00:15:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 15

Which wireless standard is currently recommended to enhance security in modern wireless network infrastructures?

  • TKIP

  • WPA2

  • WEP

  • WPA3

Question 2 of 15

A network administrator is tasked with configuring a reverse DNS lookup for a subnet used by company email servers. After setting up the necessary zone files, which type of DNS record should they add to associate the subnet's IP addresses with a canonical hostname?

  • PTR records

  • MX records

  • NS records

Question 3 of 15

A company's network administrator discovers that multiple users are complaining about connectivity issues and incorrect network settings. After investigation, the administrator suspects the presence of an unauthorized DHCP server on the network. What is the potential security risk posed by this rogue DHCP server?

  • It serves as a backup server improving network redundancy.

  • It encrypts data packets causing delays in data transmission.

  • It can issue incorrect network settings leading to traffic misdirection.

  • It increases the network's broadcast traffic, slowing down network speeds.

Question 4 of 15

A company is reviewing its data center security measures to prevent unauthorized physical access. Which of the following would BEST enhance the security at the primary entrance to the data center?

  • Implement a pin code access system

  • Place surveillance cameras at the entrance

  • Use traditional key locks

  • Install biometric locks that require fingerprint authentication

Question 5 of 15

Which scenario best represents a typical use case for implementing VXLAN in an enterprise network?

  • Extending Layer 2 domains across multiple data centers

  • Managing Quality of Service (QoS) for streaming media

  • Reducing the number of required IP addresses in a small office

  • Encrypting data transmission between two endpoints in the same data center

Question 6 of 15

An IT support technician in a mid-sized company is noticing that latency issues are affecting the performance of their Voice over IP (VoIP) calls, especially during peak usage hours. Which of the following actions should the technician explore first to troubleshoot and address the latency on the network?

  • Check the current bandwidth usage and availability on key network segments.

  • Inspect the physical layer for any signs of damage or interference in cable connections.

  • Upgrade the firmware on network routers and switches to the latest version.

  • Immediately configure Quality of Service (QoS) settings to prioritize VoIP traffic.

Question 7 of 15

Which IPv4 address is classified as a public IP address?

  • 192.168.1.1

  • 172.16.254.3

  • 8.8.4.4

  • 10.0.0.1

Question 8 of 15

An organization wants to establish secure communications between its headquarters and remote offices through the internet. They require a tunneling solution that supports both encapsulation and encryption to ensure data privacy and security. Which protocol should they implement?

  • Routing Information Protocol (RIP)

  • Border Gateway Protocol (BGP)

  • Internet Protocol Security (IPsec)

  • Generic Routing Encapsulation (GRE)

Question 9 of 15

A network administrator is setting up a network that must support both IPv4 and IPv6. Which configuration approach allows the network devices to process IPv4 and IPv6 packets simultaneously, optimizing the handling of traffic without the need for extra translation mechanisms?

  • Tunneling

  • NAT64

  • Dual stack

Question 10 of 15

A network administrator is configuring a server that needs to guarantee data delivery without errors, and in the correct order. Which protocol would be the most appropriate to prioritize these needs?

  • ICMP

  • TCP

  • UDP

  • IPSec

Question 11 of 15

Which of the following IPv4 addresses falls within the private address space specified by RFC 1918 and therefore cannot be routed across the public Internet?

  • 8.8.8.8

  • 192.168.1.1

  • 203.0.113.10

  • 172.34.0.5

Question 12 of 15

In a network interface configuration, setting the speed incorrectly can cause performance degradation. What is the potential impact of configuring a gigabit switch port to 100 Mbps when connected devices support gigabit speeds?

  • It leads to total loss of data transfer between devices

  • It makes the devices use an outdated protocol for communication

  • It creates a bottleneck, limiting the data rate to less than what the devices are capable of handling

  • It increases the noise level on the physical medium

Question 13 of 15

A network administrator at a medium-sized enterprise is configuring an extended ACL on the main router to restrict access to a secure server subnet that hosts sensitive client data. The server network is 192.168.5.0/24. Only devices on the administration team's subnet, 10.10.10.0/24, should be able to reach this server network. Which of the following ACL statements accomplishes this requirement?

  • permit ip 192.168.5.0 0.0.0.255 10.10.10.0 0.0.0.255

  • permit ip 10.10.10.0 0.0.0.255 any

  • permit ip any 192.168.5.0 0.0.0.255

  • permit ip 10.10.10.0 0.0.0.255 192.168.5.0 0.0.0.255

Question 14 of 15

An organization plans to temporarily connect its IPv4 infrastructure to a new, IPv6-based service provider. Which of the following options facilitates communication between the new provider's IPv6 network and the organization's existing IPv4 system without altering client or server configurations?

  • Tunnel broker

  • NAT64

  • DHCP relay

  • Dual-stack architecture

Question 15 of 15

Which of the following would be the BEST method to guarantee bandwidth for a video conferencing application?

  • Applying QoS policies to prioritize traffic

  • Increasing the overall bandwidth of the internet connection

  • Using traffic policing to limit traffic rates

  • Implementing traffic shaping to control traffic bursts