CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
To minimize the impact of malicious redirection of web traffic within a network, which of the following measures would MOST effectively authenticate legitimate responses?
Increase the complexity of network passwords
Deploy network firewalls at key perimeter points
Regularly update antivirus software on client machines
Implement and configure DNSSEC for servers
Answer Description
Implementing and configuring DNSSEC on servers targets the root cause of malicious traffic redirection by authenticating the origins of the data, ensuring that the data integrity is maintained. This specific alignment with protecting against unauthorized changes and redirection aids in counteracting the effects of malicious web traffic redirection techniques. Other options, while beneficial for overall security, do not specifically authenticate the source of web traffic data, which is crucial in mitigating this type of attack.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DNSSEC and how does it work?
Why don't firewalls or antivirus software prevent DNS-based attacks?
How does DNSSEC differ from regular DNS functionality?
What is the primary function of RADIUS in network security?
Providing cloud storage solutions for network data
Encrypting data traffic for all network devices
Managing centralized Authentication, Authorization, and Accounting for network services
Physically securing network-connected hardware
Answer Description
RADIUS primarily functions as a protocol that provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service. Authentication verifies who the user is, Authorization determines what a user can and cannot access, and Accounting keeps track of the consumption of network resources by the user. The other options, while plausible-sounding, are incorrect because they do not describe the main functionalities provided by RADIUS.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does RADIUS stand for and why is it important?
How does RADIUS handle Authentication, Authorization, and Accounting (AAA)?
What types of network services typically use RADIUS?
Which of the following authentication methods uses a centralized server to verify each user's identity before granting access to the network?
WPA2-Personal
Enterprise
MAC address filtering
Pre-shared key
Answer Description
Enterprise authentication involves a centralized server, such as a RADIUS or LDAP server, to manage user credentials and permissions. The server verifies each user who attempts to access the network, ensuring secure and centralized user management. This contrasts with Pre-shared Key (PSK) authentication, where a single shared key is used for all users, not involving individual verification by a server.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a RADIUS server?
How does Enterprise authentication compare to Pre-shared Key (PSK)?
What is LDAP, and how is it used in authentication?
Which of the following BEST describes the primary benefit of using a Direct Connect service in a cloud environment?
Allows for unlimited data transfer rates that are not possible with typical internet connections.
Decreases expenses significantly by completely eliminating the need for local data storage.
Automatically encrypts data before transferring it over the internet.
Provides a private and direct link that offers more consistent network performance compared to connections over the general internet.
Answer Description
Direct Connect services primarily provide a dedicated network connection that bypasses the internet. This is advantageous because it offers more consistent network performance compared to internet-based connections. The approach reduces latency, increases bandwidth, and offers a more reliable security profile by not exposing data to the public internet. While increased speed and better bandwidth management are benefits, they are secondary to the main purpose of consistent and reliable network performance over a private connection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Direct Connect service in cloud computing?
How does a Direct Connect service improve network performance?
Is using a Direct Connect service more secure than a standard internet connection?
What range of IP addresses is automatically assigned by a host when DHCP server communication fails?
192.168.0.1 to 192.168.255.254
10.0.0.1 to 10.255.255.254
169.254.0.1 to 169.254.255.254
172.16.0.1 to 172.31.255.254
Answer Description
The correct answer specifies a specific range of IP addresses from 169.254.0.1 to 169.254.255.254, which are designated for automatic assignment by the host in the event that DHCP server communication is unsuccessful. This range is within the 169.254.0.0/16 subnet, reserved specifically for this purpose by networking standards to prevent IP conflicts with addresses assigned elsewhere.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the 169.254.0.0/16 range?
Why does a device fail to communicate with a DHCP server?
How can devices with APIPA addresses communicate on the same network?
When a computer configured to obtain an IP address automatically is unable to reach a Dynamic Host Configuration Protocol (DHCP) server, which IP address range will it most likely assign to itself?
169.254.0.1 to 169.254.255.254
255.255.255.0 network subnet mask
192.168.0.1 to 192.168.255.254
127.0.0.1 to 127.255.255.254
Answer Description
Automatic Private IP Addressing (APIPA) allows a computer to assign itself an IP address in the absence of a DHCP server. This functionality, defined in RFC 3927 as link-local addressing, uses a designated range of addresses from 169.254.0.1 through 169.254.255.254. The computer randomly chooses an IP address within this range, allowing for basic communication with other devices on the same local network. This is intended as a temporary solution until a DHCP server can be reached. The 192.168.x.x range is a private IP address space defined by RFC 1918, commonly used in local networks. The 127.0.0.0/8 range (e.g., 127.0.0.1) is reserved for loopback addresses, which are used for network software testing on the local machine. The final option is a subnet mask, not an IP address range; it is used with an IP address to define the network and host portions of the address.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is APIPA and why is it used?
What is the difference between APIPA and DHCP?
What happens if two devices assign themselves the same APIPA address?
A network administrator needs to implement a wireless security protocol that provides robust encryption and user authentication over a centralized server for their corporate Wi-Fi. Which is the BEST option to meet these requirements?
WEP (Wired Equivalent Privacy)
WPA2-Personal
WPA3-Enterprise
Open network (no encryption)
Answer Description
WPA3-Enterprise offers the highest security by providing strong encryption and centrally managed user authentication. This method leverages a RADIUS server to authenticate each connecting device independently, which is ideal for a corporate environment. WPA3 includes updated security measures, such as Simultaneous Authentication of Equals (SAE) and stronger encryption, to protect against vulnerabilities found in WPA2, making it the most robust choice.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between WPA2-Personal and WPA3-Enterprise?
What is a RADIUS server, and how does it enhance wireless security?
What is Simultaneous Authentication of Equals (SAE), and why is it important in WPA3?
What is the primary function of an Internet gateway in a network environment?
To facilitate the transfer of data between a private network and the Internet
To manage intra-network data flow and congestion
To increase the security of internal network transactions
To assign IP addresses to internal network devices
Answer Description
An Internet gateway enables networked devices to connect to the Internet by providing a routing path from the local network to the Internet. This function is fundamental in network design to facilitate external communication and access to Internet services. The answer specifying data transfer between a private network and the Internet correctly captures this role. Other options, while related to networking tasks, do not accurately describe the primary function of an Internet gateway.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between an Internet gateway and a router?
How does an Internet gateway work with Network Address Translation (NAT)?
Why is an Internet gateway essential in a network environment?
A network administrator notices that the quality of a video conferencing signal decreases significantly during peak usage hours. What is the MOST likely cause of this signal degradation?
Interference from external sources
Congestion/contention
Insufficient wireless coverage in the area
Using an incorrect cable type for the connection
Answer Description
The most likely cause of the signal degradation during peak usage hours is congestion/contention, which leads to increased packet loss and delays as multiple devices attempt to use the same network resources simultaneously. Interference, while a common cause of signal issues, typically relates to wireless signals and environmental factors, not tied directly to network usage patterns. Insufficient wireless coverage usually presents as a consistently poor signal, not one that worsens specifically during high traffic periods. Incorrect cable type would not typically result in a degradation that varies with time; issues would be constant.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network congestion/contention?
How does packet loss affect video conferencing performance?
How can network administrators mitigate congestion during peak hours?
When configuring a network to include a diversity of device authentications, which characteristic differentiates TACACS+ most effectively from other authentication solutions?
It utilizes UDP for more reliable communication.
It automatically synchronizes user data across different platforms.
It uses a simpler encryption method to decrease overhead.
It offers granular control over individual commands.
Answer Description
TACACS+ provides granular control over individual commands, allowing network administrators to grant specific rights to users, making it distinct from other protocols that may only authenticate user access levels without such detailed control. This feature is particularly beneficial in environments that require precise user permissions or restrictions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is TACACS+?
How does TACACS+ enable granular control over commands?
What is the difference between TACACS+ and RADIUS?
Which of the following options BEST describes the role of a honeynet in a network security strategy?
A separate network system designed to resemble genuine production systems, configured to lure attackers by exposing seemingly vulnerable services, to monitor their activities.
A set of redundant network configurations that bewilder attackers by constantly changing DHCP configurations.
An isolated network that prevents access to production services and data for users or entities appearing risky or unverified.
A real segment of the network that is intentionally weakened to attract attackers and study their behavior in a live environment.
Answer Description
A honeynet is intended to simulate a set of network resources to engage attackers, giving them an array of potential targets that are actually isolated and monitored environments. This allows security teams to analyze attack methods and behaviors without risk to real network assets. Honeypots are individual systems meant to attract attackers, but a honeynet consists of multiple honeypots and additional network devices, making the deception more complex and enabling the collection of broader information about malicious activities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a honeynet and a honeypot?
How does a honeynet enhance network security strategies?
What are some challenges associated with deploying a honeynet?
During the deployment of a single-mode fiber-optic link, a network technician suspects that the transposition of TX and RX has occurred because the endpoints are not communicating. What would be the BEST immediate step to confirm and address the suspected issue?
Review the system logs for errors on the fiber link interfaces
Use a light source or visual fault locator to check connectivity and orientation
Adjust adapter settings on the network interface cards at both ends
Replace the single-mode fiber with a multimode fiber to verify link capability
Answer Description
The most effective method for diagnosing and correcting a suspected TX/RX transposition in fiber-optic links is to use a light source or visual fault locator. By sending a visible signal through the fiber, the technician can observe whether the light appears at the expected receiver side. A lack of light at the intended receiver, or light showing on the opposite fiber, indicates that the transmit and receive fibers are crossed. Adjusting adapter settings does not correct physical misconnections, replacing the cable type is unnecessary, and reviewing system logs is unlikely to pinpoint this specific physical-layer error.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
ELI5: What are TX and RX in fiber-optic communication?
What is a visual fault locator?
Why is multimode fiber not suitable in this situation?
A network administrator is troubleshooting issues on a network where newly installed security cameras are intermittently going offline. The PoE switch used supports a total of 185 watts, and there are 10 cameras, each requiring 20 watts. Which of the following actions should the administrator take to BEST resolve the power-budget-exceeded issue?
Install an additional PoE switch or replace it with one that supports a higher power budget
Replace PoE cameras with non-PoE cameras
Adjust the camera settings to lower their power consumption
Prioritize power to critical cameras and turn off non-essential ones
Answer Description
Installing an additional PoE switch or a switch with a higher power budget is the best solution because the existing switch cannot supply the 200 watts required by all ten cameras. The resulting power shortfall causes certain cameras to shut down intermittently. Lowering camera settings or prioritizing some cameras only sidesteps the underlying capacity problem, and replacing the cameras with non-PoE models would require separate power cabling without fixing the current PoE deficit.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is PoE and how does it work?
How can a network administrator calculate the power budget for PoE devices?
What are the standards for PoE, and how do they differ?
A company is setting up a wireless network in a new branch office. The network administrator decides to install multiple wireless access points to ensure adequate coverage. Which of the following factors should be the primary consideration when deciding on the placement of each access point?
Positioning access points near the largest number of wired network connections
Maximizing the distance between the access points to reduce overlap
Avoiding physical obstructions to minimize signal interference
Orienting all access points toward the center of the area
Answer Description
When selecting mounting points for wireless access points, the first priority is to guarantee a clean RF line-of-sight so that every part of the floor plan receives a usable signal. This means locating each AP where its antennas are not blocked by thick walls, metal shelving, or other large physical obstacles that absorb or reflect 2.4- and 5-GHz radio waves. After candidate spots free of major obstructions are chosen, the installer can fine-tune spacing and channels to control overlap and can add extra APs in high-density areas to handle client load. Without clear paths for the signal, however, neither channel planning nor additional capacity will overcome poor coverage.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why do physical obstructions reduce wireless signal quality?
What is a 'clean RF line-of-sight' in wireless networking?
How can channel planning reduce overlap between wireless access points?
Which of the following is the BEST method to secure remote server management sessions?
Use key-based authentication instead of passwords
Disable root logins
Disable unused services on the server
Configure the network firewall to restrict incoming management traffic
Answer Description
Using key-based authentication instead of passwords is a best practice for securing remote administration sessions because it provides stronger security than password-based authentication. This method relies on cryptographic keys, which are significantly more resistant to brute-force attacks than passwords. While the other options are valid security measures, they are not the BEST method for securing the session's authentication process. Disabling unused services on the server reduces the overall attack surface but does not directly secure the authentication of the management session. Configuring a network firewall to restrict incoming traffic is a critical network-level control that limits who can attempt to connect, but it does not enhance the security of the authentication process itself. Similarly, disabling root logins is an important hardening step to prevent direct attacks on the most privileged account, but it does not strengthen the authentication method used by other administrative accounts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does key-based authentication work?
Why is key-based authentication considered better than passwords?
What is the difference between disabling unused services on a server and securing remote sessions?
Considering a standard Class C network with the address 192.168.15.0, what would be the broadcast address for this network?
192.168.15.1
192.168.15.255
192.168.255.255
192.168.15.0
Answer Description
The broadcast address for any IPv4 subnet is obtained by setting all host bits to 1. For a standard Class C network, the default subnet mask is 255.255.255.0, so the host portion is the final octet. Setting those eight bits to 1 changes 192.168.15.0 to 192.168.15.255, which is the directed broadcast address for that subnet. The incorrect answers either identify the network address, the first usable host address, or the broadcast for a different subnet size.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a broadcast address and why is it important in networking?
How do you calculate the broadcast address for a subnet?
What is the difference between a network address and a broadcast address?
A network administrator notices that traffic intended for a specific subnet is not being routed through the expected path in a production network. After verifying the physical connectivity and interface status, the administrator decides to examine the routing table of the router. Which command should the administrator use to view the current routing table and verify the routes?
show interface
show arp
show config
show route
Answer Description
The 'show route' command is specifically designed to display the routing table on a router. This command provides detailed information about all routes known to the router, including destination networks, next-hop addresses, and metrics, which is useful for troubleshooting routing issues. The other options, while useful for other diagnostic scenarios, do not provide the routing table information that the administrator needs in this situation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What information does the routing table contain?
How does the 'show route' command help in troubleshooting?
What’s the difference between 'show route' and 'show arp'?
During an analysis of network traffic patterns, a network administrator detects intermittent latency spikes that are not associated with scheduled backup operations. These spikes coincide with high utilization rates on the database server. Which of the following methods will most effectively further analyze the nature of the traffic causing these spikes?
Optimize database queries to reduce load on the server
Implement port mirroring to capture the traffic to and from the database server
Set a new Quality of Service (QoS) policy for database-related traffic
Review firewall logs for denied connections during the times of spikes
Answer Description
By implementing port mirroring to mirror the traffic to and from the database server to an analysis tool, the administrator can conduct a comprehensive examination of the traffic. This enables the identification of specific packet types, sources, or unusual activity without interrupting server operation. Setting a QoS policy might help in managing traffic but does not provide the detailed insight needed for diagnosis. Reviewing firewall logs could miss detailed traffic content, and optimizing database queries is unrelated until the specific traffic cause is identified.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is port mirroring and how does it work?
Why is Quality of Service (QoS) not ideal for this scenario?
How does traffic analysis help identify the cause of latency spikes?
A network administrator needs to ensure that requests to a subdomain are correctly directed to the primary domain of their organizational website. Which DNS record type is most suitable to achieve this redirection?
TXT Record
MX Record
A Record
CNAME Record
Answer Description
A Canonical Name (CNAME) record is used to redirect domain aliasing or subdomains to the primary domain. For instance, if you want 'info.example.com' to point to 'www.example.com', a CNAME record would be the right choice. It's important to choose CNAME when the goal is to link a subdomain to the primary domain without providing a direct IP address mapping, which an A record would do.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a CNAME record and an A record in DNS?
Can a CNAME record point to another CNAME?
What is the primary use of other DNS record types like MX and TXT?
A network technician suspects that there are issues with the signal integrity on a newly installed Ethernet cable run in an industrial environment. To appropriately diagnose this issue, which hardware tool should the technician use?
Visual fault locator
Toner
Cable tester
Wi-Fi analyzer
Answer Description
A cable tester is designed to test the connectivity and signal integrity of network cables. It can diagnose a variety of issues such as breaks or shorts in the cable, ensuring that the physical transmission media is capable of carrying the network signal properly. A toner is typically used to locate a specific cable within a bundle and does not test for signal integrity. A Wi-Fi analyzer and a visual fault locator are not suitable for testing Ethernet cables as they are used for wireless signal analysis and detecting breaks in fiber optic cables, respectively.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the limitations of a cable tester?
What is the difference between a cable tester and a toner?
What tools are better suited for diagnosing fiber optic cables instead of Ethernet cables?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.