CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
A network technician suspects that several issues in the network are due to unmarked cables that might be incorrectly patched. What is the BEST tool to use to trace and identify these specific cables within a bundled and unmarked group?
Toner
Wi-Fi analyzer
Cable tester
Wire strippers
Answer Description
A toner, which consists of a tone generator and a probe, is specifically designed for tracing and identifying wires or cables within a group. It works by sending a tone signal down the cable, which the probe can then detect. This is crucial in environments where cables are unmarked or bundled together, allowing a technician to follow the tone to locate the correct cable. A cable tester is primarily used for verifying the functionality and integrity of a cable's connections, not for tracing its physical path. Wire strippers are used to remove the protective coating of wires for termination. A Wi-Fi analyzer is a tool for wireless networks and is not applicable to wired cable tracing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a toner and how does it work?
What is the difference between a toner and a cable tester?
Are there other tools that can be used to trace cables?
A network administrator suspects a server has been compromised and an unauthorized service is listening for incoming connections. Which of the following command-line tools would be the most effective for the administrator to use to view the server's open ports and active connections?
tracert
netstat
ipconfig
ping
Answer Description
The netstat
command is a command-line tool used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, and more. It is the most appropriate tool among the choices for identifying unauthorized listening ports and active connections on a server. ping
is used to test reachability, tracert
traces the route to a host, and ipconfig
displays the local IP configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is netstat and how does it work?
What are open ports and why are they important?
What are some common tools besides netstat that can monitor network connections?
A network administrator suspects that an incorrect DNS record might be causing a website to be unreachable from the corporate network. They decide to use nslookup to check the DNS records for the domain example.com. What command should the administrator use to specifically retrieve the mail server records for the domain?
nslookup -query=a example.com
nslookup -type=soa example.com
nslookup -query=mx example.com
nslookup example.com -mx
Answer Description
The correct command to retrieve mail server records for a domain using nslookup is nslookup -query=mx example.com
. The -query=mx
option specifies that the Mail Exchanger (MX) records should be retrieved, which are used for email routing. Understanding the correct syntax and options for nslookup commands is essential in diagnosing DNS issues effectively. \n\nThe incorrect answers provided either use wrong query types or misunderstand the function of nslookup: \n- -query=a
retrieves address records (A records), which is incorrect as the scenario specifies a check for mail server records (MX records). \n- -type=soa
retrieves the Start of Authority (SOA) record, which is useful for information about DNS zone transfers and not email.\n- example.com -mx
lacks the proper nslookup command structure and incorrectly places options.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are MX records and why are they important?
What is the purpose of nslookup in network troubleshooting?
Can you explain the difference between A records and MX records?
What term describes the technique where an attacker gains physical access to a building by following closely behind a person who has legitimate access?
Dumpster diving
Tailgating
Phishing
Vishing
Answer Description
Tailgating is a specific type of social engineering where an unauthorized person follows someone with authorized access into a restricted area without being noticed. This differs from other social-engineering techniques because it requires physical proximity and exploits courteous behavior rather than electronic communication or technical network manipulation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common social engineering techniques besides tailgating?
How can organizations prevent tailgating incidents?
What are the consequences of tailgating for an organization?
What is geofencing primarily used for in network security?
Creating a virtual boundary that triggers a response when crossed
Filtering content based on network policies
Encrypting data stored on mobile devices
Hardening devices by disabling unused ports and services
Answer Description
Geofencing defines a virtual boundary for a real-world geographic area and triggers an automated response-such as granting or denying system access-when that boundary is crossed. It leverages technologies like GPS, RFID, Wi-Fi, or cellular data to enhance logical security by restricting or auditing access based on physical location. The other options describe unrelated security measures such as content filtering, device hardening, or encryption, none of which inherently rely on location-based boundaries.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does geofencing work in network security?
What technologies are commonly used for geofencing?
What are the benefits of using geofencing for network security?
A network administrator notices that an IP camera, which is PoE-capable, is not powering up despite being connected to a PoE switch. The switch supports 802.3af and the camera is located 115 meters from the switch using a Cat5e cable. What could be the most probable cause?
The switch is not supplying enough power due to a high number of connected devices.
The camera and switch are incompatible with each other's PoE standards.
The camera requires PoE+, which the switch does not support.
The cable used is too long, leading to a voltage drop significant enough to affect power delivery.
Answer Description
Given the scenario, among the listed reasons, the most probable cause for the IP camera not powering up is exceeding the maximum power delivery range for PoE over Cat5e, which is typically recommended up to 100 meters. As the power reaches the limits of its range, voltage drops can occur, leading to insufficient power delivery to the device. Upgrading to a Cat6 cable could help due to its inherently lower resistance per meter, potentially mitigating voltage drop over the same distance. The other options, though possible in different contexts, are less likely in this specific scenario given the details provided (e.g., no mention of incorrect standards or device incompatibility).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is PoE and how does it work?
What is the significance of the 100-meter limit for Ethernet cabling?
What are the differences between PoE, PoE+, and PoE++?
A university campus with multiple buildings has received numerous complaints from students about dropped video calls and intermittent connectivity issues on their devices as they move between lecture halls. The network administrator suspects problems in the wireless network settings associated with client roaming. What is the most effective adjustment that can address these roaming issues and enhance connectivity stability?
Modify the RSSI threshold settings
Optimize the SCTP settings on the network controllers
Increase the transmit power on all access points
Adjust the Quality of Service (QoS) configurations
Answer Description
Fine-tuning the RSSI (Received Signal Strength Indicator) threshold can significantly enhance the roaming experience by determining the sensitivity of when a device should switch to a stronger signal access point, thus maintaining steadier connectivity. Adjusting transmit power primarily affects the range and strength of the signal emitted by access points but does not directly optimize how devices roam between them. Although SCTP optimization might appear related to performance, it mainly deals with transport protocols for session initiation tasks rather than wireless roaming. Lastly, tweaking QoS settings is generally geared towards prioritizing traffic types over the network and would not specifically resolve roaming transitions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is RSSI and how does it affect wireless connections?
What are access points and how do they support client roaming?
Why is Quality of Service (QoS) important in a wireless network?
A network administrator is setting up an internal network which requires isolation from external internet access. Which designation should the addressing schema fall under?
Private addressing
Public addressing
APIPA addressing
Loopback addressing
Answer Description
Private addressing is designated for internal network use and ensures the network is isolated from direct internet access, thereby conserving global address space and enhancing security. Public addresses are intended for devices that require internet accessibility. Loopback addresses are primarily utilized for local host testing and not meant for network configuration. APIPA addresses are self-assigned when DHCP servers fail to provide an address, and are not typically employed for deliberate internal networking setups.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the benefits of using private addressing?
How do I choose between public and private addressing?
Can you explain the difference between APIPA and private addressing?
A company stores confidential client information in a centralized database that employees access daily. The database administrator has been tasked with enhancing the security of the stored data. Which of the following measures would be MOST effective in ensuring the data remains confidential?
Separate data by clearance level
Implement strong firewall rules
Encrypt all stored data
Require regular password changes
Answer Description
Encryption of data at rest is the most effective measure for ensuring that stored data remains secure from unauthorized access. It transforms the stored data into a secured form that can only be decrypted with a specific key, thereby protecting the confidentiality of the information even if an intruder gains physical access to the storage. Separating data by clearance level, while useful, primarily pertains to data access control rather than securing the data itself. Regular password changes mainly strengthen access controls but do not secure the data if storage is compromised. Implementing strong firewall rules protects against external threats but doesn't secure the data once an attacker bypasses the network defenses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is data encryption and how does it work?
What is meant by 'data at rest'?
Why are strong firewall rules important, and how do they differ from encryption?
A network administrator is tasked with upgrading the cabling of a corporate network to support a new 10GBase-T installation in a cost-effective manner. The current infrastructure uses CAT5e cables. Which type of cable should the administrator select to ensure compatibility with 10GBase-T specifications and optimal network performance over standard infrastructure distances?
CAT3
CAT6a
CAT7
CAT5e
Answer Description
CAT6a (Augmented Category 6) cables are designed to support 10 Gbps speeds up to a 100-meter channel length, which makes them the standard and most suitable choice for a 10GBase-T network deployment. CAT5e, although capable of 1 Gbps speeds, does not officially support 10 Gbps for 10GBase-T, except for very short, non-standard distances. CAT7 cables are capable of 10 Gbps speeds but are more expensive, have stricter installation requirements, and are generally considered overkill for standard 10GBase-T deployments, making CAT6a a more cost-effective option. CAT3 is an obsolete standard primarily used for telephone installations and supports much lower data speeds, making it unsuitable for modern Ethernet networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main differences between CAT6a and CAT7 cables?
Why does CAT5e not support 10GBase-T, and what are its capabilities?
What factors should a network administrator consider when selecting cabling for high-speed networks?
Which scenario best represents a typical use case for implementing VXLAN in an enterprise network?
Reducing the number of required IP addresses in a small office
Encrypting data transmission between two endpoints in the same data center
Managing Quality of Service (QoS) for streaming media
Extending Layer 2 domains across multiple data centers
Answer Description
VXLAN is primarily used for Layer 2 network isolation over a Layer 3 network, allowing for the creation of a large number of isolated Layer 2 networks across geographically dispersed data centers. This technology is essential in scenarios where you need to extend the same Layer 2 domain across different data centers without physical connectivity limitations. Choice 'Extending Layer 2 domains across multiple data centers' directly reflects the capability of VXLAN to extend network segments over a Layer 3 infrastructure, which is crucial for large and distributed network architectures. Other options, while feasible in certain contexts, do not specifically leverage the unique Layer 2 encapsulation capabilities of VXLAN.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of using VXLAN for Layer 2 network extension?
How does VXLAN differ from traditional VLANs?
What are some common use cases for VXLAN beyond data center connectivity?
An IT specialist is tasked with configuring a company's new email server. The team wants to ensure that outbound email is encrypted using the method most commonly negotiated on TCP port 587. Which configuration setting should the specialist enable to meet this requirement?
Require implicit SSL/TLS on port 587
Enable STARTTLS
Use plain SMTP only on port 587
Configure IMAP to listen on port 587
Answer Description
Port 587 is reserved for SMTP message submission. By default, it begins as an unencrypted session and should be upgraded to TLS with the STARTTLS command. Enabling STARTTLS on the server (and requiring clients to use it) ensures that each message is encrypted after the initial handshake. Using plain SMTP on port 587 does not guarantee encryption; implicit SSL/TLS requires port 465 instead, and IMAP is a different protocol entirely.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is STARTTLS and how does it work?
Why is port 587 preferred for sending secure emails?
What are the differences between SSL and TLS?
What is the best practice when addressing multiple network issues to ensure effective troubleshooting?
Address each issue separately
Ignore minor issues and focus only on major ones
Escalate all problems at once to higher level support
Combine similar issues to save time
Answer Description
The correct practice is to address each issue separately to accurately pinpoint and solve individual problems without creating additional confusion or errors. Attempting to solve all problems simultaneously can lead to misdiagnosis or inefficiencies, as complex interactions might obscure the root causes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to address each network issue separately?
What are the risks of combining similar network issues during troubleshooting?
What should I do if I encounter multiple unrelated network issues at once?
Which connection method allows network administrators to remotely manage network devices using encrypted communication?
API
Console
Telnet
SSH
Answer Description
SSH (Secure Shell) is the correct answer because it provides a secure channel over an unsecured network by using encryption, which ensures that login credentials and other sensitive data are not transmitted openly. Telnet, while also a remote management tool, does not encrypt communications and as such is not suitable for secure environments. An API, or Application Programming Interface, is a software intermediary that allows two applications to talk to each other, not a specific method for remote management with encryption. A console connection refers to a direct physical connection and does not imply encrypted remote communication.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SSH and how does it work?
What are the security implications of using Telnet instead of SSH?
Can you explain what an API is and how it differs from SSH?
Which of the following options BEST describes the role of a honeynet in a network security strategy?
A separate network system designed to resemble genuine production systems, configured to lure attackers by exposing seemingly vulnerable services, to monitor their activities.
A set of redundant network configurations that bewilder attackers by constantly changing DHCP configurations.
An isolated network that prevents access to production services and data for users or entities appearing risky or unverified.
A real segment of the network that is intentionally weakened to attract attackers and study their behavior in a live environment.
Answer Description
A honeynet is intended to simulate a set of network resources to engage attackers, giving them an array of potential targets that are actually isolated and monitored environments. This allows security teams to analyze attack methods and behaviors without risk to real network assets. Honeypots are individual systems meant to attract attackers, but a honeynet consists of multiple honeypots and additional network devices, making the deception more complex and enabling the collection of broader information about malicious activities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a honeypot and a honeynet?
How do security teams analyze data collected from a honeynet?
Why is it important to isolate a honeynet from production systems?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.