CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test
- 20 Questions
- Unlimited
- Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
Which of the following BEST describes the primary benefit of using a Direct Connect service in a cloud environment?
Allows for unlimited data transfer rates that are not possible with typical internet connections.
Provides a private and direct link that offers more consistent network performance compared to connections over the general internet.
Decreases expenses significantly by completely eliminating the need for local data storage.
Automatically encrypts data before transferring it over the internet.
Answer Description
Direct Connect services primarily provide a dedicated network connection that bypasses the internet. This is advantageous because it offers more consistent network performance compared to internet-based connections. The approach reduces latency, increases bandwidth, and offers a more reliable security profile by not exposing data to the public internet. While increased speed and better bandwidth management are benefits, they are secondary to the main purpose of consistent and reliable network performance over a private connection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Direct Connect service in cloud computing?
How does a Direct Connect service improve network performance?
Is using a Direct Connect service more secure than a standard internet connection?
A network administrator at a broadcasting company needs to ensure that video streams and audio feeds are synchronized across various devices on the network. Which protocol would be most effective for achieving the high-precision time synchronization required for this scenario?
Dynamic Host Configuration Protocol (DHCP)
Network Time Protocol (NTP)
Global Positioning System (GPS) time synchronization
Precision Time Protocol (PTP)
Answer Description
Precision Time Protocol (PTP) is specifically designed for very high-accuracy clock synchronization over an IP/Ethernet network. In practice it can keep devices aligned to within sub-microsecond accuracy, and SMPTE ST 2059 adopts PTP for timing professional video and audio equipment. NTP is adequate for general computing but normally stays within the millisecond range on a LAN. Using a separate GPS receiver at every device can provide precise time but is costly and impractical indoors, and DHCP is unrelated to time synchronization.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Precision Time Protocol (PTP) used for?
How does PTP achieve sub-microsecond accuracy?
How is PTP different from NTP?
A company's website suddenly experiences an inordinate amount of traffic, causing it to respond exceedingly slowly or go offline entirely. What type of attack is most likely occurring?
ARP poisoning
MAC flooding
Denial-of-Service (DoS) attack
Rogue AP
Answer Description
A Denial-of-Service (DoS) attack is intended to make a server or network resource unavailable to users, typically by overwhelming it with excessive requests until it can no longer respond effectively. The sudden spike in traffic and degradation of service mentioned in the scenario is characteristic of a DoS attack. ARP poisoning is a threat that affects data integrity by redirecting network traffic to an attacker, which is different from overwhelming a service with traffic. MAC flooding aims to saturate a switch's MAC address table, forcing it to broadcast traffic to all ports, which is a different mechanism and goal than the one described. A Rogue AP is an unauthorized access point that provides a vector for various other attacks but does not in itself cause a massive flood of traffic to a specific web server.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of DoS attacks?
How does a DoS attack differ from a DDoS attack?
What are some common tools used to detect and prevent DoS attacks?
When initially addressing a network outage, what should be done FIRST according to the standard troubleshooting methodology?
Question users
Establish a theory of probable cause
Gather information
Duplicate the problem
Answer Description
The correct answer is 'Gather information'. According to the troubleshooting methodology, the first step in identifying the problem is to gather all relevant information regarding the issue. This includes understanding the symptoms and the impact of the issue. While questioning users and duplicating the problem are part of the process, they come after initially gathering all necessary data to understand what might be going wrong.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the standard troubleshooting methodology?
Why is gathering information the first step in troubleshooting?
What types of information are typically gathered during the first step of troubleshooting?
During an audit of your network management practices, it is evident that multiple network configurations have been applied without proper documentation or version control. What immediate action should be recommended to ensure consistent deployment and easy rollback capabilities in the future?
Manually document changes in a shared spreadsheet at regular intervals.
Perform periodic backups of configurations without versioning.
Automate the synchronization of network configurations to the central repository with detailed logging and version control.
Establish a protocol for manual version control tagging before any configuration change.
Answer Description
Implementing automated synchronization between the live network configurations and the central repository ensures all changes are documented and versioned. This practice not only provides a history of changes for auditing purposes but also allows for quick rollbacks to previous configurations if necessary. Manual versioning is prone to human error and inconsistency, while periodic documentation can cause delays and lack real-time updates.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is automation important for network configuration management?
What types of tools can be used for automating configuration synchronization?
What are the risks of relying solely on manual configuration documentation?
You are troubleshooting a fiber optic network in your organization and suspect there may be a physical fault in the fiber optic cable due to recent construction near the cable pathway. You decide to use a visual fault locator to identify the location of any potential faults. What type of issue are you specifically looking to detect with this tool?
Breaks or severe bends in the fiber optic cable
Incorrect type of fiber optic cable used
Problems related to improper termination of the cable ends
Signal degradation due to interference or crosstalk
Answer Description
A visual fault locator is used to detect physical issues in fiber optic cables, specifically pinpointing exact location of breaks or severe bends affecting the cable's integrity. It emits a bright light that leaks through breaks or faults, visually indicating where the defect lies. Incorrect cable types and improper termination primarily involve using wrong materials or faulty setup procedures which can't typically be detected directly through a visual inspection of light leakage. Signal degradation pertains to the reduction in signal quality over distance or due to interference, but it wouldn't be visually detectable using this method.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a visual fault locator work?
What other tools can be used to troubleshoot fiber optic cables?
What are the common causes of physical faults in fiber optic cables?
A company is transitioning its network operations to a more flexible and management-efficient architecture due to its rapidly evolving service demands. They want centralized control of network devices so administrators can push policies and configurations from a single controller instead of logging in to each device at its physical location. Which solution would best fit their needs?
Virtual private network (VPN)
Software-defined wide area network (SD-WAN)
Zero Trust Architecture
Software-defined networking (SDN)
Answer Description
Software-defined networking (SDN) abstracts the control plane from the data plane, placing control logic in a centralized SDN controller. Administrators use this controller to program the network and enforce policies across all switches and routers, eliminating the need to configure each device individually. Although SD-WAN also uses centralized orchestration, its primary goal is to optimize and manage traffic across multiple WAN links between sites. Zero Trust Architecture is a security framework focused on continuous verification and least-privilege access, and a traditional VPN only provides encrypted connectivity without centralized device management. Therefore, SDN best satisfies the requirement for centralized configuration of network devices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main components of SDN and how do they work together?
How does SDN compare to SD-WAN in terms of functionality?
What are some real-world benefits of using SDN in enterprise networks?
What is the primary characteristic of static routing in network environments?
Routes are manually configured and do not change unless manually updated
Routing decisions are made based on real-time data
Routes are determined by a central networking authority
Routes are automatically updated based on network traffic changes
Answer Description
Static routing involves manually configuring routes in a router's routing table. These routes remain fixed and do not adjust to topology changes unless an administrator edits or replaces them. This manual, unchanging nature distinguishes static routing from dynamic routing protocols that automatically discover and update routes. Therefore, the correct response is the option stating that routes are manually configured and do not change unless manually updated. The other options describe behaviors associated with dynamic routing or centralized route control, which do not apply to static routing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main differences between static routing and dynamic routing?
When should static routing be used over dynamic routing?
How do administrators implement static routes on a router?
What range of IP addresses is automatically assigned by a host when DHCP server communication fails?
192.168.0.1 to 192.168.255.254
169.254.0.1 to 169.254.255.254
172.16.0.1 to 172.31.255.254
10.0.0.1 to 10.255.255.254
Answer Description
The correct answer specifies a specific range of IP addresses from 169.254.0.1 to 169.254.255.254, which are designated for automatic assignment by the host in the event that DHCP server communication is unsuccessful. This range is within the 169.254.0.0/16 subnet, reserved specifically for this purpose by networking standards to prevent IP conflicts with addresses assigned elsewhere.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the 169.254.0.0/16 range?
Why does a device fail to communicate with a DHCP server?
How can devices with APIPA addresses communicate on the same network?
During an initiative to enhance the efficiency of network monitoring, a network administrator decides to utilize a structured database that details the properties of each network device. This database is essential for targeted monitoring. What is the primary reason this database aids in the administrator's efforts?
The database is primarily utilized for automated system upgrades to ensure all devices meet the latest security standards.
It compiles device-specific information in a hierarchical form accessible through specific network protocols, facilitating precise supervision.
It provides an improved graphical interface within network management tools, simplifying task management.
This database secures communication by encrypting data exchanges between network devices.
Answer Description
A Management Information Base (MIB) provides a structured format for device information that allows for precise and efficient data collection regarding device performance, status, and configuration, essential for targeted and effective monitoring. This hierarchy of data is not meant for automatic firmware updates, enhancing user interface designs, or encrypting network communications, which differentiates the correct choice from the incorrect ones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Management Information Base (MIB)?
How does SNMP interact with MIBs?
What are Object Identifiers (OIDs) in the context of MIBs?
A network administrator is configuring a high-speed data link between two data centers, which requires a distance coverage of 10 km. Which of the following cable types would be the BEST choice for this configuration?
Single Mode Fiber (SMF)
Category 6 (Cat 6)
Category 6a (Cat 6a)
Multimode Fiber (MMF)
Answer Description
For long distances, especially those covering more than 2 km, Single Mode Fiber (SMF) is the appropriate choice because it allows light to travel down a very narrow core, which minimizes signal degradation and allows for data transmission over long distances without significant signal loss. Multimode Fiber (MMF) is generally suited for shorter distances due to modal dispersion, where multiple light paths cause the signal to spread and degrade over long hauls. Cat 6 and Cat 6a are types of copper cables which are typically limited to 100 meters in Ethernet applications; thus, they are unsuitable for a distance of 10 km.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Single Mode Fiber (SMF)?
Why is Multimode Fiber (MMF) unsuitable for long distances?
What limits Category 6 and Category 6a cables from being used for distances of 10 km?
In a network configured with STP, which port role is assigned to the port on a non-root switch with the lowest path cost to the root bridge?
Alternate Port
Root Port
Designated Port
Backup Port
Answer Description
In Spanning Tree Protocol (STP), the Root Port is the port on a non-root bridge with the lowest path cost to the root bridge. This port is used for forwarding traffic towards the root bridge. The Designated Port is assigned on a network segment and is used to forward packets on that segment. The Alternate Port provides an alternative path towards the root, similar to the root port, but is in a blocking state to prevent loops until needed. The Backup Port provides redundancy to a designated port on the same segment and is also in a blocking state. Thus, the best answer is the Root Port because it specifically serves as the primary forwarding path to the root bridge.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What factors determine the ‘lowest path cost’ in STP?
What happens if two ports on a switch have the same path cost to the root bridge?
How does an Alternate Port differ from a Root Port in STP?
Which wireless standard is currently recommended to enhance security in modern wireless network infrastructures?
WEP
WPA3
TKIP
WPA2
Answer Description
WPA3 is the recommended protocol and standard as it provides advanced security measures, including individualized data encryption and improved protection against brute-force attacks, which are crucial for protecting modern wireless networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What improvements does WPA3 offer over WPA2?
What is individualized data encryption in WPA3?
How does WPA3 protect against brute-force attacks?
Which protocol and port combination is primarily used for securely transferring web pages from web servers to clients?
HTTPS | 443
FTP | 21
SMTP | 25
Telnet | 23
Answer Description
HTTPS on port 443 is the correct answer because it is the secure version of HTTP, using encryption (SSL/TLS) to securely transfer web pages from web servers to clients. FTP on port 21 is used for file transfers but not specifically for web pages. SMTP on port 25 is used for sending emails, not web pages. Telnet on port 23 offers text-oriented communication but lacks encryption, making it inappropriate for secure transfers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What makes HTTPS on port 443 more secure than HTTP?
How does TLS work in securing HTTPS connections?
Why is FTP on port 21 not suitable for secure web page transfers?
Which command on a network device provides details about the status and metrics of interfaces, including the operational state and error statistics?
show mac-address-table
show route
show config
show interface
Answer Description
The 'show interface' command is used to view detailed information about the network interfaces on a router or switch. This involves operational status, physical layer statuses, and counters for errors which are vital for troubleshooting. The incorrect options represent other valuable commands but do not focus specifically on interface details as demanded by the question.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of information can be obtained from the 'show interface' command?
What is the difference between 'show interface' and 'show config' commands?
When would you use the 'show route' and 'show mac-address-table' commands?
A network administrator notices that a switch port, which connects to a server, is no longer active and upon checking, finds that the port has been put into an 'error disabled' state. What is the MOST likely cause for this state?
The DHCP server has run out of IP addresses to assign to clients.
The port security settings have been violated, such as exceeding the maximum number of allowed MAC addresses.
The switch experienced a temperature anomaly exceeding operational thresholds.
There was an incorrect cable type used between the server and the switch.
Answer Description
The correct reason why the port would go into an 'error disabled' state in this scenario is usually due to a violation of port security settings, such as exceeding the maximum allowed MAC addresses. Port security limits the number of valid MAC addresses allowed on a port to prevent unauthorized access. If this number is exceeded, the default action for many switches is to disable the port to prevent possible security breaches. Incorrect cable types or DHCP exhaustion typically do not directly cause ports to be error disabled, and temperature anomalies are more related to hardware malfunctions rather than configurations that trigger port security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is port security?
How does a switch detect a violation in port security?
What steps can a network administrator take to resolve an error-disabled port?
In the context of Infrastructure as Code (IaC), how does implementing configuration-drift detection influence network upgrade processes?
It directly increases the bandwidth capacity of the network during upgrades.
It reduces the cost associated with physical components in network upgrades.
It helps identify unauthorized changes and ensures that the network configuration adheres to defined compliance standards during upgrades.
It prevents the need for manual intervention in network troubleshooting post-upgrade.
Answer Description
Configuration-drift detection compares the live environment against the desired state defined in IaC templates. During an upgrade, this practice highlights any unauthorized or unintended changes so administrators can remediate them, ensuring the new configuration meets policy and compliance requirements. The other options describe benefits that are not directly provided by drift detection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Infrastructure as Code (IaC)?
How does configuration-drift detection work?
Why is configuration-drift detection important during upgrades?
Which of the following best describes the function of an intrusion prevention system (IPS)?
It filters incoming network traffic to protect the network from unauthorized access based on a set of security rules.
It only alerts the network administrator about potential security breaches without taking any action.
It facilitates requests between a client and another server to provide anonymity and caching services.
It detects potentially harmful activities within a network and actively blocks them.
Answer Description
An intrusion prevention system (IPS) not only detects malicious activities but actively blocks them from causing harm to the network. While an intrusion detection system (IDS) also monitors for potentially malicious activity, it differs from an IPS because it does not block the activity but rather alerts the administrator. A firewall is designed to block unauthorized access based on predetermined security rules, not specifically to handle post-detection activities like an IPS. A proxy server, conversely, facilitates requests between the client and the server primarily for anonymity and can perform content filtering but does not directly act on intrusion attempts like an IPS.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does an IPS differ from an IDS?
Can an IPS replace a firewall in a network setup?
What are the key methods an IPS uses to detect and block threats?
A network team utilizes code to automate configurations and maintain consistency across the network infrastructure. The team needs to ensure that they can track changes, collaborate without overwriting each other's work, and revert to previous configurations if necessary. Which is the BEST solution to meet these requirements?
Establishing a central repository with a version control system
Applying a strict change management process without tooling support
Using a single shared document to store all network scripts
Implementing a network monitoring tool
Answer Description
A central repository enables network teams to keep all configuration scripts and automation code in a single location, where it can be accessed and updated by various team members. Version control systems such as Git allow tracking changes to network configurations, collaboratively working on code without overwriting each other's changes, and the ability to revert to previous versions if a new configuration causes issues. Version control is the only option among the given answers that addresses all the specified criteria for collaboration, tracking changes, and reverting to previous states when needed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a version control system and how does it work?
Why is Git commonly used as a version control system for network automation?
How is a central repository different from a single shared document?
Which protocol would optimally support a secure client-server communication that involves sensitive data transactions, specifically needing both authentication of the server and encryption of the data?
SNMP
LDAP
HTTP
HTTPS
Answer Description
HTTPS (Hypertext Transfer Protocol Secure) is the best choice for secure client-server communications involving sensitive data because it incorporates SSL/TLS to encrypt data in transit and authenticate the server. This ensures that all data sent between the client and server is protected. In contrast, HTTP (Hypertext Transfer Protocol) is incorrect as it does not include encryption and sends data in cleartext. LDAP (Lightweight Directory Access Protocol) is used for accessing and maintaining distributed directory information services and does not inherently encrypt data in its standard form. SNMP (Simple Network Management Protocol) is used for network management; while newer versions have security features, its primary purpose is not for general secure data exchange.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of SSL/TLS in HTTPS?
How does HTTPS differ from HTTP?
Why isn't LDAP ideal for secure data transactions?
That's It!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.