CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
During an initiative to enhance the efficiency of network monitoring, a network administrator decides to utilize a structured database that details the properties of each network device. This database is essential for targeted monitoring. What is the primary reason this database aids in the administrator's efforts?
This database secures communication by encrypting data exchanges between network devices.
It provides an improved graphical interface within network management tools, simplifying task management.
It compiles device-specific information in a hierarchical form accessible through specific network protocols, facilitating precise supervision.
The database is primarily utilized for automated system upgrades to ensure all devices meet the latest security standards.
Answer Description
A Management Information Base (MIB) provides a structured format for device information that allows for precise and efficient data collection regarding device performance, status, and configuration, essential for targeted and effective monitoring. This hierarchy of data is not meant for automatic firmware updates, enhancing user interface designs, or encrypting network communications, which differentiates the correct choice from the incorrect ones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Management Information Base (MIB)?
How do network protocols work with the database for monitoring?
What types of information can be found in a MIB?
During a network upgrade, a technician uses a cable tester to verify the new cabling installations. The tester identifies several failures. What type of issues CANNOT be directly detected using a standard cable tester?
Short circuits
Crossed wires
Signal attenuation
Improper cable termination
Answer Description
While a cable tester can effectively detect electrical problems, such as discontinuities, shorts, or miswirings (crossed or reversed wires), it cannot directly determine signal degradation issues like attenuation or interference. These types of problems require more advanced analysis typically provided by a network analyzer, which can measure the quality of signal transmission and identify disturbances or signal loss over a network cable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is signal attenuation and why is it important?
What is the difference between a cable tester and a network analyzer?
What types of cable issues can a standard cable tester identify?
A network technician suspects that there is an IP address conflict in the subnet. Which command would BEST help the technician verify this hypothesis by checking the MAC address associated with IP addresses on the device?
ping
show mac-address-table
show interface
show arp
Answer Description
The 'show arp' command is used to display the ARP table of a network device, which contains the mappings of IP addresses to their respective MAC addresses. This can help identify duplicate IP addresses if multiple entries for the same IP address with different MAC addresses are found. Conversely, the other commands listed do not specifically address the mapping of IP addresses to MAC addresses essential for detecting IP conflicts. 'show mac-address-table' displays the MAC address table, which links MAC addresses with their corresponding port numbers but not IP addresses. 'show interface' provides detailed information about the network interfaces, not about IP-to-MAC mappings. 'ping' is used to check the reachability of a host on an IP network and does not display ARP table information.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the ARP table?
How can an IP address conflict occur?
What is the difference between 'show arp' and 'show mac-address-table' commands?
Which of the following best describes the process utilized by devices to automatically configure their own IPv6 addresses using SLAAC when no DHCPv6 server is present?
Devices extract an IPv6 prefix from router advertisements and combine it automatically with an interface identifier derived from their MAC address.
Devices send a request to the nearest DHCPv6 server to obtain an IPv6 address and additional configuration settings.
Network administrators manually assign IPv6 addresses to each device in accordance with an IP address management policy.
Answer Description
Stateless Address AutoConfiguration (SLAAC) allows IPv6-capable devices to configure their own IPv6 addresses by combining a locally available prefix advertised by an IPv6 router with a locally derived interface identifier. This configuration method is essential in environments without a DHCPv6 server. The other options describe manual configuration or DHCP-based methods, which do not correctly represent the autonomous address setup process performed by SLAAC.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does SLAAC stand for and how does it work?
What is the role of router advertisements in SLAAC?
How does the interface identifier work in SLAAC?
When configuring a point-to-point wireless bridge between two buildings, which of the following is the BEST choice to maximize stable connectivity?
Use a directional antenna
Use an omnidirectional antenna
Deploy an autonomous access point
Use a high-gain antenna without specifying directional or omnidirectional
Answer Description
Choosing a directional antenna for a point-to-point setup is ideal because it focuses the signal between two specific points, which enhances the signal strength and reduces interference compared to an omnidirectional antenna which spreads the signal in all directions. Omnidirectional antennas, despite their usability in different scenarios, are not optimal for long, specific links as they do not focus the signal. High-gain antennas without specifying directional or omnidirectional criteria might seem suitable, but the key is the directionality which maximizes the strength and focus of the signal. Finally, an autonomous access point is a solution for network management and flexibility but does not inherently address the directional strength needed in a point-to-point connection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are directional antennas and how do they work?
What is the difference between directional and omnidirectional antennas?
What is a high-gain antenna, and why might its effectiveness depend on directionality?
Which of the following accurately describes a network intrusion detection system (IDS) when compared with an intrusion prevention system (IPS)?
An IDS operates out of band, generates alerts, and does not block traffic, whereas an IPS sits inline and can automatically drop malicious packets.
An IDS can replace a firewall because it performs stateful packet inspection and enforces access-control lists, unlike an IPS.
An IDS and an IPS both operate inline and both can automatically block malicious traffic.
An IDS blocks malicious traffic in real time, whereas an IPS only logs the activity for administrators.
Answer Description
An IDS is typically positioned out of band to passively monitor network traffic. It analyzes traffic copies and sends alerts when suspicious activity is detected but does not actively block packets. An IPS, by contrast, is placed inline and can automatically take preventive actions-such as dropping or rejecting malicious packets-to stop the threat in real time. Therefore, the only statement that correctly distinguishes these roles is the option describing an IDS as passive (alert-only) and an IPS as active (blocking).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main function of an Intrusion Detection System (IDS)?
How does an Intrusion Prevention System (IPS) differ from an IDS?
What are some examples of how an IPS can mitigate threats?
A network administrator discovers that some users are experiencing connectivity issues. Further investigation reveals that there are multiple devices attempting to use the same network address. What is the BEST course of action to rectify this problem?
Assign unique addresses to each device that currently has a conflicting setting.
Review configuration settings on the network routers.
Inspect the subnet masks on all network devices for inconsistencies.
Restart the DHCP server to clear up the address conflicts.
Answer Description
Assigning unique addresses to each conflicted device directly resolves the issue of address duplication, ensuring that each device can communicate effectively on the network without conflicts. Adjusting subnet masks, checking router configurations, or rebooting the DHCP server would not directly resolve the problem of address duplication. Resolving this ensures proper connectivity and network operations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the consequences of having multiple devices with the same IP address?
What is the role of DHCP in addressing devices on a network?
How can I prevent IP address conflicts in a network?
What is the BEST method to secure network switches against unauthorized inter-segment traffic manipulation?
Set all inactive ports to a non-routable VLAN to avoid unauthorized use.
Configure all user-access ports to non-trunking mode with the specific VLAN assigned via the switchport access command.
Apply the switchport nonegotiate command to all trunk ports to prevent DTP frames from automatically forming a trunk.
Enable dynamic VLAN assignments via a VLAN Membership Policy Server across all switch interfaces.
Answer Description
Configuring all user-access ports to fixed configurations via the switchport access vlan
command effectively secures network switches against unauthorized inter-segment traffic manipulation, such as VLAN hopping. This technique reduces the chance of exploitation by forcing each port to carry traffic for a specified VLAN only, not allowing dynamic changes that could permit unauthorized access. In contrast, using the switchport nonegotiate
command or dynamic VLAN assignments does not specifically aim at preventing this manipulation and thus is less effective in securing the switches adequately. Setting unused ports to a blackhole VLAN is a good security practice but does not directly prevent unauthorized inter-segment traffic manipulation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is VLAN hopping and how does it relate to switch security?
What does the switchport access command do?
Why is setting unused switch ports to a non-routable VLAN important?
A network engineer is tasked with overseeing the upgrade of a data center's fiber optic system to support higher bandwidth and reduce cable clutter. They are considering the use of MPO connectors. Which of the following is an advantage of using MPO connectors in this scenario?
Supports simultaneous connection of multiple fibers, reducing physical space requirements
Enhances electrical isolation to prevent signal leakage between cables
Decreases the maximum transmission distance achievable
Allows the transmission of signals over a single fiber to minimize interference
Answer Description
MPO connectors can interface multiple fibers (typically 12 or 24) at once, which significantly reduces the physical space required for the cables and enhances the overall manageability and scalability of the network infrastructure. This is particularly advantageous in a high-density environment like a data center where space and cable management are critical factors. Answer choices mentioning single-fiber applications or lower scalability offer less relevance and practical benefit in the context of upgrading to higher bandwidth capacity in data centers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are MPO connectors and how do they work?
What are the benefits of reducing cable clutter in data centers?
How does using MPO connectors affect bandwidth capacity?
A network administrator is configuring a server to ensure secure file transfers between the server and client machines. The administrator wants to use a protocol that encrypts the data transfer using SSH. Which port should the administrator ensure is open on the firewall?
Port 22
Port 443
Port 21
Port 23
Answer Description
Port 22 is used by SSH (Secure Shell) and by extension, SFTP (SSH File Transfer Protocol), which uses SSH to securely transfer files. Ensuring that port 22 is open on the firewall allows for encrypted transmissions, providing both security and verification. Port 21 is used by FTP, which is not secure by itself. Port 23, used by Telnet, transmits data in plaintext and is less secure than SFTP/SSH. Port 443 is commonly used by HTTPS, which is secure but meant for secure web traffic, not the type of file server access implied in the scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SSH and how does it work?
What is SFTP and how is it different from FTP?
Why is it important to use secure protocols for file transfers?
Which of the following IPv4 addresses falls within the private address space specified by RFC 1918 and therefore cannot be routed across the public Internet?
8.8.8.8
192.168.1.1
172.34.0.5
203.0.113.10
Answer Description
RFC 1918 designates three private IPv4 blocks: 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. Only addresses inside these ranges are intended for internal networks and are filtered by Internet routers. 192.168.1.1 sits inside 192.168.0.0/16, so it is private. The other options (172.34.0.5, 203.0.113.10, 8.8.8.8) lie outside the private ranges and are publicly routable (203.0.113.0/24 and 198.51.100.0/24 are documentation ranges but still public).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are RFC 1918 addresses used for?
What does it mean for an IP address to be 'routable'?
Can private IP addresses communicate with the public Internet?
A network administrator observes intermittent connectivity losses and resource access failures in two devices on the same LAN. After initial checks, the hypothesis of conflicting network configurations arises. What should the administrator do next to identify and rectify the issue?
Review DHCP server logs and settings on the devices for address assignments
Reboot the network's main router to reset the connections
Extend the DHCP lease time to decrease the frequency of address renewals
Switch out the connecting cables for the devices experiencing issues
Answer Description
The appropriate step when suspecting conflicting network address configurations is to check for entries in the DHCP server logs and inspect the settings on the devices involved. This allows the administrator to pinpoint the source of the conflict accurately. Options like restarting networking equipment or altering physical connections might seem plausible but don't address the core issue identified, which is related to address assignments and requires specific targeting.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are DHCP server logs and why are they important?
What could cause IP address conflicts on a local area network (LAN)?
What is the significance of checking device settings during troubleshooting?
Which of the following options BEST describes the primary function of 802.1X in a network environment?
Content filtering
Port-based Network Access Control
Data packet encryption
Network Address Translation
Answer Description
802.1X provides an authentication framework that allows network devices, such as switches and wireless access points, to become part of an authentication process before allowing further access to the network. This protocol works by encapsulating and transporting the authentication data between the client and the authentication server, typically using the Extensible Authentication Protocol (EAP). Port-based Network Access Control is a feature of 802.1X that denies all access to the network via the port to which the client is connected until the client's identity is verified and authorized. This involves blocking all traffic, except authentication messages, until the client is authenticated, serving to prevent unauthorized access. The other options, while related to network security, do not directly describe the function of 802.1X as thoroughly or accurately.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Port-based Network Access Control (PNAC)?
How does the Extensible Authentication Protocol (EAP) work with 802.1X?
What are the benefits of using 802.1X for network security?
What is the primary purpose of using a rack diagram in network documentation?
To illustrate the physical positioning of network hardware in a server rack
To monitor real-time data traffic
To record IP address allocations
To map out the logical flow of data across the network
Answer Description
A rack diagram is used primarily to detail the physical arrangement of hardware equipment within a server rack. This includes servers, routers, switches, and other network devices, providing a clear visual reference of how equipment is installed, and its exact location in the rack. This aids in troubleshooting, maintenance, and upgrading network components by offering a precise, easy-to-understand layout. Other options, while related to network operation, do not accurately describe the direct application of a rack diagram.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a rack diagram help with troubleshooting network issues?
What elements are typically included in a rack diagram?
How do rack diagrams differ from logical network diagrams?
What is the best definition of a 'Vulnerability' in the context of network security?
The person performing the attack
A successful type of network attack
A failure to launch an attack
A weakness in a system that can be exploited to perform unauthorized actions
Answer Description
A vulnerability refers to a weakness in a system that can be exploited by a threat actor to perform unauthorized actions. Understanding vulnerabilities is key to improving security measures by addressing these weaknesses before they can be exploited. 'A failure to launch an attack' does not represent a system weakness but rather highlights an unsuccessful attack attempt. 'The person performing the attack' and 'A successful type of network attack' focus on the attacker and the attack itself rather than the weakness being exploited.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common types of vulnerabilities in network security?
How can organizations protect against vulnerabilities?
What is the difference between a vulnerability and a threat?
That's It!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.