Welcome to today’s CompTIA Network+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 3.2 (Given a scenario, use network monitoring technologies) from the CompTIA Network+ N10-009 objectives.

This beginner-level practice test is inspired by the CompTIA Network+ (N10-009) exam and is designed to help you reinforce key networking concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Network+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Network+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Network+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Network+ Study Guide (2026)

CompTIA Network+ Practice Test for Subdomain 3.2 #01
10 questions • Single best answer
Question 1
A NOC technician at a telecommunications provider is auditing SNMP configurations across all managed devices. The security team has flagged every device still running SNMPv2c for immediate remediation, citing the protocol's lack of encryption and its reliance on cleartext community strings for authentication. Which SNMPv3 security configuration directly addresses both weaknesses identified by the security team?
    Question 2
    A network engineer at a hospital is configuring a network management system (NMS) to monitor CPU utilization and interface error counters on newly deployed switches from a third-party vendor. The NMS needs to query specific metrics by their unique object identifiers (OIDs). The vendor has provided a file that defines the hierarchical structure mapping each OID to its corresponding device metric. What is this file called?
      Question 3
      A junior engineer at a financial services firm is reviewing SNMP configurations on the network. The operations manager wants the network management system to receive immediate notification the moment a WAN interface goes down, rather than discovering the failure during the next scheduled polling cycle. Which SNMP mechanism is specifically designed to provide this real-time event notification from a managed device to the NMS?
        Question 4
        A security analyst at a retail company needs to capture all traffic passing through a core distribution switch in order to feed it into a network intrusion detection system (IDS). The analyst requires a method that copies traffic from production ports to a dedicated monitoring port without disrupting existing network operations or inserting inline hardware. Which switch feature enables this traffic duplication capability?
          Question 5
          The network team at a shipping company is investigating unexplained saturation on their primary WAN link. Rather than capturing and storing full packet payloads, the team wants a lightweight method that reveals traffic metadata -- including source and destination IP addresses, ports, protocols, and byte counts -- to identify top talkers and application usage patterns. Which monitoring method provides this type of summarized traffic metadata?
            Question 6
            A network administrator at a manufacturing plant is centralizing event logging from all routers, switches, and firewalls. Each device is configured to forward timestamped event messages to a single server using UDP port 514. The server aggregates and stores these messages for security review and troubleshooting. Which protocol and corresponding server role are being used in this deployment?
              Question 7
              A SOC team at an insurance company receives log data from firewalls, endpoint agents, VPN concentrators, and authentication systems. The team needs a centralized platform that can ingest all of these data sources, correlate events across them using detection rules, generate automated alerts for suspicious activity patterns, and support forensic investigations. Which solution is specifically designed to fulfill all of these functions?
                Question 8
                A network engineer at a university has configured the NMS to alert the team when CPU utilization on the core router exceeds 80% for more than three consecutive minutes. During normal operations over the past 90 days, CPU utilization on that device has averaged 35%. The thresholds were derived from historical data collected during normal operations. Which network monitoring concept is being applied when historical performance data is used to define the threshold for triggering alerts?
                  Question 9
                  A network technician at a growing startup has been asked to immediately inventory all devices currently active on the network following a suspected security incident. The standard automated scan is scheduled to run at midnight, but the security team cannot wait. The technician manually initiates a network scan on demand to generate a current device list. Which type of network discovery method is the technician using?
                    Question 10
                    A network operations team at a media streaming company uses two separate monitoring dashboards. The first dashboard uses ping tests and service checks to alert the team whenever DNS, DHCP, or critical application servers become unreachable. The second dashboard graphs interface utilization, CPU load, memory usage, and packet error rates over time to help the team identify degradation trends before they become outages. Which monitoring categories do these two dashboards represent, respectively?

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *