Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

N10-009 CompTIA Network+ Certification Exam Free Practice Exam Questions (2026 Updated)

Prepare effectively for your CompTIA N10-009 CompTIA Network+ Certification Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 8
Total 529 questions

After extremely high temperatures cause a power outage, the servers automatically shut down, even though the UPSs for the servers still have hours of battery life. Which of the following should a technician recommend?

A.

Include backup power for air-conditioning units

B.

Configure door locks to automatically lock during power outages

C.

Increase UPS battery size

D.

Add an IoT-enabled thermostat

A network administrator is unable to ping a remote server from a newly connected workstation that has been added to the network. Ping to 127.0.0.1 on the workstation is failing. Which of the following should the administrator perform to diagnose the problem?

A.

Verify the NIC interface status.

B.

Verify the network is not congested.

C.

Verify the router is not dropping packets.

D.

Verify that DNS is resolving correctly.

A new SQL server is identified as allowing FTP access to all users. Which of the following would a systems administrator most likely do to ensure only the required services are allowed?

A.

Disable unused ports on the server.

B.

Change default passwords on all servers.

C.

Delete the NGFW rules that allow all FTP traffic.

D.

Configure server ACLs on the switches that the SQL traffic traverses.

After a recent merger, a large number of alerts are coming in regarding extremely high utilization. Which of the following should be generated to help inform new alerting requirements?

A.

SLA

B.

Network diagram

C.

Baseline

D.

Heat map

A network administrator deploys new network hardware. While configuring the network monitoring server, the server could authenticate but could not determine the specific status of the hardware. Which of the following would the administrator most likely do to resolve the issue?

A.

Use the public community string

B.

Import the appropriate MIB

C.

Set up a switchport analyzer and forward traffic

D.

Configure SNMPv3 privacy

Which of the following allows a user to authenticate to multiple resources without requiring additional passwords?

A.

SSO

B.

MFA

C.

SAML

D.

RADIUS

A newtwork administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

A.

A physical interface used for trunking logical ports

B.

A physical interface used for management access

C.

A logical interface used for the routing of VLANs

D.

A logical interface used when the number of physical ports is insufficent.

A network administrator needs to create a way to redirect a network resource that has been on the local network but is now hosted as a SaaS solution. Which of the following records should be used to accomplish the task?

A.

TXT

B.

AAA

C.

PTR

D.

CNAME

Which of the following will allow secure, remote access to internal applications?

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A systems administrator is configuring a new device to be added to the network. The administrator is planning to perform device hardening prior to connecting the device. Which of the following should the administrator do first?

A.

Update the network ACLs.

B.

Place the device in a screened subnet.

C.

Enable content filtering.

D.

Change the default admin passwords.

A user calls the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the following troubleshooting steps should be taken first?

A.

Identify the problem.

B.

Establish a theory.

C.

Document findings.

D.

Create a plan of action.

Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?

A.

Access, distribution, and core

B.

Core, root, and distribution

C.

Core, spine, and leaf

D.

Access, core, and roof

Which of the following allows a network administrator to analyze attacks coming from the internet without affecting latency?

A.

IPS

B.

IDS

C.

Load balancer

D.

Firewall

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

After a security incident, a technician reveals that company data was stolen. During the investigation, it is discovered that a host disguised itself as a switch. Which of the following best describes the attack that occurred?

A.

VLAN hopping

B.

Evil twin

C.

DNS poisoning

D.

ARP spoofing

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

A network manager connects two switches together and uses two connecting links. Which of the following configurations will prevent Layer 2 loops?

A.

802.1Q tagging

B.

Full duplex

C.

Link aggregation

D.

QoS

Which of the following are the best device-hardening techniques for network security? (Select two).

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Page: 2 / 8
Total 529 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved