dc dotCreds
CompTIA Network+ (N10-009)

Network+ Practice Test

Start a free 30-question Network+ daily set with source-backed explanations, local progress, and a fresh rotation every morning.

30 daily web questions Source-backed explanations 7-day score history Questions updated at Apr 15, 2026, 4:12 PM CDT
Network+ icon

Network+

CompTIA Network+ (N10-009)

Why this page works

  • Thirty focused questions every day
  • Source links on every explanation
  • Local progress saved automatically
  • Email sync path ready for later
  • Apps provide deeper drills when available
Today's 30 Network+ questions

Use this Network+ practice test to review N10-009. Questions rotate daily and each answer links back to the source used to write it.

Today’s Set
30 questions
Daily set rotates at 10:00 AM local time
Progress
0/30
Answered on this page session
Accuracy
0%
Loading countdown…

7-day score keeper

Answer questions today and this will become a rolling 7-day scorecard.

Local history
Optional progress sync

Keep today’s practice moving

Guest progress saves automatically on this device. Add an email later when you want a magic link that keeps your daily N10-009 practice in sync across browsers.

Guest progress saves on this device automatically

Guest progress is available without an account.

124 verified questions are currently in the live bank. Questions updated at Apr 15, 2026, 4:12 PM CDT. The daily set rotates at 10:00 AM local time, and each explanation links back to the source used to write it. Use the web set for quick practice, then switch to the app when available for larger banks and deeper review.

Official exam resources

Use these official CompTIA resources alongside the daily practice set. They cover the provider's own exam page, study guide, or prep material.

Need adjacent CompTIA practice pages too? CompTIA practice hub.

Question 1 of 30
Objective 2.3 Network Implementation

Which standard is recommended for ensuring strong encryption and secure authentication in a WLAN?

Concept tested: Network Implementation

A. Incorrect: IEEE 802.11b is incorrect because it uses outdated security protocols that are vulnerable to modern attacks.

B. Correct: WPA2 provides strong encryption and secure authentication mechanisms for WLANs against contemporary threats.

C. Incorrect: WEP is incorrect because (Wired Equivalent Privacy) has known vulnerabilities and does not offer adequate protection in today's threat landscape.

D. Incorrect: IEEE 802.11a is incorrect because specifies wireless network physical layer standards but does not address security or encryption.

Why this matters: This matters because understanding the latest security protocols ensures WLANs are protected against unauthorized access and data breaches.
Question 2 of 30
Objective 3.2 Network Operations

What does the MODULE-IDENTITY statement define in the context of SNMP management frameworks?

Concept tested: Network Operations

A. Incorrect: unique identifier for a network device is incorrect because it refers to a unique identifier for a network device rather than an MIB module identity.

B. Correct: An identity and metadata for an MIB module is correct because it accurately describes the purpose of MODULE-IDENTITY in defining metadata and identity for an MIB module.

C. Incorrect: The version number of the SNMP protocol is incorrect because it is the version number of SNMP protocol is unrelated to the definition provided by MODULE-IDENTITY.

D. Incorrect: Configuration settings for SNMP traps is incorrect because it is not defined using the MODULE-IDENTITY statement.

Why this matters: This matters because understanding the role of MODULE-IDENTITY helps in correctly configuring and managing SNMP-based network monitoring systems.
Question 3 of 30
Objective 5.2 Network Troubleshooting

During a routine check of your network infrastructure, you observe that one switch port is consistently showing reduced signal strength compared to others. What physical connectivity issue could be causing this problem?

Concept tested: Network Troubleshooting

A. Incorrect: Damaged cables on the affected segment is incorrect because damaged cables typically cause intermittent connectivity issues rather than consistently reduced signal strength.

B. Incorrect: Duplex mismatch between connected devices is incorrect because it is a duplex mismatch would likely result in communication errors and dropped packets, not just reduced signal strength.

C. Correct: Incorrect cable type for the distance involved is correct because using an incorrect cable type for the distance between devices can lead to degraded signal quality over longer distances.

D. Incorrect: Improper termination at both ends of the cable is incorrect because improper termination affects signal reflection but does not necessarily cause consistently reduced signal strength.

Why this matters: This matters because understanding physical layer issues helps in accurately diagnosing network performance problems and maintaining reliable data transmission.
Question 4 of 30
Objective 4.1 Network Security

What is a primary reason attackers might launch DoS or DDoS attacks against one target while simultaneously targeting other services within the same network?

Concept tested: Network Security

A. Incorrect: To disrupt network traffic and prevent data exfiltration is incorrect because it focuses on preventing data exfiltration rather than creating a distraction for secondary attacks.

B. Incorrect: To overload servers with legitimate requests and cause service outages is incorrect because request floods can cause outages, but the stem asks why attackers use the outage as cover for another attack.

C. Incorrect: To test the resilience of firewalls and intrusion detection systems is incorrect because testing security systems is not the primary goal of launching DoS or DDoS attacks; attackers aim to exploit vulnerabilities rather than assess defenses.

D. Correct: To create a distraction for secondary attacks on less secure services is correct because it accurately describes how attackers use DoS or DDoS to create a distraction, allowing them to focus on exploiting less secure services within the network.

Why this matters: This matters because attack-scenario questions test intent: a DDoS can be both an outage and a diversion for secondary compromise.
Question 5 of 30
Objective 1.6 Networking Concepts

Why might two network paths have different performance characteristics even if they are symmetric?

Concept tested: Networking Concepts

A. Incorrect: Due to differences in physical layer standards is incorrect because differences in physical layer standards do not affect symmetric paths equally.

B. Correct: Because of asymmetric queueing is correct because asymmetric queueing can cause one path to experience higher latency or packet loss than another, even if they are symmetric.

C. Incorrect: They use the same routing protocols is incorrect because using the same routing protocols does not ensure identical performance characteristics between two network paths.

D. Incorrect: Symmetric paths always perform identically is incorrect because symmetric paths do not always perform identically due to factors like asymmetric queueing.

Why this matters: This matters because understanding why symmetric paths can have different performance helps in diagnosing and troubleshooting network issues effectively.
Question 6 of 30
Objective 2.1 Network Implementation

When configuring VLAN trunking on a Cisco switch, what is the purpose of the native VLAN?

Concept tested: Network Implementation

A. Correct: To carry untagged frames between switches is correct because it carries untagged frames between switches to ensure compatibility with devices that do not support VLAN tagging.

B. Incorrect: To provide redundancy for critical network traffic is incorrect because it provides redundancy for network traffic, which is unrelated to the function of the native VLAN in handling untagged frames.

C. Incorrect: To isolate management traffic from data traffic is incorrect because it isolates management traffic from data traffic, a feature more relevant to port security or separate VLAN configurations rather than trunking.

D. Incorrect: To encrypt traffic across VLANs is incorrect because it encrypts traffic across VLANs, which is not within the scope of the native VLAN's purpose and would typically be handled by other network security measures.

Why this matters: This matters because understanding the role of the native VLAN is crucial for configuring inter-switch communication effectively in a VLAN environment.
Question 7 of 30
Objective 3.1 Network Operations

When planning a network, which type of diagram would best illustrate the IP address plan for an organization's network?

Concept tested: Network Operations

A. Incorrect: Physical layout diagram is incorrect because it is a physical layout diagram focuses on the placement of devices in an environment rather than their IP address configuration.

B. Incorrect: Rack diagram is incorrect because it is a rack diagram details how equipment is physically arranged within server racks and does not depict network addressing schemes.

C. Correct: Logical diagram is correct because it is a logical diagram illustrates the functional relationships between network components, including their assigned IP addresses, making it ideal for representing an IP address plan.

D. Incorrect: Cable map is incorrect because it is a cable map shows physical connections between devices but does not convey information about IP addresses or network logic.

Why this matters: This matters because understanding which type of diagram to use for specific planning purposes ensures accurate and effective network design.
Question 8 of 30
Objective 5.1 Network Troubleshooting

When applying a structured troubleshooting methodology, what is the next step after identifying the problem?

Concept tested: Network Troubleshooting

A. Correct: Testing theory is correct because after identifying the problem, testing theory helps to hypothesize possible causes and solutions.

B. Incorrect: Establish secure networks is incorrect because establishing secure networks is a separate process unrelated to immediate troubleshooting steps following problem identification.

C. Incorrect: Planning and implementing a solution is incorrect because comes later in the troubleshooting process, after theories have been tested and verified.

D. Incorrect: Verifying functionality is incorrect because happens at the end of the troubleshooting process, not immediately after identifying the problem.

Why this matters: This matters because understanding this sequence ensures effective and efficient resolution of network issues during certification exams.
Question 9 of 30
Objective 4.2 Network Security

Which of the following best practices involves using Access Control Lists (ACLs) to filter traffic based on specific criteria such as IP addresses, protocols, and ports?

Concept tested: Network Security

A. Correct: Configuring ACLs for role-based access control is correct because it involves using ACLs to filter traffic based on specific criteria such as IP addresses, protocols, and ports.

B. Incorrect: Implementing port security measures exclusively is incorrect because it focuses solely on port security measures rather than the broader use of ACLs for filtering traffic according to detailed criteria.

C. Incorrect: Disabling unused services on all network devices is incorrect because disabling unused services does not address the need for precise traffic control using ACLs based on IP addresses, protocols, and ports.

D. Incorrect: Securing management plane interfaces with default passwords is incorrect because it does not relate to configuring ACLs for role-based access control.

Why this matters: This matters because understanding how to configure ACLs effectively is crucial for managing network security by controlling traffic flow according to specific rules.
Question 10 of 30
Objective 1.4 Networking Concepts

Which protocol is commonly used for secure file transfer over port 22?

Concept tested: Networking Concepts

A. Incorrect: FTP is incorrect because it uses port 21 for control connections and does not inherently provide secure file transfer.

B. Correct: SSH runs on port 22 and provides a secure channel for remote login and other network services, including secure file transfers through SFTP (SSH File Transfer Protocol).

C. Incorrect: HTTP is incorrect because operates on port 80 or 443 for HTTPS, which are not used for secure file transfer.

D. Incorrect: SMTP is incorrect because it uses port 25 for email transmission and does not handle file transfers.

Why this matters: This matters because understanding the correct protocol for secure file transfer ensures data protection during network operations.
Question 11 of 30
Objective 2.4 Network Implementation

What mechanism ensures DHCP clients receive configurations only from authorized servers in a diverse network environment?

Concept tested: Network Implementation

A. Incorrect: DNS record validation is incorrect because it does not control DHCP client-server interactions.

B. Correct: DHCP server policies is correct because it specifies policies that ensure only authorized DHCP servers can provide configurations to clients.

C. Incorrect: NAT port forwarding is incorrect because it is unrelated to controlling DHCP server authorization and client configuration.

D. Incorrect: Static IP reservations is incorrect because static reservations bind addresses to clients but do not authorize which DHCP servers may answer.

Why this matters: This matters because DHCP security questions test which control limits server responses rather than DNS, NAT, or address-assignment conveniences.
Question 12 of 30
Objective 3.5 Network Operations

Which document would a network engineer refer to for understanding how diverse organizations use the Cybersecurity Framework to improve cybersecurity risk management?

Concept tested: Network Operations

A. Incorrect: ISO/IEC 27001 Information Security Management Systems is incorrect because it focuses on establishing an information security management system rather than providing guidance on using the Cybersecurity Framework.

B. Correct: NIST Getting Started with the Cybersecurity Framework is correct because it offers insights and examples of how various organizations apply the Cybersecurity Framework to enhance their cybersecurity risk management practices.

C. Incorrect: CompTIA Network+ N10-009 Study Guide is incorrect because it covers general network certification topics, not specific guidance on the Cybersecurity Framework.

D. Incorrect: Cisco Networking Academy Curriculum is incorrect because it provides curriculum for networking education rather than information about implementing the Cybersecurity Framework.

Why this matters: This matters because understanding how different organizations use the Cybersecurity Framework helps in tailoring risk management strategies to fit various operational contexts.
Question 13 of 30
Objective 5.5 Network Troubleshooting

When investigating a NAT issue, what should an administrator check first to ensure proper traffic translation?

Concept tested: Network Troubleshooting

A. Incorrect: DNS server configuration is incorrect because it does not affect how NAT translates IP addresses between internal and external networks.

B. Incorrect: DHCP lease duration is incorrect because it is unrelated to the translation of network traffic by NAT rules.

C. Correct: Interface IP address ranges is correct because checking interface IP address ranges ensures that the NAT rules correctly map internal private addresses to public ones for proper traffic translation.

D. Incorrect: Certificate authority settings is incorrect because it is not relevant to NAT operations or traffic translation.

Why this matters: This matters because understanding how to check IP address ranges helps in effectively troubleshooting and resolving issues related to network connectivity and security.
Question 14 of 30
Objective 4.4 Network Security

When designing a DMZ for an organization's network architecture, which of the following considerations is most critical due to the nature of cyberspace security challenges?

Concept tested: Network Security

A. Incorrect: Implementing multifactor authentication exclusively on internal networks is incorrect because it does not address the specific security needs of a DMZ.

B. Correct: Integrating SIEM with microsegmentation to monitor and control access in real-time is correct because integrating SIEM with microsegmentation provides real-time monitoring and control, enhancing the security of a DMZ by detecting and responding to threats promptly and segmenting the network to limit potential damage.

C. Incorrect: Deploying an IDS/IPS system only within the organization's intranet is incorrect because it does not provide adequate protection for the DMZ, which requires specialized security measures.

D. Incorrect: Relying solely on traditional firewalls for DMZ protection is incorrect because it is insufficient in today’s threat landscape; advanced monitoring and segmentation are necessary.

Why this matters: This matters because effective DMZ design is crucial to protect against external threats while maintaining internal network integrity.
Question 15 of 30
Objective 1.5 Networking Concepts

In a cloud environment, which service model allows users to manage their own virtualized network resources and infrastructure?

Concept tested: Networking Concepts

A. Incorrect: Software as a Service (SaaS) is incorrect because it provides fully managed software applications without requiring users to manage underlying infrastructure.

B. Incorrect: Platform as a Service (PaaS) is incorrect because it offers development tools and environments for building, testing, and deploying applications, but does not allow management of virtualized network resources and infrastructure.

C. Correct: Infrastructure as a Service (IaaS) provides users with the ability to manage their own virtualized network resources and infrastructure.

D. Incorrect: Multitenancy Services is incorrect because they refer to multiple customers sharing the same infrastructure or platform, which does not specifically relate to managing one's own virtualized network resources.

Why this matters: This matters because understanding IaaS is crucial for configuring and maintaining cloud environments where control over infrastructure is necessary.
Question 16 of 30
Objective 2.5 Network Implementation

During a network installation, an engineer notices that the signal strength is weak on fiber connections despite proper termination and cabling. What should be checked next?

Concept tested: Network Implementation

A. Incorrect: Copper cable type is incorrect because it does not affect fiber signal strength.

B. Incorrect: Patch panel configuration is incorrect because issues would typically cause connectivity problems rather than weak signals on properly terminated fibers.

C. Incorrect: Power over Ethernet (PoE) settings is incorrect because it is unrelated to optical signal strength in fiber connections.

D. Correct: Transceiver compatibility directly affects the ability of devices to communicate effectively over fiber, impacting signal strength.

Why this matters: This matters because understanding transceiver compatibility ensures proper network performance and troubleshooting efficiency.
Question 17 of 30
Objective 3.4 Network Operations

When planning for disaster recovery in a network environment, which of the following is most critical to ensure minimal data loss?

Concept tested: Network Operations

A. Correct: Setting an appropriate Recovery Point Objective (RPO) is correct because it defines the maximum acceptable period of data loss due to a disaster, helping to minimize data loss effectively.

B. Incorrect: Implementing cold site redundancy is incorrect because while cold site redundancy provides an alternative location for operations after a disaster, it does not directly address minimizing data loss at the moment of recovery.

C. Incorrect: Conducting regular failover testing is incorrect because ensures that systems can switch over smoothly during a disaster but does not specify how much data might be lost in the process.

D. Incorrect: Establishing warm site availability is incorrect because it offers faster recovery than cold sites but still does not directly set limits on acceptable data loss.

Why this matters: This matters because setting an RPO matters for network operations as it guides backup and disaster recovery strategies to ensure business continuity with minimal data loss.
Question 18 of 30
Objective 5.4 Network Troubleshooting

When comparing STP issues to routing loops, which tool is more commonly used for diagnosing the latter?

Concept tested: Network Troubleshooting

A. Correct: Traceroute helps identify routing loops by showing the path packets take and where they might be looping.

B. Incorrect: ping is incorrect because it does not provide information about the route taken between networks; it only confirms reachability.

C. Incorrect: Packet Debugging is incorrect because tools are more specialized and typically used for detailed analysis rather than diagnosing routing loop issues.

D. Incorrect: ICMP is incorrect because (Internet Control Message Protocol) is a protocol, not a tool, and while ping uses ICMP, traceroute provides the necessary path information to diagnose routing loops.

Why this matters: This matters because understanding which tools are best for specific network issues ensures effective troubleshooting during certification exams and in real-world scenarios.
Question 19 of 30
Objective 4.3 Network Security

In a Zero Trust environment, which technology is crucial for verifying user identity before granting access to network resources?

Concept tested: Network Security

A. Correct: MFA is correct because multi-Factor Authentication (MFA) ensures that users are verified through multiple factors before accessing network resources in a Zero Trust environment.

B. Incorrect: RADIUS is incorrect because it is an authentication protocol but does not inherently provide multi-factor verification, which is crucial for Zero Trust security principles.

C. Incorrect: IPsec is incorrect because it is used to secure communications between devices and networks rather than verifying user identity through multiple factors.

D. Incorrect: TACACS+ is incorrect because it is a network access control protocol that authenticates users before they can use network services but do not provide multi-factor verification.

Why this matters: This matters because understanding MFA's role in Zero Trust environments is crucial for implementing robust security measures against unauthorized access.
Question 20 of 30
Objective 1.1 Networking Concepts

Which layer of the OSI model is directly comparable to the Internet Layer in the TCP/IP model?

Concept tested: Networking Concepts

A. Correct: Layer 3 - Network is correct because it represents the Network layer in the OSI model, which handles routing and forwarding of packets, similar to the Internet Layer in TCP/IP.

B. Incorrect: Layer 2 - Data Link is incorrect because it refers to the Data Link layer, which deals with physical network access and frame transmission, not packet routing or addressing.

C. Incorrect: Layer 4 - Transport is incorrect because it corresponds to the Transport layer, responsible for end-to-end data delivery between hosts, rather than inter-network communication.

D. Incorrect: Layer 7 - Application is incorrect because it pertains to the Application layer, where applications interact directly with software, far removed from network-layer functions.

Why this matters: This matters because understanding this mapping helps in grasping how different networking models relate and function together.
Question 21 of 30
Objective 2.2 Network Implementation

Which type of route would be used to ensure traffic is directed through a backup link when the primary link fails?

Concept tested: Network Implementation

A. Incorrect: Dynamic routing protocol is incorrect because s automatically discover and maintain routes but do not prioritize backup links specifically.

B. Correct: Floating static route is correct because it is a floating static route has a higher administrative distance than other routes and will only be used if no better path exists, ensuring traffic goes through the backup link when needed.

C. Incorrect: Default route is incorrect because s are used for unknown destinations and do not provide specific failover functionality.

D. Incorrect: Directly connected interface is incorrect because s represent immediate connections to networks but offer no mechanism for routing around failed links.

Why this matters: This matters because understanding floating static routes ensures you can configure reliable network fallbacks, critical for maintaining service availability during link failures.
Question 22 of 30
Objective 3.3 Network Operations

What is considered a necessary part of achieving organizational missions according to NIST SP 800-40 Rev. 4?

Concept tested: Network Operations

A. Incorrect: Implementing new software features is incorrect because may add functionality, but it does not directly provide the preventive security maintenance described by NIST SP 800-40 Rev. 4.

B. Incorrect: Conducting regular security audits is incorrect because regular security audits assess conditions and detect issues, but patch management is the preventive maintenance activity named in the stem.

C. Correct: Performing enterprise patch management ensures that all systems are up-to-date and secure against known vulnerabilities, aligning directly with NIST SP 800-40 Rev. 4 recommendations for preventive maintenance.

D. Incorrect: Creating detailed network diagrams is incorrect because network diagrams document infrastructure, but they do not remediate known vulnerabilities the way patch management does.

Why this matters: This matters because patch-management questions test preventive vulnerability reduction, not documentation, feature delivery, or after-the-fact review work.
Question 23 of 30
Objective 5.3 Network Troubleshooting

When a wireless network shows signs of interference, what should an administrator consider to reduce channel overlap?

Concept tested: Network Troubleshooting

A. Incorrect: Adjusting the signal strength on access points is incorrect because adjusting signal strength does not reduce channel overlap; it only affects how far the signal reaches.

B. Correct: Modifying the channel settings can ensure that adjacent channels do not interfere with each other, reducing overlap.

C. Incorrect: Changing the frequency band is incorrect because changing frequency bands may avoid some interference, but it does not directly resolve channel overlap within the band being used.

D. Incorrect: Increasing the number of SSIDs is incorrect because it does not reduce channel overlap; it only creates more network identities.

Why this matters: This matters because wireless troubleshooting questions separate channel-overlap fixes from range, band selection, and SSID design changes.
Question 24 of 30
Objective 4.1 Network Security

What is a common tactic attackers use during DoS or DDoS attacks to facilitate secondary attacks on other network services?

Concept tested: Network Security

A. Incorrect: Conducting ARP poisoning to redirect traffic is incorrect because it describes a tactic used for ARP spoofing rather than leveraging a DoS attack to facilitate secondary attacks.

B. Incorrect: Launching DNS amplification attacks to overwhelm servers is incorrect because it is DNS amplification, but it can be part of a DDoS attack, the question asks about using the distraction of a DoS attack to hide other activities, not just overwhelming servers.

C. Incorrect: Creating man-in-the-middle scenarios for data interception is incorrect because man-in-the-middle scenarios are unrelated to the use of a DoS attack as a smokescreen for additional intrusions.

D. Correct: Using the distraction of a DoS attack to mask additional intrusions is correct because it accurately describes how attackers use the chaos caused by a DoS or DDoS attack to conceal other malicious activities on network services.

Why this matters: This matters because understanding this tactic helps in identifying and mitigating secondary threats that may occur alongside apparent DoS attacks.
Question 25 of 30
Objective 1.2 Networking Concepts

In a network architecture, which topology is characterized by direct connections between all devices to ensure high redundancy and reliability?

Concept tested: Networking Concepts

A. Incorrect: Star/hub and spoke is incorrect because they is a star/hub and spoke topology connects devices to a central hub rather than providing direct connections between all devices.

B. Correct: Mesh is correct because it is a mesh topology provides direct connections between all devices, ensuring high redundancy and reliability.

C. Incorrect: Three-tier is incorrect because it is a three-tier topology divides the network into core, distribution, and access layers, not directly connecting every device for redundancy.

D. Incorrect: Collapsed core is incorrect because it is a collapsed core topology combines the core and distribution layers of a hierarchical design, which does not inherently ensure direct connections between all devices.

Why this matters: This matters because topology questions test whether redundancy requires full device-to-device connectivity instead of a layered or hub-centered design.
Question 26 of 30
Objective 2.3 Network Implementation

When configuring a multi-SSID WLAN, which command is used to assign VLANs for mobility?

Concept tested: Network Implementation

A. Correct: mobility network-id vlan is correct because it assigns VLANs for mobility in a multi-SSID WLAN configuration.

B. Incorrect: ssid vlan is incorrect because it does not specify the command used to assign VLANs for mobility; instead, it refers to an SSID and VLAN relationship without context.

C. Incorrect: vlan ssid is incorrect because while it mentions VLANs and SSIDs, it incorrectly reverses their order and does not provide a valid command syntax.

D. Incorrect: network-id mobility is incorrect because although it includes 'network-id', the correct full command requires 'mobility network-id vlan' to properly assign VLANs for mobility.

Why this matters: This matters because understanding how to configure VLANs correctly in multi-SSID WLANs ensures proper isolation and management of wireless traffic, which is crucial for network security and performance.
Question 27 of 30
Objective 3.2 Network Operations

Which of the following are correctly imported into the SNMP-FRAMEWORK-MIB definition according to RFC 3411?

Concept tested: Network Operations

A. Incorrect: MODULE-IDENTITY, OBJECT-TYPE, TEXTUAL-CONVENTION is incorrect because it includes OBJECT-TYPE and MODULE-IDENTITY which are not part of the SNMP-FRAMEWORK-MIB imports according to RFC 3411.

B. Incorrect: snmpModules, OBJECT-GROUP, MODULE-COMPLIANCE is incorrect because snmpModules, OBJECT-GROUP, and MODULE-COMPLIANCE do not appear in the list of imported items specified by RFC 3411 for SNMP-FRAMEWORK-MIB.

C. Incorrect: SNMPv2-SMI, OBJECT-TYPE, snmpFrameworkMIB is incorrect because while SNMPv2-SMI and OBJECT-TYPE are related to MIB definitions, they are not specifically listed as imports within the SNMP-FRAMEWORK-MIB according to RFC 3411.

D. Correct: TEXTUAL-CONVENTION, OBJECT-GROUP, SNMPv2-TC is correct because it accurately lists TEXTUAL-CONVENTION, OBJECT-GROUP, and SNMPv2-TC which are explicitly imported in the SNMP-FRAMEWORK-MIB definition per RFC 3411.

Why this matters: This matters because SNMP and MIB questions test exact imported symbols and object definitions, where one extra or missing identifier changes the answer.
Question 28 of 30
Objective 5.2 Network Troubleshooting

While troubleshooting a network issue, you notice that one of the Ethernet ports on your switch is showing high error rates and intermittent connectivity issues. Upon inspecting both cables, you find no obvious damage but suspect a physical layer problem. Which of the following should be your first step to diagnose the issue?

Concept tested: Network Troubleshooting

A. Incorrect: Check for signal loss using an OTDR is incorrect because it involves Optical Time Domain Reflectometer (OTDR) which is used for fiber optic cable testing and not Ethernet cables.

B. Incorrect: Verify the duplex settings between connected devices is incorrect because duplex settings are a configuration issue rather than a physical layer problem, which does not address the suspected connector issues.

C. Correct: Inspect the connectors on both ends of the cable for proper termination is correct because inspecting connectors ensures proper termination and absence of damage that can cause signal loss and intermittent connectivity in Ethernet connections.

D. Incorrect: Run a network trace to identify packet loss is incorrect because running a network trace identifies software or higher-layer issues, not physical cable problems.

Why this matters: This matters because identifying physical layer issues correctly saves time by focusing on the right problem area without wasting effort on unrelated configurations.
Question 29 of 30
Objective 4.3 Network Security

Which protocol is essential for establishing secure connections between endpoints in a Zero Trust environment?

Concept tested: Network Security

A. Incorrect: IPsec is incorrect because it provides secure communication at the network layer but does not directly address endpoint-to-endpoint encryption and authentication in a Zero Trust environment.

B. Correct: TLS (Transport Layer Security) is essential for establishing secure connections between endpoints by providing critical encryption and authentication mechanisms necessary for securing communications.

C. Incorrect: RADIUS is incorrect because it is used for network access control and authentication but does not provide the direct endpoint-to-endpoint security required in a Zero Trust architecture.

D. Incorrect: MFA is incorrect because (Multi-Factor Authentication) enhances user identity verification but does not secure data transmission between endpoints.

Why this matters: This matters because understanding which protocol secures communications in a Zero Trust environment is crucial for implementing robust network security measures.
Question 30 of 30
Objective 1.3 Networking Concepts

What is the primary benefit of using CIDR-style addressing in IPv4?

Concept tested: Networking Concepts

A. Incorrect: It increases the number of available IP addresses is incorrect because it increases address efficiency but does not directly reduce the consumption rate of IPv4 addresses.

B. Correct: It reduces the rate at which IPv4 address space is consumed by efficiently allocating IP blocks based on actual needs.

C. Incorrect: It eliminates the need for subnet masks is incorrect because cIDR still requires subnet masks, just in a more flexible and efficient manner than traditional classful addressing.

D. Incorrect: It allows for larger network sizes without segmentation is incorrect because it is CIDR, but it can create smaller subnets to manage network sizes better, it does not inherently allow for larger networks without segmentation.

Why this matters: This matters because understanding CIDR's impact on IPv4 address space conservation is crucial for managing network resources efficiently.
Where to go after the daily web set

How are Network+ questions generated?

dotCreds builds Network+ practice questions from public exam objectives and CompTIA exam objectives and source-backed references. The questions are written for realistic study practice, not copied from exam dumps.

How are explanations sourced?

Each question includes an explanation and, when available, a source link back to the provider documentation or reference used to validate the answer. That keeps the practice tied to study material you can actually review.

What score do I get?

The page tracks today's answered count and accuracy for the 30-question daily set, then saves a 7-day score history on this device so you can see your recent practice trend.

Why use this site?

The site is the fastest way to start Network+ practice without installing anything. It is built for daily recall, quick weak-topic discovery, and source-backed explanations you can review immediately.

Why use the app when available?

The web page is the quick free sampler. If a dotCreds app is available for Network+, the app is better for larger banks, focused weak-domain drills, longer review sessions, and mobile study routines.