CompTIA Network+ Practice Test (N10-009)
Use the form below to configure your CompTIA Network+ Practice Test (N10-009). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Network+ N10-009 (V9) Information
The CompTIA Network+ N10-009 certification exam is a key credential for IT professionals specializing in network technologies and infrastructure. This exam assesses a candidate's ability to design, configure, manage, and troubleshoot wired and wireless network devices. Unlike more specialized certifications, the Network+ offers a broad foundation, making it ideal for early-career network technicians and administrators. It covers emerging technologies like cloud computing and virtualization, while also emphasizing traditional networking concepts and practices. By passing the N10-009 exam, candidates demonstrate their expertise in these areas, proving their readiness for roles such as network administrator, network field technician, and help desk technician.
The exam's content is divided into several key areas. Network architecture forms a significant part, where candidates must understand the design and implementation of functional networks, including network components and their roles in network services. Network security is also crucial, requiring knowledge of security concepts and protocols, as well as the skills to implement security features on network devices. The exam also tests on network operations and troubleshooting, focusing on monitoring tools, network performance optimization, and problem-solving techniques. Moreover, it includes newer areas like cloud computing and virtualization, reflecting the evolving nature of network technology. This wide-ranging scope ensures that professionals holding the Network+ certification are equipped to support and manage modern network environments effectively.
More reading:
Free CompTIA Network+ N10-009 (V9) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Networking ConceptsNetwork ImplementationNetwork OperationsNetwork SecurityNetwork Troubleshooting
A network administrator is setting up a secure email transmission service that encrypts SMTP traffic. Which port should the administrator configure the email server to listen to in order to secure email messages?
Port 587
Port 443
Port 993
Port 25
Answer Description
Port 587 is used for secure email communication over SMTP, commonly known as SMTPS. This port allows email to be sent securely via an encrypted connection, which is crucial for protecting sensitive information during transmission. Port 25 is the default for unencrypted SMTP, and while port 443 is commonly used for HTTPS, it is not used for securing SMTP. Port 993 is for IMAPS, which is used for receiving emails securely, not sending.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SMTP and why is it important for email communication?
What does SMTPS mean, and how does it differ from regular SMTP?
What role do ports play in network communications, specifically for email protocols?
In a small company's local network, an IT technician suspects that there might be a Layer 2 loop occurring because of improper switch configuration. Which feature should be enabled on the company's network switches to prevent broadcast storms and ensure efficient handling of network frames?
Loop Detection and Prevention Protocol (LDPD)
Port Mirroring
Quality of Service (QoS)
Spanning Tree Protocol (STP)
Answer Description
The correct answer is Spanning Tree Protocol (STP). STP is a Layer 2 loop-prevention mechanism that creates a loop-free logical topology by exchanging Bridge Protocol Data Units (BPDUs), electing a root bridge, and blocking redundant paths. This stops broadcast storms while keeping backup links available if the primary path fails. Port Mirroring simply copies traffic to another port for monitoring and has no role in topology control. Quality of Service (QoS) classifies and prioritizes traffic but does not detect or block loops. "Loop Detection and Prevention Protocol (LDPD)" is not an industry-standard feature.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Spanning Tree Protocol (STP)?
What is the difference between STP and Rapid Spanning Tree Protocol (RSTP)?
How does a Layer 2 loop affect network performance?
Which of the following capabilities is typically provided by an enterprise IP address management (IPAM) solution?
Filtering unsolicited bulk e-mail (spam) at the network perimeter
Automatic discovery of DHCP scopes and real-time tracking of IP lease status
Encrypting web traffic using SSL/TLS certificates
Monitoring per-interface CPU utilization on routers and switches
Answer Description
IPAM platforms automatically discover DHCP scopes, track real-time lease status, and integrate this information with subnet and address-pool documentation. These features allow administrators to monitor both dynamically assigned and static IP space from a single console. Functions such as SSL/TLS encryption, spam filtering, and CPU-utilization monitoring fall under other network or security tools, not IPAM.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are dynamic IP addresses, and how do they differ from static ones?
What is DHCP and how does it relate to IP address management?
What other features do IPAM tools offer beyond just managing IP addresses?
Which of the following options BEST describes the primary function of 802.1X in a network environment?
Network Address Translation
Port-based Network Access Control
Content filtering
Data packet encryption
Answer Description
802.1X provides an authentication framework that allows network devices, such as switches and wireless access points, to become part of an authentication process before allowing further access to the network. This protocol works by encapsulating and transporting the authentication data between the client and the authentication server, typically using the Extensible Authentication Protocol (EAP). Port-based Network Access Control is a feature of 802.1X that denies all access to the network via the port to which the client is connected until the client's identity is verified and authorized. This involves blocking all traffic, except authentication messages, until the client is authenticated, serving to prevent unauthorized access. The other options, while related to network security, do not directly describe the function of 802.1X as thoroughly or accurately.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Port-based Network Access Control (PNAC)?
How does the Extensible Authentication Protocol (EAP) work with 802.1X?
What are the benefits of using 802.1X for network security?
Which IPv4 address range correctly defines the scope reserved for Class D multicast addresses?
230.0.0.0 to 239.0.0.0
224.0.0.0 to 239.255.255.255
192.0.0.0 to 223.255.255.255
127.0.0.0 to 127.255.255.255
Answer Description
Class D addresses are designated for multicast usage and range from 224.0.0.0 to 239.255.255.255. This range supports multicast groups for applications like streaming media. The other options are incorrect. The range 192.0.0.0 to 223.255.255.255 is assigned to Class C addresses. The 127.0.0.0 to 127.255.255.255 block is the loopback address range, which is reserved for internal testing on a local machine.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a multicast address and how is it used?
What are the classifications of IP addresses and why are they important?
What are the roles of loopback addresses in networking?
When configuring EIGRP in a network, what is the primary benefit of using unequal-cost load balancing?
It ensures a quicker convergence time than other dynamic routing protocols.
It provides a robust way to utilize available network bandwidth and redundancy by involving multiple feasible paths.
It prevents routing loops through the implementation of the split horizon rule.
It simplifies the metric calculation process used in best path selection.
Answer Description
EIGRP's ability to support unequal-cost load balancing allows the protocol to use multiple paths of different metrics to the same destination, unlike protocols that support only equal-cost paths. This extends the capability of a network by using all viable paths effectively, increasing bandwidth and redundancy without compromising the routing efficiency.
The incorrect answers referenced methods that are either not directly linked to EIGRP's advanced capabilities (like basic split horizon) or are benefits of EIGRP that do not address the specific capability of unequal-cost load balancing - speed (not a unique feature of using this type of load balancing) or metrics simplification (which is related broadly to how EIGRP calculates path costs but not specifically to the benefit of unequal-cost load balancing).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is unequal-cost load balancing in EIGRP?
How does EIGRP determine path metrics for load balancing?
What are some advantages of using EIGRP with unequal-cost load balancing?
Which protocol is commonly used for accessing and managing directory services over an IP network?
HTTP
SSH
LDAP
DNS
Answer Description
LDAP (Lightweight Directory Access Protocol) is the correct answer because it is designed specifically for providing access to directory services over IP networks, making it a key tool in network administration for managing user identities and relations. LDAP typically operates on TCP port 389. DNS (Domain Name System), which operates on port 53, is primarily used for translating domain names into IP addresses. SSH (Secure Shell), which utilizes port 22, is used for secure remote logins and file transfers. HTTP (Hypertext Transfer Protocol), on port 80, is the foundation of data communication for the World Wide Web.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is LDAP used for in network administration?
What are the main differences between LDAP and DNS?
Can LDAP be used on different operating systems?
A company wants to provide internet access to visitors in its lobby. A network technician needs to ensure that visitors cannot access the company's internal servers and sensitive data. Which of the following is the BEST method to achieve this goal?
Implement a guest network on a separate VLAN.
Configure a firewall to block all traffic from visitor devices.
Provide visitors with the password to the primary corporate Wi-Fi network.
Enable MAC filtering on the primary corporate access point.
Answer Description
The best method for providing internet access to guests while protecting the internal network is to implement network segmentation. Creating a separate guest network, often on its own Virtual LAN (VLAN), effectively isolates guest traffic from the internal corporate network. This allows guests to access the internet without being able to reach sensitive internal resources. Providing the corporate Wi-Fi password would grant visitors access to the internal network, which is a significant security risk. MAC filtering is used to control which specific devices can connect but does not segment traffic for a group of unknown guest devices. Blocking all traffic with a firewall would prevent guests from accessing the internet entirely, defeating the objective.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network segmentation?
How does guest network access work?
What are the security benefits of a separate guest network?
A corporate environment is planning to expand its wireless network across multiple offices. The network manager wants to ensure centralized control over all wireless access points to streamline configurations and management. Which type of access point should be used?
Unmanaged switches
Autonomous access points
Managed switches
Lightweight access points
Answer Description
Lightweight access points are designed for scenarios where centralized control is required. They do not handle all of their processing and rely on a wireless controller to manage their configurations and data traffic, ideal for large environments requiring uniform policies and simplicity in managing multiple devices. Autonomous access points, while capable of independent operation, are more suited to smaller scale or standalone deployments where centralized management is not as critical. Managed and unmanaged switch options do not directly pertain to the control over wireless access points.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a wireless controller, and how does it relate to lightweight access points?
What are the main advantages of using lightweight access points over autonomous access points?
In what scenarios would an autonomous access point be more appropriate than a lightweight access point?
What is the primary role of a NAT gateway in a network environment?
To control access to the network based on predefined security policies.
To assign dynamic IP addresses to devices within the network.
To translate private IP addresses of a local network into a public IP address for Internet connectivity.
To provide a direct routing path from a private network to the Internet without translation.
Answer Description
A NAT gateway allows multiple hosts that use private IP addresses to initiate connections to external networks (such as the Internet) by translating each internal address to the gateway's public address (SNAT). This conserves public IPv4 space and hides internal addressing from outside hosts.
Network Access Control (NAC) products enforce security policies to determine whether a user or device is permitted onto the network, but they do not perform address translation. A DHCP server dynamically leases IP addresses and other TCP/IP settings to hosts. An Internet gateway acts as the edge router that routes traffic between a network and the Internet; it carries out one-to-one translation for resources that already have public IPs, but it does not let private-only addresses reach the Internet without a separate NAT device.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are private and public IP addresses?
What are the security advantages of using a NAT gateway?
How does a NAT gateway work with dynamic IP addressing?
A network administrator notices that devices on the local network are unable to access external websites. After verifying that internet services from the ISP are operational and that internal resources are accessible, the administrator suspects an issue with the network's routing configuration. What configuration error is likely causing the devices to fail connecting to external websites?
The routing table contains incorrect entries for local subnets.
ACLs are blocking access to external network addresses.
The default gateway is not correctly configured on the router.
Incorrect subnet masks are configured on the devices.
Answer Description
The likeliest issue in this scenario is that the default gateway is not configured or incorrectly configured on the router. The default gateway provides the necessary routing information for forwarding packets destined for external networks and the internet. If it's missing or incorrect, devices can communicate within the local network but fail to find a route for external addresses. Incorrect entries in the routing table typically only affect specific network segments, and incorrect subnets would largely prevent local communications, not just external communications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a default gateway and why is it important?
How do I check if the default gateway is configured correctly?
What could happen if the routing table has incorrect entries?
What principle does role-based access control (RBAC) primarily employ to manage user permissions and access within a network?
Using a single master password for access control
Assigning permissions based on the specific roles within an organization
Implementing multifactor authentication for access verification
Granting every user individual permissions based on personal requests
Answer Description
Role-based access control (RBAC) uses predefined roles associated with specific permissions. Users are then assigned to these roles, thereby inheriting the permissions. This method is effective in managing large numbers of users and can simplify the administration of network permissions and security. The incorrect answers mentioned relate to other management strategies or access authentication methods, which are not directly related to the foundational principle of RBAC.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are predefined roles in RBAC?
How does RBAC simplify network management?
What are the benefits of using RBAC over individual permissions?
Which of the following is the best description of how Anycast operates within a network?
Anycast uses one IP address to direct a packet randomly to any one of multiple devices
Anycast restricts an IP address to a single device, ensuring direct routing
Anycast allows multiple devices to share the same IP address, with routers directing client requests to the nearest device
Anycast sends a packet to all devices within a broadcast domain
Answer Description
Anycast addresses are used by routers to enable requests from clients to be sent to the nearest server using the same IP address. This is particularly useful for load balancing and optimizing response times in networks. The other options describe either different IP addressing types or incorrect interpretations of Anycast.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of Anycast in a network?
How does Anycast differ from Unicast and Multicast?
What are the advantages of using Anycast for DNS servers?
A company is planning to extend their on-premises data center into the cloud to handle overflow traffic during peak times. They want to ensure that their cloud resources in this hybrid setup operate under the same network policies and security controls as their existing on-premises infrastructure. Which technology is most suitable for creating an isolated section of the cloud that can be provisioned with its own set of policies?
Network Security Group
Virtual Private Cloud (VPC)
Direct Connect
VPN Gateway
Answer Description
A Virtual Private Cloud (VPC) is designed specifically for this purpose. It allows users to create a segregated environment within a public cloud, where they can define and control network configurations, including IP address range, subnets, network gateways, and security settings. This isolation ensures that the resources inside a VPC have the same level of security and networking rules as the on-premises infrastructure, making it the correct choice. Other options, like Direct Connect or VPN, are meant for establishing connectivity rather than managing detailed network policies and isolation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a Virtual Private Cloud (VPC)?
How do security controls work in a VPC?
What are some use cases for a VPC?
A network administrator observes intermittent connectivity losses and resource access failures in two devices on the same LAN. After initial checks, the hypothesis of conflicting network configurations arises. What should the administrator do next to identify and rectify the issue?
Review DHCP server logs and settings on the devices for address assignments
Switch out the connecting cables for the devices experiencing issues
Reboot the network's main router to reset the connections
Extend the DHCP lease time to decrease the frequency of address renewals
Answer Description
The appropriate step when suspecting conflicting network address configurations is to check for entries in the DHCP server logs and inspect the settings on the devices involved. This allows the administrator to pinpoint the source of the conflict accurately. Options like restarting networking equipment or altering physical connections might seem plausible but don't address the core issue identified, which is related to address assignments and requires specific targeting.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are DHCP server logs and why are they important?
What could cause IP address conflicts on a local area network (LAN)?
What is the significance of checking device settings during troubleshooting?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.