To optimize network traffic

  • To hide IP schemes from untrusted devices

  • To support specific functions in corporate communications

Question 7 of 20

A network administrator receives alerts that several users are experiencing connectivity issues. The administrator decides to perform a ping operation to test the reachability of these users' computers. Which protocol does the ping command primarily utilize to verify network connectivity?

  • Simple Network Management Protocol (SNMP)

  • Hypertext Transfer Protocol Secure (HTTPS)

  • Hypertext Transfer Protocol (HTTP)

  • Internet Control Message Protocol (ICMP)

Question 8 of 20

A company is implementing a zero trust architecture to bolster their network security. As part of this initiative, what approach should be primarily taken to ensure that authorized users are allowed access to network resources?

  • Grant access based on policy-based authorization

  • Provide network access to devices following a preliminary security assessment

  • Allow access based on user location within the enterprise premises, subject to additional verifications

  • Offer access based on network segment location, supplemented by user credential checks

Question 9 of 20

A network technician is tasked with connecting a legacy fax machine in an office to the network. The fax machine uses an older connection interface. Which type of cable should the technician use to connect this device?

  • RJ11 cable

  • Coaxial cable

  • RJ48 cable

  • RJ45 cable

Question 10 of 20

Which design approach best utilizes a screened subnet for enhancing network security, considering its strategic placement in network architecture?

  • Configuring it to serve as the main hub for internal routing and switching, optimizing the network's core performance.

  • Implementing it for all employee workstations to ensure uniform security policies across the company.

  • Utilizing it to separate the internal network from the external internet, placing only externally accessible services such as a web server within it.

  • Deploying it as the primary network for internal operations with high-speed connectivity requirements.

Question 11 of 20

A company is reviewing its data center security measures to prevent unauthorized physical access. Which of the following would BEST enhance the security at the primary entrance to the data center?

  • Implement a pin code access system

  • Place surveillance cameras at the entrance

  • Install biometric locks that require fingerprint authentication

  • Use traditional key locks

Question 12 of 20

What is the primary function of a captive portal in a network environment?

  • To encrypt data packets on a wireless network using WPA2

  • To increase the range of the wireless signal

  • To allocate IP addresses to devices connected to the network

  • To authenticate and redirect users to a login page before they gain access to the network

Question 13 of 20

A network engineer is troubleshooting an issue where a newly installed switch is not connecting to the network. After confirming the switch configuration is correct, the engineer establishes a theory that a cable fault is the probable cause. According to the CompTIA troubleshooting methodology, what is the best next step?

  • Replace the switch with a new one.

  • Perform a traceroute from a connected device.

  • Ping the default gateway from the switch.

  • Test the cable using a cable tester.

Question 14 of 20

A network administrator is setting up a wireless network in a busy office environment. The administrator wants to ensure that employee devices connect seamlessly to the strongest signal within the office without manually switching between multiple access points. What is the BEST configuration to use?

  • Assign a unique BSSID for each access point.

  • Use a single ESSID across all access points.

  • Implement band steering on all access points.

  • Configure each access point as a separate mesh network.

Question 15 of 20

What is a primary result of a network loop occurring within a switched environment?

  • Routing loops

  • Broadcast storm

  • Duplicated IP addresses

  • MAC address instability

Question 16 of 20

A network administrator is setting up a DHCP server for a new subnet. To ensure specific department devices always receive the same IP addresses whenever their devices connect to the network, which DHCP setting should the administrator configure?

  • Scope

  • Exclusions

  • Lease time

  • Reservations

Question 17 of 20

A network administrator notices that a Windows 11 workstation cannot communicate with other hosts on the same subnet. Which command-line method should the administrator use on the workstation to verify that its stored mappings between network (IP) addresses and hardware (MAC) addresses are correct?

  • Clear all cached ARP entries with arp -d *

  • Display the workstation's ARP cache with arp -a

  • View the routing table on the default gateway using show ip route

  • List interface details with ipconfig /all

Question 18 of 20

A company is planning to expand its network across multiple geographic locations and requires a scalable and flexible networking solution that can manage diverse traffic types efficiently while also allowing centralized management. Which technology would be most appropriate for its needs?

  • Virtual private network (VPN)

  • Software-defined wide area network (SD-WAN)

  • IPv6 addressing

  • Zero Trust Architecture (ZTA)

Question 19 of 20

A network engineer needs to update the firmware of several low-storage network devices in a resource-constrained environment. The devices do not require secure file transfers. Which protocol is the most suitable for performing these updates?

  • File Transfer Protocol (FTP)

  • Hypertext Transfer Protocol (HTTP)

  • Trivial File Transfer Protocol (TFTP)

  • Secure File Transfer Protocol (SFTP)

Question 20 of 20

A user named Sarah has reported that her ability to access the corporate website fluctuates throughout the working day, with periods during which the website becomes inaccessible. What question should you prioritize to effectively gather initial relevant information and identify potential patterns or causes?

  • Suggest checking Sarah's computer for potential malware or viruses that might be affecting her connectivity.

  • Query whether any of her colleagues are facing similar issues, focusing on possible common variables across users.

  • Inquire if the issue happens at specific times and if it's restricted to the corporate site or also affects other websites.

  • Ask directly about any recent changes to her computer system or network settings to correlate the issue to changes in configuration.