00:20:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

CompTIA Network+ N10-009 (V9) Logo
  • Free CompTIA Network+ N10-009 (V9) Practice Test

  • 20 Questions
  • Unlimited
  • Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 20

Which algorithm does Open Shortest Path First (OSPF) use to build its shortest-path tree when determining the best routes through a network?

  • Path Vector algorithm

  • Bellman-Ford algorithm

  • Dijkstra's Shortest Path First (SPF) algorithm

  • Ford-Fulkerson algorithm

Question 2 of 20

Which scenario BEST demonstrates the principle of integrity within the CIA triad?

  • Regularly backing up data to a secure location.

  • Using encryption to protect data from unauthorized access.

  • Employing checksums to verify data integrity during transmission.

  • Implementing role-based access controls to limit data access based on user roles.

Question 3 of 20

A network administrator notices that a switch port, which connects to a server, is no longer active and upon checking, finds that the port has been put into an 'error disabled' state. What is the MOST likely cause for this state?

  • There was an incorrect cable type used between the server and the switch.

  • The switch experienced a temperature anomaly exceeding operational thresholds.

  • The DHCP server has run out of IP addresses to assign to clients.

  • The port security settings have been violated, such as exceeding the maximum number of allowed MAC addresses.

Question 4 of 20

A network administrator is setting up a wireless network in a busy corporate office with numerous other wireless networks. The administrator wants to make sure the new network can be easily identified by staff while ensuring it is configured securely. What is the best practice when naming this new network?

  • Create a descriptive and unique SSID that references the company while avoiding sensitive internal details.

  • Retain the default SSID provided by the wireless hardware manufacturer.

  • Include specific department details in the SSID to clearly indicate its intended users.

  • Use a generic name such as "wireless" to prevent confusion.

Question 5 of 20

A network administrator notices an increase in CRC errors on a network interface. What is the BEST first step in troubleshooting this issue?

  • Reconfigure the switch VLAN assignments

  • Update the network drivers and firmware

  • Check the network cables for damage or misconfiguration

  • Increase the bandwidth allocation for affected connections

Question 6 of 20

The IT team at a large retail company is reviewing its disaster-recovery strategy to meet the organization's requirement for moderate downtime after a disruption. They are considering implementing a warm site. Which of the following best describes the state of a warm site that they should expect?

  • Equipped only with the physical infrastructure and requires all servers, applications, and data to be restored before operations can resume.

  • Lacks any pre-installed hardware and is primarily an empty data center reserved for emergency use.

  • Partially equipped with servers, network connections, and possibly some replicated data, but requires additional configuration before it can become fully operational.

  • Fully operational with all services, applications, and data mirrored from the primary site and running in real time.

Question 7 of 20

A network engineer needs to segment a network into multiple broadcast domains without using additional hardware. Which Layer 2 technology should be implemented to achieve this?

  • Routing

  • VLAN

  • Subnetting

  • NAT

Question 8 of 20

Which of the following best describes the role of administrative distance in a network environment?

  • It configures the actual metric values of routes on the router.

  • It is used to define the router's physical distance from the destination network.

  • It identifies the number of routers in the path to the destination.

  • It determines the preference of routing information received from different routing sources.

Question 9 of 20

You are tasked with diagnosing an issue where a server is intermittently unreachable from multiple clients across different subnets. You decide to use a command line tool to trace the path packets take through the network to the server. Which command should you use to identify at which hop in the network path the packets are being dropped?

  • ping

  • ipconfig / ifconfig

  • tracert (Windows) / traceroute (Unix/Linux)

  • netstat

Question 10 of 20

Following the implementation of enhanced security measures to validate authenticity and integrity of network address data, an organization notices that some valid address lookups are being rejected. What is the most likely cause of this problem?

  • The address lookup systems do not support enhanced security verifications

  • The information storage systems are experiencing high rates of traffic delays

  • The cryptographic signatures were not updated following changes to the address records

  • Security appliances are configured to block address lookup operations

Question 11 of 20

What is the primary focus of a logical network diagram?

  • It illustrates the architecture and communication paths within a network.

  • It provides a detailed representation of server rack positions.

  • It shows the physical location of all the network devices and cabling.

  • It describes the power sources and cooling systems used in the data center.

Question 12 of 20

What best describes the role of a Basic Service Set Identifier (BSSID) in a wireless network?

  • It serves as the network name that is broadcasted by wireless routers.

  • It specifies the maximum capacity of connected devices within a network.

  • It uniquely identifies each access point within a wireless network using a MAC-like address.

  • It acts mainly as a security measure to prevent unauthorized access.

Question 13 of 20

A network technician is designing a wireless network for a large office building. The goal is for employees to walk from one end of the building to the other without losing their Wi-Fi connection. To achieve this seamless roaming, multiple access points will be deployed as part of an Extended Service Set (ESS). How should the access points be configured?

  • Configure each access point with the same SSID on different, non-overlapping channels.

  • Configure each access point with a unique SSID and a unique channel.

  • Configure each access point with the same SSID on the same channel.

  • Configure each access point with a unique SSID and the same BSSID.

Question 14 of 20

A technician needs to create a temporary wireless network for several users to share files directly between their laptops in a meeting room that lacks an access point. Which of the following wireless network types best describes this configuration?

  • Ad hoc

  • Mesh

  • Point-to-point

  • Infrastructure

Question 15 of 20

An organization uses a network configured with routers handling multiple subnets. While establishing a route for new data packets, which type of address does the router primarily use to determine the next hop?

  • Service number

  • Port number

  • IP address

  • MAC address

Question 16 of 20

A network engineer is configuring a corporate router to support a site-to-site VPN. Which IP protocol should be enabled on the router to securely encapsulate and transport payloads over the public network?

  • UDP

  • TCP

  • IPSec

  • ICMP

Question 17 of 20

A DevOps network team is introducing Infrastructure as Code (IaC) to automate switch and firewall deployments across several branch offices. Which technology should they implement first to track every proposed configuration change, maintain a history of revisions, and enable rapid rollbacks when errors are detected?

  • A high-performance Layer 3 switch to lower network latency

  • A source control (version-control) system to manage configuration files

  • A remote power-cycling console to physically manage devices

  • A next-generation firewall and IDS cluster for added security

Question 18 of 20

You are a network administrator tasked with updating the network infrastructure at your company. During the audit, you notice outdated cable maps that do not reflect current network layouts. What is the primary reason for updating these cable maps?

  • To reduce paper consumption and storage costs by eliminating old drawings.

  • To comply with cabling safety and standards documentation requirements (e.g., ANSI/TIA-568).

  • To prepare documentation for an upcoming software license audit.

  • To ensure network documentation reflects the current layout for efficient troubleshooting and maintenance.

Question 19 of 20

After expanding a department in a corporate office, a network administrator is alerted that new users in that department are unable to access network resources. Initial checks reveal that attempts to connect to the network are consistently failing for these users. What should the administrator investigate as the probable cause of this network issue?

  • Additional wireless access points are needed.

  • Unused network ports should be deactivated to reduce load.

  • The DHCP pool might not have sufficient available network addresses.

  • There is a misconfiguration in network segment settings.

Question 20 of 20

Which network monitoring solution is primarily responsible for analyzing the patterns of network traffic to identify trends and potential issues?

  • Configuration monitoring

  • Availability monitoring

  • Traffic analysis

  • Network discovery