CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
A company's web server has been configured to allow secure transactions for their online store. The security administrator wants to ensure that the data exchanged between the web server and clients is encrypted. Which port should the firewall be configured to allow so that secure web traffic can pass through?
Port 22
Port 443
Port 80
Port 53
Answer Description
HTTPS is the secure version of HTTP, which means that HTTPS traffic is encrypted. By default, HTTPS traffic runs over port 443. Therefore, to allow encrypted web traffic, the firewall should be configured to allow traffic through port 443. While port 80 is used for HTTP, it is not secure. Ports 53 and 22 are often used for DNS and SSH respectively, neither of which are correct for this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does HTTPS mean, and how does it secure data?
Why is port 80 not secure, and what is it used for?
What are the other common ports besides 443, and what are their purposes?
In a network interface configuration, setting the speed incorrectly can cause performance degradation. What is the potential impact of configuring a gigabit switch port to 100 Mbps when connected devices support gigabit speeds?
It leads to total loss of data transfer between devices
It creates a bottleneck, limiting the data rate to less than what the devices are capable of handling
It makes the devices use an outdated protocol for communication
It increases the noise level on the physical medium
Answer Description
Configuring a switch port speed to 100 Mbps on a connection where the connected devices support gigabit speeds will lead to a significant bottleneck. The port will limit the transmission speed to 100 Mbps, thereby underutilizing the gigabit capability of the connected devices and potentially causing network congestion due to slower data transfer rates. This misconfiguration does not directly involve protocol compatibility or increase noise levels, and it also won't necessarily result in complete data loss unless other factors are at play.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a bottleneck in networking?
How does misconfiguration affect network performance?
What are the implications of network congestion?
Your company is expanding its internal data center setup, which includes multiple servers that handle sensitive information. These servers require configuration to ensure they are isolated from direct internet access. What type of network address should be assigned to maintain their inaccessibility from the global web?
APIPA addresses
Private network addresses
Externally routable RFC 1918 addresses
Public network addresses
Answer Description
Private network addresses, as defined by RFC 1918, are used for internal networks and are not routable on the public internet. Assigning these addresses ensures the servers are isolated from direct external connections, enhancing security. Public network addresses are globally routable and would expose the servers to the internet. APIPA addresses are used as a fallback when a DHCP server is unavailable and are not suitable for a planned data center configuration. The term "Externally routable RFC 1918 addresses" is a contradiction, as these address ranges are specifically designated as non-routable on the global internet.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are private network addresses?
Why are public network addresses dangerous for sensitive servers?
What is RFC 1918 and its significance?
Which of the following accurately describes a network intrusion detection system (IDS) when compared with an intrusion prevention system (IPS)?
An IDS and an IPS both operate inline and both can automatically block malicious traffic.
An IDS blocks malicious traffic in real time, whereas an IPS only logs the activity for administrators.
An IDS can replace a firewall because it performs stateful packet inspection and enforces access-control lists, unlike an IPS.
An IDS operates out of band, generates alerts, and does not block traffic, whereas an IPS sits inline and can automatically drop malicious packets.
Answer Description
An IDS is typically positioned out of band to passively monitor network traffic. It analyzes traffic copies and sends alerts when suspicious activity is detected but does not actively block packets. An IPS, by contrast, is placed inline and can automatically take preventive actions-such as dropping or rejecting malicious packets-to stop the threat in real time. Therefore, the only statement that correctly distinguishes these roles is the option describing an IDS as passive (alert-only) and an IPS as active (blocking).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main function of an Intrusion Detection System (IDS)?
How does an Intrusion Prevention System (IPS) differ from an IDS?
What are some examples of how an IPS can mitigate threats?
Which of the following best describes a network that modifies its behavior based on the type of application traffic it detects?
A network that uses the same routing protocol for all data packets flowing through it.
A network that employs a standard firewall rule set applied uniformly to all traffic.
A network with fixed QoS policies that strictly segments bandwidth based on VLAN IDs regardless of traffic type.
A network that prioritizes video streaming over regular browsing to ensure quality service.
Answer Description
The correct answer is the one that defines a network's ability to dynamically adjust its services and priorities based on the recognition and analysis of different types of application traffic, which is central to the concept of being application aware. This involves real-time adaptation to optimize application performance and reliability, differentiating it from static configurations that do not change based on the traffic type.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'application aware' mean in networking?
How does QoS work in prioritizing network traffic?
What are the limitations of fixed QoS policies?
When initially addressing a network outage, what should be done FIRST according to the standard troubleshooting methodology?
Duplicate the problem
Gather information
Establish a theory of probable cause
Question users
Answer Description
The correct answer is 'Gather information'. According to the troubleshooting methodology, the first step in identifying the problem is to gather all relevant information regarding the issue. This includes understanding the symptoms and the impact of the issue. While questioning users and duplicating the problem are part of the process, they come after initially gathering all necessary data to understand what might be going wrong.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some effective ways to gather information about a network outage?
Why is it important to gather information before troubleshooting?
What tools can aid in gathering information during a network outage?
A network technician is troubleshooting an application that is experiencing glitches and dropouts. What is the most direct symptom of network packet loss?
Enhanced bandwidth utilization
Implementation of new encryption protocols
Intermittent data transmission errors
Increased network latency
Answer Description
Packet loss fundamentally means that data packets fail to reach their destination, resulting in incomplete data transmission. This is directly observed as intermittent errors, such as glitches in video or audio streams. While packet loss can cause increased latency, the latency is a secondary effect resulting from the time it takes for a protocol like TCP to retransmit the lost packets. Enhanced bandwidth utilization is incorrect; in fact, retransmissions caused by packet loss consume more bandwidth, leading to inefficient use. Encryption protocols are related to data security, not the physical delivery of packets.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What causes packet loss in a network?
How can packet loss be measured?
What are the effects of packet loss on applications?
Within an enterprise firewall configuration, interfaces are mapped to different security zones. Which statement BEST differentiates a trusted zone from an untrusted zone?
Trusted zones allow traffic only on ports above 1024 by default, while untrusted zones allow traffic on any port.
A trusted zone is an internal, organization-controlled network with the highest trust level, whereas an untrusted zone is an external network (such as the Internet) with no inherent trust.
Devices in trusted zones use only MAC filtering for access control, whereas devices in untrusted zones use only IP-based filtering.
Trusted zones consist solely of public-facing servers placed between two firewalls, while untrusted zones sit behind the internal firewall with user workstations.
Answer Description
A trusted zone is the organization-controlled internal network (for example, a corporate LAN or intranet). Because it contains critical assets, it is assigned the highest trust level, but traffic from this zone is generally allowed to initiate connections to lower-trust zones. An untrusted zone is an external network that the organization does not control-most commonly the public Internet. It carries the lowest trust level, and inbound traffic from this zone to higher-trust zones is blocked by default or subjected to tight firewall rules. The other options confuse port numbers, zone placement, or specific filtering methods with the fundamental concept of trust that defines the two zones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of a trusted zone?
How is traffic filtered in an untrusted zone?
What are the benefits of separating trusted and untrusted zones?
Considering a standard Class C network with the address 192.168.15.0, what would be the broadcast address for this network?
192.168.255.255
192.168.15.255
192.168.15.1
192.168.15.0
Answer Description
The broadcast address for any IPv4 subnet is obtained by setting all host bits to 1. For a standard Class C network, the default subnet mask is 255.255.255.0, so the host portion is the final octet. Setting those eight bits to 1 changes 192.168.15.0 to 192.168.15.255, which is the directed broadcast address for that subnet. The incorrect answers either identify the network address, the first usable host address, or the broadcast for a different subnet size.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a broadcast address?
Why is 192.168.15.1 not the broadcast address?
What is the significance of the subnet mask in determining broadcast addresses?
A network administrator needs to configure a secure connection that allows individual employees working from home to access the corporate network over the internet. Which VPN configuration is most appropriate for this scenario?
Full tunnel
Client-to-site
Split tunnel
Site-to-site
Answer Description
A Client-to-site configuration allows individual users to connect securely from distant locations to their organization's network, providing an encrypted tunnel over public connections. Site-to-site configurations connect entire networks across different locations, differing from the personal connection setup required by remote employees. Full tunnel and Split tunnel refer to how traffic is handled through these connections but do not specify the type of network connection arrangement between a single client and a network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Client-to-site configuration?
How does encryption work in a Client-to-site configuration?
What are the key differences between Client-to-site and Site-to-site configurations?
A company requires its employees to access sensitive systems only during their assigned shifts. The network administrator needs to implement a security mechanism that restricts employee access to these systems based solely on the current time and their shift schedule. Which type of authentication mechanism would be most appropriate to meet this requirement?
Multifactor authentication (MFA)
Time-based authentication
Role-based access control
LDAP
Answer Description
Time-based authentication is the correct answer because it allows system access to be controlled based on the time factor, aligning access permissions with individual shift times. This mechanism restricts users from accessing certain systems outside their designated working hours, thus increasing security.
LDAP, while useful for directory services and access management, does not inherently restrict access based on current time or schedule without additional configuration or integration. Multifactor authentication (MFA) provides an additional layer of security by requiring more than one form of verification but does not limit access based on time. Role-based access control defines user permissions based on their role within an organization but does not typically restrict access times unless specifically configured to do so.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is time-based authentication?
How does time-based authentication enhance security?
Can you explain why LDAP, MFA, and Role-based access control aren't suitable for this scenario?
A network administrator at a medium-sized enterprise plans to upgrade the firmware on several critical routers. To ensure a systematic approach compliant with best practices for network management, which of these actions should most appropriately initiate the change management process?
Directly implement the changes during a scheduled maintenance window
Submit a change request to the change advisory board (CAB) for review and approval
Informally discuss the change with colleagues to gather feedback before proceeding
Start with a thorough risk assessment before proposing any specific actions
Answer Description
Before making any significant changes to a network's infrastructure, the first step under the change management process should always start with submitting a change request. This action ensures that all necessary approvals are obtained, and all impacts are assessed before any changes are implemented, minimizing potential disruptions. Just discussing potential changes informally does not provide proper documentation or authorization. Implementing changes directly or beginning with a risk assessment, though important, skips the initial necessary step of formally recording and initiating the process through an official change request.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Change Advisory Board (CAB)?
What is the change management process in network management?
Why is it important to submit a change request before making network changes?
When a computer configured to obtain an IP address automatically is unable to reach a Dynamic Host Configuration Protocol (DHCP) server, which IP address range will it most likely assign to itself?
255.255.255.0 network subnet mask
127.0.0.1 to 127.255.255.254
192.168.0.1 to 192.168.255.254
169.254.0.1 to 169.254.255.254
Answer Description
Automatic Private IP Addressing (APIPA) allows a computer to assign itself an IP address in the absence of a DHCP server. This functionality, defined in RFC 3927 as link-local addressing, uses a designated range of addresses from 169.254.0.1 through 169.254.255.254. The computer randomly chooses an IP address within this range, allowing for basic communication with other devices on the same local network. This is intended as a temporary solution until a DHCP server can be reached. The 192.168.x.x range is a private IP address space defined by RFC 1918, commonly used in local networks. The 127.0.0.0/8 range (e.g., 127.0.0.1) is reserved for loopback addresses, which are used for network software testing on the local machine. The final option is a subnet mask, not an IP address range; it is used with an IP address to define the network and host portions of the address.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is APIPA and how does it work?
What is a DHCP server and its role in a network?
What are the other private IP address ranges?
A network administrator is troubleshooting connectivity issues in a newly installed network segment. After examining the installation, the administrator notices that there is excessive noise near some of the cables. Which cable type is most likely in use and would be most vulnerable to electromagnetic interference (EMI)?
Shielded Twisted Pair (STP)
Fiber optic
Unshielded Twisted Pair (UTP)
Coaxial
Answer Description
Unshielded Twisted Pair (UTP) cables lack an overall shielding layer, so they are more susceptible to electromagnetic interference than Shielded Twisted Pair (STP), coaxial, or fiber-optic cabling. STP uses a foil or braided shield to attenuate external noise, coaxial cable has a conductive shield around the dielectric insulator, and fiber-optic cable transmits light rather than electrical signals, making it immune to EMI. Therefore, UTP is the cable type most likely to suffer connectivity issues in a noisy electromagnetic environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is electromagnetic interference (EMI)?
What are the differences between UTP and STP cables?
Why are fiber optic cables immune to EMI?
A network administrator at a broadcasting company needs to ensure that video streams and audio feeds are synchronized across various devices on the network. Which protocol would be most effective for achieving the high-precision time synchronization required for this scenario?
Global Positioning System (GPS) time synchronization
Precision Time Protocol (PTP)
Network Time Protocol (NTP)
Dynamic Host Configuration Protocol (DHCP)
Answer Description
Precision Time Protocol (PTP) is specifically designed for very high-accuracy clock synchronization over an IP/Ethernet network. In practice it can keep devices aligned to within sub-microsecond accuracy, and SMPTE ST 2059 adopts PTP for timing professional video and audio equipment. NTP is adequate for general computing but normally stays within the millisecond range on a LAN. Using a separate GPS receiver at every device can provide precise time but is costly and impractical indoors, and DHCP is unrelated to time synchronization.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Precision Time Protocol (PTP)?
How does PTP differ from NTP?
What are the main use cases for PTP in broadcasting?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.