CompTIA Network+ Practice Test for Subdomain 3.2 #02

Welcome to today’s CompTIA Network+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 3.2 (Given a scenario, use network monitoring technologies) from the CompTIA Network+ N10-009 objectives.

This beginner-level practice test is inspired by the CompTIA Network+ (N10-009) exam and is designed to help you reinforce key networking concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Network+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Network+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Network+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Network+ Study Guide (2026)

CompTIA Network+ Practice Test for Subdomain 3.2 #02
10 questions • Single best answer
Question 1
A network operations center analyst at a managed services provider needs to be immediately notified when CPU utilization on a managed router exceeds 90% or when an interface transitions to a down state. The analyst wants the router to proactively send an alert to the NMS when these conditions occur, rather than waiting for the NMS to discover the issue during its next polling cycle. Which SNMP mechanism allows the managed device to initiate this notification?
    Question 2
    A security engineer auditing SNMP configurations on production network devices finds that all devices use SNMPv2c with community strings transmitted in cleartext over the management network. The engineer wants to upgrade to an SNMP version that provides cryptographic authentication to verify the identity of the NMS and optional encryption to protect data in transit. Which SNMP version satisfies both requirements?
      Question 3
      A network monitoring engineer is configuring a new NMS to collect performance and status data from managed switches and routers. The NMS needs to know which specific data objects are available on each device, what data type each object contains, and how each object is uniquely identified using an object identifier (OID). Which SNMP component provides this structured, hierarchical database of manageable objects for a given device type?
        Question 4
        A network administrator reviewing SNMPv2c configurations on legacy distribution switches notices that several devices still use the factory-default read community string. An attacker who discovers this string could send SNMP GET requests and retrieve detailed configuration data from the switch. Which SNMPv2c mechanism controls read and write access to SNMP-managed objects on these devices?
          Question 5
          A network operations team wants to implement centralized logging so that event messages from all routers, switches, and firewalls are forwarded to a single platform for storage, search, and alerting, rather than being stored locally in device flash memory. The team needs a component that listens for incoming log messages, indexes them, and makes them available for review. Which component should be deployed to fulfill this role?
            Question 6
            A security operations team needs to detect coordinated attacks that span multiple systems simultaneously, where the evidence is distributed across firewall logs, switch authentication records, and endpoint security alerts. No single device's logs contain the full attack picture. The team needs a platform that ingests logs from all these sources, normalizes the data into a common format, applies correlation rules, and generates alerts when multi-source patterns indicate a threat. Which solution addresses this requirement?
              Question 7
              A network engineer needs to capture and analyze traffic on a specific switch port connected to a server that is suspected of communicating with unauthorized external hosts. The engineer does not want to disrupt normal traffic flow to or from the server. The engineer connects a packet analyzer device to a separate, dedicated switch port and needs to configure the switch to copy all traffic from the server's port to the analyzer port. Which switch feature should be configured to accomplish this?
                Question 8
                A security analyst suspects that a workstation is communicating with a known malicious IP address. To confirm this, the analyst needs to see the actual payload content, source and destination IP addresses, port numbers, protocol flags, and complete session details of the traffic being exchanged. Which monitoring method provides this level of detail?
                  Question 9
                  A network operations team needs to review all TCP sessions that traversed the core router during the previous 24 hours, including source and destination IP addresses, port numbers, total bytes exchanged, and session duration for each flow. The team does not need to inspect packet payloads, only the connection-level summary data. The router already exports this data to a dedicated collector. Which monitoring technology produces these connection summary records?
                    Question 10
                    A network monitoring engineer has spent two weeks collecting performance data and establishing reference values for normal CPU utilization, interface error rates, and traffic volume across all managed devices during typical business operations. The engineer then configures the NMS to automatically alert the team whenever current measurements deviate significantly from these reference values. Which network monitoring concept do these reference measurements represent?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top