CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
A network administrator is creating a backup policy for the configurations of routers and switches in a dynamic environment where changes are frequent. To minimize the risk of data loss from a device failure, what is the MOST effective backup strategy?
Back up the configuration after every change.
Perform a daily backup during off-peak hours.
Schedule a weekly backup during the weekend.
Run a full backup on an annual basis.
Answer Description
The most effective backup strategy to minimize data loss is to save the configuration immediately after any change is made. This ensures the backed-up version is always the most current, preventing any loss of configuration changes. While daily backups are a strong practice, changes made after the daily backup would be lost if a failure occurred before the next one. Weekly and annual backups are not frequent enough for a dynamic environment and would likely result in significant configuration loss.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to update backup configurations frequently?
What are some common scenarios that might necessitate frequent updates to backup configurations?
How can I automate the process of updating backup configurations?
A team of field engineers needs to establish a quick and temporary network for devices to share resources while working on a remote site without internet access. Which type of wireless network setup would be most appropriate for this scenario?
Mesh network
Infrastructure network with an access point
Point to point network with dedicated bridges
Ad hoc network
Answer Description
An Ad hoc network is best suited for this scenario because it allows devices to connect directly without needing a central router or server, facilitating peer-to-peer communication. Ad hoc networks are ideal for temporary situations where no existing network infrastructure is present, such as in remote field operations. This type of network avoids the complexity and dependencies related to more permanent network installations and provides the straightforward, direct device-to-device communication needed in this scenario. The other options involve infrastructure-based networks that require network hardware and setups that are not necessary or feasible for temporary and remote conditions like the one described.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Ad hoc network?
What are the advantages of using an Ad hoc network?
How does an Ad hoc network differ from an Infrastructure network?
Which of the following accurately describes a network intrusion detection system (IDS) when compared with an intrusion prevention system (IPS)?
An IDS operates out of band, generates alerts, and does not block traffic, whereas an IPS sits inline and can automatically drop malicious packets.
An IDS blocks malicious traffic in real time, whereas an IPS only logs the activity for administrators.
An IDS and an IPS both operate inline and both can automatically block malicious traffic.
An IDS can replace a firewall because it performs stateful packet inspection and enforces access-control lists, unlike an IPS.
Answer Description
An IDS is typically positioned out of band to passively monitor network traffic. It analyzes traffic copies and sends alerts when suspicious activity is detected but does not actively block packets. An IPS, by contrast, is placed inline and can automatically take preventive actions-such as dropping or rejecting malicious packets-to stop the threat in real time. Therefore, the only statement that correctly distinguishes these roles is the option describing an IDS as passive (alert-only) and an IPS as active (blocking).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main function of an Intrusion Detection System (IDS)?
How does an Intrusion Prevention System (IPS) differ from an IDS?
What are some examples of how an IPS can mitigate threats?
A corporation requires a method for their employees to securely access specific internal web applications from any location, using their personal devices without installing any additional software. Which technology should the company use?
Full VPN client
VPN Passthrough
IPSec VPN
Clientless VPN
Answer Description
A Clientless VPN is appropriate in this scenario because it allows users to access internal network resources through a web browser without requiring the installation of client software on their devices. This method is particularly effective for accessing specific applications securely, rather than the entire network. An SSL VPN typically facilitates this by securing the connection between the user's web browser and the network gateway. In contrast, a Full VPN client would require installing software on each device, which is not ideal for this requirement. VPN Passthrough is a feature on a router that allows outbound VPN connections from clients on the internal network; it does not provide inbound access to internal web applications for remote users. Lastly, an IPSec VPN also typically requires client software installation and is therefore not suitable for scenarios that demand a clientless setup.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Clientless VPN?
What is SSL in the context of VPNs?
What are the limitations of a Full VPN client?
What principle should be applied to minimize user privileges while still allowing them to perform their required job functions?
Time-based authentication
Role-based access control
Least privilege
Multifactor authentication
Answer Description
The principle of least privilege states that a user, process, or system component should be granted only the minimum permissions necessary to complete its tasks. Applying this principle limits the potential damage from accidents or malicious actions because excess privileges are removed. Role-based access control, time-based authentication, and multifactor authentication are access-control or authentication methods, but none are specifically centered on minimizing privileges to only what is required.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the principle of Least Privilege?
How does Role-Based Access Control relate to Least Privilege?
Why is minimizing user privileges important for security?
During an audit of your network management practices, it is evident that multiple network configurations have been applied without proper documentation or version control. What immediate action should be recommended to ensure consistent deployment and easy rollback capabilities in the future?
Perform periodic backups of configurations without versioning.
Establish a protocol for manual version control tagging before any configuration change.
Automate the synchronization of network configurations to the central repository with detailed logging and version control.
Manually document changes in a shared spreadsheet at regular intervals.
Answer Description
Implementing automated synchronization between the live network configurations and the central repository ensures all changes are documented and versioned. This practice not only provides a history of changes for auditing purposes but also allows for quick rollbacks to previous configurations if necessary. Manual versioning is prone to human error and inconsistency, while periodic documentation can cause delays and lack real-time updates.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is automated synchronization of network configurations?
What role does version control play in network management?
What tools can be used for automated configuration management?
An enterprise is deploying a new set of network links that will connect data centers located approximately 15 kilometers apart. The project requirements specify that the fiber optic cable used must efficiently support high-speed data transmission over these long distances with minimal signal loss. Which type of fiber optic cable should the technician select to meet these specifications?
Single mode fiber
Shielded twisted pair
Multimode fiber
Enhanced Cat 5e copper cable
Answer Description
For connections spanning 15 kilometers, single mode fiber is the most suitable option. It is specifically designed for long distances as it uses a smaller core diameter that allows light to travel in a direct path, minimizing signal loss and delay. While multimode fiber could potentially be considered for shorter distances due to its ability to transmit data at high speeds, its larger core size leads to higher modal dispersion, making it less effective over long distances. The other options are copper-based cables, such as Cat 5e and STP, which are limited to a maximum length of 100 meters and are therefore unsuitable for a 15-kilometer link.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between single mode fiber and multimode fiber?
Why is signal loss a concern in fiber optic cables?
What are some applications for single mode fiber?
What is a common feature or function provided by a network device's GUI?
Scripting automation tasks
Secure shell command execution
Detailed configuration via CLI tools
Visual monitoring and management
Answer Description
A Graphical User Interface (GUI) for a network device typically facilitates visual interaction with the device, allowing for easier monitoring and management tasks, such as viewing status indicators and statistics. This option contrasts with command-line interfaces that require command memorization and provide less immediate visual feedback.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of visual monitoring provided by a network device's GUI?
How does a GUI differ from a CLI when managing network devices?
Why is visual feedback important in network device management?
A network administrator notices that traffic intended for a specific subnet is not being routed through the expected path in a production network. After verifying the physical connectivity and interface status, the administrator decides to examine the routing table of the router. Which command should the administrator use to view the current routing table and verify the routes?
show arp
show route
show config
show interface
Answer Description
The 'show route' command is specifically designed to display the routing table on a router. This command provides detailed information about all routes known to the router, including destination networks, next-hop addresses, and metrics, which is useful for troubleshooting routing issues. The other options, while useful for other diagnostic scenarios, do not provide the routing table information that the administrator needs in this situation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specific information can I find in the routing table using the 'show route' command?
What is the difference between 'show route' and 'show interface' commands?
What are common reasons for routes not being followed as expected in a production network?
A network technician is deploying a 5 GHz wireless network in a location near a weather radar installation. To comply with regulations and prevent interference, the access points must be able to automatically detect the radar signals and switch to a different channel. Which IEEE standard provides this capability through mechanisms like Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC)?
802.11h
802.11ac
802.11e
802.11i
Answer Description
The correct answer is 802.11h. This amendment to the 802.11 standard was specifically created to manage spectrum and power in the 5 GHz band to avoid interference with other systems, such as military, weather, or satellite radar. It accomplishes this using Dynamic Frequency Selection (DFS), which detects radar signals and moves the Wi-Fi network to a clear channel, and Transmit Power Control (TPC), which adjusts signal strength to the minimum necessary. 802.11i is incorrect as it deals with security enhancements (WPA2). 802.11e is incorrect because it focuses on Quality of Service (QoS) for traffic prioritization. 802.11ac is a wireless networking protocol, and while devices using it in the 5 GHz band must adhere to 802.11h regulations, 802.11h is the standard that specifically defines the DFS and TPC mechanisms.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC)?
Why is it important to avoid interference with military and satellite radar systems?
How does 802.11h impact Wi-Fi performance in areas with radar systems?
A network administrator is configuring SNMP to enhance the security of network monitoring. They need to ensure that the SNMP version they choose supports strong authentication and encryption. Which version of SNMP should they implement?
SNMPv3
SNMPv2c
SNMPv1
Answer Description
SNMPv3 is the correct choice because it provides enhanced security features including authentication, encryption, and access control, which are not supported by earlier versions like SNMPv1 and SNMPv2c. SNMPv1 and SNMPv2c do not include mechanisms for securing SNMP traffic, making them less suitable for environments where security is a concern.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key security features of SNMPv3?
How does SNMPv3 compare to SNMPv1 and SNMPv2c regarding security?
What are the main differences between SNMPv1, SNMPv2c, and SNMPv3?
What best describes static routing in network configurations?
Routes are automatically updated based on network traffic and topology changes
Routes use bandwidth and delay statistics among other factors to determine the best path
Routing decisions are made based on the real-time analysis of the network’s state
Routes are manually configured and updated by a network administrator
Answer Description
Static routing involves manual entry of routes into a network router's routing table by the network administrator. This method depends on pre-determined paths set by the admin and does not change unless manually updated. This contrasts with dynamic routing where routes are automatically updated based on changes in the network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of using static routing?
What is the difference between static routing and dynamic routing?
When should I use static routing instead of dynamic routing?
What best describes the role of a Basic Service Set Identifier (BSSID) in a wireless network?
It serves as the network name that is broadcasted by wireless routers.
It uniquely identifies each access point within a wireless network using a MAC-like address.
It specifies the maximum capacity of connected devices within a network.
It acts mainly as a security measure to prevent unauthorized access.
Answer Description
The BSSID uniquely identifies each access point in a WLAN. It is a 48-bit identifier that follows MAC address conventions and allows client devices and administrators to distinguish between multiple access points broadcasting the same SSID. The SSID, by contrast, is the user-visible network name. While the BSSID is included in beacon and management frames, its primary purpose is identification, not capacity planning or direct security enforcement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a BSSID and an SSID?
How does the BSSID help in managing multiple access points?
What role does BSSID play in security for a wireless network?
A network technician is troubleshooting a problem where multiple wireless clients frequently disassociate from a WLAN hosted on a single access point. The clients experience disconnections several times a day, primarily during peak hours. To address this issue, which of the following solutions is BEST?
Adjust the minimum data rates allowed on the current access point.
Increase the wireless coverage area by adjusting the current antenna setup.
Replace the access point's antenna with high-gain antennas.
Add an additional access point to distribute the client load more evenly.
Answer Description
Increasing the wireless coverage might not directly address the high number of clients disconnecting if the area coverage is already sufficient. Adjusting the data rates requires assessing if slow data rates are the actual cause of disassociation, which is not directly implied. Replacing the antenna would depend on whether the existing ones are faulty or unsuitable for the environment, which isn't suggested by the given scenario. Adding an additional access point addresses the issue by reducing the load on a single access point, thus likely decreasing the frequency of disconnections during peak hours. This aligns with managing network congestion and ensuring adequate service delivery for all connected clients.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why would adding an additional access point help with disconnections?
What factors should be considered when determining the number of access points needed?
What role does network congestion play in wireless disconnections?
During an ARP poisoning (also called ARP spoofing) attack on a local area network, what action by the attacker enables interception of traffic that is intended for another host or the default gateway?
The attacker maps their own MAC address to the IP address of a legitimate host, causing that host's traffic to be sent to the attacker first.
The attacker disables port security to allow unauthorized devices to connect to switch ports.
The attacker encrypts all packets on the wire to prevent anyone else from reading them.
The attacker overwhelms the switch with thousands of fake MAC addresses until the CAM table overflows.
Answer Description
ARP poisoning is performed by repeatedly sending forged ARP replies that bind the attacker's MAC address to the IP address of another device (commonly the gateway). Once the false mapping is cached, frames destined for that IP are delivered to the attacker, who can forward, modify, or drop them-creating a man-in-the-middle condition. MAC flooding (CAM-table overflow) overwhelms a switch with bogus MAC entries, encryption protects data rather than redirects it, and port-security configurations restrict device access; none of these describe how ARP poisoning functions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of ARP in a network?
How can ARP poisoning be detected?
What are some preventative measures against ARP poisoning?
That's It!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.