00:15:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 15

A network administrator is creating a backup policy for the configurations of routers and switches in a dynamic environment where changes are frequent. To minimize the risk of data loss from a device failure, what is the MOST effective backup strategy?

  • Back up the configuration after every change.

  • Perform a daily backup during off-peak hours.

  • Schedule a weekly backup during the weekend.

  • Run a full backup on an annual basis.

Question 2 of 15

A team of field engineers needs to establish a quick and temporary network for devices to share resources while working on a remote site without internet access. Which type of wireless network setup would be most appropriate for this scenario?

  • Mesh network

  • Infrastructure network with an access point

  • Point to point network with dedicated bridges

  • Ad hoc network

Question 3 of 15

Which of the following accurately describes a network intrusion detection system (IDS) when compared with an intrusion prevention system (IPS)?

  • An IDS operates out of band, generates alerts, and does not block traffic, whereas an IPS sits inline and can automatically drop malicious packets.

  • An IDS blocks malicious traffic in real time, whereas an IPS only logs the activity for administrators.

  • An IDS and an IPS both operate inline and both can automatically block malicious traffic.

  • An IDS can replace a firewall because it performs stateful packet inspection and enforces access-control lists, unlike an IPS.

Question 4 of 15

A corporation requires a method for their employees to securely access specific internal web applications from any location, using their personal devices without installing any additional software. Which technology should the company use?

  • Full VPN client

  • VPN Passthrough

  • IPSec VPN

  • Clientless VPN

Question 5 of 15

What principle should be applied to minimize user privileges while still allowing them to perform their required job functions?

  • Time-based authentication

  • Role-based access control

  • Least privilege

  • Multifactor authentication

Question 6 of 15

During an audit of your network management practices, it is evident that multiple network configurations have been applied without proper documentation or version control. What immediate action should be recommended to ensure consistent deployment and easy rollback capabilities in the future?

  • Perform periodic backups of configurations without versioning.

  • Establish a protocol for manual version control tagging before any configuration change.

  • Automate the synchronization of network configurations to the central repository with detailed logging and version control.

  • Manually document changes in a shared spreadsheet at regular intervals.

Question 7 of 15

An enterprise is deploying a new set of network links that will connect data centers located approximately 15 kilometers apart. The project requirements specify that the fiber optic cable used must efficiently support high-speed data transmission over these long distances with minimal signal loss. Which type of fiber optic cable should the technician select to meet these specifications?

  • Single mode fiber

  • Shielded twisted pair

  • Multimode fiber

  • Enhanced Cat 5e copper cable

Question 8 of 15

What is a common feature or function provided by a network device's GUI?

  • Scripting automation tasks

  • Secure shell command execution

  • Detailed configuration via CLI tools

  • Visual monitoring and management

Question 9 of 15

A network administrator notices that traffic intended for a specific subnet is not being routed through the expected path in a production network. After verifying the physical connectivity and interface status, the administrator decides to examine the routing table of the router. Which command should the administrator use to view the current routing table and verify the routes?

  • show arp

  • show route

  • show config

  • show interface

Question 10 of 15

A network technician is deploying a 5 GHz wireless network in a location near a weather radar installation. To comply with regulations and prevent interference, the access points must be able to automatically detect the radar signals and switch to a different channel. Which IEEE standard provides this capability through mechanisms like Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC)?

  • 802.11h

  • 802.11ac

  • 802.11e

  • 802.11i

Question 11 of 15

A network administrator is configuring SNMP to enhance the security of network monitoring. They need to ensure that the SNMP version they choose supports strong authentication and encryption. Which version of SNMP should they implement?

  • SNMPv3

  • SNMPv2c

  • SNMPv1

Question 12 of 15

What best describes static routing in network configurations?

  • Routes are automatically updated based on network traffic and topology changes

  • Routes use bandwidth and delay statistics among other factors to determine the best path

  • Routing decisions are made based on the real-time analysis of the network’s state

  • Routes are manually configured and updated by a network administrator

Question 13 of 15

What best describes the role of a Basic Service Set Identifier (BSSID) in a wireless network?

  • It serves as the network name that is broadcasted by wireless routers.

  • It uniquely identifies each access point within a wireless network using a MAC-like address.

  • It specifies the maximum capacity of connected devices within a network.

  • It acts mainly as a security measure to prevent unauthorized access.

Question 14 of 15

A network technician is troubleshooting a problem where multiple wireless clients frequently disassociate from a WLAN hosted on a single access point. The clients experience disconnections several times a day, primarily during peak hours. To address this issue, which of the following solutions is BEST?

  • Adjust the minimum data rates allowed on the current access point.

  • Increase the wireless coverage area by adjusting the current antenna setup.

  • Replace the access point's antenna with high-gain antennas.

  • Add an additional access point to distribute the client load more evenly.

Question 15 of 15

During an ARP poisoning (also called ARP spoofing) attack on a local area network, what action by the attacker enables interception of traffic that is intended for another host or the default gateway?

  • The attacker maps their own MAC address to the IP address of a legitimate host, causing that host's traffic to be sent to the attacker first.

  • The attacker disables port security to allow unauthorized devices to connect to switch ports.

  • The attacker encrypts all packets on the wire to prevent anyone else from reading them.

  • The attacker overwhelms the switch with thousands of fake MAC addresses until the CAM table overflows.