CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test
- 20 Questions
- Unlimited
- Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
Which of the following options BEST describes the primary function of 802.1X in a network environment?
Content filtering
Port-based Network Access Control
Data packet encryption
Network Address Translation
Answer Description
802.1X provides an authentication framework that allows network devices, such as switches and wireless access points, to become part of an authentication process before allowing further access to the network. This protocol works by encapsulating and transporting the authentication data between the client and the authentication server, typically using the Extensible Authentication Protocol (EAP). Port-based Network Access Control is a feature of 802.1X that denies all access to the network via the port to which the client is connected until the client's identity is verified and authorized. This involves blocking all traffic, except authentication messages, until the client is authenticated, serving to prevent unauthorized access. The other options, while related to network security, do not directly describe the function of 802.1X as thoroughly or accurately.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Extensible Authentication Protocol (EAP) in 802.1X?
How does 802.1X prevent unauthorized access?
What is the role of a RADIUS server in 802.1X?
A network administrator is configuring a mixed network environment with both high-speed corporate connections and smaller links for remote offices. If the main goal is to minimize packet breakup, which MTU setting on the routers should be considered the BEST?
Conform all settings to the smallest link capacity to prevent packet fragmentation
Set an average size based on all connected link capacities
Maintain default settings for each connection type without adjustments
Increase all link sizes to the maximum allowed by the high-speed corporate connections
Answer Description
Setting the MTU to match the smallest allowed data packet size in the network minimizes fragmentation. In settings with a combination of higher and lower capacity links, selecting the MTU of the smaller links as the standard avoids fragmentation that could occur if packets allowed by larger capacity links are too big to be handled by the smaller links without being broken up.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is MTU in networking?
Why does packet fragmentation affect network performance?
How can MTU settings be adjusted to prevent fragmentation?
A network technician is addressing an issue where several applications periodically fail to establish network connections. Which mechanism, crucial for setting up reliable communications between devices, should be evaluated to ensure it is not at fault?
Window scaling
Keepalive messages
Checksum calculation
Three-way handshake
Answer Description
The three-way handshake is essential for establishing a reliable connection between a client and server. This process involves sending a SYN packet, receiving a SYN-ACK in response, and then sending an ACK. If any part of this handshake fails, the connection will not be established reliably, which could lead to the intermittent connection issues observed. The other options do not directly affect the fundamental establishment of connections. Window scaling impacts flow control but not the initial connection establishment. Keepalive messages are used to maintain a connection but not in establishing one. Checksums ensure data integrity rather than connection reliability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the three-way handshake process in networking?
Why is the three-way handshake important for reliable communications?
How does the three-way handshake differ from other mechanisms like keepalive messages?
What is the primary purpose of key management in network security?
To audit and ensure compliance with security policies
To securely manage the full lifecycle of cryptographic keys
To define and enforce network security rules and policies
To authenticate users and devices accessing the network
Answer Description
The primary purpose of key management in network security is to handle cryptographic keys in a secure manner. This involves the generation, distribution, storage, rotation, and destruction of keys, ensuring they remain protected throughout their lifecycle. Secure key management helps prevent unauthorized access and maintains the integrity of encrypted data. The incorrect answers address auditing (reviewing compliance), authentication (verifying identities), and defining security rules-all important tasks but different from managing cryptographic keys.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is secure key management critical in cryptography?
What are some common best practices for cryptographic key management?
How does key rotation enhance security in key management?
Which security property is primarily provided when data is encrypted as it traverses an untrusted network such as the internet?
Integrity - it ensures packets cannot be altered in transit.
Non-repudiation - it proves the sender cannot deny sending the data.
Confidentiality - intercepted data remains unreadable without the decryption key.
Availability - it prevents attackers from delaying or blocking the data.
Answer Description
Encrypting data in transit converts readable plaintext into ciphertext. Anyone who captures the traffic will see only encrypted data, which is unintelligible without the correct decryption key. Thus, encryption safeguards the confidentiality of the information. By itself, encryption does not guarantee availability, non-repudiation, or full integrity-additional mechanisms such as MACs or digital signatures are required for those properties.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between confidentiality and integrity in network security?
What role does a decryption key play in maintaining confidentiality?
How do additional mechanisms like MACs or digital signatures ensure integrity or non-repudiation?
A network technician is designing a wireless network for a large office building. The goal is for employees to walk from one end of the building to the other without losing their Wi-Fi connection. To achieve this seamless roaming, multiple access points will be deployed as part of an Extended Service Set (ESS). How should the access points be configured?
Configure each access point with the same SSID on different, non-overlapping channels.
Configure each access point with a unique SSID and a unique channel.
Configure each access point with a unique SSID and the same BSSID.
Configure each access point with the same SSID on the same channel.
Answer Description
The correct answer is to configure each access point with the same SSID on different, non-overlapping channels. An Extended Service Set (ESS) allows multiple access points to use the same network name (SSID), making them appear as a single, large network. This enables client devices to roam seamlessly from one access point to another. To prevent signal interference and performance degradation between adjacent access points, they must be set to different, non-overlapping channels (e.g., 1, 6, and 11 for 2.4 GHz Wi-Fi). Configuring APs with the same channel would cause co-channel interference. BSSIDs are the unique MAC addresses of the access points and cannot be configured to be the same.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Extended Service Set (ESS)?
Why do access points need different, non-overlapping channels?
What happens if all access points in an ESS use the same channel?
A small business is configuring their edge router to allow multiple devices to access the internet using a single public IP address. Which of the following techniques should they implement to achieve this?
Port address translation (PAT)
VLAN tagging
Dynamic routing
Dynamic Host Configuration Protocol (DHCP)
Answer Description
The correct technique to implement in this scenario is Port Address Translation (PAT).
Port Address Translation allows multiple devices on a local network to share a single public IP address when accessing the internet. PAT works by assigning a unique port number to each outgoing connection, so the edge router can track and manage traffic between internal private IP addresses and external public IP communications. This makes it especially useful for small businesses with limited public IPs.
The other options are not suitable for this specific use case:
- VLAN tagging is used for segmenting network traffic within a LAN, not for internet access sharing.
- Dynamic routing helps routers share routing information but does not manage IP address translation.
- Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to devices within a network, but it does not handle public IP sharing.
Therefore, Port Address Translation (PAT) is the correct choice.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does Port Address Translation (PAT) work?
What is the difference between NAT and PAT?
Why is PAT important for small businesses?
A network technician is troubleshooting an application that is experiencing glitches and dropouts. What is the most direct symptom of network packet loss?
Intermittent data transmission errors
Increased network latency
Enhanced bandwidth utilization
Implementation of new encryption protocols
Answer Description
Packet loss fundamentally means that data packets fail to reach their destination, resulting in incomplete data transmission. This is directly observed as intermittent errors, such as glitches in video or audio streams. While packet loss can cause increased latency, the latency is a secondary effect resulting from the time it takes for a protocol like TCP to retransmit the lost packets. Enhanced bandwidth utilization is incorrect; in fact, retransmissions caused by packet loss consume more bandwidth, leading to inefficient use. Encryption protocols are related to data security, not the physical delivery of packets.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What causes network packet loss?
How does TCP handle packet loss?
How can you detect and measure packet loss on a network?
Which type of documentation would be MOST useful when planning updates for network hardware to ensure all devices are covered under a current warranty?
Physical network diagrams
IP address management tools
Asset inventory
Logical network diagrams
Answer Description
An asset inventory explicitly lists all the hardware within an organization, including details about warranty support, which is crucial for understanding which devices are currently under warranty before planning hardware updates. Hence, it facilitates informed decisions about upgrades or replacements if warranty support is nearing an end. Physical and logical diagrams, though useful for understanding network connectivity and layout, do not typically include warranty information. IPAM tools are primarily used for managing IP addresses and do not include hardware warranty details.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is an asset inventory essential for managing hardware warranties?
How does an asset inventory differ from a physical or logical network diagram?
How can organizations keep their asset inventory up-to-date?
A company is upgrading its wireless infrastructure to ensure enhanced security and encryption. Which encryption method should be implemented to provide the highest level of security for their Wi-Fi network?
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access 3 (WPA3)
Wi-Fi Protected Access with Pre-Shared Key (WPA-PSK)
Wi-Fi Protected Access 2 (WPA2)
Answer Description
WPA3 provides enhanced security features compared to WPA2, including improved protections against brute-force attacks and better data encryption. WPA2, while still secure, is older and potentially vulnerable to security exploits that have been addressed in WPA3. WEP is outdated and highly insecure, with many vulnerabilities that can be exploited easily. WPA-PSK offers a decent security level but lacks the advanced features and strength of WPA3, making it less ideal for environments requiring robust security measures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is WPA3 more secure than WPA2?
What are some key weaknesses of WEP and why is it no longer used?
What is WPA-PSK and how does it differ from WPA3?
A network engineer is tasked with configuring a new router in a large multinational corporation's headquarters. This router needs to exchange routing information with routers from other autonomous systems. Which routing protocol should the engineer use?
Enhanced Interior Gateway Routing Protocol (EIGRP)
Open Shortest Path First (OSPF)
Border Gateway Protocol (BGP)
Routing Information Protocol version 2 (RIPv2)
Answer Description
BGP (Border Gateway Protocol) is the standard protocol used to exchange routing information between different autonomous systems on the internet, making it the appropriate choice for a router that needs to communicate across different ASs. OSPF and EIGRP are typically used for routing within a single AS (intra-domain routing), hence they would not be suitable for this scenario where inter-domain routing is required. RIPv2, although capable of dynamic routing, is generally considered outdated and insufficient for the scale and complexity of multinational corporation networks due to limitations like a low hop count and slower convergence.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an autonomous system (AS) in networking?
Why is BGP better suited for inter-domain routing compared to OSPF or EIGRP?
What are the limitations of RIPv2 that make it unsuitable for large networks?
When configuring a point-to-point wireless bridge between two buildings, which of the following is the BEST choice to maximize stable connectivity?
Use a high-gain antenna without specifying directional or omnidirectional
Use a directional antenna
Deploy an autonomous access point
Use an omnidirectional antenna
Answer Description
Choosing a directional antenna for a point-to-point setup is ideal because it focuses the signal between two specific points, which enhances the signal strength and reduces interference compared to an omnidirectional antenna which spreads the signal in all directions. Omnidirectional antennas, despite their usability in different scenarios, are not optimal for long, specific links as they do not focus the signal. High-gain antennas without specifying directional or omnidirectional criteria might seem suitable, but the key is the directionality which maximizes the strength and focus of the signal. Finally, an autonomous access point is a solution for network management and flexibility but does not inherently address the directional strength needed in a point-to-point connection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a directional and an omnidirectional antenna?
How does signal interference affect wireless communication in a point-to-point setup?
What role does a high-gain antenna play in wireless networking?
Which configuration is BEST for enhancing network security by controlling ingress and egress traffic according to predefined security rules?
Configuring a stateful firewall
Implementing a simple packet filtering firewall
Enabling NAT on the network router
Utilizing an access control list at the router
Answer Description
A stateful firewall is optimal for enhancing network security as it not only filters traffic based on state, port, and protocol, but also keeps track of active connections. By monitoring the state of network connections, it can make more informed decisions about which packets to allow or deny, dynamically adjusting to the flow of traffic based on the context of the traffic and sessions. Other options, such as static packet filtering, do not offer the dynamic tracking of connection states, making them less effective in scenarios where comprehensive security and control over both ingress and egress traffic are needed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does a stateful firewall do?
How is a stateful firewall different from packet filtering?
Why is NAT not sufficient for network security?
A network manager at a medium-sized enterprise has been tasked to verify that all network management software used is compliant with licensing agreements after an internal audit revealed discrepancies. Which of the following SHOULD the network manager prioritize to best address this compliance issue?
Review licenses and their actual usage across the network
Automatically update all software to the latest version
Renew software licenses irrespective of their current deployment status
Implement a retraining program on software management for the IT department
Answer Description
Reviewing the current licenses and their usage is the first step in ensuring compliance. This action allows the network manager to compare existing software deployments with the terms and conditions specified in the license agreements. Updating software merely adjusts the version but does not ensure compliance with licensing agreements. Renewing licenses might be necessary but is irrelevant until the current usage is assessed. Retraining staff, while helpful for maintaining standards, does not directly address the specific issue of licensing compliance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What steps are involved in reviewing licenses and usage across a network?
What tools can assist with tracking software licenses and usage?
Why is it important to align software usage with licensing agreements?
An organization uses a network configured with routers handling multiple subnets. While establishing a route for new data packets, which type of address does the router primarily use to determine the next hop?
MAC address
Port number
Service number
IP address
Answer Description
Routers at the network layer generally use IP addresses to make decisions about packet forwarding, routing them to the next hop based on the routing table. MAC addresses are used in Layer 2 for device identification on the same network segment and not for routing decisions, making them incorrect for this context. Port numbers and service numbers are associated with TCP/UDP in the transport layer and layer 4 services respectively, which are not used for routing decisions at the network layer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why do routers primarily use IP addresses for routing decisions?
What is the difference between a MAC address and an IP address in networking?
What role do routing tables play in determining the next hop for data packets?
Which of the following best describes the term 'vulnerability' in the context of network security?
A weakness in a system that can be exploited
A method by which someone takes advantage of a vulnerability
Any potential cause of an unwanted impact to a system or organization
The potential for loss or damage when a threat exploits a vulnerability
Answer Description
A vulnerability refers to a weakness in a system that can be exploited to compromise the security of the network or system. Understanding vulnerabilities helps in prioritizing security efforts and mitigating risks. 'Exploit' is an incorrect answer because it refers to the method by which someone takes advantage of a vulnerability. 'Risk' refers to the potential for loss or damage when a threat exploits a vulnerability, making it also incorrect. 'Threat' is a potential cause of an unwanted impact to a system or organization, thus also incorrect.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a vulnerability and a threat?
How can vulnerabilities be identified in a network?
What is the difference between a vulnerability and an exploit?
What is the primary purpose of implementing a spanning tree protocol in a network?
To expand network coverage area
To manage collision domains within the network
To improve network performance by selecting the fastest paths
To prevent switching loops in a broadcast domain
Answer Description
The correct answer is 'To prevent switching loops in a broadcast domain'. Spanning Tree Protocol (STP) is essential in a layered network to prevent loops, which can create broadcast storms and destabilize network communications. While improving performance and expanding network coverage are beneficial outcomes of many network protocols, they are not the primary functions of the spanning tree protocol. As for managing collision domains, that is primarily addressed by switching devices and protocols at a different layer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a switching loop and why is it problematic?
How does Spanning Tree Protocol (STP) prevent switching loops?
What is a broadcast domain and how does STP interact with it?
A company wants to ensure the authenticity, confidentiality, and integrity of its secure communications across its network. What is the BEST method to achieve this?
Increasing the complexity of network passwords
Enabling firewall rules for incoming and outgoing traffic
Implementing a Public Key Infrastructure (PKI) system
Applying strict access control lists (ACLs)
Answer Description
Using a Public Key Infrastructure (PKI) system is the most effective method to ensure the authenticity, confidentiality, and integrity of secure communications across a network. PKI employs a pair of public and private keys to encrypt and decrypt data, along with digital certificates issued and verified by a Certificate Authority (CA), thus maintaining secure transmissions. While other options like access control lists and firewalls are critical to comprehensive network security, they do not directly address the specific needs of data encryption and key management intrinsic to PKI.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Public Key Infrastructure (PKI)?
How does PKI maintain confidentiality, integrity, and authenticity?
What is a Certificate Authority (CA) in the context of PKI?
A router has learned the exact same 172.16.10.0/24 route from a static configuration, from OSPF, and from RIP. All three advertisements have the identical prefix length and point to valid next hops. To decide which single route to install in its routing table, which attribute will the router compare?
Type of routing protocol used
Metric value of the route
Administrative distance
Bandwidth of the outgoing interface
Answer Description
When multiple routing sources advertise an identical destination prefix, the router chooses the route with the lowest administrative distance because that value represents how trustworthy the source is. Static routes have an AD of 1 by default, OSPF 110, and RIP 120, so in this scenario the static route would be selected. Metrics are considered only after administrative distance when two routes come from the same protocol, and bandwidth or protocol type do not override administrative distance when prefixes and masks match.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Administrative Distance (AD)?
How does a router use AD to decide between routes?
Why is metric value considered after AD?
Which of the following best describes the data unit used at Layer 2 of the OSI model?
Packet
Frame
Bit
Segment
Answer Description
The correct answer is 'Frame', as Layer 2 of the OSI model, also known as the Data Link Layer, processes data in units called frames. A frame encapsulates packets with a header and a trailer to facilitate node-to-node communication across the physical layer. Ethernet frames are the most common type of Layer 2 frames, which include headers containing MAC addresses. The other answers, while related to networking, represent data units or terminologies used at different OSI model layers or different contexts, none of which pertain to the primary function of Layer 2.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a frame and a packet in networking?
What role do MAC addresses play in Layer 2 communication?
What are Ethernet frames, and what do they include?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.