CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
When configuring a point-to-point wireless bridge between two buildings, which of the following is the BEST choice to maximize stable connectivity?
Use an omnidirectional antenna
Use a directional antenna
Deploy an autonomous access point
Use a high-gain antenna without specifying directional or omnidirectional
Answer Description
Choosing a directional antenna for a point-to-point setup is ideal because it focuses the signal between two specific points, which enhances the signal strength and reduces interference compared to an omnidirectional antenna which spreads the signal in all directions. Omnidirectional antennas, despite their usability in different scenarios, are not optimal for long, specific links as they do not focus the signal. High-gain antennas without specifying directional or omnidirectional criteria might seem suitable, but the key is the directionality which maximizes the strength and focus of the signal. Finally, an autonomous access point is a solution for network management and flexibility but does not inherently address the directional strength needed in a point-to-point connection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are directional antennas and how do they work?
What is the difference between directional and omnidirectional antennas?
What is a high-gain antenna, and why might its effectiveness depend on directionality?
Which of the following best describes the concept of configuration drift in network management?
A strategy to periodically update network devices to the latest firmware versions
The backup and storage of configuration settings at regular intervals
The unintended changes to system configurations over time that result in divergence from initial settings
The manual process of aligning system configurations with compliance requirements
Answer Description
Configuration drift occurs when the actual configuration state of a device or system deviates from the desired or documented state-often because of manual, out-of-band, or incomplete changes. This divergence can introduce inconsistencies, reduce reliability, and create security or compliance risks. Effective IaC and automation practices continuously detect and remediate drift to keep infrastructure aligned with its intended configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the common causes of configuration drift?
How can automated management tools help prevent configuration drift?
Why is configuration drift especially concerning for network security?
What is the primary purpose of SNMP in network management?
Authenticate users accessing the network
Assign IP addresses to devices on a network
Collect and manipulate network device management information
Encrypt data traffic on a network
Answer Description
SNMP is used for collecting information about managed devices on IP networks and for modifying that information to change device behavior. It facilitates monitoring and management of network devices such as routers, switches, servers, printers, and other devices capable of network connectivity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does SNMP stand for and what are its main components?
How does SNMP help in monitoring network performance?
Can SNMP be used for security management in networks?
A company wants to place an appliance at the edge of its network that will inspect every inbound and outbound packet and automatically block traffic that violates the organization's security policies. Which device BEST meets this requirement?
Firewall
Load balancer
Proxy server
Intrusion detection system (IDS)
Answer Description
A firewall operates inline at the network perimeter and enforces rule-based filtering, blocking any packet that does not comply with the defined policy. An intrusion detection system (IDS) only monitors traffic and raises alerts; it cannot actively stop packets. A proxy primarily intermediates application-layer requests and may provide caching or content filtering but does not serve as the main packet-filtering gatekeeper for all protocols. A load balancer spreads connections across multiple servers to improve performance and availability rather than providing security enforcement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main functions of a firewall?
What is the difference between a firewall and a router?
What are packet inspection and its significance in firewalls?
Which of the following accurately describes a network intrusion detection system (IDS) when compared with an intrusion prevention system (IPS)?
An IDS can replace a firewall because it performs stateful packet inspection and enforces access-control lists, unlike an IPS.
An IDS blocks malicious traffic in real time, whereas an IPS only logs the activity for administrators.
An IDS and an IPS both operate inline and both can automatically block malicious traffic.
An IDS operates out of band, generates alerts, and does not block traffic, whereas an IPS sits inline and can automatically drop malicious packets.
Answer Description
An IDS is typically positioned out of band to passively monitor network traffic. It analyzes traffic copies and sends alerts when suspicious activity is detected but does not actively block packets. An IPS, by contrast, is placed inline and can automatically take preventive actions-such as dropping or rejecting malicious packets-to stop the threat in real time. Therefore, the only statement that correctly distinguishes these roles is the option describing an IDS as passive (alert-only) and an IPS as active (blocking).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main function of an Intrusion Detection System (IDS)?
How does an Intrusion Prevention System (IPS) differ from an IDS?
What are some examples of how an IPS can mitigate threats?
A network administrator notices that a switch port, which connects to a server, is no longer active and upon checking, finds that the port has been put into an 'error disabled' state. What is the MOST likely cause for this state?
There was an incorrect cable type used between the server and the switch.
The switch experienced a temperature anomaly exceeding operational thresholds.
The DHCP server has run out of IP addresses to assign to clients.
The port security settings have been violated, such as exceeding the maximum number of allowed MAC addresses.
Answer Description
The correct reason why the port would go into an 'error disabled' state in this scenario is usually due to a violation of port security settings, such as exceeding the maximum allowed MAC addresses. Port security limits the number of valid MAC addresses allowed on a port to prevent unauthorized access. If this number is exceeded, the default action for many switches is to disable the port to prevent possible security breaches. Incorrect cable types or DHCP exhaustion typically do not directly cause ports to be error disabled, and temperature anomalies are more related to hardware malfunctions rather than configurations that trigger port security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is port security in networking?
What does 'error disabled' state mean?
How do I configure port security on a switch?
Which term best describes the principle aimed at ensuring data is not altered or tampered with?
Integrity
Authentication
Availability
Confidentiality
Answer Description
The term 'Integrity' is part of the Confidentiality, Integrity, and Availability (CIA) triad and specifically refers to the assurance that data is not altered or tampered with in an unauthorized manner. It ensures that information is trustworthy and accurate. 'Confidentiality' focuses on limiting access to information to authorized persons. 'Availability' pertains to ensuring that authorized users have reliable access to information when needed. Although 'Authentication' is critical for security, it primarily deals with verifying the identity of a user or device.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the CIA triad?
How is data integrity maintained in a network?
Can you explain the importance of authentication in the context of data integrity?
A network technician is tasked with deploying a new application across the company's network. The application requires specific network settings on all machines for optimal performance. Which document should the technician update first before making such a change to ensure consistent network performance across all devices?
Revise the Rack diagram
Edit the Service-level agreement (SLA)
Update the Production configuration
Modify the Asset inventory
Answer Description
Before implementing a network-wide change such as deploying a new application with specific network requirements, it is vital to update the Production configuration. This serves as the reference point for all operational settings within the network, ensuring any new changes are accurately reflected across the system. Updating the Production configuration ensures consistency and helps in troubleshooting or reverting changes if needed. Updating the Asset inventory, while important for tracking resources, does not directly influence network settings. A Rack diagram is useful for physical arrangements but not for network settings. A Service-level agreement (SLA) outlines the expected quality of service between two parties and is also not directly used for implementing network setting changes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Production configuration and why is it important?
What processes should be followed when updating the Production configuration?
What are the roles of the other documents mentioned (Rack diagram, Asset inventory, SLA)?
During disaster-recovery testing, which method is characterized by stakeholders gathering in a meeting (or virtual) room to walk through a simulated scenario strictly as a discussion, without performing any physical system failover or recovery operations?
Hot site failover test
Active-passive switchover drill
Full-scale simulation test
Tabletop exercise
Answer Description
A tabletop exercise is a discussion-based walkthrough that validates roles, communication paths, and documented procedures. Because no production systems are taken offline and no resources are actually failed over, it carries minimal risk and cost. In contrast, hot-site failover tests, full-scale simulations, and active-passive switchover drills all require some level of live system recovery or redirection of services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some other types of disaster recovery testing methods?
What are the key benefits of conducting tabletop exercises?
How frequently should organizations conduct tabletop exercises?
Which security property is primarily provided when data is encrypted as it traverses an untrusted network such as the internet?
Integrity - it ensures packets cannot be altered in transit.
Confidentiality - intercepted data remains unreadable without the decryption key.
Availability - it prevents attackers from delaying or blocking the data.
Non-repudiation - it proves the sender cannot deny sending the data.
Answer Description
Encrypting data in transit converts readable plaintext into ciphertext. Anyone who captures the traffic will see only encrypted data, which is unintelligible without the correct decryption key. Thus, encryption safeguards the confidentiality of the information. By itself, encryption does not guarantee availability, non-repudiation, or full integrity-additional mechanisms such as MACs or digital signatures are required for those properties.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are common encryption methods used for data transmission?
What is the role of encryption keys in data transmission?
How does data encryption protect against unauthorized access?
Which of the following is the best description of how Anycast operates within a network?
Anycast uses one IP address to direct a packet randomly to any one of multiple devices
Anycast allows multiple devices to share the same IP address, with routers directing client requests to the nearest device
Anycast sends a packet to all devices within a broadcast domain
Anycast restricts an IP address to a single device, ensuring direct routing
Answer Description
Anycast addresses are used by routers to enable requests from clients to be sent to the nearest server using the same IP address. This is particularly useful for load balancing and optimizing response times in networks. The other options describe either different IP addressing types or incorrect interpretations of Anycast.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of Anycast in a network?
How does Anycast differ from Unicast and Multicast?
What are the advantages of using Anycast for DNS servers?
Which of the following is the most effective initial step when gathering information to troubleshoot a reported network issue?
Questioning users to gain a direct understanding of the issue as experienced firsthand
Attempting to duplicate the problem based on generic descriptions
Reviewing recent changes made to the network configuration
Checking system logs for any recent warnings or errors
Answer Description
Questioning users is often the most effective initial step in gathering information for troubleshooting. It allows the troubleshooter to obtain first-hand accounts of the issue, understand the context, and gather clues about what might be causing the problem. While checking logs, reviewing recent changes, and duplicating the issue are important, they typically follow preliminary inputs from the users experiencing the issue.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is questioning users the most effective initial step in troubleshooting?
What specific questions should be asked to users during troubleshooting?
How do other troubleshooting methods compare to questioning users?
A university campus with multiple buildings has received numerous complaints from students about dropped video calls and intermittent connectivity issues on their devices as they move between lecture halls. The network administrator suspects problems in the wireless network settings associated with client roaming. What is the most effective adjustment that can address these roaming issues and enhance connectivity stability?
Modify the RSSI threshold settings
Adjust the Quality of Service (QoS) configurations
Increase the transmit power on all access points
Optimize the SCTP settings on the network controllers
Answer Description
Fine-tuning the RSSI (Received Signal Strength Indicator) threshold can significantly enhance the roaming experience by determining the sensitivity of when a device should switch to a stronger signal access point, thus maintaining steadier connectivity. Adjusting transmit power primarily affects the range and strength of the signal emitted by access points but does not directly optimize how devices roam between them. Although SCTP optimization might appear related to performance, it mainly deals with transport protocols for session initiation tasks rather than wireless roaming. Lastly, tweaking QoS settings is generally geared towards prioritizing traffic types over the network and would not specifically resolve roaming transitions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is RSSI and how does it affect wireless connections?
What are access points and how do they support client roaming?
Why is Quality of Service (QoS) important in a wireless network?
A network administrator is setting up separate network segments for IP phones on an access switch. Which switch setting should be given priority to optimize call quality and overall performance for these voice devices?
Adjust the speed and duplex settings
Set up link aggregation
Voice VLAN configuration
Enable 802.1Q tagging
Answer Description
Configuring a dedicated voice VLAN allows the switch to separate and apply Quality of Service (QoS) policies to voice traffic, reducing latency and jitter that can degrade call quality. While 802.1Q tagging identifies frames that belong to different VLANs, it does not by itself ensure that voice traffic receives higher priority. Link aggregation increases bandwidth and redundancy, and speed/duplex settings affect physical-layer performance, but neither directly provides the traffic prioritization required by real-time voice communications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Voice VLAN and how does it work?
Why is reducing latency important for voice communication devices?
What are some other benefits of configuring a Voice VLAN beyond just prioritization?
A network administrator notices that the quality of a video conferencing signal decreases significantly during peak usage hours. What is the MOST likely cause of this signal degradation?
Congestion/contention
Interference from external sources
Using an incorrect cable type for the connection
Insufficient wireless coverage in the area
Answer Description
The most likely cause of the signal degradation during peak usage hours is congestion/contention, which leads to increased packet loss and delays as multiple devices attempt to use the same network resources simultaneously. Interference, while a common cause of signal issues, typically relates to wireless signals and environmental factors, not tied directly to network usage patterns. Insufficient wireless coverage usually presents as a consistently poor signal, not one that worsens specifically during high traffic periods. Incorrect cable type would not typically result in a degradation that varies with time; issues would be constant.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network congestion and how does it affect communication?
What are some strategies to alleviate network congestion?
What is packet loss and how does it impact applications like video conferencing?
Nice!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.