CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test
- 20 Questions
- Unlimited time
- Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
A network administrator notices that devices on the local network are unable to access external websites. After verifying that internet services from the ISP are operational and that internal resources are accessible, the administrator suspects an issue with the network's routing configuration. What configuration error is likely causing the devices to fail connecting to external websites?
ACLs are blocking access to external network addresses.
Incorrect subnet masks are configured on the devices.
The default gateway is not correctly configured on the router.
The routing table contains incorrect entries for local subnets.
Answer Description
The likeliest issue in this scenario is that the default gateway is not configured or incorrectly configured on the router. The default gateway provides the necessary routing information for forwarding packets destined for external networks and the internet. If it's missing or incorrect, devices can communicate within the local network but fail to find a route for external addresses. Incorrect entries in the routing table typically only affect specific network segments, and incorrect subnets would largely prevent local communications, not just external communications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a default gateway in networking?
How is the default gateway configured on a router?
What happens if the default gateway is misconfigured?
A corporation requires a method for their employees to securely access specific internal web applications from any location, using their personal devices without installing any additional software. Which technology should the company use?
Full VPN client
VPN Passthrough
IPSec VPN
Clientless VPN
Answer Description
A Clientless VPN is appropriate in this scenario because it allows users to access internal network resources through a web browser without requiring the installation of client software on their devices. This method is particularly effective for accessing specific applications securely, rather than the entire network. An SSL VPN typically facilitates this by securing the connection between the user's web browser and the network gateway. In contrast, a Full VPN client would require installing software on each device, which is not ideal for this requirement. VPN Passthrough is a feature on a router that allows outbound VPN connections from clients on the internal network; it does not provide inbound access to internal web applications for remote users. Lastly, an IPSec VPN also typically requires client software installation and is therefore not suitable for scenarios that demand a clientless setup.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a Clientless VPN work?
What is the role of SSL in a Clientless VPN?
How is a Clientless VPN different from a Full VPN client?
A network administrator at a medium-sized enterprise plans to upgrade the firmware on several critical routers. To ensure a systematic approach compliant with best practices for network management, which of these actions should most appropriately initiate the change management process?
Directly implement the changes during a scheduled maintenance window
Start with a thorough risk assessment before proposing any specific actions
Informally discuss the change with colleagues to gather feedback before proceeding
Submit a change request to the change advisory board (CAB) for review and approval
Answer Description
Before making any significant changes to a network's infrastructure, the first step under the change management process should always start with submitting a change request. This action ensures that all necessary approvals are obtained, and all impacts are assessed before any changes are implemented, minimizing potential disruptions. Just discussing potential changes informally does not provide proper documentation or authorization. Implementing changes directly or beginning with a risk assessment, though important, skips the initial necessary step of formally recording and initiating the process through an official change request.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of a Change Advisory Board (CAB)?
Why is submitting a change request the first step in the process?
What is the benefit of following a formal change management process?
A network administrator is configuring a company's wireless router to prevent unauthorized access and enhance security. In addition to changing the default password, what is the most effective additional device hardening step the administrator should take?
Disable unused ports and services on the router
Schedule regular firmware updates
Change the network's SSID to a generic name
Answer Description
Disabling unused ports and services is the most effective step in this scenario, as it immediately reduces the number of avenues an attacker could exploit to gain unauthorized access or disrupt network services. Changing the SSID, while useful for concealing network identity, does not itself secure the network against determined attackers who can still detect and connect using advanced tools. Scheduling regular updates is important for security but relates more to maintaining the security posture over time rather than an immediate hardening step.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is disabling unused ports and services important for router security?
What tools or methods can attackers use to exploit open ports and services?
How does disabling services differ from using firewalls for securing a router?
An IT technician notices that a specific application is not maintaining a reliable connection between the client and the server. Considering the role of transport layer protocols, which protocol is likely being used if the application requires real-time data transmission but can tolerate some data loss?
UDP
TCP
ICMP
SCTP
Answer Description
UDP (User Datagram Protocol) is designed for applications that require fast, efficient transmission, such as streaming and online gaming where some data loss is tolerable. It does not provide the error checking and recovery services found in TCP, thus if there are issues with the connection reliability, the choice of UDP might be the reason, given its connectionless nature of allowing some packet loss.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does UDP allow data loss while prioritizing speed?
What types of applications commonly use UDP?
How does UDP differ from TCP in terms of connection management?
A network administrator needs to implement a wireless security protocol that provides robust encryption and user authentication over a centralized server for their corporate Wi-Fi. Which is the BEST option to meet these requirements?
WPA3-Enterprise
WEP (Wired Equivalent Privacy)
WPA2-Personal
Open network (no encryption)
Answer Description
WPA3-Enterprise offers the highest security by providing strong encryption and centrally managed user authentication. This method leverages a RADIUS server to authenticate each connecting device independently, which is ideal for a corporate environment. WPA3 includes updated security measures, such as Simultaneous Authentication of Equals (SAE) and stronger encryption, to protect against vulnerabilities found in WPA2, making it the most robust choice.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between WPA2-Personal and WPA3-Enterprise?
What is a RADIUS server, and how does it enhance wireless security?
What is Simultaneous Authentication of Equals (SAE), and why is it important in WPA3?
During an audit of your network management practices, it is evident that multiple network configurations have been applied without proper documentation or version control. What immediate action should be recommended to ensure consistent deployment and easy rollback capabilities in the future?
Automate the synchronization of network configurations to the central repository with detailed logging and version control.
Establish a protocol for manual version control tagging before any configuration change.
Perform periodic backups of configurations without versioning.
Manually document changes in a shared spreadsheet at regular intervals.
Answer Description
Implementing automated synchronization between the live network configurations and the central repository ensures all changes are documented and versioned. This practice not only provides a history of changes for auditing purposes but also allows for quick rollbacks to previous configurations if necessary. Manual versioning is prone to human error and inconsistency, while periodic documentation can cause delays and lack real-time updates.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is automation important for network configuration management?
What types of tools can be used for automating configuration synchronization?
What are the risks of relying solely on manual configuration documentation?
What feature of QSFP+ modules primarily differentiates them from basic QSFP modules when considering upgrades in a data center?
They enable longer cable lengths without signal degradation.
They support only single-mode fiber connections.
They support a higher data rate, reaching up to 40 Gbps.
They reduce power consumption by integrating more efficient cooling systems.
Answer Description
QSFP+ modules support four channels, each operating at 10 Gbps for a total data rate of 40 Gbps. This is a significant increase from standard QSFP modules, which support four channels at 1 Gbps each (for a total of 4 Gbps). This higher data rate makes QSFP+ suitable for modern data centers and high-performance computing. The other answers are incorrect. Power consumption generally increases with higher data rates. Cable length depends on the specific module variant (e.g., SR4, LR4) and the cable type, not the form factor alone. QSFP+ modules are available for both single-mode and multi-mode fiber, as well as for copper cables.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does QSFP stand for, and how does it differ from SFP modules?
What are the differences between single-mode and multi-mode fiber in the context of QSFP+ modules?
How does the channel configuration of QSFP+ improve performance in data centers?
Which protocol and port combination is primarily used for securely transferring web pages from web servers to clients?
Telnet | 23
FTP | 21
SMTP | 25
HTTPS | 443
Answer Description
HTTPS on port 443 is the correct answer because it is the secure version of HTTP, using encryption (SSL/TLS) to securely transfer web pages from web servers to clients. FTP on port 21 is used for file transfers but not specifically for web pages. SMTP on port 25 is used for sending emails, not web pages. Telnet on port 23 offers text-oriented communication but lacks encryption, making it inappropriate for secure transfers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What makes HTTPS on port 443 more secure than HTTP?
How does TLS work in securing HTTPS connections?
Why is FTP on port 21 not suitable for secure web page transfers?
A network team utilizes code to automate configurations and maintain consistency across the network infrastructure. The team needs to ensure that they can track changes, collaborate without overwriting each other's work, and revert to previous configurations if necessary. Which is the BEST solution to meet these requirements?
Establishing a central repository with a version control system
Implementing a network monitoring tool
Applying a strict change management process without tooling support
Using a single shared document to store all network scripts
Answer Description
A central repository enables network teams to keep all configuration scripts and automation code in a single location, where it can be accessed and updated by various team members. Version control systems such as Git allow tracking changes to network configurations, collaboratively working on code without overwriting each other's changes, and the ability to revert to previous versions if a new configuration causes issues. Version control is the only option among the given answers that addresses all the specified criteria for collaboration, tracking changes, and reverting to previous states when needed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a version control system and how does it work?
Why is Git commonly used as a version control system for network automation?
How is a central repository different from a single shared document?
A network administrator is planning to expand the company's infrastructure to include a second data center. They intend to set up a DCI to ensure high availability and optimized disaster recovery processes. Which technology is most appropriate for creating a high-capacity, secure, and scalable interconnect between these data centers?
Point-to-Point Protocol (PPP)
Multiprotocol Label Switching (MPLS)
Dark Fiber
Virtual Private Network (VPN)
Answer Description
Multiprotocol Label Switching (MPLS) is most appropriate for creating DCIs due to its ability to support high-capacity bandwidth and its proficiency in managing data packets through labels, facilitating efficient data routing. MPLS also provides reliability, various Quality of Service (QoS) levels, and traffic engineering capabilities, making it ideal for interconnecting data centers. Other answers, while related to networking technologies, are not as suited. Point-to-Point Protocol is typically used for direct connections between two nodes rather than high-capacity data center interconnections, and Dark Fiber, although offering high capacity, lacks inherent routing and QoS features critical for complex DCI. Lastly, VPN is more suited for secure, single connections over the internet and does not necessarily provide the scalability required for robust DCI.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is MPLS, and how does it work?
What is the role of Quality of Service (QoS) in MPLS?
How does MPLS compare to Dark Fiber for data center interconnections?
Which IPv4 address is classified as a public IP address?
172.16.254.3
192.168.1.1
8.8.4.4
10.0.0.1
Answer Description
The IP addresses 10.0.0.1, 172.16.254.3, and 192.168.1.1 are all classified as private IP addresses under RFC 1918, which reserves them for internal network use. Conversely, the address 8.8.4.4 is not part of any reserved private range and is routable on the global internet, making it a public IP address.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between public and private IP addresses?
What is RFC 1918, and why is it important?
Why is 8.8.4.4 classified as a public IP address?
A company's network administrator discovers that multiple users are complaining about connectivity issues and incorrect network settings. After investigation, the administrator suspects the presence of an unauthorized DHCP server on the network. What is the potential security risk posed by this rogue DHCP server?
It encrypts data packets causing delays in data transmission.
It serves as a backup server improving network redundancy.
It increases the network's broadcast traffic, slowing down network speeds.
It can issue incorrect network settings leading to traffic misdirection.
Answer Description
A rogue DHCP server can issue incorrect or malicious network settings to clients, directing traffic to unauthorized locations which potentially allows for man-in-the-middle attacks or data exfiltration. It disrupts network operations by allocating incorrect IP addresses and gateway information, posing significant security and operational risks. The other options, while potentially part of various attack strategies or network configurations, do not directly represent the typical outcomes of a rogue DHCP server.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DHCP and how does it work?
How can a rogue DHCP server impact network security?
How can administrators detect and prevent rogue DHCP servers?
What is the BEST reason for setting a shorter duration for network address assignments in an environment with frequent device turnover and diverse client devices?
It improves the efficiency of network management hardware by reducing its operational load.
It facilitates quicker recycling of network resources in environments with high device turnover, adjusting swiftly to configuration changes.
It strengthens network security by frequently altering network addresses, deterring continuous unauthorized access.
It reduces the overall traffic on the network by minimizing the number of requests for new network addresses.
Answer Description
Setting a shorter duration for network address assignments is advantageous in environments where the configuration often changes due to the high turnover of devices. This practice helps in promptly releasing addresses that are no longer in use, mitigating the risk of address conflicts and effectively managing a fluctuating number of devices without the need for a large pool of addresses. While longer durations decrease the load on the network's management protocols by reducing the frequency of requests, they are less adaptable to rapid changes typical in dynamic environments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DHCP and how does it assign network addresses?
What happens when a device’s DHCP lease expires?
How does a shorter DHCP lease duration benefit environments with frequent device turnover?
Given an enterprise network that spans multiple geographic locations, which dynamic routing protocol would be the BEST to implement for optimal scalability and interoperability among various vendors' equipment?
Routing Information Protocol (RIP)
Enhanced Interior Gateway Routing Protocol (EIGRP)
Border Gateway Protocol (BGP)
Open Shortest Path First (OSPF)
Answer Description
Open Shortest Path First (OSPF) is the best choice for an enterprise network spanning multiple geographic locations due to its support for large and complex topologies and its vendor-neutral specification, which ensures interoperability among different vendors' equipment. While EIGRP also supports large networks, it is less ideal in environments that require vendor interoperability since it is Cisco proprietary, potentially limiting its use with equipment from other vendors. BGP is generally used for Internet routing between autonomous systems rather than internal enterprise networks, and RIP's limitations in scalability make it unsuitable for large networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is OSPF considered vendor-neutral, and why is this important?
When is EIGRP a better choice than OSPF?
What is the primary difference between OSPF and BGP in terms of use cases?
Which open-standard first hop redundancy protocol, defined in RFC 5798, allows multiple routers to share a virtual IP and MAC address so that hosts keep forwarding traffic even if the master router fails?
VRRP (Virtual Router Redundancy Protocol)
RIP (Routing Information Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
HSRP (Hot Standby Router Protocol)
Answer Description
Virtual Router Redundancy Protocol (VRRP) is an IETF-standard FHRP (RFC 5798) that lets two or more routers form a virtual default gateway. One router (the master) actively forwards traffic; if it goes down, another router in the group automatically takes over using the same virtual IP/MAC, so end-station traffic continues uninterrupted.
HSRP provides the same function but is Cisco-proprietary, so it is not the correct choice when the question specifies an open standard. RIP and EIGRP are dynamic routing protocols that exchange route information but do not offer default-gateway redundancy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is VRRP considered an open standard while HSRP is not?
How does VRRP ensure uninterrupted network traffic during a router failure?
What is the difference between VRRP and dynamic routing protocols like RIP and EIGRP?
Which of the following IPv4 addresses falls within the private address space specified by RFC 1918 and therefore cannot be routed across the public Internet?
203.0.113.10
8.8.8.8
192.168.1.1
172.34.0.5
Answer Description
RFC 1918 designates three private IPv4 blocks: 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. Only addresses inside these ranges are intended for internal networks and are filtered by Internet routers. 192.168.1.1 sits inside 192.168.0.0/16, so it is private. The other options (172.34.0.5, 203.0.113.10, 8.8.8.8) lie outside the private ranges and are publicly routable (203.0.113.0/24 and 198.51.100.0/24 are documentation ranges but still public).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is RFC 1918 and why is it important?
What is the difference between a private and public IP address?
Why is 172.34.0.5 not part of the private IPv4 address range?
A network administrator is troubleshooting a newly installed Ethernet network that is experiencing slower than expected data transfer rates and intermittent connectivity issues. After ruling out hardware failures and configuration errors, the administrator suspects that signal interference might be causing the problem. Which of the following would be the BEST next step to confirm if crosstalk is the issue?
Use a cable tester to check for crosstalk in the Ethernet cables.
Configure a VLAN to separate noisy traffic and decrease broadcast domains.
Increase the power settings on the network routers and switches to boost signal strength.
Replace the Ethernet cables with fiber-optic cables to test if the issue persists.
Answer Description
Using a cable tester to check for crosstalk specifically targets the possibility of signal interference between wires inside the same cable, which could lead to the issues described. It would provide direct evidence if crosstalk is present, differentiating it from other potential causes such as external electromagnetic interference or improper cable shielding, which would require different investigative tools.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is crosstalk in Ethernet cables?
How does a cable tester detect crosstalk?
Why aren’t fiber-optic cables affected by crosstalk?
A network administrator is troubleshooting issues on a network where newly installed security cameras are intermittently going offline. The PoE switch used supports a total of 185 watts, and there are 10 cameras, each requiring 20 watts. Which of the following actions should the administrator take to BEST resolve the power-budget-exceeded issue?
Prioritize power to critical cameras and turn off non-essential ones
Install an additional PoE switch or replace it with one that supports a higher power budget
Adjust the camera settings to lower their power consumption
Replace PoE cameras with non-PoE cameras
Answer Description
Installing an additional PoE switch or a switch with a higher power budget is the best solution because the existing switch cannot supply the 200 watts required by all ten cameras. The resulting power shortfall causes certain cameras to shut down intermittently. Lowering camera settings or prioritizing some cameras only sidesteps the underlying capacity problem, and replacing the cameras with non-PoE models would require separate power cabling without fixing the current PoE deficit.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is PoE and how does it work?
How can a network administrator calculate the power budget for PoE devices?
What are the standards for PoE, and how do they differ?
A network administrator is setting up a secure email transmission service that encrypts SMTP traffic. Which port should the administrator configure the email server to listen to in order to secure email messages?
Port 587
Port 993
Port 443
Port 25
Answer Description
Port 587 is used for secure email communication over SMTP, commonly known as SMTPS. This port allows email to be sent securely via an encrypted connection, which is crucial for protecting sensitive information during transmission. Port 25 is the default for unencrypted SMTP, and while port 443 is commonly used for HTTPS, it is not used for securing SMTP. Port 993 is for IMAPS, which is used for receiving emails securely, not sending.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is encryption important for SMTP traffic?
What role does Port 25 play in email transmission?
How is Port 993 different from Port 587 in email services?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.