CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:

Free CompTIA Network+ N10-009 (V9) Practice Test
- 20 Questions
- Unlimited
- Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
Which algorithm does Open Shortest Path First (OSPF) use to build its shortest-path tree when determining the best routes through a network?
Path Vector algorithm
Bellman-Ford algorithm
Dijkstra's Shortest Path First (SPF) algorithm
Ford-Fulkerson algorithm
Answer Description
OSPF is a link-state routing protocol. Each router floods link-state information, and after building a complete topology map, it runs Dijkstra's Shortest Path First (SPF) algorithm to compute the least-cost path to every destination in its link-state database. Algorithms such as Bellman-Ford (used by distance-vector protocols like RIP), Path Vector (used by BGP), and Ford-Fulkerson (a flow-optimization algorithm not used in IP routing) are not used by OSPF.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of Dijkstra's Shortest Path First (SPF) algorithm in OSPF?
What is the difference between a link-state and a distance-vector protocol?
Why does OSPF avoid using Bellman-Ford or Path Vector algorithms?
Which scenario BEST demonstrates the principle of integrity within the CIA triad?
Regularly backing up data to a secure location.
Using encryption to protect data from unauthorized access.
Employing checksums to verify data integrity during transmission.
Implementing role-based access controls to limit data access based on user roles.
Answer Description
The use of checksums to verify data integrity during transmission ensures that the data has not been altered, thus maintaining the integrity of the information as defined in the CIA triad. Although backing up data regularly primarily addresses availability, and implementing role-based access controls supports confidentiality and integrity indirectly by controlling access, neither directly ensures integrity like checksums. Using encryption strengthens confidentiality primarily by encoding data to prevent unauthorized access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the CIA triad in cybersecurity?
How do checksums verify data integrity?
What are common tools or algorithms used for checksums?
A network administrator notices that a switch port, which connects to a server, is no longer active and upon checking, finds that the port has been put into an 'error disabled' state. What is the MOST likely cause for this state?
There was an incorrect cable type used between the server and the switch.
The switch experienced a temperature anomaly exceeding operational thresholds.
The DHCP server has run out of IP addresses to assign to clients.
The port security settings have been violated, such as exceeding the maximum number of allowed MAC addresses.
Answer Description
The correct reason why the port would go into an 'error disabled' state in this scenario is usually due to a violation of port security settings, such as exceeding the maximum allowed MAC addresses. Port security limits the number of valid MAC addresses allowed on a port to prevent unauthorized access. If this number is exceeded, the default action for many switches is to disable the port to prevent possible security breaches. Incorrect cable types or DHCP exhaustion typically do not directly cause ports to be error disabled, and temperature anomalies are more related to hardware malfunctions rather than configurations that trigger port security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is port security?
How does a switch detect a violation in port security?
What steps can a network administrator take to resolve an error-disabled port?
A network administrator is setting up a wireless network in a busy corporate office with numerous other wireless networks. The administrator wants to make sure the new network can be easily identified by staff while ensuring it is configured securely. What is the best practice when naming this new network?
Create a descriptive and unique SSID that references the company while avoiding sensitive internal details.
Retain the default SSID provided by the wireless hardware manufacturer.
Include specific department details in the SSID to clearly indicate its intended users.
Use a generic name such as "wireless" to prevent confusion.
Answer Description
The best practice is to create a descriptive, unique SSID that references the organization (for example, CompanyName_WiFi or CompanyName_Staff) without revealing sensitive internal details. A clear, distinctive name helps employees quickly recognize the correct network and reduces the risk of accidental connections to other nearby APs. Generic names can lead to confusion, while keeping the default SSID may advertise the hardware vendor and invite attacks. Including highly specific information such as the Finance or HR department can expose unnecessary details about the network's internal structure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is using a generic SSID not recommended?
What risks are associated with using the default SSID from the hardware manufacturer?
Why is it a bad idea to include specific department names in the SSID?
A network administrator notices an increase in CRC errors on a network interface. What is the BEST first step in troubleshooting this issue?
Reconfigure the switch VLAN assignments
Update the network drivers and firmware
Check the network cables for damage or misconfiguration
Increase the bandwidth allocation for affected connections
Answer Description
CRC errors are usually indicative of physical layer issues such as cabling problems or electrical interference. Therefore, examining the quality of the cables used, checking for bends, breaks, or poor connections, and ensuring correct cable specifications are followed, serves as the most direct approach to addressing and resolving CRC errors. Other options might also be part of broader troubleshooting steps, but they do not directly address the common causes of CRC errors as effectively as checking the physical setup does.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a CRC error in networking?
What are signs of physical layer issues in networking?
How do you check a network cable for damage or misconfiguration?
The IT team at a large retail company is reviewing its disaster-recovery strategy to meet the organization's requirement for moderate downtime after a disruption. They are considering implementing a warm site. Which of the following best describes the state of a warm site that they should expect?
Equipped only with the physical infrastructure and requires all servers, applications, and data to be restored before operations can resume.
Lacks any pre-installed hardware and is primarily an empty data center reserved for emergency use.
Partially equipped with servers, network connections, and possibly some replicated data, but requires additional configuration before it can become fully operational.
Fully operational with all services, applications, and data mirrored from the primary site and running in real time.
Answer Description
A warm site is a partially equipped recovery facility with pre-installed servers, network connectivity, and other core infrastructure. It usually has some software and configuration in place and may receive periodic-though not real-time-data replication. Because it is not maintained in full sync with the primary data center, the IT staff must perform additional configuration and restore recent data before the site can assume production workloads. This contrasts with a cold site, which has only basic infrastructure and no installed hardware or data, and a hot site, which is fully mirrored and ready for immediate failover.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the key difference between a warm site and a cold site?
How does a warm site compare to a hot site in terms of data replication?
Why might an organization choose a warm site over a hot site for disaster recovery?
A network engineer needs to segment a network into multiple broadcast domains without using additional hardware. Which Layer 2 technology should be implemented to achieve this?
Routing
VLAN
Subnetting
NAT
Answer Description
VLANs (Virtual Local Area Networks) operate at Layer 2 of the OSI model and enable a network engineer to create multiple, isolated broadcast domains on a single physical network infrastructure without requiring additional hardware. This allows for improved network segmentation and traffic management. Subnetting operates at Layer 3 by dividing networks based on IP addresses. Routing and NAT (Network Address Translation) are also Layer 3 functions and do not provide Layer 2 segmentation capabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VLAN and how does it work?
What is the difference between VLAN and Subnetting?
How do VLANs improve network performance?
Which of the following best describes the role of administrative distance in a network environment?
It configures the actual metric values of routes on the router.
It is used to define the router's physical distance from the destination network.
It identifies the number of routers in the path to the destination.
It determines the preference of routing information received from different routing sources.
Answer Description
Administrative distance is a value used by routers to select the best path when there are multiple routes to a destination from different routing protocols. A lower administrative distance is preferred over a higher one. Therefore, knowing that it is used to determine the preference of routing information received from different sources explains its role. The other options are incorrect because they do not correctly describe the primary function of administrative distance, mainly focusing on secondary aspects or misrepresenting the concept.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is a lower administrative distance preferred in routing?
How does administrative distance differ from metrics in routing?
Can administrative distance values be manually adjusted, and why would you do that?
You are tasked with diagnosing an issue where a server is intermittently unreachable from multiple clients across different subnets. You decide to use a command line tool to trace the path packets take through the network to the server. Which command should you use to identify at which hop in the network path the packets are being dropped?
ping
ipconfig / ifconfig
tracert (Windows) / traceroute (Unix/Linux)
netstat
Answer Description
The tracert (or traceroute on Unix/Linux systems) command is used to determine the route taken by packets across an IP network on their way to a specific host. It can identify where packets start to fail to reach the destination, showing each hop in the path and the time taken to get from one node to another. This makes it invaluable for identifying at which hop in the network path packets are potentially being dropped. In contrast, ping is effective for checking reachability and round-trip times but does not show the path of the packets. netstat displays protocol statistics and current TCP/IP network connections, which is not suitable for tracing the path of packets. ipconfig (or ifconfig in Unix/Linux) is primarily used to display all current TCP/IP network configuration values and refresh DHCP and DNS settings, but isn't useful for tracing packet paths.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does tracert/traceroute work to identify network issues?
Why is tracert/traceroute better than ping for diagnosing network paths?
What are common reasons packets might be dropped at a specific hop in a network?
Following the implementation of enhanced security measures to validate authenticity and integrity of network address data, an organization notices that some valid address lookups are being rejected. What is the most likely cause of this problem?
The address lookup systems do not support enhanced security verifications
The information storage systems are experiencing high rates of traffic delays
The cryptographic signatures were not updated following changes to the address records
Security appliances are configured to block address lookup operations
Answer Description
When enhanced security measures such as cryptographic validations are in place, they require signatures to validate data authenticity. If these signatures are not kept current following modifications to the address records, validation systems may reject these as untrustworthy. Conversely, issues like network congestion or incorrect firewall settings typically do not result in selective rejection of valid records.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are cryptographic signatures, and how do they work in securing network address data?
How can organizations ensure cryptographic signatures remain valid after address record changes?
Why don't network congestion or firewall settings typically cause valid lookups to fail selectively?
What is the primary focus of a logical network diagram?
It illustrates the architecture and communication paths within a network.
It provides a detailed representation of server rack positions.
It shows the physical location of all the network devices and cabling.
It describes the power sources and cooling systems used in the data center.
Answer Description
A logical network diagram primarily focuses on illustrating the architecture of the network, including how different devices communicate and relate within the network, such as showing subnets, network devices, and routing protocols. This differs from physical diagrams, which depict the physical location of hardware and interconnections.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a logical and a physical network diagram?
What components are typically included in a logical network diagram?
Why are logical network diagrams important for network troubleshooting?
What best describes the role of a Basic Service Set Identifier (BSSID) in a wireless network?
It serves as the network name that is broadcasted by wireless routers.
It specifies the maximum capacity of connected devices within a network.
It uniquely identifies each access point within a wireless network using a MAC-like address.
It acts mainly as a security measure to prevent unauthorized access.
Answer Description
The BSSID uniquely identifies each access point in a WLAN. It is a 48-bit identifier that follows MAC address conventions and allows client devices and administrators to distinguish between multiple access points broadcasting the same SSID. The SSID, by contrast, is the user-visible network name. While the BSSID is included in beacon and management frames, its primary purpose is identification, not capacity planning or direct security enforcement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a BSSID and an SSID?
How is a BSSID related to MAC addresses?
Why is the BSSID included in beacon and management frames?
A network technician is designing a wireless network for a large office building. The goal is for employees to walk from one end of the building to the other without losing their Wi-Fi connection. To achieve this seamless roaming, multiple access points will be deployed as part of an Extended Service Set (ESS). How should the access points be configured?
Configure each access point with the same SSID on different, non-overlapping channels.
Configure each access point with a unique SSID and a unique channel.
Configure each access point with the same SSID on the same channel.
Configure each access point with a unique SSID and the same BSSID.
Answer Description
The correct answer is to configure each access point with the same SSID on different, non-overlapping channels. An Extended Service Set (ESS) allows multiple access points to use the same network name (SSID), making them appear as a single, large network. This enables client devices to roam seamlessly from one access point to another. To prevent signal interference and performance degradation between adjacent access points, they must be set to different, non-overlapping channels (e.g., 1, 6, and 11 for 2.4 GHz Wi-Fi). Configuring APs with the same channel would cause co-channel interference. BSSIDs are the unique MAC addresses of the access points and cannot be configured to be the same.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Extended Service Set (ESS)?
Why do access points need different, non-overlapping channels?
What happens if all access points in an ESS use the same channel?
A technician needs to create a temporary wireless network for several users to share files directly between their laptops in a meeting room that lacks an access point. Which of the following wireless network types best describes this configuration?
Ad hoc
Mesh
Point-to-point
Infrastructure
Answer Description
An ad hoc network is a decentralized type of wireless network where devices connect to each other directly in a peer-to-peer (P2P) fashion, without the need for a central access point or router. This makes it ideal for temporary setups where no network infrastructure exists. An infrastructure network requires a central access point to manage communications. A mesh network can involve peer-to-peer links but is typically a more complex setup, often used to extend wireless coverage over a larger area. A point-to-point network typically connects exactly two nodes, often over a longer distance, whereas this scenario involves several users in a single room.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an ad hoc network used for?
How is an ad hoc network different from an infrastructure network?
Are there any security concerns with ad hoc networks?
An organization uses a network configured with routers handling multiple subnets. While establishing a route for new data packets, which type of address does the router primarily use to determine the next hop?
Service number
Port number
IP address
MAC address
Answer Description
Routers at the network layer generally use IP addresses to make decisions about packet forwarding, routing them to the next hop based on the routing table. MAC addresses are used in Layer 2 for device identification on the same network segment and not for routing decisions, making them incorrect for this context. Port numbers and service numbers are associated with TCP/UDP in the transport layer and layer 4 services respectively, which are not used for routing decisions at the network layer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why do routers primarily use IP addresses for routing decisions?
What is the difference between a MAC address and an IP address in networking?
What role do routing tables play in determining the next hop for data packets?
A network engineer is configuring a corporate router to support a site-to-site VPN. Which IP protocol should be enabled on the router to securely encapsulate and transport payloads over the public network?
UDP
TCP
IPSec
ICMP
Answer Description
IPSec (Internet Protocol Security) is the correct choice because it is designed to securely encrypt and encapsulate data for secure transport over a public network, which is essential for VPNs. ICMP, used mainly for diagnostic purposes, does not support secure encapsulation. TCP and UDP are core transport protocols and do not inherently provide encryption or encapsulation necessary for VPN security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key features of IPSec?
How does IPSec compare to SSL/TLS in VPNs?
What role does ICMP play in a network?
A DevOps network team is introducing Infrastructure as Code (IaC) to automate switch and firewall deployments across several branch offices. Which technology should they implement first to track every proposed configuration change, maintain a history of revisions, and enable rapid rollbacks when errors are detected?
A high-performance Layer 3 switch to lower network latency
A source control (version-control) system to manage configuration files
A remote power-cycling console to physically manage devices
A next-generation firewall and IDS cluster for added security
Answer Description
Version-control repositories such as Git store each revision of configuration files, record who made the change and when, and support branching, merging, and rollbacks. This collaborative history prevents accidental overwrites and provides an auditable trail-capabilities the other choices do not offer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some popular source control systems, and how are they used in network configuration?
Why is version control critical in collaborative network environments?
How does using source control improve auditing and compliance efforts in network management?
You are a network administrator tasked with updating the network infrastructure at your company. During the audit, you notice outdated cable maps that do not reflect current network layouts. What is the primary reason for updating these cable maps?
To reduce paper consumption and storage costs by eliminating old drawings.
To comply with cabling safety and standards documentation requirements (e.g., ANSI/TIA-568).
To prepare documentation for an upcoming software license audit.
To ensure network documentation reflects the current layout for efficient troubleshooting and maintenance.
Answer Description
Accurate cable maps are crucial for efficient troubleshooting and management of the network. They assist in quick identification of connection points and paths, thereby reducing downtime and simplifying maintenance tasks. Incorrect maps can lead to confusion, increased troubleshooting times, and potential errors during network upgrades or repairs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are accurate cable maps important for troubleshooting?
What happens if cable maps are outdated?
How does updating cable maps impact network maintenance?
After expanding a department in a corporate office, a network administrator is alerted that new users in that department are unable to access network resources. Initial checks reveal that attempts to connect to the network are consistently failing for these users. What should the administrator investigate as the probable cause of this network issue?
Additional wireless access points are needed.
Unused network ports should be deactivated to reduce load.
The DHCP pool might not have sufficient available network addresses.
There is a misconfiguration in network segment settings.
Answer Description
Address pool exhaustion occurs when all the available network addresses in a DHCP pool are currently in use, preventing new devices from obtaining addresses needed for network connection. This issue is typical when network expansion, such as adding a new department, occurs without adjusting DHCP configurations to meet increased demand. Investigating whether the DHCP pool has sufficient available network addresses directly addresses the problem. Adding more access points does not relate directly to the provisioning of network addresses, but instead to wireless coverage. Errors in network segment configuration could potentially lead to connection issues, but these would generally manifest differently than simple failures to access network resources. Deactivating unused network ports would not increase the availability of network addresses that are directly managed by DHCP.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does DHCP work in assigning IP addresses to devices?
What is DHCP pool exhaustion, and how can it be resolved?
What happens if a device is unable to obtain an IP address from DHCP?
Which network monitoring solution is primarily responsible for analyzing the patterns of network traffic to identify trends and potential issues?
Configuration monitoring
Availability monitoring
Traffic analysis
Network discovery
Answer Description
Traffic analysis is the correct answer because it specifically involves the examination and breaking down of network traffic to detect trends, potential security threats, or other issues. This is crucial for proactive network management and optimization. Other options, like configuration monitoring and availability monitoring, focus on different aspects of network performance. Configuration monitoring tracks changes to the network's configuration while availability monitoring ensures that systems are up and running as expected.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does traffic analysis help identify security threats in a network?
What tools are commonly used for traffic analysis in networks?
How does traffic analysis differ from configuration monitoring?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.