Welcome to today’s CompTIA Network+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 4.2 (Summarize various types of attacks and their impact to the network) from the CompTIA Network+ N10-009 objectives.

This beginner-level practice test is inspired by the CompTIA Network+ (N10-009) exam and is designed to help you reinforce key networking concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Network+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Network+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Network+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Network+ Study Guide (2026)

CompTIA Network+ Practice Test for Subdomain 4.2 #01
10 questions • Single best answer
Question 1
A cybersecurity analyst at a healthcare provider notices an unusually high volume of traffic overwhelming a public-facing web server, causing legitimate users to lose access. Which type of attack is most likely occurring?
    Question 2
    An employee at a logistics company receives an email that appears to be from the IT department asking them to reset their password using a provided link. The email is fraudulent and designed to steal credentials. What type of attack is this?
      Question 3
      A network engineer discovers that an attacker has inserted themselves between two communicating systems and is intercepting and possibly altering traffic. Which attack type does this describe?
        Question 4
        A company’s file servers suddenly become inaccessible, and a message appears demanding payment in cryptocurrency to restore access. Which type of attack is this?
          Question 5
          A penetration tester attempts to gain access to an account by systematically trying many different password combinations until the correct one is found. Which attack method is being used?
            Question 6
            An attacker gains access to a system and installs software that secretly collects user activity and sends it to an external server. What type of malware is this?
              Question 7
              A malicious program spreads automatically across a network without user interaction, exploiting vulnerabilities in operating systems. Which type of malware is this?
                Question 8
                A user installs a free application that appears legitimate but secretly creates a backdoor for attackers. What type of malware is this?
                  Question 9
                  An attacker captures authentication data from a valid session and reuses it later to gain unauthorized access. Which attack type is this?
                    Question 10
                    An attacker leaves a malicious USB drive in a company parking lot hoping an employee will plug it into a corporate computer. Which attack technique is this?

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *