CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
What does the term 'Scheduled' refer to in the context of network monitoring?
Real-time traffic monitoring
Automated tasks performed at regular intervals
Ad hoc network management activities
Unscheduled maintenance actions
Answer Description
In network monitoring, 'Scheduled' refers to the predefined planning and execution of network monitoring tasks at regular intervals. This systematic approach ensures consistent and proactive checks on network performance and health, such as traffic analysis or performance monitoring, essential for maintaining optimal network operations. Scheduled tasks are typically automated to occur at regular intervals, separating them from ad hoc tasks which are performed as needed. This distinction is key in network management, ensuring a balanced and well-maintained IT infrastructure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of scheduled tasks in network monitoring?
How does scheduling tasks improve network management?
What tools are commonly used for scheduling network monitoring tasks?
During a network upgrade, a technician uses a cable tester to verify the new cabling installations. The tester identifies several failures. What type of issues CANNOT be directly detected using a standard cable tester?
Crossed wires
Short circuits
Improper cable termination
Signal attenuation
Answer Description
While a cable tester can effectively detect electrical problems, such as discontinuities, shorts, or miswirings (crossed or reversed wires), it cannot directly determine signal degradation issues like attenuation or interference. These types of problems require more advanced analysis typically provided by a network analyzer, which can measure the quality of signal transmission and identify disturbances or signal loss over a network cable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is signal attenuation and why is it important?
What is the difference between a cable tester and a network analyzer?
What types of cable issues can a standard cable tester identify?
Given an enterprise network that spans multiple geographic locations, which dynamic routing protocol would be the BEST to implement for optimal scalability and interoperability among various vendors' equipment?
Enhanced Interior Gateway Routing Protocol (EIGRP)
Open Shortest Path First (OSPF)
Border Gateway Protocol (BGP)
Routing Information Protocol (RIP)
Answer Description
Open Shortest Path First (OSPF) is the best choice for an enterprise network spanning multiple geographic locations due to its support for large and complex topologies and its vendor-neutral specification, which ensures interoperability among different vendors' equipment. While EIGRP also supports large networks, it is less ideal in environments that require vendor interoperability since it is Cisco proprietary, potentially limiting its use with equipment from other vendors. BGP is generally used for Internet routing between autonomous systems rather than internal enterprise networks, and RIP's limitations in scalability make it unsuitable for large networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key features of OSPF that make it suitable for large networks?
How does OSPF ensure interoperability among different vendors?
Why is EIGRP not recommended for environments needing vendor interoperability?
What function does central policy management serve in a software-defined network?
It expands the physical range of the network.
It decreases network traffic by compressing data packets.
It enforces security settings across the network devices from a single control point.
It physically connects disparate network segments.
Answer Description
Central policy management allows for the centralized control and enforcement of policies within a software-defined network, streamlining configuration and compliance across the network. This enables administrators to apply policies from a single point, enhancing consistency and ease of management. The incorrect options are related network functions or strategies, but they do not define the role of central policy management in SDNs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of security settings that can be enforced through central policy management?
How does central policy management improve ease of management in a software-defined network?
What is the difference between central policy management and traditional network management?
What is a self-signed certificate primarily used for in network security?
Verifying external server identities publicly
Establishing internal trusts and testing environments
Issuing certifications for interoperability with other organizations
Reducing the operational costs associated with public key infrastructure
Answer Description
A self-signed certificate is primarily used to validate identity and enable encrypted connections without relying on external Certificate Authorities (CAs). Because it is generated and signed by the same organization or individual that uses it, a self-signed certificate is well suited for internal environments or testing scenarios where trust is already established. In public-facing situations, however, these certificates are less reliable because no third-party has verified the certificate holder's identity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Certificate Authorities (CAs)?
What is the difference between self-signed certificates and CA-issued certificates?
In what scenarios are self-signed certificates beneficial?
A network technician is tasked with setting up a network in a large data center. Given the need for high speed data transfer and distances that exceed 100 meters between devices, which type of cable should the technician use?
Multimode fiber
CAT5e
Single-mode fiber
CAT6
Answer Description
Single-mode fiber is the most suitable choice for this scenario because it provides a higher transmission rate and can cover long distances (beyond 100 meters) without signal degradation. Multimode fiber also supports high data rates but is typically used for shorter distances, such as connecting multiple adjacent racks in a datacenter. CAT5e and CAT6 cables are not feasible for lengths exceeding 100 meters as signal quality can degrade, especially at high data rates.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of using single-mode fiber over multimode fiber?
What are typical uses for CAT5e and CAT6 cables in a datacenter?
Why is signal degradation a concern for cable types used in data centers?
Which of the following accurately describes a network intrusion detection system (IDS) when compared with an intrusion prevention system (IPS)?
An IDS and an IPS both operate inline and both can automatically block malicious traffic.
An IDS blocks malicious traffic in real time, whereas an IPS only logs the activity for administrators.
An IDS can replace a firewall because it performs stateful packet inspection and enforces access-control lists, unlike an IPS.
An IDS operates out of band, generates alerts, and does not block traffic, whereas an IPS sits inline and can automatically drop malicious packets.
Answer Description
An IDS is typically positioned out of band to passively monitor network traffic. It analyzes traffic copies and sends alerts when suspicious activity is detected but does not actively block packets. An IPS, by contrast, is placed inline and can automatically take preventive actions-such as dropping or rejecting malicious packets-to stop the threat in real time. Therefore, the only statement that correctly distinguishes these roles is the option describing an IDS as passive (alert-only) and an IPS as active (blocking).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main function of an Intrusion Detection System (IDS)?
How does an Intrusion Prevention System (IPS) differ from an IDS?
What are some examples of how an IPS can mitigate threats?
Your company is expanding its internal data center setup, which includes multiple servers that handle sensitive information. These servers require configuration to ensure they are isolated from direct internet access. What type of network address should be assigned to maintain their inaccessibility from the global web?
Private network addresses
APIPA addresses
Externally routable RFC 1918 addresses
Public network addresses
Answer Description
Private network addresses, as defined by RFC 1918, are used for internal networks and are not routable on the public internet. Assigning these addresses ensures the servers are isolated from direct external connections, enhancing security. Public network addresses are globally routable and would expose the servers to the internet. APIPA addresses are used as a fallback when a DHCP server is unavailable and are not suitable for a planned data center configuration. The term "Externally routable RFC 1918 addresses" is a contradiction, as these address ranges are specifically designated as non-routable on the global internet.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are private network addresses?
Why are public network addresses dangerous for sensitive servers?
What is RFC 1918 and its significance?
A network engineer needs to connect two buildings that are 10 kilometers apart with a high-speed and reliable link. Which of the following transmission media would BEST suit this need?
Coaxial cable
Category 6 twisted pair cable
Single-mode fiber optic cable
Multimode fiber optic cable
Answer Description
Single-mode fiber optic cable is ideal for long-distance communications, supporting distances over 10 kilometers with high bandwidth and minimal signal loss. Multimode fiber optic cable is designed for shorter distances, typically up to 2 kilometers, due to modal dispersion. Category 6 twisted pair cable and coaxial cable are also limited in distance and bandwidth compared to single-mode fiber, making them unsuitable for a 10-kilometer connection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of using single-mode fiber optic cable over multimode?
What is modal dispersion, and why does it affect multimode fiber optic cable?
Why are Category 6 twisted pair and coaxial cables unsuitable for a 10-kilometer connection?
What does channel width in wireless networking determine?
The maximum distance a wireless signal can travel
The security protocol used in wireless communication
The number of devices that can connect to a network
The range of frequencies a wireless signal uses on a specific channel
Answer Description
Channel width in wireless networking determines the range of frequencies that a wireless signal uses on a specific channel. A wider channel width allows for more data to be transmitted simultaneously, increasing throughput but potentially increasing interference with other channels if not managed properly. This concept is fundamental in optimizing the performance of wireless networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does channel width affect wireless network performance?
What is the difference between 20 MHz and 40 MHz channel widths?
What impact does interference have on wireless networking?
What range of IP addresses is automatically assigned by a host when DHCP server communication fails?
10.0.0.1 to 10.255.255.254
169.254.0.1 to 169.254.255.254
172.16.0.1 to 172.31.255.254
192.168.0.1 to 192.168.255.254
Answer Description
The correct answer specifies a specific range of IP addresses from 169.254.0.1 to 169.254.255.254, which are designated for automatic assignment by the host in the event that DHCP server communication is unsuccessful. This range is within the 169.254.0.0/16 subnet, reserved specifically for this purpose by networking standards to prevent IP conflicts with addresses assigned elsewhere.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DHCP and how does it work?
What does it mean when a device uses an automatic IP address from the 169.254.x.x range?
Why is the 169.254.0.0/16 subnet reserved for automatic address assignment?
A company's disaster recovery team meets in a conference room to walk through the procedures of a disaster recovery plan after a simulated server failure. The team discusses their roles and the expected sequence of events without using any actual equipment or relocating to a backup site. Which of the following DR concepts does this scenario describe?
Full-scale exercise
RPO validation
Tabletop exercise
Hot site cutover
Answer Description
This scenario describes a tabletop exercise, which is a discussion-based session where team members meet to discuss their roles and walk through the steps of a disaster recovery plan in response to a simulated event. It does not involve physical relocation or actual system recovery. A full-scale exercise would involve a hands-on, physical run-through. A hot site cutover is the actual process of switching to a live backup site. RPO (Recovery Point Objective) is a metric that defines the acceptable amount of data loss, not a type of exercise.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a tabletop exercise in disaster recovery?
What are full-scale drills, and how do they differ from tabletop exercises?
What are the benefits of conducting tabletop exercises?
What is the primary purpose of using the ping
command in network troubleshooting?
To determine the speed of the network connection
To physically map out the network infrastructure
To automatically resolve any detected network connectivity issues
To test the reachability of a host on an IP network and measure the round-trip time for messages sent
Answer Description
The primary purpose of the ping
command is to test the reachability of a host on an IP network and measure the round-trip time for messages sent from the originating host to a destination computer. This is crucial for initially diagnosing connectivity issues. Answers involving speed testing or direct problem resolution are incorrect because ping
does not measure network speed in terms of throughput and cannot resolve the problems itself; it merely checks connectivity and latency.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does the `ping` command actually work?
What are some common uses of the `ping` command in troubleshooting?
What are the limitations of using the `ping` command?
What is the primary function of port security on network switches?
Limit the bandwidth usage on a network
Monitor traffic patterns to detect anomalies
Encrypt data transmitted from one port to another
Limit the number of MAC addresses allowed on a switch port
Answer Description
Port security is a layer 2 traffic control feature used mainly to limit the number of MAC addresses allowed on a single port. This prevents unauthorized devices from accessing the network and mitigates risks like MAC flooding. Limiting bandwidth does not relate directly to security, and monitoring traffic patterns and transmitting data securely are functions more closely associated with network monitors and encryption protocols, respectively.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a MAC address and why is it important for port security?
How does limiting the number of MAC addresses on a switch port prevent network attacks?
What happens when a device with a non-allowed MAC address attempts to connect to a port with port security enabled?
A network administrator is tasked with deploying numerous network devices across multiple locations of a rapidly growing company. Which technology should they implement to automate the configuration and deployment process, ensuring minimal manual intervention?
Zero-touch provisioning
Manual configuration of each device
Dynamic Host Configuration Protocol (DHCP)
Simple Network Management Protocol (SNMP)
Answer Description
Zero-touch provisioning (ZTP) enables network devices to be configured and deployed automatically without manual intervention, which reduces deployment time and potential human errors. It is particularly useful for scenarios involving multiple device deployments across various locations. While DHCP automates IP address assignment, it does not handle the full device-specific configurations, though it is often a component of the ZTP process. SNMP is predominantly used for network management and monitoring, not for initial device deployment. Manual configuration would be time-consuming and prone to errors, making it unsuitable for rapid, large-scale deployments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Zero-Touch Provisioning (ZTP)?
How does ZTP differ from other provisioning methods?
Can ZTP be used with other technologies?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.