00:15:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009 (V9)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 (V9) Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 15

Which protocol would optimally support a secure client-server communication that involves sensitive data transactions, specifically needing both authentication of the server and encryption of the data?

  • LDAP

  • HTTPS

  • HTTP

  • SNMP

Question 2 of 15

A university campus with multiple buildings has received numerous complaints from students about dropped video calls and intermittent connectivity issues on their devices as they move between lecture halls. The network administrator suspects problems in the wireless network settings associated with client roaming. What is the most effective adjustment that can address these roaming issues and enhance connectivity stability?

  • Optimize the SCTP settings on the network controllers

  • Increase the transmit power on all access points

  • Adjust the Quality of Service (QoS) configurations

  • Modify the RSSI threshold settings

Question 3 of 15

What type of data is primarily used in performance monitoring to assess network efficiency and identify potential issues?

  • Traffic analysis data

  • Error logs

  • Usage statistics

  • Security alerts

Question 4 of 15

A company is deploying a software-defined wide area network (SD-WAN) solution to connect multiple branches. The IT administrator needs to ensure that the SD-WAN solution maintains optimal performance and reliability regardless of the underlying transport mechanisms (MPLS, broadband, LTE, etc.). What feature should the IT administrator focus on configuring in the SD-WAN controller to achieve this?

  • Dynamic routing configurations

  • Encryption standards

  • Transport agnostic capabilities

  • Zero-touch provisioning

Question 5 of 15

What is the primary purpose of using the ping command in network troubleshooting?

  • To physically map out the network infrastructure

  • To determine the speed of the network connection

  • To automatically resolve any detected network connectivity issues

  • To test the reachability of a host on an IP network and measure the round-trip time for messages sent

Question 6 of 15

An IT technician is tasked with upgrading the network infrastructure of a small business to support higher speed applications such as video conferencing and large file transfers. The current network uses Cat 5e Ethernet cables. Which type of cable should the technician recommend to significantly increase the speed capacity of the network?

  • Cat 6a

  • Cat 6

  • Cat 7

  • Cat 5e

Question 7 of 15

To enhance security by ensuring that domain name resolutions are authenticated and verifiable, which technology should be implemented?

  • DNSSEC

  • SSL

  • DNS over TLS (DoT)

  • DNS over HTTPS (DoH)

Question 8 of 15

Users in a branch office report very slow Internet access. When the network technician examines the primary router, the routing table shows that the 0.0.0.0/0 entry is pointing to the wrong next-hop address. Which of the following is the most likely impact of this incorrect default route on the network?

  • Packets destined for unknown networks are forwarded to the wrong gateway, causing delayed or failed access to external resources.

  • The DHCP server will quickly exhaust its address pool and stop leasing new addresses.

  • Switch ports will detect a spanning-tree loop and go into a blocking state, resulting in broadcast storms.

  • Hosts on the LAN will begin reporting duplicate IP-address conflicts.

Question 9 of 15

What is typically the goal of an unauthorized server that assigns network configurations to clients?

  • To monitor network performance and traffic

  • To filter and secure network traffic

  • To disrupt network operations by issuing incorrect network information

  • To increase network efficiency by providing backup configuration services

Question 10 of 15

You are troubleshooting a fiber optic network in your organization and suspect there may be a physical fault in the fiber optic cable due to recent construction near the cable pathway. You decide to use a visual fault locator to identify the location of any potential faults. What type of issue are you specifically looking to detect with this tool?

  • Problems related to improper termination of the cable ends

  • Incorrect type of fiber optic cable used

  • Signal degradation due to interference or crosstalk

  • Breaks or severe bends in the fiber optic cable

Question 11 of 15

A network engineer is tasked with setting up a long-distance fiber optic link between two data centers located 120 kilometers apart. Which type of fiber optic cable should the engineer use to ensure efficient and reliable data transmission over this distance?

  • Coaxial cable

  • Category 6 cable

  • Multimode fiber

  • Single-mode fiber

Question 12 of 15

A network technician is setting up a wired Ethernet network for a new office. To ensure that each connected device operates within its own collision domain and can utilize the full available bandwidth, which device should the technician install?

  • Hub

  • Switch

  • Access Point

  • Router

Question 13 of 15

Which IP protocol is particularly suited for establishing secure tunnels over the internet, often used in conjunction with VPNs?

  • Internet Protocol Security (IPSec)

  • Transmission Control Protocol (TCP)

  • User Datagram Protocol (UDP)

  • Generic Routing Encapsulation (GRE)

Question 14 of 15

What is the primary purpose of DHCP in a network environment?

  • Automates the assignment of IP addresses and other network settings to devices on a network

  • Encrypts data traffic at the transport layer

  • Resolves domain names to IP addresses

  • Provides a secure channel for remote administration

Question 15 of 15

Which of the following best describes Multifactor Authentication?

  • A process where a user must input their username and password twice for enhanced security.

  • An authentication scheme where users sign in using their voice alone.

  • A security measure where users require a single passcode to access multiple systems.

  • A method where two or more independent credentials are required for verification.