CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
A network administrator is configuring an Ethernet switch port that will connect to a VoIP desk phone. The phone has a built-in switch so that a user's PC can share the same cable run. Which port configuration will provide separate traffic handling for the phone and the PC while using only one physical interface on the switch?
Set the interface to access mode on the data VLAN and configure a separate voice VLAN
Configure the interface as a trunk port and allow all VLANs, including voice and data
Assign only a voice VLAN to the interface and leave data untagged on the default VLAN
Enable Auto-MDI/MDI-X with portfast and leave the VLAN assignment at the default
Answer Description
Configure the port as an access port for the data VLAN and add a voice VLAN. An access port carries one untagged VLAN (for the PC's frames) and can be instructed, via the voice-VLAN command or LLDP-MED, to accept 802.1Q-tagged frames from the IP phone on a separate VLAN. This keeps data and voice traffic logically separate, allows QoS policies to prioritize voice, and prevents users from plugging in a device that could exploit a true trunk. Simply assigning a default VLAN, configuring only the voice VLAN, or changing speed/duplex does not meet the requirement to transport both traffic types securely and efficiently.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VLAN and why is it important for network management?
What does QoS stand for, and how does it affect voice traffic?
What are trunk ports and how do they function in a network?
A company is planning to establish a secure connection between two of their branch offices over the internet. The network administrator has been tasked with choosing a protocol that encrypts and authenticates the data packet for secure transmission. Which protocol should be utilized?
IPSec
DHCP
GRE
SSL/TLS
Answer Description
IPSec is the correct choice because it is designed to provide security at the network layer. By encrypting and authenticating each IP packet of a communication session, IPSec ensures that the data remains confidential and has not been tampered with during transit. SSL/TLS, while also commonly used for encrypting connections, operates at a higher layer in the OSI model and is generally implemented for securing HTTP connections. GRE is a tunneling protocol used to encapsulate a wide variety of network layer protocols, but it does not inherently provide encryption or authentication.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the OSI model, and what layers does IPSec operate at?
How does IPSec ensure data confidentiality and integrity during transmission?
What are the key differences between IPSec and SSL/TLS for secured connections?
Which security property is primarily provided when data is encrypted as it traverses an untrusted network such as the internet?
Integrity - it ensures packets cannot be altered in transit.
Availability - it prevents attackers from delaying or blocking the data.
Non-repudiation - it proves the sender cannot deny sending the data.
Confidentiality - intercepted data remains unreadable without the decryption key.
Answer Description
Encrypting data in transit converts readable plaintext into ciphertext. Anyone who captures the traffic will see only encrypted data, which is unintelligible without the correct decryption key. Thus, encryption safeguards the confidentiality of the information. By itself, encryption does not guarantee availability, non-repudiation, or full integrity-additional mechanisms such as MACs or digital signatures are required for those properties.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are common encryption methods used for data transmission?
What is the role of encryption keys in data transmission?
How does data encryption protect against unauthorized access?
Which IPv4 address range correctly defines the scope reserved for Class D multicast addresses?
224.0.0.0 to 239.255.255.255
192.0.0.0 to 223.255.255.255
230.0.0.0 to 239.0.0.0
127.0.0.0 to 127.255.255.255
Answer Description
Class D addresses are designated for multicast usage and range from 224.0.0.0 to 239.255.255.255. This range supports multicast groups for applications like streaming media. The other options are incorrect. The range 192.0.0.0 to 223.255.255.255 is assigned to Class C addresses. The 127.0.0.0 to 127.255.255.255 block is the loopback address range, which is reserved for internal testing on a local machine.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a multicast address and how is it used?
What are the classifications of IP addresses and why are they important?
What are the roles of loopback addresses in networking?
A network engineer is selecting appropriate cabling for a new data center. They need a solution that supports increased bandwidth over long distances and is less susceptible to electrical interference. Which type of cable best meets these requirements?
Coaxial cable
Multimode fiber
Twinaxial cable
Single-mode fiber
Answer Description
Single-mode fiber is the optimal choice for long-distance and high-bandwidth applications as it uses laser light to send signals, which allows for smaller modal dispersion over long distances compared to multimode fiber and other types of cables. This makes it ideal for large-scale data centers that require high-speed data transfer across long distances without susceptibility to electrical interference. Multimode fiber, while also resistant to electrical interference and useful for moderate distances, cannot maintain signal quality over as long distances as single-mode. Coaxial and Twinaxial cables are susceptible to electromagnetic interference and are generally used for shorter distances.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of single-mode fiber over multimode fiber?
What types of applications typically use single-mode fiber cabling?
How does electrical interference affect coaxial and twinaxial cables compared to fiber optics?
A network technician is troubleshooting a fiber optic link that is performing below expected levels. The technician suspects that the issue may be related to the signal strength. What is the BEST method to verify and troubleshoot the signal strength related issues?
Adjust the wavelength settings on the networking hardware.
Measure the dB loss using an Optical Power Meter.
Replace the fiber cables with higher category ones to improve signal strength.
Check the compatibility of the transceiver with the installed fiber cables.
Answer Description
Using an Optical Power Meter is the most accurate and direct method to measure the strength of the light signal in a fiber optic cable, providing quantifiable data on how much signal loss occurs between transmitter and receiver. Strength testers or adjusting wavelengths, although related to managing signal strength, do not provide specific measurements needed to diagnose issues and identify potential losses. Ensuring hardware compatibility relates to initial configuration rather than troubleshooting an existing problem.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Optical Power Meter and how does it work?
What does dB loss mean in the context of fiber optics?
What other factors can affect the performance of a fiber optic link?
A company's network engineer is evaluating designs for enhancing the resiliency and fault tolerance of their distributed data center network architecture. They are considering implementing a full mesh topology. What is the primary advantage of selecting a full mesh topology for this purpose?
It increases the data transfer speeds across the network.
It reduces the need for routing protocols, simplifying the network architecture.
It minimizes cabling costs by reducing the total length of cables needed.
It provides direct connections between all nodes, enhancing fault tolerance and redundancy.
Answer Description
The primary advantage of a full mesh topology is that it provides a network design where every node is directly connected to every other node. This maximizes redundancy and ensures there is no single point of failure, allowing communication even if a connection fails, making it highly useful for critical applications in environments such as distributed data centers. The incorrect choices do not focus on the intrinsic attribute of full mesh related to direct node connectivity and fault tolerance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key characteristics of full mesh topology?
How does fault tolerance work in a full mesh topology?
Are there any disadvantages to using a full mesh topology?
A network administrator is setting up separate network segments for IP phones on an access switch. Which switch setting should be given priority to optimize call quality and overall performance for these voice devices?
Adjust the speed and duplex settings
Set up link aggregation
Voice VLAN configuration
Enable 802.1Q tagging
Answer Description
Configuring a dedicated voice VLAN allows the switch to separate and apply Quality of Service (QoS) policies to voice traffic, reducing latency and jitter that can degrade call quality. While 802.1Q tagging identifies frames that belong to different VLANs, it does not by itself ensure that voice traffic receives higher priority. Link aggregation increases bandwidth and redundancy, and speed/duplex settings affect physical-layer performance, but neither directly provides the traffic prioritization required by real-time voice communications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Voice VLAN and how does it work?
Why is reducing latency important for voice communication devices?
What are some other benefits of configuring a Voice VLAN beyond just prioritization?
A corporate environment is planning to expand its wireless network across multiple offices. The network manager wants to ensure centralized control over all wireless access points to streamline configurations and management. Which type of access point should be used?
Managed switches
Unmanaged switches
Lightweight access points
Autonomous access points
Answer Description
Lightweight access points are designed for scenarios where centralized control is required. They do not handle all of their processing and rely on a wireless controller to manage their configurations and data traffic, ideal for large environments requiring uniform policies and simplicity in managing multiple devices. Autonomous access points, while capable of independent operation, are more suited to smaller scale or standalone deployments where centralized management is not as critical. Managed and unmanaged switch options do not directly pertain to the control over wireless access points.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a wireless controller, and how does it relate to lightweight access points?
What are the main advantages of using lightweight access points over autonomous access points?
In what scenarios would an autonomous access point be more appropriate than a lightweight access point?
Within an enterprise firewall configuration, interfaces are mapped to different security zones. Which statement BEST differentiates a trusted zone from an untrusted zone?
A trusted zone is an internal, organization-controlled network with the highest trust level, whereas an untrusted zone is an external network (such as the Internet) with no inherent trust.
Trusted zones allow traffic only on ports above 1024 by default, while untrusted zones allow traffic on any port.
Trusted zones consist solely of public-facing servers placed between two firewalls, while untrusted zones sit behind the internal firewall with user workstations.
Devices in trusted zones use only MAC filtering for access control, whereas devices in untrusted zones use only IP-based filtering.
Answer Description
A trusted zone is the organization-controlled internal network (for example, a corporate LAN or intranet). Because it contains critical assets, it is assigned the highest trust level, but traffic from this zone is generally allowed to initiate connections to lower-trust zones. An untrusted zone is an external network that the organization does not control-most commonly the public Internet. It carries the lowest trust level, and inbound traffic from this zone to higher-trust zones is blocked by default or subjected to tight firewall rules. The other options confuse port numbers, zone placement, or specific filtering methods with the fundamental concept of trust that defines the two zones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of a trusted zone?
How is traffic filtered in an untrusted zone?
What are the benefits of separating trusted and untrusted zones?
Which of the following best describes the Ethernet frame size specified under the 802.3 standards?
64 to 1518 bytes
1500 to 1522 bytes
100 to 1500 bytes
128 to 1024 bytes
Answer Description
The standard Ethernet frame size under the IEEE 802.3 specification has a minimum length of 64 bytes and a maximum length of 1518 bytes. This range includes the header and trailer but excludes the Layer 1 preamble and Start Frame Delimiter. The maximum payload, or Maximum Transmission Unit (MTU), is 1500 bytes, and the minimum payload is 46 bytes to meet the 64-byte minimum frame requirement. It is essential for network analysts and administrators to know these details to ensure proper network function and compatibility with various networking devices and protocols. The other answers provided are incorrect as they do not accurately represent the frame sizes specified by the standard.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the components included in the Ethernet frame that contribute to its size?
What are the implications of exceeding the maximum Ethernet frame size?
How do different types of networks or protocols affect Ethernet frame sizes?
A network technician is tasked with wiring a new office with Ethernet cables. The technician decides to use Cat6 cables for the connections. Which connector type should be used to terminate these cables at the patch panel and network interface cards?
RJ11
LC
RJ45
BNC
Answer Description
RJ45 connectors are the standard connector type used for terminating Cat6 cables in Ethernet networks. They are designed to provide a reliable and secure connection for network interfaces and patch panels, supporting speeds up to 10Gbps over Ethernet. The other options listed do not fit the Cat6 cable specification for Ethernet networking.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the specifications of Cat6 cables?
What is the difference between RJ45 and RJ11 connectors?
Why is it important to use the correct connector with Cat6 cables?
A company's IT security team is planning to deploy a honeypot to improve their detection of malicious activity within their network. Which of the following best describes the primary function of the honeypot they should implement?
To attract attacks in order to study attacker behavior or distract them from more valuable targets.
To test network performance under high load to ensure stability and speed.
To redirect excess network traffic to optimize bandwidth usage during peak hours.
To secure endpoints by deploying strict access control and authentication processes.
Answer Description
The correct answer is that a honeypot is designed to attract attacks in order to study the attacker's behavior or to distract them from more valuable targets. By understanding attacker methods, the security team can better defend their actual network resources. The other options, while plausible, do not correctly describe the main purpose of honeypots. Redirecting traffic to optimize bandwidth and securing endpoints are not purposes of a honeypot, and testing network performance under load is more related to stress testing or performance benchmarking rather than security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of honeypots?
How does a honeypot improve security?
What are some best practices for deploying a honeypot?
Closed-circuit television (CCTV) cameras installed around a data center are typically classified as which type of physical security control?
Compensating
Detection
Corrective
Prevention
Answer Description
CCTV cameras provide visual monitoring and recording that allow security personnel to detect unauthorized access or suspicious activity. Because they simply observe and alert rather than physically stop or remediate an incident, they are considered detection controls. Preventive controls (for example, badge readers) block access, corrective controls restore normal operation after an incident, and compensating controls are alternatives used when primary controls are not feasible.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do surveillance cameras deter unauthorized access?
What are the different types of surveillance cameras used for network security?
How does monitoring employee activities relate to network security?
An enterprise is deploying a new set of network links that will connect data centers located approximately 15 kilometers apart. The project requirements specify that the fiber optic cable used must efficiently support high-speed data transmission over these long distances with minimal signal loss. Which type of fiber optic cable should the technician select to meet these specifications?
Shielded twisted pair
Multimode fiber
Enhanced Cat 5e copper cable
Single mode fiber
Answer Description
For connections spanning 15 kilometers, single mode fiber is the most suitable option. It is specifically designed for long distances as it uses a smaller core diameter that allows light to travel in a direct path, minimizing signal loss and delay. While multimode fiber could potentially be considered for shorter distances due to its ability to transmit data at high speeds, its larger core size leads to higher modal dispersion, making it less effective over long distances. The other options are copper-based cables, such as Cat 5e and STP, which are limited to a maximum length of 100 meters and are therefore unsuitable for a 15-kilometer link.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between single mode fiber and multimode fiber?
Why is signal loss a concern in fiber optic cables?
What are some applications for single mode fiber?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.