Back to CompTIA Network+ N10-009

CompTIA exam questions

N10-009 CompTIA Network+ N10-009 practice test

Use this page to practise N10-009 CompTIA Network+ N10-009 practice test. The goal is not to memorise dumps, but to understand the concept, review the explanation and improve your exam readiness.

500
practice questions
Mapped
topics covered
N10-009
exam code
CompTIA
vendor

Practice sessions

Start a focused practice session

Choose a question count to begin. Longer sessions build deeper familiarity; shorter sessions are ideal for daily warm-ups or targeting a specific weak area before moving on.

Practice set

CompTIA Network+ N10-009 questions

Start full practice test
Question 1easymultiple choice
Full question →

Which of the following describes a unicast transmission?

Question 2mediummultiple choice
Full question →

A network administrator is connecting two switches to increase bandwidth and provide redundancy. Which technology should be used to combine multiple physical links into a single logical link?

Question 3mediummultiple choice
Full question →

A network administrator is experiencing issues where unauthorized devices are offering IP addresses to clients, causing connectivity problems. Which security feature should be enabled on switches to prevent this?

Question 4easymultiple choice
Full question →

A network administrator is troubleshooting a connectivity issue and suspects the problem is related to the physical cabling. At which layer of the OSI model should the administrator begin their investigation?

Question 5easymultiple choice
Full question →

A network administrator needs to generate a report of all MAC addresses learned on each switch port to assist with inventory management. Which command-line utility can be used to view the MAC address table on a switch?

Question 6mediummultiple choice
Full question →

A network administrator needs to identify which application protocols are consuming the most bandwidth on the company WAN link. Which of the following tools should the administrator use?

Question 7mediummultiple choice
Full question →

A network administrator needs to identify which devices are generating the most traffic on a WAN link. The administrator requires detailed flow data including source and destination IP addresses, ports, and protocols. Which technology should be deployed?

Question 8mediummultiple choice
Full question →

A network administrator needs to replace a core switch that is nearing end-of-life. According to change management best practices, which step should the administrator perform FIRST?

Question 9mediummultiple choice
Full question →

A network administrator needs to schedule a firmware update for several switches during a maintenance window. Which of the following documents should be updated immediately after the changes are complete?

Question 10easymultiple choice
Full question →

A network administrator needs to schedule a firmware upgrade for a critical router. Which document should be used to formally communicate the change, seek approval, and track the implementation?

Question 11easymultiple choice
Full question →

A network administrator needs to schedule a firmware upgrade for a critical switch during a maintenance window. After the upgrade is completed and verified, which document should the administrator update to reflect the new firmware version?

Question 12easymultiple choice
Full question →

A network technician notices a high volume of broadcast traffic on a flat network. Which device will best reduce the size of the broadcast domain?

Question 13mediummultiple choice
Full question →

A security analyst notices a large number of incoming TCP packets to a server with the FIN, PSH, and URG flags set. This pattern is characteristic of which type of network scan?

Question 14mediummultiple choice
Full question →

A network administrator needs to schedule a firmware upgrade on a core switch during the next maintenance window. According to best practices, which document should the administrator create and have approved before making the change?

Question 15mediummultiple choice
Full question →

A network administrator needs to securely transfer backup configuration files from a router to a remote server over the internet. Which protocol should be used?

Question 16easymultiple choice
Full question →

A network administrator needs to update the firmware on a critical core switch. According to change management best practices, which step should be completed FIRST?

Question 17mediummultiple choice
Full question →

A company hosts a web server in a DMZ. The firewall has three interfaces: inside (corporate network), outside (Internet), and DMZ. Which firewall rule is necessary to allow external users to access the web server?

Question 18hardmultiple choice
Full question →

A company is connecting two buildings that are 300 meters apart. The link must support 10 Gbps. Which combination of cable and transceiver should be used?

Question 19mediummultiple choice
Full question →

A network administrator needs to upgrade the backbone link between two switches to fiber optic to eliminate electromagnetic interference. The distance between the switches is 350 meters. Which transceiver type should be used?

Question 20mediummultiple choice
Full question →

A network administrator needs to upgrade the firmware on a core switch. According to change management best practices, which step should be performed first?

Question 21mediummultiple choice
Full question →

A company wants to deploy a wireless network with the highest level of security for client authentication. The network will use a RADIUS server. Which authentication method should be used?

Question 22mediummultiple choice
Full question →

A network administrator needs to upgrade the firmware on a critical core router. The admin has downloaded the new firmware and verified its checksum. Which of the following should the admin do before proceeding with the installation?

Question 23mediummultiple choice
Full question →

A company wants to enforce network access control such that only authenticated users can connect to the wired network. The authentication server will use RADIUS. Which IEEE standard should be implemented?

Question 24easymultiple choice
Full question →

A network administrator wants to automate the backup of configuration files from multiple routers and switches. Which protocol is commonly used for this purpose and is supported by most network devices?

Exam question guide

How to use these N10-009 questions

Use these questions as active recall, not passive reading. Try the question first, review the answer choices, then open the explanation and connect the result back to the exam topic.

Quick answer

Wireless security questions usually test authentication protocols (WPA2/WPA3), encryption modes, 802.11 standards and troubleshooting clients that cannot connect or associate.

WPA2 vs WPA3 authentication and encryption standards.

802.11 wireless standards, frequency bands and channel behaviour.

WLAN client troubleshooting — association, authentication and DHCP.

How SSID, authentication method and pre-shared key affect wireless access.

Related practice questions

Related N10-009 topic practice pages

Use these pages to study the exact topics behind the exam questions — one weak area at a time.