CompTIA Network+ Certification N10-009 Practice Questions

Page: 1 / 14
Total 551 questions
Question 1

Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?



Answer : A

Quality of Service (QoS) is crucial for real-time services like video conferencing. It prioritizes voice and video packets over less critical traffic (like file downloads), reducing latency, jitter, and packet loss.

B . Network signal may apply to wireless, but it's not specific to video issues.

C . Time to live (TTL) affects packet lifespan, not performance or quality.

D . Load balancing manages traffic across multiple paths but doesn't prioritize real-time traffic like QoS does.

Reference:

CompTIA Network+ N10-009 Official Objectives: 3.6 -- Explain the characteristics of network topologies and types.


Question 2

A help desk technician receives a report that users cannot access internet URLs. The technician performs ping tests and finds that sites fail when a URL is used but succeed when an IP is used. Which of the following tools should the technician utilize next?



Answer : D, D

The issue is clearly related to DNS resolution, as IP-based connections succeed but domain name-based ones fail.


Question 3

A network engineer is installing new PoE wireless APs. The first five APs deploy successfully, but the sixth one fails to start. Which of the following should the engineer investigate first?



Answer : C

When deploying multiple Power over Ethernet (PoE) devices, the switch's power budget can be exhausted. If the available wattage on the switch cannot supply the additional AP, it will fail to power on. This is the most likely cause when previous APs worked fine but a new one does not.

A . Signal strength affects wireless connectivity, not whether the AP powers up.

B . Duplex mismatch causes poor throughput, not power failure.

D . CRC errors point to cabling issues but do not prevent booting if no power is available.

Reference (CompTIA Network+ N10-009):

Domain: Network Troubleshooting --- PoE power budget considerations, device startup issues.


Question 4

A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following documents should the technician reference to determine which ticket to complete first?



Answer : C

An SLA (Service Level Agreement) defines performance expectations, including response time, prioritization, and resolution time for services and support issues. It helps the technician determine which task has higher priority based on business impact.

A . NDA (Non-Disclosure Agreement) relates to confidentiality, not task prioritization.

B . AUP (Acceptable Use Policy) defines user behavior, not issue handling.

D . MOU (Memorandum of Understanding) outlines informal agreements and doesn't define ticket priorities.

Reference:

CompTIA Network+ N10-009 Official Objectives: 4.1 -- Compare and contrast common documentation types.


Question 5

A network administrator configures a new network discovery tool and is concerned that it might disrupt business operations. Which of the following scan types should the administrator configure?



Answer : D

If the administrator is concerned a new discovery tool could disrupt operations, the safest option is to configure scheduled scans. Network+ (N10-009) operations guidance emphasizes minimizing impact by running potentially noisy tasks (discovery, vulnerability checks, inventory scans) during defined maintenance windows or off-peak hours. A scheduled scan allows controlled timing, predictable load, and easier coordination with change management, monitoring, and support teams. This reduces the risk of saturating links, overwhelming devices with queries, or triggering alerts during business-critical periods.

Ad hoc scanning is on-demand and may occur at any time, which increases the chance of disruption if run during peak usage. Authenticated versus unauthenticated describes whether the scanner uses credentials to log into systems for deeper visibility; that choice affects depth and accuracy, but it doesn't directly address when scanning occurs to reduce business impact. An authenticated scan can still be disruptive if run at the wrong time, and an unauthenticated scan can still generate significant traffic. Since the key concern is operational disruption, controlling scan timing via scheduled scans is the best mitigation.

===========


Question 6

Which of the following uses the longest prefix match to determine an exit interface?



Answer : C

The longest prefix match is a routing concept used to find the most specific route to a destination IP address. The routing table performs this calculation to determine the exit interface for a packet, ensuring the most accurate delivery. The document explains:

''Routers use the longest prefix match when searching the routing table to determine the best path for an IP packet. This ensures that the most specific (and thus optimal) route is chosen, based on the destination IP address.''


Question 7

Which of the following is the best way to securely access a network appliance from an external location?



Answer : D

SSH (Secure Shell) is the best and most secure method for accessing a network appliance from an external location, according to the CompTIA Network+ N10-009 objectives related to secure management protocols and network security. SSH provides encrypted remote command-line access, ensuring that authentication credentials, commands, and session data are protected from interception, eavesdropping, and man-in-the-middle attacks.

Telnet is an insecure legacy protocol that transmits all data, including usernames and passwords, in cleartext, making it unsuitable for any external or untrusted network access. RDP is primarily used for graphical remote desktop access to Windows systems and is not commonly used for managing network appliances such as routers, switches, firewalls, or load balancers. Additionally, RDP introduces a larger attack surface if exposed externally. FTPS is a secure file transfer protocol and is designed for transferring files, not for interactive device management or configuration.

The Network+ N10-009 exam emphasizes the use of secure administrative access methods, and SSH is the industry-standard protocol for managing network infrastructure devices. It supports strong encryption, key-based authentication, and secure tunneling, making it ideal for remote administration over untrusted networks such as the internet.


Page:    1 / 14   
Total 551 questions