Free N10-009 Sample Questions — CompTIA Network+

Free N10-009 sample questions for the CompTIA Network+ exam. No account required: study at your own pace.

Want an interactive quiz? Take the full N10-009 practice test

Looking for more? Click here to get the full PDF with 491+ practice questions for $10 for offline study and deeper preparation.

Question 1

A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and coverage?

  • A. 802.11ac
  • B. 802.11ax
  • C. 802.11g
  • D. 802.11n
Show Answer
Correct Answer:
B. 802.11ax
Question 2

Which of the following would a network administrator most likely use to securely manage a network device on a closed network?

  • A. Bastion host
  • B. Remote desktop
  • C. SSH
  • D. Split-tunnel VPN
Show Answer
Correct Answer:
C. SSH
Question 3

A network administrator needs to assign IP addresses to a newly installed network. They choose 192.168.1.0/24 as their network address and need to create three subnets with 30 hosts on each subnet. Which of the following is a valid subnet mask that will meet the requirements?

  • A. 255.255.255.128
  • B. 255.255.255.192
  • C. 255.255.255.224
  • D. 255.255.255.240
Show Answer
Correct Answer:
C. 255.255.255.224
Question 4

Which of the following typically uses compromised systems that become part of a bot network?

  • A. Evil twin attack
  • B. DDoS attack
  • C. XML injection
  • D. Brute-force password attack
Show Answer
Correct Answer:
B. DDoS attack
Question 5

A network engineer needs to add a boundary network to isolate and separate the internal network from the public-facing internet. Which of the following security defense solutions would best accomplish this task?

  • A. Trusted zones
  • B. URL filtering
  • C. ACLs
  • D. Screened subnet
Show Answer
Correct Answer:
D. Screened subnet
Question 6

Which of the following is the best device to use to provide security and filtering between a private network and a public network?

  • A. Switch
  • B. Firewall
  • C. Bridge
  • D. Gateway
Show Answer
Correct Answer:
B. Firewall
Question 7

Which of the following is the OSI model layer that uses a connectionless protocol for packet delivery?

  • A. Physical
  • B. Network
  • C. Transport
  • D. Application
Show Answer
Correct Answer:
B. Network
Question 8

Which of the following ports is used for secure email?

  • A. 25
  • B. 110
  • C. 143
  • D. 587
Show Answer
Correct Answer:
D. 587
Question 9

An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?

  • A. TXT
  • B. AAA
  • C. CNAME
  • D. MX
Show Answer
Correct Answer:
A. TXT
Question 10

A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?

  • A. Scalability
  • B. Software as a service
  • C. Hybrid cloud
  • D. Elasticity
Show Answer
Correct Answer:
D. Elasticity
Question 11

A company discovers on video surveillance recordings that an unauthorized person installed a rogue access point in its secure facility. Which of the following allowed the unauthorized person to do this?

  • A. Evil twin
  • B. Honeytrap
  • C. Wardriving
  • D. Tailgating
Show Answer
Correct Answer:
D. Tailgating
Question 12

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

  • A. Logical diagram
  • B. Layer 3 network diagram
  • C. Service-level agreement
  • D. Heat map
Show Answer
Correct Answer:
D. Heat map
Question 13

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

  • A. Anomaly alerts
  • B. Port mirroring
  • C. Performance monitoring
  • D. Packet capture
Show Answer
Correct Answer:
D. Packet capture
Question 14

Which of the following are the main differences between ESP and AH? (Choose two.)

  • A. AH provides confidentiality through the use of encryption
  • B. ESP provides authentication for IP headers and their payloads
  • C. ESP provides confidentiality through the use of encryption
  • D. AH provides authentication for IP headers and their payloads
  • E. AH provides data origin authorization over shared secret
  • F. ESP provides data origin authorization over shared secret
Show Answer
Correct Answer:
  • C. ESP provides confidentiality through the use of encryption
  • D. AH provides authentication for IP headers and their payloads
Question 15

An ISP provided a company with an IP range of 98.174.235.142/28. A network technician configured a router with a subnet mask of 255.255.255.224 and default gateway of 98.174.235.129. After the configuration was set up. the company is unable to connect to the ISP. Which of the following would resolve this issue?

  • A. Change the subnet mask to .240
  • B. Change the Ethernet cable from the external interface to the modem
  • C. Change the CIDR to /29
  • D. Change the static IP to 98.174.235.128/28.
Show Answer
Correct Answer:
A. Change the subnet mask to .240
Question 16

Which of the following should a network administrator configure when adding OT devices to an organization's architecture?

  • A. Honeynet
  • B. Data-at-rest encryption
  • C. Time-based authentication
  • D. Network segmentation
Show Answer
Correct Answer:
D. Network segmentation
Question 17

Which of the following connectors allows a singular QSFP transceiver to have several physical connections?

  • A. RJ45
  • B. ST
  • C. LC
  • D. MPO
Show Answer
Correct Answer:
D. MPO
Question 18

Which of the following attacks utilizes a network packet that contains multiple network tags?

  • A. MAC flooding
  • B. VLAN hopping
  • C. DNS spoofing
  • D. ARP poisoning
Show Answer
Correct Answer:
B. VLAN hopping
Question 19

Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?

  • A. Quality of service
  • B. Network signal
  • C. Time to live
  • D. Load balancing
Show Answer
Correct Answer:
A. Quality of service
Question 20

Which of the following should an installer orient a port-side exhaust to when installing equipment?

  • A. The patch panel
  • B. The front of the IDF
  • C. The warm aisle
  • D. The administrator console
Show Answer
Correct Answer:
C. The warm aisle

Aced these? Get the Full Exam

Download the complete N10-009 study bundle with 491+ questions in a single printable PDF.