CompTIA N10-009 Practice Test

Prepare smarter and boost your chances of success with our CompTIA N10-009 Practice test. This test helps you assess your knowledge, pinpoint strengths, and target areas for improvement. Surveys and user data from multiple platforms show that individuals who use N10-009 practice exam are 40–50% more likely to pass on their first attempt.

Start practicing today and take the fast track to becoming CompTIA N10-009 certified.

12400 already prepared
Updated On : 30-Jun-2025
240 Questions
4.8/5.0

Page 9 out of 24 Pages

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

A. Geofencing

B. Honeynet

C. Jumpbox

D. Screened subnet


B.   Honeynet

Explanation: A honeynet is a network of honeypots designed to attract and study attackers. Honeypots are decoy systems set up to lure cyber attackers and analyze their activities. A honeynet, being a collection of these systems, provides a broader view of attack methods and patterns, helping organizations improve their security measures. References: CompTIA Network+ Exam Objectives and official study guides.

Which of the following is the most closely associated with segmenting compute resources within a single cloud account?

A. Network security group

B. laaS

C. VPC

D. Hybrid cloud


C.   VPC

A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and converage?

A. 802.11ac

B. 802.11ax

C. 802.11g

D. 802.11n


B.   802.11ax

Explanation:
802.11ax, also known as Wi-Fi 6, is designed for high-density environments and improves device saturation and coverage compared to previous standards.
802.11ac: While it offers high throughput, it is not optimized for high-density environments as effectively as 802.11ax.
802.11ax (Wi-Fi 6): Introduces features like OFDMA, MU-MIMO, and BSS Coloring, which enhance performance in crowded environments, reduce latency, and increase the number of devices that can be connected simultaneously.
802.11g and 802.11n: Older standards that do not offer the same level of efficiency or support for high device density as 802.11ax.

Network References:

CompTIA Network+ N10-007 Official Certification Guide: Covers the 802.11 standards and their capabilities.
Cisco Networking Academy: Provides training on Wi-Fi technologies and best practices for high-density deployments.
Network+ Certification All-in-One Exam Guide: Discusses the various 802.11 standards and their applications in different environments.

Which of the following most likely requires the use of subinterfaces?

A. A router with only one available LAN port

B. A firewall performing deep packet inspection

C. A hub utilizing jumbo frames

D. A switch using Spanning Tree Protocol


A.   A router with only one available LAN port

Explanation:
Introduction to Subinterfaces:

Subinterfaces are logical interfaces created on a single physical interface. They are used to enable a router to support multiple networks on a single physical interface.

Use Case for Subinterfaces:

Subinterfaces are commonly used in scenarios where VLANs are implemented. A router with a single physical LAN port can be configured with multiple subinterfaces, each associated with a different VLAN.
This setup allows the router to route traffic between different VLANs.

Example Configuration:

Consider a router with a single physical interface GigabitEthernet0/0 and two VLANs, 10 and 20. interface GigabitEthernet0/0.10
encapsulation dot1Q 10
ip address 192.168.10.1 255.255.255.0
!
interface GigabitEthernet0/0.20

encapsulation dot1Q 20 ip address 192.168.20.1 255.255.255.0
The encapsulation dot1Q command specifies the VLAN ID.

Explanation of the Options:

A. A router with only one available LAN port: This is correct. Subinterfaces allow a single physical interface to manage multiple networks, making it essential for routers with limited physical interfaces.
B. A firewall performing deep packet inspection: Firewalls can use subinterfaces, but it is not a requirement for deep packet inspection.
C. A hub utilizing jumbo frames: Hubs do not use subinterfaces as they operate at Layer 1 and do not manage IP addressing.
D. A switch using Spanning Tree Protocol: STP is a protocol for preventing loops in a network and does not require subinterfaces.

Conclusion:

Subinterfaces provide a practical solution for routing between multiple VLANs on a router with limited physical interfaces. They allow network administrators to optimize the use of available hardware resources efficiently.

References:

CompTIA Network+ guide detailing VLAN configurations and the use of subinterfaces (see page Ref 9†Basic Configuration Commands).

A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches:

Switch 1

Port State Cost

1 Forward 2
2 Forward 2

Switch 2

Port State Cost

1 Forward 2
2 Forward 2

Which of the following best describes the issue?

A. The port cost should not be equal.

B. The ports should use link aggregation.

C. A root bridge needs to be identified.

D. The switch should be configured for RSTP.


C.   A root bridge needs to be identified.

Explanation: Explanation: The issue is that no root bridge has been identified. In STP, a root bridge is necessary to manage redundant paths and avoid loops in the network. Without a root bridge, all switches will assume they can forward traffic, causing a network loop and connectivity problems.

Which of the following can support a jumbo frame?

A. Access point

B. Bridge

C. Hub

D. Switch


D.   Switch

Explanation:
Definition of Jumbo Frames:

Jumbo frames are Ethernet frames with more than 1500 bytes of payload, typically up to 9000 bytes. They are used to improve network performance by reducing the overhead caused by smaller frames.

Why Switches Support Jumbo Frames:

Switches are network devices designed to manage data packets and can be configured to support jumbo frames. This capability enhances throughput and efficiency, particularly in high-performance networks and data centers.

Incompatibility of Other Devices:

Access Point: Primarily handles wireless communications and does not typically support jumbo frames.
Bridge: Connects different network segments but usually operates at standard Ethernet frame sizes.
Hub: A simple network device that transmits packets to all ports without distinguishing between devices, incapable of handling jumbo frames.

Practical Application:

Enabling jumbo frames on switches helps in environments where large data transfers are common, such as in storage area networks (SANs) or large-scale virtualized environments.

References:
CompTIA Network+ course materials and networking hardware documentation.

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

A. Toner and probe

B. Cable tester

C. Visual fault locator

D. Network tap


A.   Toner and probe

Explanation: A toner and probe tool, also known as a tone generator and probe, is used to trace and identify individual cables within a bundle or to locate the termination points of cables in wiring closets and patch panels. It generates a tone that can be picked up by the probe, helping technicians quickly and accurately identify and label wall plates and wiring. This is the best tool for identifying proper wiring in the Intermediate Distribution Frame (IDF). References: CompTIA Network+ Exam Objectives and official study guides.

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).

A. Mesh network

B. 5GHz frequency

C. Omnidirectional antenna

D. Non-overlapping channel

E. Captive portal

F. Ad hoc network


B.   5GHz frequency

A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?

A. Mesh

B. Ad hoc

C. Point-to-point

D. Infrastructure


A.   Mesh

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

A. Least privilege network access

B. Dynamic inventeries

C. Central policy management

D. Zero-touch provisioning

E. Configuration drift prevention

F. Subnet range limits


A.   Least privilege network access
C.   Central policy management

Page 9 out of 24 Pages
N10-009 Practice Test Previous