CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test
- 20 Questions
- Unlimited
- Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
What does channel width in wireless networking determine?
The security protocol used in wireless communication
The range of frequencies a wireless signal uses on a specific channel
The maximum distance a wireless signal can travel
The number of devices that can connect to a network
Answer Description
Channel width in wireless networking determines the range of frequencies that a wireless signal uses on a specific channel. A wider channel width allows for more data to be transmitted simultaneously, increasing throughput but potentially increasing interference with other channels if not managed properly. This concept is fundamental in optimizing the performance of wireless networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is channel width in wireless networking?
How does wider channel width affect wireless network performance?
What is the difference between 20 MHz and 40 MHz channel widths?
Which of the following scenarios BEST describes the use of a public network deployment model?
A government agency using a secured network to transmit sensitive data.
A company using a network only accessible by its employees to share internal documents.
A corporation hosting its website which is accessible to anyone on the internet.
An organization using a virtual private network (VPN) for connecting remote employees to its internal network.
Answer Description
A public network deployment model is characterized by its open accessibility to general internet users and is typically used to operate services meant for the general public, such as email services, social media, and public websites. The correct answer best represents this definition as it refers to hosting a website accessible to anyone on the internet, which is one of the most common uses of public networks. The other answers, while plausible, involve scenarios more typical of private or protected environments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main difference between a public and private network?
Why are public networks often used for hosting websites?
How does a VPN differ from a public network in terms of access and use cases?
A company plans to extend its Wi-Fi coverage to ensure seamless connectivity across its large, multi-floor office building without installing additional cabling. They are considering using a mesh network. Which of the following benefits is a primary reason for choosing a mesh network in this scenario?
It ensures fiber optic or ethernet cabling is redundant and fail-safe.
It inherently provides better bandwidth utilization.
It significantly increases the amount of broadcast traffic.
It allows extensive coverage with minimal physical infrastructure.
Answer Description
A mesh network efficiently extends Wi-Fi coverage across multiple areas without needing physical cables connecting each access point. This benefit is crucial in environments like large office buildings where cabling can be intrusive, expensive, or physically impractical to install in certain areas. Better bandwidth utilization and increased broadcast traffic are not inherent benefits of mesh networks; in fact, mesh networks can introduce challenges in these areas unless carefully managed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a mesh network work in extending Wi-Fi coverage?
What are the challenges associated with mesh networks?
Why might a company choose a mesh network over traditional wired solutions?
To minimize the impact of malicious redirection of web traffic within a network, which of the following measures would MOST effectively authenticate legitimate responses?
Implement and configure DNSSEC for servers
Deploy network firewalls at key perimeter points
Increase the complexity of network passwords
Regularly update antivirus software on client machines
Answer Description
Implementing and configuring DNSSEC on servers targets the root cause of malicious traffic redirection by authenticating the origins of the data, ensuring that the data integrity is maintained. This specific alignment with protecting against unauthorized changes and redirection aids in counteracting the effects of malicious web traffic redirection techniques. Other options, while beneficial for overall security, do not specifically authenticate the source of web traffic data, which is crucial in mitigating this type of attack.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DNSSEC and how does it work?
Why don't firewalls or antivirus software prevent DNS-based attacks?
How does DNSSEC differ from regular DNS functionality?
Which CLI command on a Cisco IOS XE or Catalyst switch displays detailed Power over Ethernet (PoE) status, including how much power each interface is using and the remaining power budget?
show environment power
show power inline
show interfaces status
show mac-address-table
Answer Description
The "show power inline" command lists the global PoE budget and a table for every PoE-capable interface showing current draw, maximum allocated power, and operational status. This information lets a technician verify that enough power is available and identify ports that have exceeded or been denied power. Other commands shown do not provide per-port PoE consumption details.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is PoE (Power over Ethernet)?
What does the 'show power inline' command do in detail?
How does the PoE budget on a switch work?
What range of IP addresses is automatically assigned by a host when DHCP server communication fails?
192.168.0.1 to 192.168.255.254
10.0.0.1 to 10.255.255.254
169.254.0.1 to 169.254.255.254
172.16.0.1 to 172.31.255.254
Answer Description
The correct answer specifies a specific range of IP addresses from 169.254.0.1 to 169.254.255.254, which are designated for automatic assignment by the host in the event that DHCP server communication is unsuccessful. This range is within the 169.254.0.0/16 subnet, reserved specifically for this purpose by networking standards to prevent IP conflicts with addresses assigned elsewhere.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the 169.254.0.0/16 range?
Why does a device fail to communicate with a DHCP server?
How can devices with APIPA addresses communicate on the same network?
A network administrator is investigating why certain web addresses are redirecting users to unintended websites on a specific company workstation. Which method is MOST effective to verify if this issue is stemming from local configurations?
Inspect the Hosts file for any hardcoded mappings between hostnames and network addresses.
Verify the connectivity by testing the route to another network device.
Reinitialize the network interface to force a reload of configuration parameters.
Flush the locally stored resolution information using relevant system commands.
Answer Description
Inspecting the Hosts file can confirm if there are any manually configured hostname mappings, which might be causing these redirections. The Hosts file can contain entries that override DNS resolutions, directly leading to websites being misdirected. This step is fundamental before considering broader DNS issues or network settings, making it the most direct and effective approach.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Hosts file, and what role does it play in DNS resolution?
How can you inspect and edit the Hosts file on a workstation?
Why might flushing the DNS or reinitializing the network interface not address redirection issues caused by the Hosts file?
A network administrator is configuring SNMP to enhance the security of network monitoring. They need to ensure that the SNMP version they choose supports strong authentication and encryption. Which version of SNMP should they implement?
SNMPv1
SNMPv3
SNMPv2c
Answer Description
SNMPv3 is the correct choice because it provides enhanced security features including authentication, encryption, and access control, which are not supported by earlier versions like SNMPv1 and SNMPv2c. SNMPv1 and SNMPv2c do not include mechanisms for securing SNMP traffic, making them less suitable for environments where security is a concern.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SNMP and how does it work?
How does SNMPv3 improve security compared to SNMPv1 and SNMPv2c?
What are the specific uses of SNMP in network management?
What is the primary purpose of conducting a wireless survey and creating a heat map in a network environment?
To increase the throughput of wired network connections
To visualize and optimize wireless signal strength and coverage
To monitor the real-time traffic through the network
To enhance the physical security of the network infrastructure
Answer Description
A wireless survey and the resulting heat map are used primarily to assess the coverage and strength of wireless signals across different areas in a network environment. This ensures optimal placement of wireless access points and helps in identifying areas with poor connectivity or signal interference. The heat map visually represents the wireless signal strength and coverage, allowing for more informed decisions regarding infrastructure improvements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What tools are commonly used to conduct a wireless survey?
What factors can affect wireless signal strength during a wireless survey?
How do heat maps assist in improving a wireless network?
What is the primary function of RADIUS in network security?
Encrypting data traffic for all network devices
Managing centralized Authentication, Authorization, and Accounting for network services
Physically securing network-connected hardware
Providing cloud storage solutions for network data
Answer Description
RADIUS primarily functions as a protocol that provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service. Authentication verifies who the user is, Authorization determines what a user can and cannot access, and Accounting keeps track of the consumption of network resources by the user. The other options, while plausible-sounding, are incorrect because they do not describe the main functionalities provided by RADIUS.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does RADIUS stand for and why is it important?
How does RADIUS handle Authentication, Authorization, and Accounting (AAA)?
What types of network services typically use RADIUS?
According to PCI DSS version 4.0, what must an organization do to protect cardholder data whenever that data is transmitted across open, public networks such as the Internet, wireless, or cellular links?
Transmit the data in clear text if it stays within a private VLAN.
Compress the data before sending it to reduce exposure time.
Encrypt the data using strong cryptography and secure protocols (e.g., TLS 1.2 or higher) for the entire session.
Mask the primary account number by replacing the middle six digits with asterisks but leave the remainder unencrypted.
Answer Description
PCI DSS Requirement 4 states that cardholder data must be protected with strong cryptography during transmission over any open, public network. Implementing secure protocols such as TLS 1.2 or higher (or other PCI-approved encryption methods) satisfies this control. Compressing data, sending it in clear text within a private VLAN, or merely masking some digits of the PAN do not meet the requirement because none of those tactics provide the mandatory strong encryption of the entire data stream.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is PCI DSS and why is it important?
What is TLS and how does it provide strong cryptography?
Why is encrypting data across public networks required under PCI DSS?
A network issue has been reported where two computers in the same segment cannot communicate, despite having what appears to be properly configured addresses. Investigation reveals a discrepancy: one machine uses a mask of 255.255.255.0, while the other employs a mask of 255.255.254.0. What is the MOST likely resolution to allow seamless communication between these devices?
Standardize the network mask on both computers to 255.255.255.0
Adjust the network address of the second machine to match the mask setting of the first
Replace the network interfaces of both computers
Divide the network into smaller, distinct segments with new masks
Answer Description
The communication problem stems from the use of differing network masks which logically places the devices on different subnets, despite being physically on the same network segment. Aligning both devices to the same network mask resolves this discrepancy by placing them on the same logical network, thereby facilitating direct communication. Modifying individual addresses or segmenting the network further does not confront the root cause, which is the mismatch in network masks. Changing network cables is unrelated to an issue caused by subnet configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a subnet mask?
How does a mismatch in subnet masks affect communication?
What are common subnet mask settings and their uses?
Which of the following best defines Mean Time to Repair (MTTR) in a networking or disaster-recovery context?
The average time required to repair a failed component and return it to normal operation.
The average time between one failure and the next for a given device or system.
The maximum acceptable amount of data loss measured in time after an outage.
The total time it takes to detect that a failure has occurred, without including repair.
Answer Description
MTTR is the average amount of time required to diagnose, repair, and fully restore a device or system after a failure has been detected. It spans detection, troubleshooting, replacement or repair, and verification that normal operation has resumed. It does not describe the interval between failures (MTBF), the allowable data-loss window (RPO), or merely the time to notice a fault.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How is MTTR different from MTBF?
What are some steps included in the MTTR process?
How does MTTR differ from RPO in disaster recovery?
You are tasked with diagnosing an issue where a server is intermittently unreachable from multiple clients across different subnets. You decide to use a command line tool to trace the path packets take through the network to the server. Which command should you use to identify at which hop in the network path the packets are being dropped?
tracert (Windows) / traceroute (Unix/Linux)
ping
netstat
ipconfig / ifconfig
Answer Description
The tracert (or traceroute on Unix/Linux systems) command is used to determine the route taken by packets across an IP network on their way to a specific host. It can identify where packets start to fail to reach the destination, showing each hop in the path and the time taken to get from one node to another. This makes it invaluable for identifying at which hop in the network path packets are potentially being dropped. In contrast, ping is effective for checking reachability and round-trip times but does not show the path of the packets. netstat displays protocol statistics and current TCP/IP network connections, which is not suitable for tracing the path of packets. ipconfig (or ifconfig in Unix/Linux) is primarily used to display all current TCP/IP network configuration values and refresh DHCP and DNS settings, but isn't useful for tracing packet paths.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does tracert/traceroute work to identify network issues?
Why is tracert/traceroute better than ping for diagnosing network paths?
What are common reasons packets might be dropped at a specific hop in a network?
What is the primary purpose of using the ping command in network troubleshooting?
To determine the speed of the network connection
To automatically resolve any detected network connectivity issues
To physically map out the network infrastructure
To test the reachability of a host on an IP network and measure the round-trip time for messages sent
Answer Description
The primary purpose of the ping command is to test the reachability of a host on an IP network and measure the round-trip time for messages sent from the originating host to a destination computer. This is crucial for initially diagnosing connectivity issues. Answers involving speed testing or direct problem resolution are incorrect because ping does not measure network speed in terms of throughput and cannot resolve the problems itself; it merely checks connectivity and latency.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the round-trip time in the context of the `ping` command?
How does the `ping` command work technically?
What are some common scenarios where the `ping` command might fail?
What does an increase in the CRC counter typically indicate on a network device?
Excessive bandwidth usage exceeding the available limit
Configuration errors in network addressing
Routing loops in the network topology
Physical layer issues such as noise or cable problems
Answer Description
An increase in the Cyclic Redundancy Check (CRC) counter usually indicates that there have been errors in the transmission of data frames due to issues such as noise, interference, or problems with the network cable. CRC is a form of error detection that checks the accuracy of data on the network. If the data is altered due to interference, the CRC values will not match, which is flagged as an error.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a CRC and how does it detect errors?
What are common causes of CRC errors?
How can CRC errors be reduced or resolved?
A network analyst is troubleshooting an issue where users are unable to access a web application hosted internally. Upon investigation, the analyst detects that the application receives the HTTP request, processes it, but users do not receive any response. At which layer of the OSI model should the analyst first focus their troubleshooting efforts?
Network Layer (Layer 3)
Transport Layer (Layer 4)
Application Layer (Layer 7)
Session Layer (Layer 5)
Answer Description
The issue described pertains to the end-to-end delivery of data packets, which falls predominantly under the Transport layer, Layer 4 of the OSI model. This layer is responsible for ensuring complete data transfer. If the application receives the request and processes it, but no response is received by the users, it could mean there is a failure in the reassembly or acknowledgment of packets, which are handled at Layer 4. The Network layer mainly deals with data packet forwarding including routing through different paths in the network, which is not primarily concerned with the bidirectional flow and control acknowledgments of the establishment maintained by the Transport layer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specifically does the Transport Layer (Layer 4) handle in the OSI model?
How does the Transport Layer differ from the Network Layer?
What tools or methods can an analyst use to troubleshoot issues at the Transport Layer?
You are a network administrator tasked with updating the network infrastructure at your company. During the audit, you notice outdated cable maps that do not reflect current network layouts. What is the primary reason for updating these cable maps?
To comply with cabling safety and standards documentation requirements (e.g., ANSI/TIA-568).
To prepare documentation for an upcoming software license audit.
To ensure network documentation reflects the current layout for efficient troubleshooting and maintenance.
To reduce paper consumption and storage costs by eliminating old drawings.
Answer Description
Accurate cable maps are crucial for efficient troubleshooting and management of the network. They assist in quick identification of connection points and paths, thereby reducing downtime and simplifying maintenance tasks. Incorrect maps can lead to confusion, increased troubleshooting times, and potential errors during network upgrades or repairs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are accurate cable maps important for troubleshooting?
What happens if cable maps are outdated?
How does updating cable maps impact network maintenance?
During an analysis of network traffic patterns, a network administrator detects intermittent latency spikes that are not associated with scheduled backup operations. These spikes coincide with high utilization rates on the database server. Which of the following methods will most effectively further analyze the nature of the traffic causing these spikes?
Review firewall logs for denied connections during the times of spikes
Implement port mirroring to capture the traffic to and from the database server
Set a new Quality of Service (QoS) policy for database-related traffic
Optimize database queries to reduce load on the server
Answer Description
By implementing port mirroring to mirror the traffic to and from the database server to an analysis tool, the administrator can conduct a comprehensive examination of the traffic. This enables the identification of specific packet types, sources, or unusual activity without interrupting server operation. Setting a QoS policy might help in managing traffic but does not provide the detailed insight needed for diagnosis. Reviewing firewall logs could miss detailed traffic content, and optimizing database queries is unrelated until the specific traffic cause is identified.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is port mirroring and how does it work?
Why is Quality of Service (QoS) not ideal for this scenario?
How does traffic analysis help identify the cause of latency spikes?
During a network audit, an administrator needs to verify the exact model and software version of devices connected directly to a company's primary Cisco switch. Which protocol would be BEST for collecting this detailed information automatically?
LLDP
Using the command line to manually check each device
CDP
SNMP
Answer Description
Cisco Discovery Protocol (CDP) is specifically designed for collecting detailed data about directly connected Cisco devices, including hardware model and software version. This makes CDP the best choice in networks predominantly utilizing Cisco equipment, as it can gather extensive device-specific information without manual configuration on each connected device. While LLDP also serves to discover device information on a network, it is vendor-neutral and may not provide the same level of detail for specific Cisco device characteristics compared to CDP. The command line provides a manual method to extract information and does not automate the process. SNMP, primarily used for monitoring and managing network devices, focuses more broadly on performance metrics rather than specific device information like model and software version.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Cisco Discovery Protocol (CDP) and how does it work?
How is CDP different from LLDP?
Why isn't SNMP the best choice for gathering detailed device information in this scenario?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.