00:15:00

CompTIA Network+ Practice Test (N10-009)

Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Network+ N10-009
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Network+ N10-009 Information

The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.

The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.

More reading:

Free CompTIA Network+ N10-009 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Networking Concepts
    Network Implementation
    Network Operations
    Network Security
    Network Troubleshooting
Question 1 of 15

What does the ability to specify a different subnet mask for the same network range across various subnets allow a network engineer to do?

  • You selected this option

    Create multiple subnets with the same number of hosts to ensure uniformity across a network.

  • You selected this option

    Allocate IP addresses more efficiently by creating subnets of varying sizes within a larger network.

  • You selected this option

    Assign one single subnet mask to all subnets within the network to simplify the routing process.

  • You selected this option

    Increase the number of available IP addresses within a network by extending the range of the subnet mask.

Question 2 of 15

A company is setting up an IPsec VPN to secure communication between their main office and a remote office. The network administrator needs to ensure the confidentiality of data as it traverses the public network. Which component specifically helps achieve this privacy requirement?

  • You selected this option

    Authentication Header (AH)

  • You selected this option

    Full-duplex transmission

  • You selected this option

    Encapsulating Security Payload (ESP)

  • You selected this option

    Link-state routing protocol

Question 3 of 15

A company is upgrading its wireless infrastructure to ensure enhanced security and encryption. Which encryption method should be implemented to provide the highest level of security for their Wi-Fi network?

  • You selected this option

    Wi-Fi Protected Access 2 (WPA2)

  • You selected this option

    Wired Equivalent Privacy (WEP)

  • You selected this option

    Wi-Fi Protected Access 3 (WPA3)

  • You selected this option

    Wi-Fi Protected Access with Pre-Shared Key (WPA-PSK)

Question 4 of 15

Which characteristic best describes UDP in network communications?

  • You selected this option

    Reliable and connection-oriented

  • You selected this option

    Uses handshaking protocols

  • You selected this option

    Encrypted by default

  • You selected this option

    Connectionless and best-effort delivery

Question 5 of 15

What is the primary function of the tcpdump tool in network troubleshooting?

  • You selected this option

    Capture and analyze network traffic

  • You selected this option

    Implement network policies such as ACLs

  • You selected this option

    Generate synthetic network traffic for testing

  • You selected this option

    Configure network devices automatically

Question 6 of 15

A network technician is troubleshooting a problem where multiple wireless clients frequently disassociate from a WLAN hosted on a single access point. The clients experience disconnections several times a day, primarily during peak hours. To address this issue, which of the following solutions is BEST?

  • You selected this option

    Add an additional access point to distribute the client load more evenly.

  • You selected this option

    Adjust the minimum data rates allowed on the current access point.

  • You selected this option

    Replace the access point's antenna with high-gain antennas.

  • You selected this option

    Increase the wireless coverage area by adjusting the current antenna setup.

Question 7 of 15

A small business is setting up a wireless network to ensure high data transmission rates for video conferencing and file transfers. The network administrator is considering different Wi-Fi technologies. Which technology should be chosen to support higher bandwidth and shorter range communications?

  • You selected this option

    802.11g

  • You selected this option

    802.11ac

  • You selected this option

    802.11b

  • You selected this option

    802.11a

Question 8 of 15

A company's network administrator discovers that multiple users are complaining about connectivity issues and incorrect network settings. After investigation, the administrator suspects the presence of an unauthorized DHCP server on the network. What is the potential security risk posed by this rogue DHCP server?

  • You selected this option

    It serves as a backup server improving network redundancy.

  • You selected this option

    It increases the network's broadcast traffic, slowing down network speeds.

  • You selected this option

    It can issue incorrect network settings leading to traffic misdirection.

  • You selected this option

    It encrypts data packets causing delays in data transmission.

Question 9 of 15

A company is planning to establish a secure connection between two of their branch offices over the internet. The network administrator has been tasked with choosing a protocol that encrypts and authenticates the data packet for secure transmission. Which protocol should be utilized?

  • You selected this option

    IPSec

  • You selected this option

    GRE

  • You selected this option

    SSL/TLS

  • You selected this option

    DHCP

Question 10 of 15

A network technician is troubleshooting a fiber optic link that is performing below expected levels. The technician suspects that the issue may be related to the signal strength. What is the BEST method to verify and troubleshoot the signal strength related issues?

  • You selected this option

    Check the compatibility of the transceiver with the installed fiber cables.

  • You selected this option

    Measure the dB loss using an Optical Power Meter.

  • You selected this option

    Replace the fiber cables with higher category ones to improve signal strength.

  • You selected this option

    Adjust the wavelength settings on the networking hardware.

Question 11 of 15

What is the primary purpose of implementing a spanning tree protocol in a network?

  • You selected this option

    To improve network performance by selecting the fastest paths

  • You selected this option

    To expand network coverage area

  • You selected this option

    To manage collision domains within the network

  • You selected this option

    To prevent switching loops in a broadcast domain

Question 12 of 15

What is a key feature of Port Security in the context of Network Access Control?

  • You selected this option

    It employs 802.1X as a basis for connection restrictions

  • You selected this option

    It focuses primarily on implementing MAC filtering across the network

  • You selected this option

    It limits the number of MAC addresses that can connect on a single port

  • You selected this option

    It involves frequent device identification and re-authentication

Question 13 of 15

Which option best describes the function of a wireless access point in a home networking environment?

  • You selected this option

    It routes traffic between multiple network segments and manages network traffic efficiently.

  • You selected this option

    It stores digital data and allows networked devices to access data concurrently.

  • You selected this option

    It controls multiple network switches and directs data frames to appropriate parts of the network.

  • You selected this option

    It connects wireless devices to a wired network enabling them to communicate with other network devices.

Question 14 of 15

During a routine network monitoring, an IT security specialist observes unusual network traffic patterns from company workstations. These stations are communicating with a recognized command and control server frequently. Additionally, new processes are running on these stations, which utilize high amounts of system resources and attempt unauthorized access to secured data stores. Based on the given symptoms, which type of malware is likely at play?

  • You selected this option

    Trojan

  • You selected this option

    Worm

  • You selected this option

    Botnet

  • You selected this option

    Spyware

Question 15 of 15

A network engineer needs to segment a network into multiple broadcast domains without using additional hardware. Which Layer 2 technology should be implemented to achieve this?

  • You selected this option

    Routing

  • You selected this option

    Subnetting

  • You selected this option

    NAT

  • You selected this option

    VLAN