CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
Which protocol would optimally support a secure client-server communication that involves sensitive data transactions, specifically needing both authentication of the server and encryption of the data?
LDAP
HTTPS
HTTP
SNMP
Answer Description
HTTPS (Hypertext Transfer Protocol Secure) is the best choice for secure client-server communications involving sensitive data because it incorporates SSL/TLS to encrypt data in transit and authenticate the server. This ensures that all data sent between the client and server is protected. In contrast, HTTP (Hypertext Transfer Protocol) is incorrect as it does not include encryption and sends data in cleartext. LDAP (Lightweight Directory Access Protocol) is used for accessing and maintaining distributed directory information services and does not inherently encrypt data in its standard form. SNMP (Simple Network Management Protocol) is used for network management; while newer versions have security features, its primary purpose is not for general secure data exchange.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SSL/TLS and why is it important in HTTPS?
How does HTTPS differ from HTTP?
What are the scenarios where HTTPS is necessary?
A university campus with multiple buildings has received numerous complaints from students about dropped video calls and intermittent connectivity issues on their devices as they move between lecture halls. The network administrator suspects problems in the wireless network settings associated with client roaming. What is the most effective adjustment that can address these roaming issues and enhance connectivity stability?
Optimize the SCTP settings on the network controllers
Increase the transmit power on all access points
Adjust the Quality of Service (QoS) configurations
Modify the RSSI threshold settings
Answer Description
Fine-tuning the RSSI (Received Signal Strength Indicator) threshold can significantly enhance the roaming experience by determining the sensitivity of when a device should switch to a stronger signal access point, thus maintaining steadier connectivity. Adjusting transmit power primarily affects the range and strength of the signal emitted by access points but does not directly optimize how devices roam between them. Although SCTP optimization might appear related to performance, it mainly deals with transport protocols for session initiation tasks rather than wireless roaming. Lastly, tweaking QoS settings is generally geared towards prioritizing traffic types over the network and would not specifically resolve roaming transitions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is RSSI and how does it affect wireless connections?
What are access points and how do they support client roaming?
Why is Quality of Service (QoS) important in a wireless network?
What type of data is primarily used in performance monitoring to assess network efficiency and identify potential issues?
Traffic analysis data
Error logs
Usage statistics
Security alerts
Answer Description
Traffic analysis data is the most relevant for performance monitoring because it provides insights into the volume and type of traffic flowing through a network. This information is crucial for assessing the network's efficiency, identifying bottlenecks, and understanding overall network health. Usage statistics, while related, more broadly cover the general use of the network without detailed traffic insights. Error logs are important for identifying problems but do not provide a comprehensive overview for performance metrics typically monitored for optimization. Security alerts focus specifically on potential security incidents, not performance metrics.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What kinds of metrics are included in traffic analysis data?
How can traffic analysis data be collected and analyzed?
Why is traffic analysis more effective for performance monitoring compared to usage statistics and error logs?
A company is deploying a software-defined wide area network (SD-WAN) solution to connect multiple branches. The IT administrator needs to ensure that the SD-WAN solution maintains optimal performance and reliability regardless of the underlying transport mechanisms (MPLS, broadband, LTE, etc.). What feature should the IT administrator focus on configuring in the SD-WAN controller to achieve this?
Dynamic routing configurations
Encryption standards
Transport agnostic capabilities
Zero-touch provisioning
Answer Description
Configuring the transport agnostic feature is crucial as it allows the SD-WAN system to function efficiently across various types of network connections (MPLS, broadband, LTE, etc.) without needing specific adjustments for each type. This feature abstracts the details of the underlying transport mechanisms, allowing seamless connectivity and management. Other options listed either do not relate directly to managing diverse transport mechanisms or involve security, not operational connectivity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are transport agnostic capabilities in SD-WAN?
How does SD-WAN improve network performance and reliability?
What role does the SD-WAN controller play in managing different transport mechanisms?
What is the primary purpose of using the ping
command in network troubleshooting?
To physically map out the network infrastructure
To determine the speed of the network connection
To automatically resolve any detected network connectivity issues
To test the reachability of a host on an IP network and measure the round-trip time for messages sent
Answer Description
The primary purpose of the ping
command is to test the reachability of a host on an IP network and measure the round-trip time for messages sent from the originating host to a destination computer. This is crucial for initially diagnosing connectivity issues. Answers involving speed testing or direct problem resolution are incorrect because ping
does not measure network speed in terms of throughput and cannot resolve the problems itself; it merely checks connectivity and latency.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does the `ping` command actually work?
What are some common uses of the `ping` command in troubleshooting?
What are the limitations of using the `ping` command?
An IT technician is tasked with upgrading the network infrastructure of a small business to support higher speed applications such as video conferencing and large file transfers. The current network uses Cat 5e Ethernet cables. Which type of cable should the technician recommend to significantly increase the speed capacity of the network?
Cat 6a
Cat 6
Cat 7
Cat 5e
Answer Description
The correct answer is Cat 6a because it supports speeds up to 10 Gbps over distances up to 100 meters, which is ideal for a modern small business requiring high-speed applications like video conferencing and large file transfers. In contrast, Cat 6 supports 10 Gbps but only up to 55 meters in high crosstalk environments, making it less reliable for consistent high-speed delivery across a business premise. Cat 5e, supporting up to 1 Gbps, currently does not meet the requirements for higher speed applications. Cat 7, although capable of up to 10 Gbps, is typically used for specific cases due to its shielded system and is not a common upgrade path from Cat 5e.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the differences between Cat 5e, Cat 6, and Cat 6a cables?
What is crosstalk, and why does it matter for network cabling?
Why is Cat 6a generally recommended over Cat 7 for small business upgrades?
To enhance security by ensuring that domain name resolutions are authenticated and verifiable, which technology should be implemented?
DNSSEC
SSL
DNS over TLS (DoT)
DNS over HTTPS (DoH)
Answer Description
DNSSEC (Domain Name Security Extensions) enhances the security of the domain name system by signing records with public key cryptography. This allows client systems to verify the authenticity and integrity of the response, protecting against certain types of attacks such as cache poisoning. Technologies like DoH and DoT, while providing confidentiality through encryption of requests, do not offer mechanisms for response validation akin to DNSSEC.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DNSSEC and how does it work?
What is cache poisoning and why is it a security concern?
How does DNSSEC differ from other DNS encryption methods like DoH and DoT?
Users in a branch office report very slow Internet access. When the network technician examines the primary router, the routing table shows that the 0.0.0.0/0 entry is pointing to the wrong next-hop address. Which of the following is the most likely impact of this incorrect default route on the network?
Packets destined for unknown networks are forwarded to the wrong gateway, causing delayed or failed access to external resources.
The DHCP server will quickly exhaust its address pool and stop leasing new addresses.
Switch ports will detect a spanning-tree loop and go into a blocking state, resulting in broadcast storms.
Hosts on the LAN will begin reporting duplicate IP-address conflicts.
Answer Description
The default route is used whenever a destination network is not found elsewhere in the routing table. If it points to the wrong next-hop, packets destined for the Internet (or any unknown network) will be forwarded toward an unreachable or incorrect gateway. The result is that external resources become slow or unreachable while internal LAN traffic is unaffected. Duplicate-IP errors, spanning-tree loops, and DHCP scope exhaustion are unrelated to the default-route setting, so those choices are incorrect.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are routing tables and how do they work?
What is a default route in network routing?
How does incorrect routing impact internet speeds?
What is typically the goal of an unauthorized server that assigns network configurations to clients?
To monitor network performance and traffic
To filter and secure network traffic
To disrupt network operations by issuing incorrect network information
To increase network efficiency by providing backup configuration services
Answer Description
An unauthorized server that assigns network configurations, such as a rogue DHCP server, often intercepts or disrupts network traffic by providing incorrect configurations to clients. This misdirection can lead to man-in-the-middle attacks or other security breaches, highlighting why understanding this threat is crucial. The incorrect answers do not accurately describe the primary malicious intent of such a server.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a man-in-the-middle attack?
What are the potential impacts of incorrect network configurations on clients?
What measures can be taken to prevent unauthorized servers from assigning network configurations?
You are troubleshooting a fiber optic network in your organization and suspect there may be a physical fault in the fiber optic cable due to recent construction near the cable pathway. You decide to use a visual fault locator to identify the location of any potential faults. What type of issue are you specifically looking to detect with this tool?
Problems related to improper termination of the cable ends
Incorrect type of fiber optic cable used
Signal degradation due to interference or crosstalk
Breaks or severe bends in the fiber optic cable
Answer Description
A visual fault locator is used to detect physical issues in fiber optic cables, specifically pinpointing exact location of breaks or severe bends affecting the cable's integrity. It emits a bright light that leaks through breaks or faults, visually indicating where the defect lies. Incorrect cable types and improper termination primarily involve using wrong materials or faulty setup procedures which can't typically be detected directly through a visual inspection of light leakage. Signal degradation pertains to the reduction in signal quality over distance or due to interference, but it wouldn't be visually detectable using this method.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a visual fault locator work?
What are severe bends in fiber optic cables, and why are they a problem?
What are the effects of signal degradation in fiber optics?
A network engineer is tasked with setting up a long-distance fiber optic link between two data centers located 120 kilometers apart. Which type of fiber optic cable should the engineer use to ensure efficient and reliable data transmission over this distance?
Coaxial cable
Category 6 cable
Multimode fiber
Single-mode fiber
Answer Description
Single-mode fiber is designed for long-distance data transmission, capable of carrying signals over 100 kilometers without the need for signal repeaters due to its ability to limit light mode dispersion. This makes it the appropriate choice for distances like 120 kilometers between two data centers. Multimode fiber, on the other hand, is typically used for shorter distances up to 2 kilometers due to modal dispersion, which can lead to signal loss over longer distances.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between single-mode and multimode fiber optic cables?
Why is modal dispersion an issue for multimode fiber cables?
What are some common applications for single-mode fiber optic cables?
A network technician is setting up a wired Ethernet network for a new office. To ensure that each connected device operates within its own collision domain and can utilize the full available bandwidth, which device should the technician install?
Hub
Switch
Access Point
Router
Answer Description
A switch is the correct answer because it creates a separate collision domain for each port, allowing each connected device to operate without collisions with devices on other ports and use the full available bandwidth. A hub, by contrast, places all connected devices into a single collision domain, forcing them to share bandwidth and leading to performance degradation from frequent collisions. A router operates at Layer 3 to separate broadcast domains and route traffic between different networks, which is a different function than managing collision domains within a single LAN segment. An access point is used for wireless connectivity and creates a shared collision domain for all wireless clients connected to it, using collision avoidance (CSMA/CA) instead of eliminating collisions in the way a switch does for wired devices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a collision domain?
How does a switch differ from a hub?
Why is bandwidth important in a network?
Which IP protocol is particularly suited for establishing secure tunnels over the internet, often used in conjunction with VPNs?
Internet Protocol Security (IPSec)
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Generic Routing Encapsulation (GRE)
Answer Description
IPsec is designed to securely exchange data over public networks by encrypting and authenticating IP packets. It establishes mutual authentication and negotiates cryptographic keys, making it ideal for VPN tunnels. GRE can encapsulate many protocol types inside IP tunnels but lacks inherent encryption. UDP supports fast, connectionless transmission without built-in security, while TCP provides reliable delivery but no native encryption or confidentiality mechanisms.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does VPN stand for and how does it relate to IPSec?
Can you explain how encryption works in IPSec?
What are the differences between the main IPSec protocols?
What is the primary purpose of DHCP in a network environment?
Automates the assignment of IP addresses and other network settings to devices on a network
Encrypts data traffic at the transport layer
Resolves domain names to IP addresses
Provides a secure channel for remote administration
Answer Description
DHCP, or Dynamic Host Configuration Protocol, automates the assignment of IP addresses, subnet masks, gateways, and other network settings. This automation simplifies the management of IP address allocation, reduces configuration errors, and supports the easy addition of new devices to the network without the need for manual IP configuration. The other options are incorrect. Resolving domain names to IP addresses is the primary function of DNS. Encrypting data traffic at the transport layer is a function of protocols like TLS. Providing a secure channel for remote administration is a function of protocols like SSH.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What other settings can DHCP configure besides IP addresses?
What happens if a DHCP server fails?
How does DHCP improve network management?
Which of the following best describes Multifactor Authentication?
A process where a user must input their username and password twice for enhanced security.
An authentication scheme where users sign in using their voice alone.
A security measure where users require a single passcode to access multiple systems.
A method where two or more independent credentials are required for verification.
Answer Description
Multifactor Authentication (MFA) requires users to provide multiple forms of verification to access a system. This method significantly increases security by requiring two or more independent credentials, combining something the user knows, something the user has, or something the user is. This setup blocks unauthorized access more effectively than methods relying on a single authentication factor.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of factors used in Multifactor Authentication?
How does Multifactor Authentication increase security compared to single-factor authentication?
Can you provide examples of where Multifactor Authentication is used?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.