CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA Network+ N10-009 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
During the setup of network device monitoring, a network administrator needs to access detailed information about device performance and status. To achieve this, which component should they interact with?
- You selected this option
Event Notifications (Traps)
- You selected this option
Management Information Base (MIB)
- You selected this option
Access Control List (ACL)
- You selected this option
Authentication strings
Answer Description
The Management Information Base (MIB) is the correct answer because it contains hierarchical descriptions of all the network objects that can be managed. The MIB allows administrators to gather detailed information about device performance and status efficiently, unlike SNMP Traps, which are used for asynchronous event notification, or Community strings, which authenticate access to a device's saved data, without providing detailed information themselves. Access Control Lists (ACLs) are used primarily for security to control traffic flow, not for information retrieval about device performance and status.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Management Information Base (MIB)?
How do network administrators use SNMP with MIBs?
What are SNMP Traps, and how do they differ from MIBs?
Which of the following would be the BEST method to guarantee bandwidth for a video conferencing application?
- You selected this option
Increasing the overall bandwidth of the internet connection
- You selected this option
Applying QoS policies to prioritize traffic
- You selected this option
Using traffic policing to limit traffic rates
- You selected this option
Implementing traffic shaping to control traffic bursts
Answer Description
Applying QoS policies to prioritize traffic ensures that critical applications, such as video conferencing, are given the required bandwidth even during high traffic periods. This is crucial for maintaining the quality and reliability of the video conferencing, which may be sensitive to bandwidth fluctuations. On the other hand, increasing bandwidth would not prioritize the specific needs of various types of traffic, traffic shaping alone might delay some packets to reduce burstiness without ensuring bandwidth availability, and traffic policing would limit the rate of traffic, potentially dropping packets when the bandwidth cap is exceeded.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are QoS policies and how do they work?
What impact does bandwidth have on video conferencing?
What is traffic shaping and how does it differ from QoS?
An enterprise has recently expanded its operations, and employees are experiencing slow network speeds. The IT manager suspects the issue might be due to the current throughput not meeting the increased demand created by additional users and upgraded applications. What would be an effective method to confirm if throughput capacity is indeed the root cause of the slow network speeds?
- You selected this option
Inspect all networking devices for hardware faults.
- You selected this option
Perform network bandwidth analysis.
- You selected this option
Replace all existing Ethernet cables with higher category ones.
- You selected this option
Upgrade the firmware on all network routers.
- You selected this option
Increase the number of access points in the network.
Answer Description
Performing a network bandwidth analysis would provide data on the actual bandwidth being used compared to the available bandwidth. If the analysis shows that the actual usage is consistently near or at the capacity of the network, it is likely that increasing the throughput capacity would resolve the issue. Inspecting cables or replacing network devices, while important in general, would not directly determine if throughput capacity is the issue.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network bandwidth analysis?
How can I perform a network bandwidth analysis?
What are the signs that throughput capacity is insufficient?
A network technician is tasked with connecting a legacy fax machine in an office to the network. The fax machine uses an older connection interface. Which type of cable should the technician use to connect this device?
- You selected this option
RJ11 cable
- You selected this option
Coaxial cable
- You selected this option
RJ48 cable
- You selected this option
RJ45 cable
Answer Description
RJ11 cables are commonly used for telephone connections in North America and are suitable for devices like fax machines that require a single telephone line connection. RJ45, used primarily in Ethernet networks, and RJ48, often used for T1 lines, are not suitable for traditional fax machine connections. Coaxial cables are generally used for television and broadband connections, not for telephone-based fax connections.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an RJ11 cable and how does it work?
Why can't I use an RJ45 cable with a fax machine?
What are the differences between RJ11, RJ45, and RJ48 cables?
A network technician is troubleshooting a problem where multiple wireless clients frequently disassociate from a WLAN hosted on a single access point. The clients experience disconnections several times a day, primarily during peak hours. To address this issue, which of the following solutions is BEST?
- You selected this option
Add an additional access point to distribute the client load more evenly.
- You selected this option
Increase the wireless coverage area by adjusting the current antenna setup.
- You selected this option
Adjust the minimum data rates allowed on the current access point.
- You selected this option
Replace the access point's antenna with high-gain antennas.
Answer Description
Increasing the wireless coverage might not directly address the high number of clients disconnecting if the area coverage is already sufficient. Adjusting the data rates requires assessing if slow data rates are the actual cause of disassociation, which is not directly implied. Replacing the antenna would depend on whether the existing ones are faulty or unsuitable for the environment, which isn't suggested by the given scenario. Adding an additional access point addresses the issue by reducing the load on a single access point, thus likely decreasing the frequency of disconnections during peak hours. This aligns with managing network congestion and ensuring adequate service delivery for all connected clients.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why would adding an additional access point help with disconnections?
What factors should be considered when determining the number of access points needed?
What role does network congestion play in wireless disconnections?
A network administrator at a medium-sized enterprise is configuring an ACL on the main router to restrict access to a secure server hosting sensitive client data. The server is on the subnet 192.168.5.0/24. To ensure only devices from the administration team's subnet, 10.10.10.0/24, can access this server, which of the following ACL rules should be applied?
- You selected this option
Permit 0.0.0.0 0.0.0.0 192.168.5.0 0.0.0.255
- You selected this option
Permit 10.10.10.0 0.0.0.255 10.10.10.255 0.0.0.0
- You selected this option
Permit 10.10.10.0 0.0.0.255 192.168.5.0 0.0.0.255
- You selected this option
Permit 192.168.5.0 0.0.0.255 10.10.10.0 0.0.0.255
Answer Description
The correct answer specifies an ACL rule that allows only the specific subnet 10.10.10.0/24 access to the server's subnet 192.168.5.0/24. This rule effectively restricts all other subnets from accessing the secure server, ensuring that only administration team devices can reach the subnet. Other options either incorrectly specify the source or destination addresses, or inappropriately allow traffic from all addresses which compromises security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an ACL in networking?
What do the numbers in 192.168.5.0/24 mean?
What is the difference between a permit and deny rule in an ACL?
Which IPv4 address range is correctly classified as Class A?
- You selected this option
1.0.0.0 to 126.255.255.255
- You selected this option
127.0.0.0 to 127.255.255.255
- You selected this option
128.0.0.0 to 191.255.255.255
- You selected this option
192.0.0.0 to 223.255.255.255
Answer Description
Class A addresses are designed for very large networks, with a default subnet mask of 255.0.0.0. They start with a first octet from 1 to 126. This allows for a large number of possible hosts on each network, suitable for networks with many devices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are Class A IP addresses used for large networks?
What role do subnet masks play in IP addressing?
What are the other classes of IPv4 addresses?
A network administrator is configuring a network device to ensure that its time settings are synchronized with the rest of the network devices across multiple locations to maintain consistent timestamps for logs and operations. Which protocol should be used to achieve accurate time synchronization?
- You selected this option
PTP
- You selected this option
NTS
- You selected this option
NTP
Answer Description
NTP (Network Time Protocol) is used to synchronize the clocks of computers to one another within a few milliseconds of Coordinated Universal Time (UTC). It is essential for maintaining accurate timekeeping across all network devices, which is critical for activities depending on precise timing such as logging and transaction timestamping. PTP (Precision Time Protocol), while also used for time synchronization, is typically employed in industries requiring extremely high precision timekeeping, like telecommunications and finance, which might be overkill for standard network operations. NTS (Network Time Security) is actually a security protocol intended to provide authentication for NTP.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is NTP and how does it work?
What is the difference between NTP and PTP?
What is NTS and how does it relate to NTP?
What best describes the role of a Basic Service Set Identifier (BSSID) in a wireless network?
- You selected this option
It acts mainly as a security measure to prevent unauthorized access.
- You selected this option
It uniquely identifies each access point within a wireless network using a MAC-like address.
- You selected this option
It specifies the maximum capacity of connected devices within a network.
- You selected this option
It serves as the network name that is broadcasted by wireless routers.
Answer Description
The BSSID uniquely identifies each access point in a WLAN, functioning similar to a MAC address for the wireless access point. This is crucial for characterizing and managing individual access points, especially in environments where multiple APs are deployed. The description of it as an SSID for the wireless AP is inaccurate because the SSID is what users see as the network name, not a unique identifier for the hardware like the BSSID. Although BSSIDs are broadcasted in packets, characterizing them primarily as security measures or as devices that define network size is misleading.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a BSSID and an SSID?
How does the BSSID help in managing multiple access points?
What role does BSSID play in security for a wireless network?
What is the primary function of a captive portal in a network environment?
- You selected this option
To authenticate and redirect users to a login page before they gain access to the network
- You selected this option
To encrypt data packets on a wireless network using WPA2
- You selected this option
To allocate IP addresses to devices connected to the network
- You selected this option
To increase the range of the wireless signal
Answer Description
A captive portal controls network access by requiring users to view or interact with a web page before Internet access is granted. It's a common method for implementing guest Wi-Fi networks, ensuring users accept legal terms or log in. Other answers might sound plausible, but they do not correctly describe the primary function of a captive portal.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a captive portal used for in guest networks?
How does a captive portal authenticate users?
What are the security benefits of using a captive portal?
A company's web server has been configured to allow secure transactions for their online store. The security administrator wants to ensure that the data exchanged between the web server and clients is encrypted. Which port should the firewall be configured to allow so that secure web traffic can pass through?
- You selected this option
Port 80
- You selected this option
Port 53
- You selected this option
Port 22
- You selected this option
Port 443
Answer Description
HTTPS is the secure version of HTTP, which means that HTTPS traffic is encrypted. By default, HTTPS traffic runs over port 443. Therefore, to allow encrypted web traffic, the firewall should be configured to allow traffic through port 443. While port 80 is used for HTTP, it is not secure. Ports 53 and 22 are often used for DNS and SSH respectively, neither of which are correct for this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does HTTPS mean, and how does it secure data?
Why is port 80 not secure, and what is it used for?
What are the other common ports besides 443, and what are their purposes?
OSPF uses the Bellman-Ford algorithm for the shortest path calculation.
- You selected this option
True
- You selected this option
False
Answer Description
The correct answer is 'False'. OSPF actually utilizes the Dijkstra's algorithm to compute the shortest path tree for each route. The Bellman-Ford algorithm, conversely, is used by protocols like RIP, which is different from OSPF.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Dijkstra's algorithm and how does it work?
What is OSPF and how is it used in networking?
What is the Bellman-Ford algorithm and where is it applied?
Which of the following is the BEST reason to implement GRE in a network environment?
- You selected this option
To provide direct hardware access control on a network
- You selected this option
To encapsulate a wide variety of network layer protocol packet types inside IP tunnels
- You selected this option
To increase the security of network traffic by encrypting data
- You selected this option
To prioritize certain types of network traffic and improve Quality of Service (QoS)
- You selected this option
To reduce the complexity of managing IP addresses
Answer Description
Encapsulating protocols for tunneling across diverse networks is the primary application of GRE, making it useful for creating virtual point-to-point links over an IP internetwork. It enables the encapsulation of packets from one protocol suite within the datagram encapsulations of another protocol suite, facilitating connectivity across heterogeneous networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does GRE stand for and what does it do?
How does GRE work in a network tunnel?
What are some use cases for implementing GRE tunnels?
An enterprise network is experiencing poor VoIP call quality, and complaints are coming from multiple departments. No recent changes have been reported. Which approach would be most effective for initially investigating this network-wide issue?
- You selected this option
Immediately replace VoIP hardware like phones and PBX systems.
- You selected this option
Conduct an extensive audit of recent network changes despite reports.
- You selected this option
Use a Wi-Fi analyzer solely on the wireless networks.
- You selected this option
Use a top-to-bottom OSI model approach to check each layer.
Answer Description
Given the symptoms are network-wide and affect a specific service (VoIP), starting the troubleshooting process using a top-to-bottom OSI model approach is appropriate. This method ensures that no layer-specific issues are overlooked, starting from the application layer (which directly affects VoIP quality), down through transport and network layers where issues like packet loss or delay can occur, and finally to the physical layer. Other approaches, such as focusing on a specific tool or protocol or checking only hardware installations, could miss configuration or software issues that might be impacting the network layers crucial for VoIP functionality.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the OSI model and why is it used in troubleshooting?
What specific VoIP issues should I look for at the different layers of the OSI model?
What tools can assist in troubleshooting VoIP quality issues?
A utility that displays open ports and active connections can help identify unauthorized services running on a device.
- You selected this option
True
- You selected this option
False
Answer Description
Tools like netstat provide information about open ports and active connections, allowing administrators to detect unauthorized services that may be compromising network security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is netstat and how does it work?
What are open ports and why are they important?
What are some common tools besides netstat that can monitor network connections?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.