CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
A company is transitioning to a hybrid cloud model and needs to ensure continuous, secure connectivity between their on-premises data center and their virtual private cloud (VPC). Which type of cloud gateway would be most appropriate for this scenario?
Internet Gateway
NAT Gateway
Network Security Group
VPN Gateway
Answer Description
A VPN Gateway is the correct choice because it creates a secure network connection over the internet that enables safe communication between the on-premises data center and the VPC. This gateway uses tunneling and encryption to ensure data security and integrity. Internet gateways are not appropriate as they mainly facilitate outbound and inbound access to the internet rather than secure, site-to-site connections. NAT gateways are mostly used for mapping local private IP addresses to a public address before transferring the information to the internet, which is not directly relevant to creating secure channels for hybrid connectivity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VPN Gateway and how does it work?
What are the benefits of using a VPN Gateway over an Internet Gateway?
What are tunneling and encryption in the context of a VPN Gateway?
A network issue has been reported where two computers in the same segment cannot communicate, despite having what appears to be properly configured addresses. Investigation reveals a discrepancy: one machine uses a mask of 255.255.255.0, while the other employs a mask of 255.255.254.0. What is the MOST likely resolution to allow seamless communication between these devices?
Divide the network into smaller, distinct segments with new masks
Standardize the network mask on both computers to 255.255.255.0
Replace the network interfaces of both computers
Adjust the network address of the second machine to match the mask setting of the first
Answer Description
The communication problem stems from the use of differing network masks which logically places the devices on different subnets, despite being physically on the same network segment. Aligning both devices to the same network mask resolves this discrepancy by placing them on the same logical network, thereby facilitating direct communication. Modifying individual addresses or segmenting the network further does not confront the root cause, which is the mismatch in network masks. Changing network cables is unrelated to an issue caused by subnet configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a subnet mask and why is it important?
How do I configure the subnet mask on a machine?
What issues can arise from using different subnet masks?
Which characteristic is true for the 5GHz wireless frequency band compared to the 2.4GHz band?
It penetrates solid objects as well as the 2.4GHz frequency band.
It has a longer range than the 2.4GHz frequency band.
It supports faster data transmission speeds.
It is more impacted by interference from microwave ovens.
Answer Description
The 5GHz band tends to support faster data rates and has more channels available, which reduces interference and improves overall network performance compared to the 2.4GHz band. The incorrect answers refer to incorrect or exaggerated characteristics of the 5GHz band.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does the 5GHz band support faster data transmission speeds than the 2.4GHz band?
What are the advantages of the increased channels in 5GHz compared to 2.4GHz?
What types of devices typically use the 2.4GHz band instead of the 5GHz band?
During an audit of your network management practices, it is evident that multiple network configurations have been applied without proper documentation or version control. What immediate action should be recommended to ensure consistent deployment and easy rollback capabilities in the future?
Manually document changes in a shared spreadsheet at regular intervals.
Perform periodic backups of configurations without versioning.
Establish a protocol for manual version control tagging before any configuration change.
Automate the synchronization of network configurations to the central repository with detailed logging and version control.
Answer Description
Implementing automated synchronization between the live network configurations and the central repository ensures all changes are documented and versioned. This practice not only provides a history of changes for auditing purposes but also allows for quick rollbacks to previous configurations if necessary. Manual versioning is prone to human error and inconsistency, while periodic documentation can cause delays and lack real-time updates.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is automated synchronization of network configurations?
What role does version control play in network management?
What tools can be used for automated configuration management?
A manufacturing company utilizes an integrated system to monitor and control their factory operations. Recently, they have been concerned about potential cybersecurity threats that could disrupt production. As part of enhancing their network security, which of the following actions would be MOST effective in protecting their operational systems?
Implement network segmentation to isolate the critical industrial systems from the corporate IT network.
Regularly update all computer and network devices with the latest software patches.
Secure wireless signals by switching to WEP security protocol for all connections.
Change default passwords on all network connected devices within the factory.
Answer Description
Implementing network segmentation isolates critical industrial systems from the corporate IT network, significantly reducing the risk of unauthorized access or malware spreading from less secure networks. Although changing default passwords and securing wireless signals are important security measures, they do not directly address the heightened risks associated with interconnected industrial environments. Regular software updates are crucial but would not be the sole or most effective strategy for securing industrial control systems where system stability and compatibility are critical, and updates must be carefully managed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network segmentation and why is it important for cybersecurity?
How do default passwords pose a risk in a manufacturing setting?
Why is it necessary to regularly update software and what challenges might it present in operational systems?
Which of the following is the BEST description of a network that uses a collapsed core design?
A network where the distribution layer devices connect directly to each other without a core layer.
A network that integrates the core and distribution layers to optimize performance and reduce infrastructure complexity.
A network architecture where each device is directly connected to a central hub, without hierarchical design.
A network with distinct core, distribution, and access layers to manage traffic between office locations.
Answer Description
A collapsed core design combines the functionality of both the core and distribution layers into a single layer. This model is advantageous in smaller networks due to reduced hardware needs and simplified management. While all of the other answers describe possible configurations in a network, they either describe other types of networks, mix up hierarchical layers, or add elements not specific to collapsed core networks, such as direct connections from devices to a centralized hub.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the core and distribution layers in networking?
What are the advantages of using a collapsed core design?
What types of networks typically use a collapsed core design?
What is the primary purpose of using the ping
command in network troubleshooting?
To physically map out the network infrastructure
To determine the speed of the network connection
To automatically resolve any detected network connectivity issues
To test the reachability of a host on an IP network and measure the round-trip time for messages sent
Answer Description
The primary purpose of the ping
command is to test the reachability of a host on an IP network and measure the round-trip time for messages sent from the originating host to a destination computer. This is crucial for initially diagnosing connectivity issues. Answers involving speed testing or direct problem resolution are incorrect because ping
does not measure network speed in terms of throughput and cannot resolve the problems itself; it merely checks connectivity and latency.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does the `ping` command actually work?
What are some common uses of the `ping` command in troubleshooting?
What are the limitations of using the `ping` command?
A multinational organization wants to ensure its network security policies and data handling practices are correctly aligned with the necessary legal requirements. Which regulatory standard is specifically targeted at protecting cardholder data during processing and storage?
Data locality
General Data Protection Regulation (GDPR)
Payment Card Industry Data Security Standards (PCI DSS)
Answer Description
PCI DSS (Payment Card Industry Data Security Standards) is specifically designed to protect cardholder data during processing and storage. This standard applies to all entities involved in payment card processing, including merchants, processors, acquirers, issuers, and service providers. GDPR focuses on the protection of personal information of individuals within the European Union, making it too broad for this particular context. Data locality emphasizes the localization of stored data for regulatory reasons, which is not directly related to payment data protection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specific requirements does PCI DSS have for organizations handling cardholder data?
How does PCI DSS differ from GDPR in terms of focus and application?
What are the penalties for non-compliance with PCI DSS?
Which type of disaster recovery site provides only the basic facility infrastructure-such as building space, power, cooling, and network cabling-but has no pre-installed IT hardware, applications, or real-time data replication, resulting in the longest recovery time when activated after a disaster?
Cloud-based DR site
Warm site
Hot site
Cold site
Answer Description
The correct answer is Cold site. A cold site supplies an empty but prepared facility with essential utilities (power, HVAC, cabling) where an organization can bring in its own equipment after a disaster. Because no servers, applications, or synchronized data are ready beforehand, significant time is required to install hardware, restore backups, and resume normal operations. Hot sites and warm sites already contain at least some operational hardware and more current data, enabling faster recovery, while cloud-based DR solutions typically host virtualized resources that can be brought online more quickly than a cold site.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are hot sites and warm sites?
What does real-time data mirroring involve?
Why is a cold site considered the most basic form of backup?
During a network upgrade, a technician uses a cable tester to verify the new cabling installations. The tester identifies several failures. What type of issues CANNOT be directly detected using a standard cable tester?
Improper cable termination
Short circuits
Signal attenuation
Crossed wires
Answer Description
While a cable tester can effectively detect electrical problems, such as discontinuities, shorts, or miswirings (crossed or reversed wires), it cannot directly determine signal degradation issues like attenuation or interference. These types of problems require more advanced analysis typically provided by a network analyzer, which can measure the quality of signal transmission and identify disturbances or signal loss over a network cable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is signal attenuation and why is it important?
What is the difference between a cable tester and a network analyzer?
What types of cable issues can a standard cable tester identify?
When troubleshooting a network issue, a technician decides to employ a bottom-to-top approach using the OSI model. From which OSI layer would they begin their troubleshooting process?
Transport layer
Application layer
Physical layer
Network layer
Answer Description
When applying the bottom-to-top (bottom-up) approach in the OSI model, the technician starts at the Physical layer. This layer encompasses the network's tangible components-cables, connectors, and hardware interfaces-making it the first place to check for link lights, proper terminations, or damaged media before examining higher-layer configurations and protocols.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the OSI model?
What does the Physical layer include?
Why is the bottom-to-top approach effective in troubleshooting?
During disaster-recovery testing, which method is characterized by stakeholders gathering in a meeting (or virtual) room to walk through a simulated scenario strictly as a discussion, without performing any physical system failover or recovery operations?
Full-scale simulation test
Tabletop exercise
Active-passive switchover drill
Hot site failover test
Answer Description
A tabletop exercise is a discussion-based walkthrough that validates roles, communication paths, and documented procedures. Because no production systems are taken offline and no resources are actually failed over, it carries minimal risk and cost. In contrast, hot-site failover tests, full-scale simulations, and active-passive switchover drills all require some level of live system recovery or redirection of services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some other types of disaster recovery testing methods?
What are the key benefits of conducting tabletop exercises?
How frequently should organizations conduct tabletop exercises?
A network administrator observes intermittent connectivity losses and resource access failures in two devices on the same LAN. After initial checks, the hypothesis of conflicting network configurations arises. What should the administrator do next to identify and rectify the issue?
Reboot the network's main router to reset the connections
Switch out the connecting cables for the devices experiencing issues
Review DHCP server logs and settings on the devices for address assignments
Extend the DHCP lease time to decrease the frequency of address renewals
Answer Description
The appropriate step when suspecting conflicting network address configurations is to check for entries in the DHCP server logs and inspect the settings on the devices involved. This allows the administrator to pinpoint the source of the conflict accurately. Options like restarting networking equipment or altering physical connections might seem plausible but don't address the core issue identified, which is related to address assignments and requires specific targeting.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are DHCP server logs and why are they important?
What could cause IP address conflicts on a local area network (LAN)?
What is the significance of checking device settings during troubleshooting?
Which form of authentication provides the highest level of security by requiring multiple types of evidence before granting access to a network resource?
MFA
SSO
RADIUS
TACACS+
Answer Description
Multifactor authentication (MFA) offers the highest level of security among the options given as it requires two or more independent credentials for user verification. This approach combines something the user knows (like a password), something the user has (such as a security token), and something the user is (like a fingerprint) to ensure a higher degree of user identity verification compared to methods that utilize only a single factor.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of factors used in MFA?
How does MFA improve security compared to traditional authentication methods?
Are there any downsides to using MFA?
A network administrator has deployed PoE to power VoIP phones across an office, but several of the phones are not powering up despite being compatible with the technology. The switch is PoE-enabled, and cables are all Cat 6. The administrator suspects that the issue may be related to a power standard mismatch. What is the most likely cause of the problem?
The switch's total PoE power budget has been exceeded.
The Cat 6 cables are not rated for the required PoE standard.
There is a firmware incompatibility between the VoIP phones and the PoE switch.
The VoIP phones and the switch are operating on incompatible PoE standards (e.g., 802.3af vs. 802.3at).
Answer Description
The correct answer is that the switch and VoIP phones are using different PoE standards (e.g., IEEE 802.3af vs. 802.3at). The 802.3af (PoE) standard provides up to 15.4W of power from the power sourcing equipment (PSE), while the 802.3at (PoE+) standard provides up to 30W from the PSE, allowing for up to 25.5W at the powered device (PD). If the VoIP phones require more power than the switch's ports can provide according to the 802.3af standard, they will fail to power on. Ensuring both the PSE and PD support the same or a compatible PoE standard is essential for proper operation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the PoE standards and how do they differ?
What does Cat 6 mean in networking?
What is a power sourcing equipment (PSE) and powered device (PD) in PoE?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.