CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
Which of the following best describes the primary use of Class E IP addresses?
Reserved for experimental purposes
Allocated for public network devices
Used for broadcast to all hosts
Commonly used for multicast
Answer Description
Class E addresses are reserved for experimental purposes and are not intended for public use. As such, they are generally not routable on the Internet. Understanding this helps in distinguishing these addresses from publicly routable addresses typically used in most network scenarios. Other choices might seem plausible, but they do not correctly represent the specific purpose and typical usage of Class E addresses. Class D is used for multicast, and broadcast addresses are a specific type of address within a subnet, not an entire class.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the ranges of Class E IP addresses?
Why are Class E IP addresses not publicly routable?
How do Class E IP addresses differ from Class D IP addresses?
A network administrator notices that traffic intended for a specific subnet is not being routed through the expected path in a production network. After verifying the physical connectivity and interface status, the administrator decides to examine the routing table of the router. Which command should the administrator use to view the current routing table and verify the routes?
show route
show arp
show interface
show config
Answer Description
The 'show route' command is specifically designed to display the routing table on a router. This command provides detailed information about all routes known to the router, including destination networks, next-hop addresses, and metrics, which is useful for troubleshooting routing issues. The other options, while useful for other diagnostic scenarios, do not provide the routing table information that the administrator needs in this situation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What information does the routing table contain?
How does the 'show route' command help in troubleshooting?
What’s the difference between 'show route' and 'show arp'?
A network administrator is setting up separate network segments for IP phones on an access switch. Which switch setting should be given priority to optimize call quality and overall performance for these voice devices?
Set up link aggregation
Enable 802.1Q tagging
Voice VLAN configuration
Adjust the speed and duplex settings
Answer Description
Configuring a dedicated voice VLAN allows the switch to separate and apply Quality of Service (QoS) policies to voice traffic, reducing latency and jitter that can degrade call quality. While 802.1Q tagging identifies frames that belong to different VLANs, it does not by itself ensure that voice traffic receives higher priority. Link aggregation increases bandwidth and redundancy, and speed/duplex settings affect physical-layer performance, but neither directly provides the traffic prioritization required by real-time voice communications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Voice VLAN, and why is it important for network performance?
How does Quality of Service (QoS) improve call quality in a network?
What is the purpose of 802.1Q tagging, and why is it insufficient alone for prioritizing voice traffic?
Which of the following outcomes best illustrates a sophisticated utilization of log aggregation in network operations?
Routine analysis of single device logs
Automated backing up of configuration files
Monitoring of individual link utilization rates
Correlation of events to identify security incidents
Answer Description
The correlation of events to identify security incidents is a sophisticated utilization of log aggregation. By aggregating logs from various sources, network operators can apply correlation techniques to analyze patterns and interactions across the logs, allowing them to identify potential security threats or operational anomalies that are not apparent when viewing logs in isolation. The incorrect answers, while related to general network management tasks, do not specifically utilize the intrinsic benefits of log aggregation on a sophisticated level.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is log aggregation?
How does event correlation work in log aggregation?
Why is routine analysis of single device logs less effective than log aggregation?
In a certain office, all devices can access shared network drives but are unable to connect to the Internet. Initial checks confirm that addresses and network masks are correctly configured, and name resolution is functioning for internal servers. The system administrator suspects a configuration error related to the gateway settings. Which of the following actions should MOST likely resolve the external connectivity issue?
Reconfigure the naming resolution settings for external servers.
Modify the gateway setting on the router.
Power cycle all network routers and switches.
Ensure all client devices are set with matching network configurations.
Answer Description
When users can reach resources on their own subnet but cannot reach external networks, the default gateway is the most likely point of failure. Correcting the gateway address or route on the router re-establishes the path off-network. Changing DNS affects only name resolution, power-cycling hardware does not fix a bad configuration, and the clients' settings have already been verified.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a default gateway in a network?
How does the default gateway setting affect external connectivity?
Why is fixing the gateway setting more effective than power cycling or changing DNS in this scenario?
Which type of network traffic flow is characterized by the flow of data packets between a server located in a datacenter and a client machine?
North-south
Radial traffic
East-west
Peripheral traffic
Answer Description
North-south traffic flow is the correct answer because it specifically refers to the movements of data between the data center and traditional client applications, typically located outside the data center, such as users' personal devices or company workstations. East-west traffic flow, on the other hand, describes the movements horizontally, such as between servers within a data center which does not fit the scenario of server to client machine described in the question. Peripheral traffic and radial traffic are not recognized types related to specific data flow in network design, and are included to test the knowledge depth.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is east-west traffic in a network?
Why is the distinction between north-south and east-west traffic important in network design?
What technologies or tools are used to manage north-south and east-west traffic flows?
A software development company is creating an application that will secure data transfers between their clients and their main server. Which functionality should be primarily implemented at the OSI model's Presentation Layer to ensure that data confidentiality is achieved?
Encrypting data
Converting media types
Compressing data
Managing session tokens
Answer Description
Encryption is the primary function related to securing data and ensuring confidentiality at the Presentation Layer of the OSI model. This layer is responsible for transforming data into a format that can be properly encrypted before transmission on the network. Compression primarily reduces the size of the data for faster transmission but does not enhance security. Media conversion does not relate directly to security; it pertains more to compatibility between different types of data formats. Session management occurs at the Session Layer (Layer 5), not the Presentation Layer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the responsibility of the Presentation Layer in the OSI model?
How does encryption ensure data confidentiality?
What is the difference between encryption and compression at the Presentation Layer?
In a network-troubleshooting scenario, a network administrator needs to verify that the server's TCP/IP stack is operational without sending any traffic onto the physical network or involving the NIC hardware. Which IP address should the administrator use to perform this test?
10.0.0.1
169.254.0.1
127.0.0.1
192.168.1.1
Answer Description
The IPv4 loopback address, 127.0.0.1, routes packets back to the host itself. Pinging this address confirms that the local TCP/IP stack is installed and functioning, but it does not traverse the physical network interface card. Using other private, APIPA, or gateway-style addresses (192.168.1.1, 10.0.0.1, 169.254.0.1) would place traffic on the actual network segment, defeating the purpose of an internal stack test.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the loopback address 127.0.0.1?
What is the difference between a loopback address and an APIPA address?
Why wouldn't addresses like 192.168.1.1 or 10.0.0.1 work for testing the TCP/IP stack?
A network technician is troubleshooting an application that is experiencing glitches and dropouts. What is the most direct symptom of network packet loss?
Implementation of new encryption protocols
Intermittent data transmission errors
Increased network latency
Enhanced bandwidth utilization
Answer Description
Packet loss fundamentally means that data packets fail to reach their destination, resulting in incomplete data transmission. This is directly observed as intermittent errors, such as glitches in video or audio streams. While packet loss can cause increased latency, the latency is a secondary effect resulting from the time it takes for a protocol like TCP to retransmit the lost packets. Enhanced bandwidth utilization is incorrect; in fact, retransmissions caused by packet loss consume more bandwidth, leading to inefficient use. Encryption protocols are related to data security, not the physical delivery of packets.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What causes network packet loss?
How does TCP handle packet loss?
How can you detect and measure packet loss on a network?
Which type of server should be queried to obtain the most reliable and up-to-date information about the IP address associated with a specific domain name?
Recursive server
Internet service provider
Non-authoritative server
Authoritative server
Answer Description
An authoritative server provides the most reliable and up-to-date information because it is responsible for storing the original and definitive records of a domain within a specific zone. Since these servers directly manage the data concerning their respective zones, the information provided is current and unaltered by external caches. Non-authoritative (cache-only) servers, on the other hand, store copies of information that might be outdated or incomplete depending on the timing and frequency of their updates.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an authoritative server?
What is the difference between authoritative and non-authoritative DNS servers?
How does a recursive server interact with an authoritative DNS server?
A network administrator needs to configure a secure connection that allows individual employees working from home to access the corporate network over the internet. Which VPN configuration is most appropriate for this scenario?
Full tunnel
Split tunnel
Client-to-site
Site-to-site
Answer Description
A Client-to-site configuration allows individual users to connect securely from distant locations to their organization's network, providing an encrypted tunnel over public connections. Site-to-site configurations connect entire networks across different locations, differing from the personal connection setup required by remote employees. Full tunnel and Split tunnel refer to how traffic is handled through these connections but do not specify the type of network connection arrangement between a single client and a network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Client-to-Site VPN?
How does a Site-to-Site VPN differ from a Client-to-Site VPN?
What is the difference between Full Tunnel and Split Tunnel VPN configurations?
A network security team wants to study the tactics, techniques, and procedures (TTPs) of attackers targeting their organization. They need to create a controlled environment that mimics their production network to attract and analyze malicious activity without risking real assets. Which of the following should they implement to achieve this goal?
Honeynet
Screened subnet
Intrusion prevention system (IPS)
Virtual private network (VPN)
Answer Description
The correct answer is a honeynet. A honeynet is a decoy network of systems and services designed to attract and trap attackers, allowing security professionals to study their behavior and gather intelligence in a safe, controlled environment. An intrusion prevention system (IPS) is designed to actively block malicious traffic, not to study it. A screened subnet (or DMZ) is a perimeter network that isolates and exposes an organization's external-facing services to an untrusted network; it is an architectural concept, not a deception tool for analysis. A virtual private network (VPN) is used to create a secure, encrypted connection over a less secure network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the primary purpose of a honeynet?
How is a honeynet different from an Intrusion Prevention System (IPS)?
What is the difference between a honeynet and a screened subnet (DMZ)?
Which statement BEST describes how a directional antenna differs from an omnidirectional antenna in a Wi-Fi deployment?
It is intended mainly for mobile client devices that change orientation frequently.
It radiates RF energy equally in every horizontal direction, providing wide coverage but limited range.
It concentrates RF energy into a narrow beam, extending range in that direction and limiting interference from other directions.
It always requires higher transmitter power because antenna gain is lower than that of an omnidirectional antenna.
Answer Description
A directional antenna focuses radio-frequency energy into a narrower beam (higher gain), so more of the transmitted power is delivered in the desired direction. This increases usable range and helps reduce the impact of interference coming from, or leaking to, other directions. An omnidirectional antenna spreads its energy in all horizontal directions (roughly 360 °), providing broad area coverage but at a lower gain per direction.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is antenna gain, and how does it relate to directional and omnidirectional antennas?
What are common scenarios where directional antennas are used in Wi-Fi networks?
How does interference reduction work with directional antennas compared to omnidirectional antennas?
A network administrator observes intermittent connectivity losses and resource access failures in two devices on the same LAN. After initial checks, the hypothesis of conflicting network configurations arises. What should the administrator do next to identify and rectify the issue?
Reboot the network's main router to reset the connections
Switch out the connecting cables for the devices experiencing issues
Review DHCP server logs and settings on the devices for address assignments
Extend the DHCP lease time to decrease the frequency of address renewals
Answer Description
The appropriate step when suspecting conflicting network address configurations is to check for entries in the DHCP server logs and inspect the settings on the devices involved. This allows the administrator to pinpoint the source of the conflict accurately. Options like restarting networking equipment or altering physical connections might seem plausible but don't address the core issue identified, which is related to address assignments and requires specific targeting.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a DHCP server and how does it manage IP address assignments?
What are common causes of IP address conflicts in a LAN?
How do DHCP logs help identify connectivity issues in a network?
A user named Sarah has reported that her ability to access the corporate website fluctuates throughout the working day, with periods during which the website becomes inaccessible. What question should you prioritize to effectively gather initial relevant information and identify potential patterns or causes?
Ask directly about any recent changes to her computer system or network settings to correlate the issue to changes in configuration.
Query whether any of her colleagues are facing similar issues, focusing on possible common variables across users.
Inquire if the issue happens at specific times and if it's restricted to the corporate site or also affects other websites.
Suggest checking Sarah's computer for potential malware or viruses that might be affecting her connectivity.
Answer Description
Asking about the specific times when the issue occurs and whether it pertains specifically to the corporate website or other sites as well sheds light on whether the issue is isolated to a particular domain, potentially indicating a server or hosting issue, or if it's a broader connectivity or network problem. This helps distinguish between local and network-wide issues. Although other questions are relevant in the troubleshooting process, pinpointing the issue's frequency, timing, and scope from the start is most effective for forming an accurate initial assessment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to know if the issue happens at specific times?
How does identifying if the problem is specific to one website narrow down potential causes?
What are some key follow-ups if the problem is confirmed to be related only to the corporate website?
When a computer configured to obtain an IP address automatically is unable to reach a Dynamic Host Configuration Protocol (DHCP) server, which IP address range will it most likely assign to itself?
127.0.0.1 to 127.255.255.254
192.168.0.1 to 192.168.255.254
255.255.255.0 network subnet mask
169.254.0.1 to 169.254.255.254
Answer Description
Automatic Private IP Addressing (APIPA) allows a computer to assign itself an IP address in the absence of a DHCP server. This functionality, defined in RFC 3927 as link-local addressing, uses a designated range of addresses from 169.254.0.1 through 169.254.255.254. The computer randomly chooses an IP address within this range, allowing for basic communication with other devices on the same local network. This is intended as a temporary solution until a DHCP server can be reached. The 192.168.x.x range is a private IP address space defined by RFC 1918, commonly used in local networks. The 127.0.0.0/8 range (e.g., 127.0.0.1) is reserved for loopback addresses, which are used for network software testing on the local machine. The final option is a subnet mask, not an IP address range; it is used with an IP address to define the network and host portions of the address.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is APIPA and why is it used?
What is the difference between APIPA and DHCP?
What happens if two devices assign themselves the same APIPA address?
A company is transitioning to a hybrid cloud model and needs to ensure continuous, secure connectivity between their on-premises data center and their virtual private cloud (VPC). Which type of cloud gateway would be most appropriate for this scenario?
Internet Gateway
VPN Gateway
Network Security Group
NAT Gateway
Answer Description
A VPN Gateway is the correct choice because it creates a secure network connection over the internet that enables safe communication between the on-premises data center and the VPC. This gateway uses tunneling and encryption to ensure data security and integrity. Internet gateways are not appropriate as they mainly facilitate outbound and inbound access to the internet rather than secure, site-to-site connections. NAT gateways are mostly used for mapping local private IP addresses to a public address before transferring the information to the internet, which is not directly relevant to creating secure channels for hybrid connectivity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VPN Gateway, and how does it work?
What is the difference between a VPN Gateway and an Internet Gateway?
Why is a NAT Gateway not suitable for hybrid cloud connectivity?
Which of the following is the BEST method to secure remote server management sessions?
Disable root logins
Disable unused services on the server
Configure the network firewall to restrict incoming management traffic
Use key-based authentication instead of passwords
Answer Description
Using key-based authentication instead of passwords is a best practice for securing remote administration sessions because it provides stronger security than password-based authentication. This method relies on cryptographic keys, which are significantly more resistant to brute-force attacks than passwords. While the other options are valid security measures, they are not the BEST method for securing the session's authentication process. Disabling unused services on the server reduces the overall attack surface but does not directly secure the authentication of the management session. Configuring a network firewall to restrict incoming traffic is a critical network-level control that limits who can attempt to connect, but it does not enhance the security of the authentication process itself. Similarly, disabling root logins is an important hardening step to prevent direct attacks on the most privileged account, but it does not strengthen the authentication method used by other administrative accounts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does key-based authentication work?
Why is key-based authentication considered better than passwords?
What is the difference between disabling unused services on a server and securing remote sessions?
A network technician is learning about the components of a new enterprise-grade router. What is the primary purpose of the firmware within this device?
To store user-configured settings like IP addresses and firewall rules
To provide the necessary operational instructions for the hardware
To increase the physical durability and lifespan of the device
To enhance the device's connectivity speed with external networks
Answer Description
Firmware is embedded software within a hardware device that provides the essential instructions for how the device communicates with other hardware or performs its basic functions. It is critical for the operation of network devices like routers, switches, and access points. While user configurations are also stored on the device, firmware is the underlying program that allows the hardware to boot up and operate. Firmware updates can add new features and address security vulnerabilities, illustrating its crucial role in network operations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is firmware and why is it important?
How does firmware differ from user-configured settings on a router?
What happens during a firmware update on a router?
A telecommunications provider wants to upgrade its core network infrastructure to improve scalability and reduce operational expenses associated with physical network devices. The solution should enable dynamic management of network services such as VPNs and intrusion prevention systems. Which technology would best fulfill these requirements?
Internet Protocol Security (IPSec)
Network Functions Virtualization (NFV)
Software-defined Networking (SDN)
Multiprotocol Label Switching (MPLS)
Answer Description
Network Functions Virtualization (NFV) is the correct answer because it provides the ability to manage network functions like VPNs and intrusion prevention systems as virtual services rather than through physical hardware. This technology directly addresses the need for scalability and reduction in operational expenses by allowing for the dynamic deployment and management of virtual network services. While SDN facilitates centralized management and efficiency, and MPLS optimizes data flow across the network, neither provides the functionality to virtualize network services in the manner that NFV does.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is Network Functions Virtualization (NFV)?
How does NFV differ from Software-Defined Networking (SDN)?
What are the key benefits of using NFV in a modern network infrastructure?
Nice!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.