CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
Which wireless standard is currently recommended to enhance security in modern wireless network infrastructures?
TKIP
WPA2
WEP
WPA3
Answer Description
WPA3 is the recommended protocol and standard as it provides advanced security measures, including individualized data encryption and improved protection against brute-force attacks, which are crucial for protecting modern wireless networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key features of WPA3 compared to WPA2?
What does 'brute-force attack' mean?
Why is WEP considered less secure than WPA3?
A network administrator is tasked with configuring a reverse DNS lookup for a subnet used by company email servers. After setting up the necessary zone files, which type of DNS record should they add to associate the subnet's IP addresses with a canonical hostname?
PTR records
MX records
NS records
Answer Description
To establish reverse DNS lookups for an IP address, a PTR record is needed in the DNS configuration. This record maps the IP address of a device or server to its canonical hostname, confirming the server's identity to other systems, specifically for functions like email delivery authentication. Other records like NS or MX do not perform this association for reverse lookups. NS records delegate DNS zones to other servers while MX records direct email to mail servers according to their priorities and are unrelated to reverse DNS configurations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are PTR records and how do they work?
What is the role of NS records in DNS?
How do MX records differ from PTR records?
A company's network administrator discovers that multiple users are complaining about connectivity issues and incorrect network settings. After investigation, the administrator suspects the presence of an unauthorized DHCP server on the network. What is the potential security risk posed by this rogue DHCP server?
It serves as a backup server improving network redundancy.
It encrypts data packets causing delays in data transmission.
It can issue incorrect network settings leading to traffic misdirection.
It increases the network's broadcast traffic, slowing down network speeds.
Answer Description
A rogue DHCP server can issue incorrect or malicious network settings to clients, directing traffic to unauthorized locations which potentially allows for man-in-the-middle attacks or data exfiltration. It disrupts network operations by allocating incorrect IP addresses and gateway information, posing significant security and operational risks. The other options, while potentially part of various attack strategies or network configurations, do not directly represent the typical outcomes of a rogue DHCP server.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a rogue DHCP server?
How does a rogue DHCP server lead to man-in-the-middle attacks?
What are the signs of a rogue DHCP server in a network?
A company is reviewing its data center security measures to prevent unauthorized physical access. Which of the following would BEST enhance the security at the primary entrance to the data center?
Implement a pin code access system
Place surveillance cameras at the entrance
Use traditional key locks
Install biometric locks that require fingerprint authentication
Answer Description
Biometric locks are the most effective option listed for controlling physical access to a sensitive area like a data center. They require unique physical characteristics (e.g., fingerprints or retinal patterns), which are harder to duplicate or share compared to key cards or pin codes. Traditional key locks are less secure as keys can be copied or stolen. Pin code access systems can also be compromised if the code is shared or observed by unauthorized persons. While surveillance cameras are useful, they do not prevent entry but rather record it, making them less effective as the primary security measure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are biometric locks and how do they work?
What are the limitations of traditional key locks and pin code access systems?
How does surveillance enhance security if it doesn't prevent unauthorized access?
Which scenario best represents a typical use case for implementing VXLAN in an enterprise network?
Extending Layer 2 domains across multiple data centers
Managing Quality of Service (QoS) for streaming media
Reducing the number of required IP addresses in a small office
Encrypting data transmission between two endpoints in the same data center
Answer Description
VXLAN is primarily used for Layer 2 network isolation over a Layer 3 network, allowing for the creation of a large number of isolated Layer 2 networks across geographically dispersed data centers. This technology is essential in scenarios where you need to extend the same Layer 2 domain across different data centers without physical connectivity limitations. Choice 'Extending Layer 2 domains across multiple data centers' directly reflects the capability of VXLAN to extend network segments over a Layer 3 infrastructure, which is crucial for large and distributed network architectures. Other options, while feasible in certain contexts, do not specifically leverage the unique Layer 2 encapsulation capabilities of VXLAN.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of using VXLAN for Layer 2 network extension?
How does VXLAN differ from traditional VLANs?
What are some common use cases for VXLAN beyond data center connectivity?
An IT support technician in a mid-sized company is noticing that latency issues are affecting the performance of their Voice over IP (VoIP) calls, especially during peak usage hours. Which of the following actions should the technician explore first to troubleshoot and address the latency on the network?
Check the current bandwidth usage and availability on key network segments.
Inspect the physical layer for any signs of damage or interference in cable connections.
Upgrade the firmware on network routers and switches to the latest version.
Immediately configure Quality of Service (QoS) settings to prioritize VoIP traffic.
Answer Description
Checking the current bandwidth usage and availability is the correct first step because increased latency during peak hours often indicates that bandwidth is being saturated. By understanding the usage patterns and identifying any bandwidth-hungry applications, a technician can take steps to manage the load or potentially increase bandwidth to reduce congestion, thus decreasing latency. Configuring Quality of Service for prioritization might be necessary if the bandwidth is not sufficient, but first, the usage needs to be assessed. Upgrading firmware or inspecting the physical layer might not directly relate to solving a congestion-induced latency issue during peak hours without first confirming the root cause is due to bandwidth issues.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is latency and why does it matter for VoIP calls?
What are some common causes of latency in networks?
What is Quality of Service (QoS) and how can it help with VoIP?
Which IPv4 address is classified as a public IP address?
192.168.1.1
172.16.254.3
8.8.4.4
10.0.0.1
Answer Description
The IP addresses 10.0.0.1, 172.16.254.3, and 192.168.1.1 are all classified as private IP addresses under RFC 1918, which reserves them for internal network use. Conversely, the address 8.8.4.4 is not part of any reserved private range and is routable on the global internet, making it a public IP address.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are private IP addresses and why are they used?
What is the difference between public and private IP addresses?
What does RFC 1918 stand for and why is it important?
An organization wants to establish secure communications between its headquarters and remote offices through the internet. They require a tunneling solution that supports both encapsulation and encryption to ensure data privacy and security. Which protocol should they implement?
Routing Information Protocol (RIP)
Border Gateway Protocol (BGP)
Internet Protocol Security (IPsec)
Generic Routing Encapsulation (GRE)
Answer Description
IPsec (Internet Protocol Security) is the correct answer because it is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPsec can be used to create a secure tunnel for transmitting data between two locations over the public Internet, providing both encapsulation and encryption, crucial for protecting data in transit. GRE, while capable of encapsulation, does not provide encryption inherently, making it less suitable for scenarios demanding high security. RIP and BGP are routing protocols and do not provide tunneling or encryption functionalities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main features of IPsec?
How does IPsec create a secure tunnel?
What is the difference between IPsec and GRE?
A network administrator is setting up a network that must support both IPv4 and IPv6. Which configuration approach allows the network devices to process IPv4 and IPv6 packets simultaneously, optimizing the handling of traffic without the need for extra translation mechanisms?
Tunneling
NAT64
Dual stack
Answer Description
Dual stack is the correct choice as it allows devices to run IPv4 and IPv6 simultaneously, providing seamless communication compatibility with both protocols. Dual stack avoids the complexities and performance hits associated with translating between IPv4 and IPv6, aligning directly with the needs specified in the question. Tunneling, although a valid approach for supporting IPv4 and IPv6, involves encapsulating IPv6 packets within IPv4 packets (or vice versa), which can introduce additional overhead and complexity. NAT64, on the other hand, translates IPv6 addresses into IPv4 addresses, which is not required in scenarios where systems support both protocols natively as is the case in dual stack configurations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is dual stack and how does it work?
What are the advantages of using dual stack over tunneling?
How does NAT64 differ from dual stack in handling traffic?
A network administrator is configuring a server that needs to guarantee data delivery without errors, and in the correct order. Which protocol would be the most appropriate to prioritize these needs?
ICMP
TCP
UDP
IPSec
Answer Description
TCP is the correct answer because it provides features such as sequencing and acknowledgment, error detection and recovery, and flow control mechanisms. These features ensure that data packets are delivered in order and without errors. UDP, while faster due to non-existent overhead for connection setup and error handling, does not guarantee packet delivery or order, making it inappropriate for scenarios requiring reliable data transmission. ICMP, primarily used for diagnostic or control purposes, is not suitable for data transfer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main features of TCP that ensure reliable data delivery?
Why is UDP not suitable for applications requiring reliable data transmission?
What are some common applications that utilize TCP?
Which of the following IPv4 addresses falls within the private address space specified by RFC 1918 and therefore cannot be routed across the public Internet?
8.8.8.8
192.168.1.1
203.0.113.10
172.34.0.5
Answer Description
RFC 1918 designates three private IPv4 blocks: 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. Only addresses inside these ranges are intended for internal networks and are filtered by Internet routers. 192.168.1.1 sits inside 192.168.0.0/16, so it is private. The other options (172.34.0.5, 203.0.113.10, 8.8.8.8) lie outside the private ranges and are publicly routable (203.0.113.0/24 and 198.51.100.0/24 are documentation ranges but still public).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are RFC 1918 addresses used for?
What does it mean for an IP address to be 'routable'?
Can private IP addresses communicate with the public Internet?
In a network interface configuration, setting the speed incorrectly can cause performance degradation. What is the potential impact of configuring a gigabit switch port to 100 Mbps when connected devices support gigabit speeds?
It leads to total loss of data transfer between devices
It makes the devices use an outdated protocol for communication
It creates a bottleneck, limiting the data rate to less than what the devices are capable of handling
It increases the noise level on the physical medium
Answer Description
Configuring a switch port speed to 100 Mbps on a connection where the connected devices support gigabit speeds will lead to a significant bottleneck. The port will limit the transmission speed to 100 Mbps, thereby underutilizing the gigabit capability of the connected devices and potentially causing network congestion due to slower data transfer rates. This misconfiguration does not directly involve protocol compatibility or increase noise levels, and it also won't necessarily result in complete data loss unless other factors are at play.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a bottleneck in networking?
How does misconfiguration affect network performance?
What are the implications of network congestion?
A network administrator at a medium-sized enterprise is configuring an extended ACL on the main router to restrict access to a secure server subnet that hosts sensitive client data. The server network is 192.168.5.0/24. Only devices on the administration team's subnet, 10.10.10.0/24, should be able to reach this server network. Which of the following ACL statements accomplishes this requirement?
permit ip 192.168.5.0 0.0.0.255 10.10.10.0 0.0.0.255
permit ip 10.10.10.0 0.0.0.255 any
permit ip any 192.168.5.0 0.0.0.255
permit ip 10.10.10.0 0.0.0.255 192.168.5.0 0.0.0.255
Answer Description
An extended ACL entry must include the protocol keyword followed by the source and destination networks with their wildcard masks. The line "permit ip 10.10.10.0 0.0.0.255 192.168.5.0 0.0.0.255" allows any IP traffic originating from the 10.10.10.0/24 subnet to reach any host on the 192.168.5.0/24 subnet. Because an implicit "deny ip any any" follows the ACL, all other source networks are automatically blocked from reaching the server subnet. The other options either reverse the source and destination fields, permit all sources, or fail to limit the destination network, so they do not meet the requirement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an ACL in networking?
What do the numbers in 192.168.5.0/24 mean?
What is the difference between a permit and deny rule in an ACL?
An organization plans to temporarily connect its IPv4 infrastructure to a new, IPv6-based service provider. Which of the following options facilitates communication between the new provider's IPv6 network and the organization's existing IPv4 system without altering client or server configurations?
Tunnel broker
NAT64
DHCP relay
Dual-stack architecture
Answer Description
NAT64 is the correct choice for transitioning from IPv4 to IPv6 by translating IPv6 addresses to IPv4 addresses and vice versa, allowing IPv4 clients to access IPv6 services transparently. Dual-stack architecture implies running both IPv4 and IPv6 on every device, which changes the set-up on clients. A Tunnel broker mainly creates a tunnel for IPv6 traffic over an IPv4 network, rather than facilitating communication between IPv4 clients and IPv6 services. DHCP relay is used to forward DHCP messages between clients and servers on different networks, but does not translate between IP versions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is NAT64 and how does it work?
What is the difference between a dual-stack architecture and NAT64?
How does NAT64 differ from a Tunnel broker?
Which of the following would be the BEST method to guarantee bandwidth for a video conferencing application?
Applying QoS policies to prioritize traffic
Increasing the overall bandwidth of the internet connection
Using traffic policing to limit traffic rates
Implementing traffic shaping to control traffic bursts
Answer Description
Applying QoS policies to prioritize traffic ensures that critical applications, such as video conferencing, are given the required bandwidth even during high traffic periods. This is crucial for maintaining the quality and reliability of the video conferencing, which may be sensitive to bandwidth fluctuations. On the other hand, increasing bandwidth would not prioritize the specific needs of various types of traffic, traffic shaping alone might delay some packets to reduce burstiness without ensuring bandwidth availability, and traffic policing would limit the rate of traffic, potentially dropping packets when the bandwidth cap is exceeded.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are QoS policies and how do they work?
What impact does bandwidth have on video conferencing?
What is traffic shaping and how does it differ from QoS?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.