CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
Which of the following best describes the data unit used at Layer 2 of the OSI model?
Frame
Bit
Packet
Segment
Answer Description
The correct answer is 'Frame', as Layer 2 of the OSI model, also known as the Data Link Layer, processes data in units called frames. A frame encapsulates packets with a header and a trailer to facilitate node-to-node communication across the physical layer. Ethernet frames are the most common type of Layer 2 frames, which include headers containing MAC addresses. The other answers, while related to networking, represent data units or terminologies used at different OSI model layers or different contexts, none of which pertain to the primary function of Layer 2.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the OSI model and why is it important?
What is encapsulation in networking and how does it work?
What are MAC addresses and how do they relate to frames?
Which encryption protocol provides the most robust protection for sensitive data while it is being transmitted across the Internet?
Internet Protocol Security (IPsec)
Transport Layer Security (TLS)
HyperText Transfer Protocol Secure (HTTPS)
Secure Shell (SSH)
Answer Description
Transport Layer Security (TLS) establishes an encrypted channel that ensures confidentiality, integrity, and authentication for application traffic. It underpins HTTPS, SMTPS, FTPS, and many other Internet services, making it the de-facto standard for end-to-end protection of data in transit. IPsec also offers strong encryption but functions at the network layer and is most often deployed for site-to-site or remote-access VPN tunnels rather than securing individual application sessions. SSH encrypts traffic too, yet its primary purpose is secure remote administration and file transfer, not general web or email traffic. HTTPS is simply HTTP carried inside TLS; the underlying encryption protocol is still TLS, so selecting TLS most accurately identifies the technology that delivers the strongest and broadest protection for sensitive Internet communications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Transport Layer Security (TLS)?
How does TLS differ from IPsec?
Why is HTTPS important?
What is the primary function of an Internet gateway in a network environment?
To assign IP addresses to internal network devices
To facilitate the transfer of data between a private network and the Internet
To increase the security of internal network transactions
To manage intra-network data flow and congestion
Answer Description
An Internet gateway enables networked devices to connect to the Internet by providing a routing path from the local network to the Internet. This function is fundamental in network design to facilitate external communication and access to Internet services. The answer specifying data transfer between a private network and the Internet correctly captures this role. Other options, while related to networking tasks, do not accurately describe the primary function of an Internet gateway.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between an Internet gateway and a router?
How do Internet gateways enhance security for a private network?
What role does NAT play in an Internet gateway's function?
A company is planning to establish a secure connection between two of their branch offices over the internet. The network administrator has been tasked with choosing a protocol that encrypts and authenticates the data packet for secure transmission. Which protocol should be utilized?
SSL/TLS
IPSec
DHCP
GRE
Answer Description
IPSec is the correct choice because it is designed to provide security at the network layer. By encrypting and authenticating each IP packet of a communication session, IPSec ensures that the data remains confidential and has not been tampered with during transit. SSL/TLS, while also commonly used for encrypting connections, operates at a higher layer in the OSI model and is generally implemented for securing HTTP connections. GRE is a tunneling protocol used to encapsulate a wide variety of network layer protocols, but it does not inherently provide encryption or authentication.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the OSI model, and what layers does IPSec operate at?
How does IPSec ensure data confidentiality and integrity during transmission?
What are the key differences between IPSec and SSL/TLS for secured connections?
What is the primary advantage of using Straight Tip (ST) connectors in fiber-optic communications?
They are optimized to provide exceptionally low insertion loss.
They can accommodate multiple fiber connections within a single connector.
They are designed to be extremely small to fit into compact spaces.
They use a bayonet-style lock, providing a secure and reliable physical connection.
Answer Description
ST connectors are primarily favored for their reliability in ensuring a secure physical connection through their bayonet-style locking mechanism, which is vital in environments where frequent vibrations or movements might occur, such as in industrial settings or data centers.
The other options are either incorrect or describe attributes that are more characteristic of other connector types:
- LC connectors are known for their small form factor, not ST connectors.
- MPO connectors accommodate multiple fibers, whereas ST connectors terminate a single fiber.
- Although low insertion loss is desirable, it is not a distinguishing advantage of the ST design.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a bayonet-style lock in connectors?
Why is a secure physical connection important in fiber-optic communications?
What are the other types of connectors used in fiber-optic communications?
Which of the following best describes the function of an intrusion prevention system (IPS)?
It facilitates requests between a client and another server to provide anonymity and caching services.
It only alerts the network administrator about potential security breaches without taking any action.
It detects potentially harmful activities within a network and actively blocks them.
It filters incoming network traffic to protect the network from unauthorized access based on a set of security rules.
Answer Description
An intrusion prevention system (IPS) not only detects malicious activities but actively blocks them from causing harm to the network. While an intrusion detection system (IDS) also monitors for potentially malicious activity, it differs from an IPS because it does not block the activity but rather alerts the administrator. A firewall is designed to block unauthorized access based on predetermined security rules, not specifically to handle post-detection activities like an IPS. A proxy server, conversely, facilitates requests between the client and the server primarily for anonymity and can perform content filtering but does not directly act on intrusion attempts like an IPS.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between an IPS and an IDS?
How do IPS and firewalls work together in network security?
What types of threats can an IPS detect and block?
A network administrator needs to set up a method to ensure that users accessing the company's guest Wi-Fi network are required to agree to specific terms of use and enter their email addresses before being granted Internet access. Which of the following solutions is MOST appropriate for this scenario?
Captive portals
Subnetting
MAC filtering
WPA3
Answer Description
The correct answer is captive portals, which display a web page to newly connected users so they must accept the organization's terms of service or provide information (such as an email address) before full Internet access is allowed. Captive-portal implementations can also keep guest traffic isolated from internal resources.
MAC filtering confines access to devices with approved hardware addresses but does not present a terms-of-use page or collect user details. WPA3 secures wireless communication through strong encryption but likewise offers no interactive login page. Subnetting divides IP networks for logical segmentation and has no capability to prompt users for agreements or credentials.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are captive portals and how do they work?
How does using captive portals enhance security?
What are the limitations of MAC filtering for network security?
A technician needs to create a temporary wireless network for several users to share files directly between their laptops in a meeting room that lacks an access point. Which of the following wireless network types best describes this configuration?
Mesh
Infrastructure
Ad hoc
Point-to-point
Answer Description
An ad hoc network is a decentralized type of wireless network where devices connect to each other directly in a peer-to-peer (P2P) fashion, without the need for a central access point or router. This makes it ideal for temporary setups where no network infrastructure exists. An infrastructure network requires a central access point to manage communications. A mesh network can involve peer-to-peer links but is typically a more complex setup, often used to extend wireless coverage over a larger area. A point-to-point network typically connects exactly two nodes, often over a longer distance, whereas this scenario involves several users in a single room.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main characteristics of an ad hoc network?
How do devices in an ad hoc network share information?
What is the difference between ad hoc networks and infrastructure networks?
As part of a network upgrade project, your task is to document the existing network infrastructure so it can be used for future expansions and troubleshooting. Which type of network diagram would be most beneficial because it shows both the physical elements and their logical interconnections?
Layer 1 physical topology only
Layer 3 network diagram only
Combined physical and logical diagram
Service-level agreement document
Answer Description
Creating a diagram that combines physical and logical views offers a complete picture of the network. The physical portion shows tangible details such as device locations, cable runs, and rack layouts, while the logical portion illustrates IP addressing, VLANs, and traffic flow. Having both perspectives in a single diagram (or paired companion diagrams) streamlines troubleshooting and makes it easier to predict how changes to one layer will affect overall connectivity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are physical and logical network diagrams?
Why is it important to document both physical and logical network components?
What tools can be used to create network diagrams?
Your company is hosting a global e-commerce website which experiences high traffic during sales events. To enhance site performance and reduce load times globally, you plan to implement a technology solution. What is the most efficient technology to deploy?
Implement a Content Delivery Network (CDN)
Expand the use of Virtual Private Networks (VPNs)
Install additional firewalls
Increase the number of load balancers
Answer Description
A Content Delivery Network (CDN) is designed to cache content at multiple geographical locations to ensure faster delivery of multimedia content and webpages to a global audience, effectively handling high traffic and enhancing web performance. VPNs, while useful for secure connectivity, primarily focus on security rather than performance enhancement. Load balancers distribute traffic across servers to prevent any one server from becoming overwhelmed, but they do not reduce latency caused by geographical distance. Firewalls monitor and control incoming and outgoing network traffic based on predetermined security rules and do not influence content delivery speed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a Content Delivery Network (CDN)?
How does a CDN improve website performance during high traffic events?
What factors should I consider when choosing a CDN provider?
A network administrator is configuring a new server so employees can upload and download files over an encrypted connection. The administrator decides to use the SSH File Transfer Protocol (SFTP). Which single TCP port must be opened on the firewall to allow SFTP traffic between clients and the server?
443
22
20 and 21
80
Answer Description
SFTP operates as a subsystem of SSH and, by default, uses TCP port 22 for both control commands and data transfer within a single encrypted session. Opening port 22 on the firewall is therefore sufficient to enable SFTP connectivity. Ports 20/21 are used by legacy (unencrypted) FTP, while ports 80 and 443 are associated with HTTP and HTTPS respectively and are unrelated to SFTP.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is FTP and how does it work?
What are the differences between FTP and SFTP?
Why are ports 80 and 443 important if they are not used for FTP?
Which protocol and port combination is primarily used for securely transferring web pages from web servers to clients?
FTP | 21
Telnet | 23
HTTPS | 443
SMTP | 25
Answer Description
HTTPS on port 443 is the correct answer because it is the secure version of HTTP, using encryption (SSL/TLS) to securely transfer web pages from web servers to clients. FTP on port 21 is used for file transfers but not specifically for web pages. SMTP on port 25 is used for sending emails, not web pages. Telnet on port 23 offers text-oriented communication but lacks encryption, making it inappropriate for secure transfers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is HTTPS and how does it work?
What are SSL and TLS, and why are they important?
What are the risks of not using HTTPS?
Which of the following best defines Mean Time to Repair (MTTR) in a networking or disaster-recovery context?
The total time it takes to detect that a failure has occurred, without including repair.
The average time between one failure and the next for a given device or system.
The average time required to repair a failed component and return it to normal operation.
The maximum acceptable amount of data loss measured in time after an outage.
Answer Description
MTTR is the average amount of time required to diagnose, repair, and fully restore a device or system after a failure has been detected. It spans detection, troubleshooting, replacement or repair, and verification that normal operation has resumed. It does not describe the interval between failures (MTBF), the allowable data-loss window (RPO), or merely the time to notice a fault.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What stages are included in MTTR?
How does MTTR impact network reliability?
How is MTTR calculated?
What would likely be the symptom if a device on a local network has an incorrect default gateway configured?
Cannot access external websites or services
High latency in intranet communications
Duplicate IP address error
Intermittent wireless disconnections
Answer Description
An incorrect default gateway on a device typically leads to the inability to communicate with devices outside the local subnet. The default gateway is responsible for routing the packets of a device to destinations not within the immediate network. If it is incorrect, the device can only communicate locally, not beyond its subnet, which is why the device 'Cannot access external websites or services' is the correct answer. The other options could be symptoms of other configuration errors, but they do not directly relate to problems with the default gateway setting.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a default gateway and why is it important?
How can I troubleshoot issues with an incorrect default gateway?
What are the potential consequences of having multiple devices with incorrect default gateways?
Which Layer 4 transport protocol is MOST commonly used for Session Initiation Protocol (SIP) signaling on the default port 5060 in typical VoIP deployments?
SCTP
TCP
UDP
ICMP
Answer Description
SIP supports several transport protocols-including UDP, TCP, and SCTP-but UDP is both the default and the most widely used for unencrypted SIP signaling on port 5060. UDP's lightweight, connectionless behavior reduces latency and overhead, which benefits real-time voice and video traffic. SIP provides its own reliability mechanisms (retransmissions and acknowledgments), so it does not rely on TCP's connection-oriented features. TCP may be selected when very large SIP messages need guaranteed delivery, and SCTP is optional in certain environments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does SIP stand for and what is its primary function?
What are the differences between TCP and UDP?
Why would an application choose to use UDP for SIP instead of TCP?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.