CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test
- 20 Questions
- Unlimited
- Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
While working in a corporate environment as a network administrator, you notice that several devices are unable to communicate with each other despite being connected to what you believe is the same VLAN. What command can you execute to verify VLAN assignments and troubleshoot the issue?
show config
show interface
show vlan
show mac-address-table
Answer Description
The 'show vlan' command is used on network switches to display VLAN configurations and assignments. It helps in verifying which ports are assigned to specific VLANs, essential for troubleshooting connectivity issues between devices. The command outputs the VLAN IDs, names, and associated ports, providing a clear view of the VLAN landscape to determine if devices are correctly categorized.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VLAN and why is it important?
What specific output does the 'show vlan' command provide?
How does a mismatched VLAN configuration cause communication issues?
When a computer configured to obtain an IP address automatically is unable to reach a Dynamic Host Configuration Protocol (DHCP) server, which IP address range will it most likely assign to itself?
255.255.255.0 network subnet mask
127.0.0.1 to 127.255.255.254
192.168.0.1 to 192.168.255.254
169.254.0.1 to 169.254.255.254
Answer Description
Automatic Private IP Addressing (APIPA) allows a computer to assign itself an IP address in the absence of a DHCP server. This functionality, defined in RFC 3927 as link-local addressing, uses a designated range of addresses from 169.254.0.1 through 169.254.255.254. The computer randomly chooses an IP address within this range, allowing for basic communication with other devices on the same local network. This is intended as a temporary solution until a DHCP server can be reached. The 192.168.x.x range is a private IP address space defined by RFC 1918, commonly used in local networks. The 127.0.0.0/8 range (e.g., 127.0.0.1) is reserved for loopback addresses, which are used for network software testing on the local machine. The final option is a subnet mask, not an IP address range; it is used with an IP address to define the network and host portions of the address.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is APIPA and why is it used?
What is the difference between APIPA and DHCP?
What happens if two devices assign themselves the same APIPA address?
A network administrator notices that devices on the local network are unable to access external websites. After verifying that internet services from the ISP are operational and that internal resources are accessible, the administrator suspects an issue with the network's routing configuration. What configuration error is likely causing the devices to fail connecting to external websites?
The routing table contains incorrect entries for local subnets.
The default gateway is not correctly configured on the router.
Incorrect subnet masks are configured on the devices.
ACLs are blocking access to external network addresses.
Answer Description
The likeliest issue in this scenario is that the default gateway is not configured or incorrectly configured on the router. The default gateway provides the necessary routing information for forwarding packets destined for external networks and the internet. If it's missing or incorrect, devices can communicate within the local network but fail to find a route for external addresses. Incorrect entries in the routing table typically only affect specific network segments, and incorrect subnets would largely prevent local communications, not just external communications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a default gateway in networking?
How is the default gateway configured on a router?
What happens if the default gateway is misconfigured?
Which protocol and port combination is primarily used for securely transferring web pages from web servers to clients?
HTTPS | 443
SMTP | 25
FTP | 21
Telnet | 23
Answer Description
HTTPS on port 443 is the correct answer because it is the secure version of HTTP, using encryption (SSL/TLS) to securely transfer web pages from web servers to clients. FTP on port 21 is used for file transfers but not specifically for web pages. SMTP on port 25 is used for sending emails, not web pages. Telnet on port 23 offers text-oriented communication but lacks encryption, making it inappropriate for secure transfers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What makes HTTPS on port 443 more secure than HTTP?
How does TLS work in securing HTTPS connections?
Why is FTP on port 21 not suitable for secure web page transfers?
What would likely be the symptom if a device on a local network has an incorrect default gateway configured?
Intermittent wireless disconnections
Duplicate IP address error
Cannot access external websites or services
High latency in intranet communications
Answer Description
An incorrect default gateway on a device typically leads to the inability to communicate with devices outside the local subnet. The default gateway is responsible for routing the packets of a device to destinations not within the immediate network. If it is incorrect, the device can only communicate locally, not beyond its subnet, which is why the device 'Cannot access external websites or services' is the correct answer. The other options could be symptoms of other configuration errors, but they do not directly relate to problems with the default gateway setting.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a subnet?
How does a default gateway work?
What happens if the wrong default gateway is configured?
What is the primary purpose of implementing a guest network in a corporate environment?
To provide secure internet access to untrusted devices
To optimize network traffic
To hide IP schemes from untrusted devices
To support specific functions in corporate communications
Answer Description
Guest networks are designed to provide limited network access to visitors while keeping the main corporate network secure. This separation ensures that visitors cannot access sensitive company data or resources, hence maintaining a secure and accessible environment. The correct answer specifies that the primary purpose is to provide internet access in a secure manner specifically for visitors.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key security benefits of separating a guest network from the corporate network?
How does VLAN setup support guest network implementation?
What best practices should be followed when configuring a guest network in a corporate environment?
A network administrator receives alerts that several users are experiencing connectivity issues. The administrator decides to perform a ping operation to test the reachability of these users' computers. Which protocol does the ping command primarily utilize to verify network connectivity?
Simple Network Management Protocol (SNMP)
Hypertext Transfer Protocol Secure (HTTPS)
Hypertext Transfer Protocol (HTTP)
Internet Control Message Protocol (ICMP)
Answer Description
The ping command uses the Internet Control Message Protocol (ICMP) to test the reachability and availability of network devices. It sends an ICMP Echo Request to the destination and waits for an ICMP Echo Reply to confirm connectivity. The other mentioned protocols serve different purposes, such as HTTP/HTTPS for web browsing, and SNMP for network management but are not used by the ping command to test network reachability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does ICMP work in network connectivity testing?
What is the difference between ICMP and SNMP?
Why can't HTTP/HTTPS be used for testing network connectivity like ICMP?
A company is implementing a zero trust architecture to bolster their network security. As part of this initiative, what approach should be primarily taken to ensure that authorized users are allowed access to network resources?
Grant access based on policy-based authorization
Provide network access to devices following a preliminary security assessment
Allow access based on user location within the enterprise premises, subject to additional verifications
Offer access based on network segment location, supplemented by user credential checks
Answer Description
The correct approach in a zero trust architecture is to implement policy-based authorization. In zero trust models, access decisions are based not on the physical or network location of a user, but on a set of policies that consider various context factors, such as the user's identity and the device's security status. This method ensures tight control over who can access specific resources, making the network more secure against various threats.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly does policy-based authorization entail in a zero trust model?
How is 'device security status' assessed for policy-based authorization?
What kinds of threats can a zero trust architecture mitigate more effectively?
A network technician is tasked with connecting a legacy fax machine in an office to the network. The fax machine uses an older connection interface. Which type of cable should the technician use to connect this device?
RJ11 cable
Coaxial cable
RJ48 cable
RJ45 cable
Answer Description
RJ11 cables are commonly used for telephone connections, including devices like fax machines that connect to a standard telephone line. RJ45 is the standard connector for Ethernet networks and is physically larger than RJ11. RJ48 connectors are typically used for specialized data lines like T1 and are not for analog fax machines. Coaxial cables are generally used for television and broadband internet connections, not for telephone-based devices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is an RJ11 cable appropriate for connecting a fax machine?
How does an RJ11 cable differ from an RJ45 cable?
What are the main uses of RJ48 cables, and why aren't they suitable for fax machines?
Which design approach best utilizes a screened subnet for enhancing network security, considering its strategic placement in network architecture?
Configuring it to serve as the main hub for internal routing and switching, optimizing the network's core performance.
Implementing it for all employee workstations to ensure uniform security policies across the company.
Utilizing it to separate the internal network from the external internet, placing only externally accessible services such as a web server within it.
Deploying it as the primary network for internal operations with high-speed connectivity requirements.
Answer Description
The correct answer emphasizes the strategic use of a screened subnet to host services that are intended for public access, such as a web server, thus isolating them from the internal network. This setup acts as a buffer zone, reducing the risk of external attacks directly impacting the core internal network. The incorrect options, although plausible in different contexts, fail to capture the primary security function of a screened subnet as an intermediary that shields internal networks from direct exposure to public internet traffic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a screened subnet in network security?
Why is it important to isolate public servers within a screened subnet?
How does a screened subnet differ from the main internal network?
A company is reviewing its data center security measures to prevent unauthorized physical access. Which of the following would BEST enhance the security at the primary entrance to the data center?
Implement a pin code access system
Place surveillance cameras at the entrance
Install biometric locks that require fingerprint authentication
Use traditional key locks
Answer Description
Biometric locks are the most effective option listed for controlling physical access to a sensitive area like a data center. They require unique physical characteristics (e.g., fingerprints or retinal patterns), which are harder to duplicate or share compared to key cards or pin codes. Traditional key locks are less secure as keys can be copied or stolen. Pin code access systems can also be compromised if the code is shared or observed by unauthorized persons. While surveillance cameras are useful, they do not prevent entry but rather record it, making them less effective as the primary security measure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do biometric locks work?
What are the limitations of biometric locks?
Why aren’t surveillance cameras sufficient for physical security?
What is the primary function of a captive portal in a network environment?
To encrypt data packets on a wireless network using WPA2
To increase the range of the wireless signal
To allocate IP addresses to devices connected to the network
To authenticate and redirect users to a login page before they gain access to the network
Answer Description
A captive portal controls network access by requiring users to view or interact with a web page before Internet access is granted. It is a common method for implementing guest Wi-Fi networks, ensuring users accept legal terms or log in. Other answers might sound plausible, but they do not correctly describe the primary function of a captive portal.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a captive portal work?
What are some common use cases for captive portals?
How does a captive portal differ from other network authentication methods?
A network engineer is troubleshooting an issue where a newly installed switch is not connecting to the network. After confirming the switch configuration is correct, the engineer establishes a theory that a cable fault is the probable cause. According to the CompTIA troubleshooting methodology, what is the best next step?
Replace the switch with a new one.
Perform a traceroute from a connected device.
Ping the default gateway from the switch.
Test the cable using a cable tester.
Answer Description
According to the CompTIA troubleshooting methodology, the step after establishing a theory of probable cause is to test that theory to determine the actual cause. In this scenario, the theory is a cable fault, so the most direct way to test it is with a cable tester. This tool specifically checks for physical layer issues like opens, shorts, and improper termination. Using higher-level tools like ping or traceroute would be ineffective if a physical layer fault prevents a link. Replacing the switch is a more drastic step (implementing a solution) that should only be taken after the cause is verified.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is a cable fault considered a Physical Layer issue in the OSI model?
What specific problems does a cable tester detect?
Why wouldn't ping or traceroute be useful if the issue is in the Physical Layer?
A network administrator is setting up a wireless network in a busy office environment. The administrator wants to ensure that employee devices connect seamlessly to the strongest signal within the office without manually switching between multiple access points. What is the BEST configuration to use?
Assign a unique BSSID for each access point.
Use a single ESSID across all access points.
Implement band steering on all access points.
Configure each access point as a separate mesh network.
Answer Description
Configuring a single Extended Service Set Identifier (ESSID) allows multiple access points to appear as a single network to Wi-Fi devices, which enables seamless roaming within a network environment. Devices will automatically connect to the AP with the strongest signal using the same SSID. BSSID refers to the unique identifier of each individual access point and is not suitable for seamless integration of multiple APs. Band steering helps to manage the distribution of devices between different frequency bands (e.g., 2.4GHz and 5GHz) but won't assist in seamless connection to multiple access points under the same network identification. Network types such as Mesh or Infrastructure do not focus on SSID configuration and thus are incorrect in this context.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an ESSID, and why is it used?
How does a BSSID differ from an ESSID?
What is Band Steering, and why is it not ideal for seamless roaming?
What is a primary result of a network loop occurring within a switched environment?
Routing loops
Broadcast storm
Duplicated IP addresses
MAC address instability
Answer Description
A network loop in a switched (Layer 2) environment creates a condition where broadcast frames are forwarded endlessly between switches. This results in a broadcast storm, which quickly consumes all available bandwidth and swamps switch CPUs, effectively bringing the network down. While MAC address instability (where a switch's MAC address table constantly changes as it sees the same device on multiple ports) is also a symptom of a network loop, the broadcast storm is the most immediate and severe result. Duplicated IP addresses and routing loops are Layer 3 issues, not direct results of a Layer 2 switching loop.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a broadcast storm?
How does a network loop form in a switched environment?
What is Spanning Tree Protocol (STP) and how does it prevent loops?
A network administrator is setting up a DHCP server for a new subnet. To ensure specific department devices always receive the same IP addresses whenever their devices connect to the network, which DHCP setting should the administrator configure?
Scope
Exclusions
Lease time
Reservations
Answer Description
The correct configuration to ensure a specific device always receives the same IP address is to use reservations. DHCP reservations bind a specific IP address to the MAC address of a device, guaranteeing that this device receives the same IP address each time it connects to the network. In contrast, exclusions are used to prevent certain IP addresses from being assigned from a scope; scope defines the entire range of possible IP addresses that can be assigned to devices; and lease time determines how long a device holds an IP address before it must renew its DHCP configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does DHCP reservations work?
What is the difference between a DHCP reservation and exclusion?
Why is lease time important in DHCP configuration?
A network administrator notices that a Windows 11 workstation cannot communicate with other hosts on the same subnet. Which command-line method should the administrator use on the workstation to verify that its stored mappings between network (IP) addresses and hardware (MAC) addresses are correct?
Clear all cached ARP entries with
arp -d *
Display the workstation's ARP cache with
arp -a
View the routing table on the default gateway using
show ip route
List interface details with
ipconfig /all
Answer Description
The command arp -a
displays the ARP cache, which lists each known IP address and the corresponding MAC address learned by the workstation. By comparing the information in this table against expected values, the administrator can confirm whether the workstation is resolving Layer-3 addresses to the correct Layer-2 addresses.
show ip route
is a Cisco IOS command that shows a router's routing table; it offers no view of host-level ARP information.
ipconfig
(or ipconfig /all
) shows the workstation's own interface configuration-IP, subnet mask, default gateway, and the adapter's physical address-but it does not list the IP-to-MAC mappings for other hosts.
arp -d *
clears the workstation's ARP cache; while useful for forcing the host to relearn entries, it does not display or verify the current mappings.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the ARP cache and why is it important?
What situations might require clearing the ARP cache using `arp -d *`?
How does the `arp -a` command differ from the `ipconfig /all` command?
A company is planning to expand its network across multiple geographic locations and requires a scalable and flexible networking solution that can manage diverse traffic types efficiently while also allowing centralized management. Which technology would be most appropriate for its needs?
Virtual private network (VPN)
Software-defined wide area network (SD-WAN)
IPv6 addressing
Zero Trust Architecture (ZTA)
Answer Description
A software-defined wide area network (SD-WAN) is designed to extend enterprise networks over large geographic areas. It provides centralized control, enhanced security, improved bandwidth utilization, and support for multiple connection types such as MPLS, broadband, and LTE/5G. By using a centralized controller to direct traffic intelligently across all available paths, SD-WAN simplifies WAN operations, boosts performance, and can reduce costs.
IPv6 addressing merely defines a new IP-address format and does not provide centralized WAN management. A virtual private network (VPN) creates secure tunnels but lacks the dynamic, centralized orchestration and path selection of SD-WAN. Zero Trust Architecture (ZTA) is a security framework focused on continuous verification rather than WAN transport and management. Therefore, SD-WAN is the most appropriate choice.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SD-WAN and how does it work?
How does SD-WAN differ from a traditional WAN?
What are some key benefits of deploying SD-WAN for a company?
A network engineer needs to update the firmware of several low-storage network devices in a resource-constrained environment. The devices do not require secure file transfers. Which protocol is the most suitable for performing these updates?
File Transfer Protocol (FTP)
Hypertext Transfer Protocol (HTTP)
Trivial File Transfer Protocol (TFTP)
Secure File Transfer Protocol (SFTP)
Answer Description
TFTP is most suitable for this scenario because it uses minimal network traffic for file transfers, which is ideal for environments with limited resources and devices with low storage. It provides a straightforward method without the complexity and overhead associated with more robust file transfer protocols, making it suitable for simple tasks like firmware updates where security is not a concern.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is TFTP, and how does it differ from FTP?
Why is TFTP suitable for resource-constrained environments?
What are the limitations of using TFTP compared to other protocols like SFTP or HTTP?
A user named Sarah has reported that her ability to access the corporate website fluctuates throughout the working day, with periods during which the website becomes inaccessible. What question should you prioritize to effectively gather initial relevant information and identify potential patterns or causes?
Suggest checking Sarah's computer for potential malware or viruses that might be affecting her connectivity.
Query whether any of her colleagues are facing similar issues, focusing on possible common variables across users.
Inquire if the issue happens at specific times and if it's restricted to the corporate site or also affects other websites.
Ask directly about any recent changes to her computer system or network settings to correlate the issue to changes in configuration.
Answer Description
Asking about the specific times when the issue occurs and whether it pertains specifically to the corporate website or other sites as well sheds light on whether the issue is isolated to a particular domain, potentially indicating a server or hosting issue, or if it's a broader connectivity or network problem. This helps distinguish between local and network-wide issues. Although other questions are relevant in the troubleshooting process, pinpointing the issue's frequency, timing, and scope from the start is most effective for forming an accurate initial assessment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to know if the issue happens at specific times?
How does identifying if the problem is specific to one website narrow down potential causes?
What are some key follow-ups if the problem is confirmed to be related only to the corporate website?
That's It!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.