CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test
- 20 Questions
- Unlimited
- Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
A network technician is tasked with connecting a legacy fax machine in an office to the network. The fax machine uses an older connection interface. Which type of cable should the technician use to connect this device?
Coaxial cable
RJ11 cable
RJ48 cable
RJ45 cable
Answer Description
RJ11 cables are commonly used for telephone connections, including devices like fax machines that connect to a standard telephone line. RJ45 is the standard connector for Ethernet networks and is physically larger than RJ11. RJ48 connectors are typically used for specialized data lines like T1 and are not for analog fax machines. Coaxial cables are generally used for television and broadband internet connections, not for telephone-based devices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is an RJ11 cable appropriate for connecting a fax machine?
How does an RJ11 cable differ from an RJ45 cable?
What are the main uses of RJ48 cables, and why aren't they suitable for fax machines?
Your network has been experiencing intermittent connectivity issues. After checking various switches, you notice that one switch port has a port state listed as 'Blocking'. What is the MOST likely reason for this port state?
The port is performing its normal operation in STP to prevent loops
The port has been administratively shut down due to a security violation
The port is overloaded with traffic causing it to shut down
There is a configuration issue that left the port in a provisional state
Answer Description
The 'Blocking' state is a normal operational state within the Spanning Tree Protocol (STP). STP intentionally places redundant ports in this state to prevent Layer 2 loops, which can cause broadcast storms and destabilize the network. A port that is shut down due to a security violation typically enters an 'err-disabled' state, not a 'blocking' state. An overloaded port might also be placed in an 'err-disabled' state or simply drop traffic. The term 'provisional state' is too vague and does not represent a standard STP state.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the Spanning Tree Protocol (STP)?
What are the possible port states in STP?
How does STP decide which ports go into a 'Blocking' state?
During the setup of network device monitoring, a network administrator needs to access detailed information about device performance and status. To achieve this, which component should they interact with?
Access Control List (ACL)
Management Information Base (MIB)
Authentication strings
Event Notifications (Traps)
Answer Description
The Management Information Base (MIB) is the correct answer because it contains hierarchical descriptions of all the network objects that can be managed. The MIB allows administrators to gather detailed information about device performance and status efficiently, unlike SNMP Traps, which are used for asynchronous event notification, or Community strings, which authenticate access to a device's saved data, without providing detailed information themselves. Access Control Lists (ACLs) are used primarily for security to control traffic flow, not for information retrieval about device performance and status.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Management Information Base (MIB)?
How does SNMP use the MIB to monitor devices?
What are SNMP Traps, and how are they different from MIB-based monitoring?
Which description correctly details a star topology?
Nodes are organized in groups, with each group connected to two separate central nodes for redundancy.
Each node is directly connected to every other node in the network.
Nodes are connected one to another in a ring, and data circles around the ring until it reaches its destination.
All nodes are connected to a central networking device, such as a hub or switch.
Answer Description
In a star topology, all nodes (computers, printers, etc.) are individually connected to a central networking device, such as a switch or hub, using a separate cable. This setup enhances fault tolerance, as the failure of a single cable only affects one node's connection to the network, not the entire network. The hub-and-spoke model is functionally the same as a star topology.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is fault tolerance better in a star topology?
What is the difference between a hub and a switch in a star topology?
What are the advantages and disadvantages of using a star topology?
A network administrator is configuring a subnet for a medium-sized corporate office. Which IPv4 address class should they consider if they need up to 65,000 addresses for host devices with a default subnet mask?
Class C
Class B
Class D
Class A
Answer Description
Class B addresses are used where medium-sized networks are required. The default subnet mask for Class B is 255.255.0.0, enabling up to 65,536 addresses (2^16), which fits the requirement of needing up to 65,000 addresses. Class A is typically too large, offering up to approximately 16 million addresses which can be excessive and inefficient for the scenario. Class C, on the other hand, provides only 256 addresses, which would be insufficient for the requirement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does Class B have a default subnet mask of 255.255.0.0?
What happens if a Class B subnet is divided further?
What is the difference between Class B and Class C in terms of address size?
A network technician is tasked with installing a fiber optic cable connection for a new high-density network device. The interface on the device requires a connector type noted for its small form factor and locking tab design. Which connector should the technician select to ensure compatibility?
Straight tip (ST)
Subscriber connector (SC)
Local connector (LC)
Multi-fiber push on (MPO)
Answer Description
The correct choice is the Local connector (commonly abbreviated as LC) which is known for its small form factor and locking tab mechanism, making it suitable for high-density applications such as data centers. Other connectors like SC, ST, and MPO have different physical designs and mechanisms which might not be compatible with the device requiring a small form factor and locking tab.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an LC connector and why is it commonly used in high-density networks?
How does an SC connector differ from an LC connector?
What are the primary applications for MPO connectors in networking?
During peak business hours, users across your enterprise network report noticeably slower file transfers and applications that time-out. Monitoring shows that backbone and distribution links are running constantly at or near 100 % utilization, while interface error counters remain low and device configurations appear correct. Which of the following is the MOST likely root cause of the degradation?
Network congestion caused by high traffic volume
Incorrect default gateway assigned to clients
Duplex mismatch on an access switch port
Faulty fiber transceiver module
Answer Description
Links that are saturated during specific periods indicate congestion: the offered traffic exceeds the designed capacity, creating a bottleneck that reduces throughput and increases latency. This situation is typically caused by high traffic volume. A duplex mismatch would introduce collisions or CRC errors (not observed), a faulty transceiver would raise interface errors, and an incorrect default gateway would break connectivity rather than merely slow it down.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network congestion?
What is a duplex mismatch and how does it cause issues?
Why wouldn't an incorrect default gateway cause slower performance instead of broken connectivity?
Which of the following is the BEST reason for an organization to implement Network Time Protocol (NTP) on its network devices?
To coordinate system logs and event timing for accurate troubleshooting and security analysis
To ensure that all network devices are operating in the same timezone
To aid in network capacity planning by analyzing peak usage times
To help regulate the frequency and sequence of routing updates
Answer Description
The correct answer emphasizes that the primary purpose of NTP is to synchronize the clocks of all network devices. This synchronization is critical to network operations for timestamping in log files, which is essential for security, troubleshooting, and compliance with various standards. Although setting the timezone also involves time, it does not provide synchronization across devices. Debugging and traffic analysis might benefit indirectly from time synchronization but are not the direct purpose of NTP.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does NTP synchronize the clocks of network devices?
Why is time synchronization so important for troubleshooting and security analysis?
What is the difference between NTP and SNTP?
In a network-troubleshooting scenario, a network administrator needs to verify that the server's TCP/IP stack is operational without sending any traffic onto the physical network or involving the NIC hardware. Which IP address should the administrator use to perform this test?
127.0.0.1
169.254.0.1
192.168.1.1
10.0.0.1
Answer Description
The IPv4 loopback address, 127.0.0.1, routes packets back to the host itself. Pinging this address confirms that the local TCP/IP stack is installed and functioning, but it does not traverse the physical network interface card. Using other private, APIPA, or gateway-style addresses (192.168.1.1, 10.0.0.1, 169.254.0.1) would place traffic on the actual network segment, defeating the purpose of an internal stack test.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the loopback address 127.0.0.1?
What is the difference between a loopback address and an APIPA address?
Why wouldn't addresses like 192.168.1.1 or 10.0.0.1 work for testing the TCP/IP stack?
When troubleshooting a network issue, a technician decides to employ a bottom-to-top approach using the OSI model. From which OSI layer would they begin their troubleshooting process?
Physical layer
Transport layer
Network layer
Application layer
Answer Description
When applying the bottom-to-top (bottom-up) approach in the OSI model, the technician starts at the Physical layer. This layer encompasses the network's tangible components-cables, connectors, and hardware interfaces-making it the first place to check for link lights, proper terminations, or damaged media before examining higher-layer configurations and protocols.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the Physical layer in the OSI model?
Why is the bottom-to-top troubleshooting approach useful?
What are some tools and methods used to troubleshoot the Physical layer?
A company is deploying a software-defined wide area network (SD-WAN) solution to connect multiple branches. The IT administrator needs to ensure that the SD-WAN solution maintains optimal performance and reliability regardless of the underlying transport mechanisms (MPLS, broadband, LTE, etc.). What feature should the IT administrator focus on configuring in the SD-WAN controller to achieve this?
Dynamic routing configurations
Transport agnostic capabilities
Encryption standards
Zero-touch provisioning
Answer Description
Configuring the transport agnostic feature is crucial as it allows the SD-WAN system to function efficiently across various types of network connections (MPLS, broadband, LTE, etc.) without needing specific adjustments for each type. This feature abstracts the details of the underlying transport mechanisms, allowing seamless connectivity and management. Other options listed either do not relate directly to managing diverse transport mechanisms or involve security, not operational connectivity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'transport agnostic capabilities' mean in SD-WAN?
Why are transport agnostic capabilities important for SD-WAN performance?
How does an SD-WAN controller use transport agnostic capabilities to manage connections?
What is the primary function of RADIUS in network security?
Managing centralized Authentication, Authorization, and Accounting for network services
Encrypting data traffic for all network devices
Physically securing network-connected hardware
Providing cloud storage solutions for network data
Answer Description
RADIUS primarily functions as a protocol that provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service. Authentication verifies who the user is, Authorization determines what a user can and cannot access, and Accounting keeps track of the consumption of network resources by the user. The other options, while plausible-sounding, are incorrect because they do not describe the main functionalities provided by RADIUS.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does RADIUS stand for and why is it important?
How does RADIUS handle Authentication, Authorization, and Accounting (AAA)?
What types of network services typically use RADIUS?
What function does central policy management serve in a software-defined network?
It physically connects disparate network segments.
It enforces security settings across the network devices from a single control point.
It decreases network traffic by compressing data packets.
It expands the physical range of the network.
Answer Description
Central policy management allows for the centralized control and enforcement of policies within a software-defined network, streamlining configuration and compliance across the network. This enables administrators to apply policies from a single point, enhancing consistency and ease of management. The incorrect options are related network functions or strategies, but they do not define the role of central policy management in SDNs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is software-defined networking (SDN)?
How does central policy management improve network security?
What is the difference between SDN and traditional networking?
Which scenario BEST describes a correctly implemented active-passive high-availability configuration?
Two servers are set up to split network traffic equally to balance the load under normal operating conditions.
Both servers are used simultaneously to handle network traffic and share a synchronized database for real-time data replication.
Two servers are configured where one server actively handles all network traffic and the other server is only activated if the primary server fails.
One server handles all web traffic while another handles database queries, with no failover configuration.
Answer Description
In an active-passive configuration, one system (the passive) remains idle while the other (the active) handles all the workload. The passive system only takes over if the active system fails, ensuring minimal downtime and providing a reliable backup. The correct answer explains this scenario. Alternative answers, though plausible, describe configurations or setups that don't align accurately with a true active-passive model.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between active-passive and active-active configurations?
How does failover occur in an active-passive setup?
What are the advantages of active-passive configurations?
Which protocol would optimally support a secure client-server communication that involves sensitive data transactions, specifically needing both authentication of the server and encryption of the data?
LDAP
HTTPS
HTTP
SNMP
Answer Description
HTTPS (Hypertext Transfer Protocol Secure) is the best choice for secure client-server communications involving sensitive data because it incorporates SSL/TLS to encrypt data in transit and authenticate the server. This ensures that all data sent between the client and server is protected. In contrast, HTTP (Hypertext Transfer Protocol) is incorrect as it does not include encryption and sends data in cleartext. LDAP (Lightweight Directory Access Protocol) is used for accessing and maintaining distributed directory information services and does not inherently encrypt data in its standard form. SNMP (Simple Network Management Protocol) is used for network management; while newer versions have security features, its primary purpose is not for general secure data exchange.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of SSL/TLS in HTTPS?
How does HTTPS differ from HTTP?
Why isn't LDAP ideal for secure data transactions?
A network administrator needs to enable several workstations in an office to access web services concurrently while the office is limited to using a single external gateway address. Which method allows these workstations to share this gateway address effectively for internet access?
Standard Network Address Translation (NAT)
One gateway address per workstation
Port address translation (PAT)
Dynamic Host Configuration Protocol (DHCP)
Answer Description
Port Address Translation (PAT) enables multiple devices on a local network to make outbound connections over the internet using the same public gateway address by tracking and mapping each session to a unique port number. This feature allows for the effective sharing of a single public IP address.
- Allocating unique gateway addresses to each workstation (incorrect) is not feasible as the scenario explicitly states the office is limited to a single external address.
- The Dynamic Host Configuration Protocol (DHCP) (incorrect) is primarily involved with allocating IP addresses and network configuration parameters to clients on the internal network; it does not manage the translation of addresses for internet access.
- Standard Network Address Translation (NAT) (incorrect) refers to methods like static or dynamic NAT. Static NAT creates a one-to-one mapping. Dynamic NAT uses a pool of public IPs but still typically requires one public IP for each active internal device. Since there is only one available public address for multiple workstations, these forms of NAT are unsuitable. PAT is the specific type of NAT required for a many-to-one translation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between NAT and PAT?
How does PAT manage multiple sessions using a single public IP?
Why is DHCP not used for internet access in this scenario?
In a 5GHz Wi-Fi network, which channel width setting could potentially allow for the highest data throughput but may result in greater susceptibility to interference in densely populated network environments?
20 MHz
40 MHz
160 MHz
80 MHz
Answer Description
A channel width of 160 MHz in a 5 GHz network provides the highest data throughput by enabling more data to be transferred simultaneously. However, using such a wide bandwidth can greatly increase the risk of interference in areas where many networks are operating, due to the broader range of frequencies being utilized.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is channel width in Wi-Fi networking?
Why does using a 160 MHz channel width increase interference risk?
How do 5 GHz channels avoid interference compared to 2.4 GHz?
A network administrator is tasked with creating a strategy to maintain network configuration standards across a multinational company. The strategy should enable quick recovery and consistent configuration deployment after infrastructure failures. The administrator needs to choose a configuration type that is pre-tested and serves as a standard template for all deployments. What type of configuration should the administrator focus on?
Baseline/golden configuration
Trial configuration
Backup configuration
Development configuration
Answer Description
The correct answer is 'Baseline/golden configuration' because this refers to a benchmark configuration set that is known to work well under tested conditions and is used as a standard template to build new systems or restore existing systems after an outage. 'Development configuration' and 'Trial configuration' are not standard established terms in network management. 'Backup configuration' is used for recovery purposes and may not prescriptively be set as a standard template that is optimized and tested.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a baseline/golden configuration?
How does a baseline configuration differ from a backup configuration?
Why is consistency important in network configuration deployment?
A company needs to implement a disaster recovery solution that ensures its critical services can be restored within minutes of a major outage. The solution must maintain a continuously updated copy of the production data, allowing for immediate failover. Which of the following DR sites best meets these requirements?
Mirrored site
Cold site
Hot site
Warm site
Answer Description
A hot site is the correct choice because it is a fully duplicated, operational environment with all the necessary hardware, software, and real-time data synchronization from the primary location. This allows for an almost immediate failover with minimal data loss. A warm site has hardware but requires data to be restored from backups, resulting in a longer recovery time. A cold site is a basic facility with power and cooling but no equipment or data, requiring a complete setup post-disaster. A mirrored site is a form of a hot site, but 'hot site' is the standard industry term for a DR facility with this level of readiness.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What differentiates a hot site from a warm site?
How does a hot site ensure real-time synchronization of data?
When would a company choose a cold site over a hot site?
Which of the following is the BEST description of a network that uses a collapsed core design?
A network with distinct core, distribution, and access layers to manage traffic between office locations.
A network where the distribution layer devices connect directly to each other without a core layer.
A network architecture where each device is directly connected to a central hub, without hierarchical design.
A network that integrates the core and distribution layers to optimize performance and reduce infrastructure complexity.
Answer Description
A collapsed core design combines the functionality of both the core and distribution layers into a single layer. This model is advantageous in smaller networks due to reduced hardware needs and simplified management. While all of the other answers describe possible configurations in a network, they either describe other types of networks, mix up hierarchical layers, or add elements not specific to collapsed core networks, such as direct connections from devices to a centralized hub.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the core and distribution layers in a network?
What are the key advantages of a collapsed core network design?
In what scenarios is a collapsed core network not ideal?
Nice!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.