00:15:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 15

During an initiative to enhance the efficiency of network monitoring, a network administrator decides to utilize a structured database that details the properties of each network device. This database is essential for targeted monitoring. What is the primary reason this database aids in the administrator's efforts?

  • This database secures communication by encrypting data exchanges between network devices.

  • It provides an improved graphical interface within network management tools, simplifying task management.

  • It compiles device-specific information in a hierarchical form accessible through specific network protocols, facilitating precise supervision.

  • The database is primarily utilized for automated system upgrades to ensure all devices meet the latest security standards.

Question 2 of 15

During a network upgrade, a technician uses a cable tester to verify the new cabling installations. The tester identifies several failures. What type of issues CANNOT be directly detected using a standard cable tester?

  • Short circuits

  • Crossed wires

  • Signal attenuation

  • Improper cable termination

Question 3 of 15

A network technician suspects that there is an IP address conflict in the subnet. Which command would BEST help the technician verify this hypothesis by checking the MAC address associated with IP addresses on the device?

  • ping

  • show mac-address-table

  • show interface

  • show arp

Question 4 of 15

Which of the following best describes the process utilized by devices to automatically configure their own IPv6 addresses using SLAAC when no DHCPv6 server is present?

  • Devices extract an IPv6 prefix from router advertisements and combine it automatically with an interface identifier derived from their MAC address.

  • Devices send a request to the nearest DHCPv6 server to obtain an IPv6 address and additional configuration settings.

  • Network administrators manually assign IPv6 addresses to each device in accordance with an IP address management policy.

Question 5 of 15

When configuring a point-to-point wireless bridge between two buildings, which of the following is the BEST choice to maximize stable connectivity?

  • Use a directional antenna

  • Use an omnidirectional antenna

  • Deploy an autonomous access point

  • Use a high-gain antenna without specifying directional or omnidirectional

Question 6 of 15

Which of the following accurately describes a network intrusion detection system (IDS) when compared with an intrusion prevention system (IPS)?

  • An IDS operates out of band, generates alerts, and does not block traffic, whereas an IPS sits inline and can automatically drop malicious packets.

  • An IDS can replace a firewall because it performs stateful packet inspection and enforces access-control lists, unlike an IPS.

  • An IDS and an IPS both operate inline and both can automatically block malicious traffic.

  • An IDS blocks malicious traffic in real time, whereas an IPS only logs the activity for administrators.

Question 7 of 15

A network administrator discovers that some users are experiencing connectivity issues. Further investigation reveals that there are multiple devices attempting to use the same network address. What is the BEST course of action to rectify this problem?

  • Assign unique addresses to each device that currently has a conflicting setting.

  • Review configuration settings on the network routers.

  • Inspect the subnet masks on all network devices for inconsistencies.

  • Restart the DHCP server to clear up the address conflicts.

Question 8 of 15

What is the BEST method to secure network switches against unauthorized inter-segment traffic manipulation?

  • Set all inactive ports to a non-routable VLAN to avoid unauthorized use.

  • Configure all user-access ports to non-trunking mode with the specific VLAN assigned via the switchport access command.

  • Apply the switchport nonegotiate command to all trunk ports to prevent DTP frames from automatically forming a trunk.

  • Enable dynamic VLAN assignments via a VLAN Membership Policy Server across all switch interfaces.

Question 9 of 15

A network engineer is tasked with overseeing the upgrade of a data center's fiber optic system to support higher bandwidth and reduce cable clutter. They are considering the use of MPO connectors. Which of the following is an advantage of using MPO connectors in this scenario?

  • Supports simultaneous connection of multiple fibers, reducing physical space requirements

  • Enhances electrical isolation to prevent signal leakage between cables

  • Decreases the maximum transmission distance achievable

  • Allows the transmission of signals over a single fiber to minimize interference

Question 10 of 15

A network administrator is configuring a server to ensure secure file transfers between the server and client machines. The administrator wants to use a protocol that encrypts the data transfer using SSH. Which port should the administrator ensure is open on the firewall?

  • Port 22

  • Port 443

  • Port 21

  • Port 23

Question 11 of 15

Which of the following IPv4 addresses falls within the private address space specified by RFC 1918 and therefore cannot be routed across the public Internet?

  • 8.8.8.8

  • 192.168.1.1

  • 172.34.0.5

  • 203.0.113.10

Question 12 of 15

A network administrator observes intermittent connectivity losses and resource access failures in two devices on the same LAN. After initial checks, the hypothesis of conflicting network configurations arises. What should the administrator do next to identify and rectify the issue?

  • Review DHCP server logs and settings on the devices for address assignments

  • Reboot the network's main router to reset the connections

  • Extend the DHCP lease time to decrease the frequency of address renewals

  • Switch out the connecting cables for the devices experiencing issues

Question 13 of 15

Which of the following options BEST describes the primary function of 802.1X in a network environment?

  • Content filtering

  • Port-based Network Access Control

  • Data packet encryption

  • Network Address Translation

Question 14 of 15

What is the primary purpose of using a rack diagram in network documentation?

  • To illustrate the physical positioning of network hardware in a server rack

  • To monitor real-time data traffic

  • To record IP address allocations

  • To map out the logical flow of data across the network

Question 15 of 15

What is the best definition of a 'Vulnerability' in the context of network security?

  • The person performing the attack

  • A successful type of network attack

  • A failure to launch an attack

  • A weakness in a system that can be exploited to perform unauthorized actions