CompTIA · Free Practice Questions · Last reviewed May 2026
30 real exam-style questions organised by domain, each with the correct answer highlighted and a plain-English explanation of why it's right — and why the others are wrong.
A network administrator is troubleshooting a connectivity issue and suspects the problem is related to the physical cabling. At which layer of the OSI model should the administrator begin their investigation?
Transport layer
Data Link layer
Physical layer
The Physical layer defines the electrical, mechanical, and procedural interface to the transmission medium, making it the correct layer for cabling issues.
Network layer
A device is configured with IP address 192.168.1.130 and subnet mask 255.255.255.192. What is the network address of this device?
192.168.1.0
192.168.1.128
Correct: 130 is in the range 128-191, so the network address is 192.168.1.128.
192.168.1.192
192.168.1.64
A network technician is explaining the concept of encapsulation to a junior technician. At which OSI layer does a packet get encapsulated with a source and destination IP address?
Layer 2
Layer 3
The network layer (Layer 3) adds the IP header containing source and destination IP addresses. This is where logical addressing occurs, enabling routing across networks.
Layer 4
Layer 1
A network engineer is designing a new IPv6 addressing scheme. The company has been assigned a /48 prefix and needs to support up to 250 subnets. Which subnet size should be used to minimize waste while meeting the requirement?
/52
/56
A /56 prefix uses 8 bits for subnetting (48+8=56), providing 256 subnets (2^8). This meets the requirement of 250 subnets with minimal waste (6 unused subnets).
/64
/60
A network technician is explaining the difference between a hub and a switch to a junior technician. Which statement correctly describes a key difference between these devices?
A hub operates at Layer 2, while a switch operates at Layer 1.
A hub sends frames out all ports except the incoming port; a switch sends frames only to the port with the matching MAC address.
This accurately describes the behavior: hubs flood all ports, switches forward based on MAC address table.
A hub uses MAC addresses to make forwarding decisions, while a switch uses IP addresses.
A hub creates a separate collision domain for each port, while a switch creates a single collision domain.
A network engineer needs to connect two network segments that use different physical media: one segment uses copper Ethernet and the other uses fiber optic. The device must forward frames based on MAC addresses and must not perform any routing. Which device should the engineer choose?
Layer 3 switch
Media converter
Bridge
A bridge operates at Layer 2, can connect different media types, and forwards frames using MAC addresses without routing.
Router
Want more Networking Concepts practice?
Practice this domainA network engineer needs to segment a single physical switch into multiple broadcast domains to improve security and reduce traffic. Which technology should be implemented?
Spanning Tree Protocol (STP)
Virtual LAN (VLAN)
VLANs create separate broadcast domains on a switch, meeting the requirement.
VLAN Trunking Protocol (VTP)
Access Control List (ACL)
A router receives a packet destined for 10.0.0.15. It has the following routes in the routing table: 10.0.0.0/8 via 192.168.1.1, 10.0.0.0/16 via 192.168.2.1, 0.0.0.0/0 via 192.168.3.1. Which route will be used?
Default route (0.0.0.0/0)
10.0.0.0/16 via 192.168.2.1
This route has a longer prefix length (16) than the /8 route, and it matches the destination (10.0.0.15 is in 10.0.0.0/16).
10.0.0.0/8 via 192.168.1.1
None; the packet is dropped
A company has just installed a new fiber optic connection between two buildings 2 km apart. The connection is using multimode fiber. However, the signal is too weak at the receiving end. What is the most likely cause?
Attenuation due to distance
Multimode fiber has a maximum effective distance that varies by speed but is generally under 1 km for higher data rates. 2 km exceeds that limit, causing significant signal loss (attenuation).
Electromagnetic interference
Incorrect termination
Crosstalk
A small office uses a wireless router that provides both wired and wireless connectivity. The router's LAN IP is 192.168.1.1. A new printer with a static IP of 192.168.1.50 cannot be reached from a laptop obtaining an IP via DHCP. The laptop's IP is 192.168.1.100. Which of the following is the most likely cause?
The printer is on a different VLAN
The subnet mask is incorrect
If the printer is configured with a static subnet mask that is not /24 (e.g., /28 or /25), it will calculate that the laptop's IP is outside its local subnet. It will then try to send traffic to the default gateway instead of directly to the laptop, and if the gateway does not forward it (or the printer's gateway is wrong), communication fails.
The default gateway is misconfigured
The DHCP scope is exhausted
A network engineer has established an IPsec VPN tunnel between a branch office (10.0.0.0/24) and the main office (192.168.10.0/24). The tunnel shows as up and active, but users at the branch office cannot ping the main office server at 192.168.10.10. The main office can ping the branch office gateway successfully. What is the most likely cause of this issue?
Mismatched encryption algorithms between the two VPN peers
Incorrect static route on the branch router for the 192.168.10.0/24 network
A route pointing to the tunnel interface or the remote VPN peer is necessary for traffic from the branch to reach the main office LAN.
Firewall on the main office server blocking ICMP
Incorrect IKE authentication settings
A network administrator adds a new server to VLAN 20. The switch port is configured as an access port in VLAN 20, and the server has a correct static IP address in that subnet. However, the server cannot communicate with other devices in the same VLAN. The VLAN exists on the switch and other devices in VLAN 20 are working. What is the most likely cause of this issue?
The switch port is configured as a trunk port instead of an access port
A trunk port expects 802.1Q tagged frames; the server sends untagged frames, so the switch may not associate them with VLAN 20, causing communication failure within the VLAN.
VLAN 20 is not allowed on the trunk to the router
The server does not have a default gateway configured
The port is administratively down
Want more Network Implementation practice?
Practice this domainA network operations center uses SNMP to monitor device health. An administrator needs to retrieve the current CPU utilization from a router. Which SNMP operation is most appropriate?
GET
GET is used to read the value of a managed object, such as CPU utilization.
SET
TRAP
INFORM
A network administrator needs to ensure that network device configurations are automatically backed up to a central server. Which protocol is commonly used for secure file transfer of configurations?
TFTP
FTP
SFTP
SFTP provides secure encrypted file transfers over SSH, ideal for backing up configurations.
HTTP
An NOC technician observes that the CPU usage on a core switch has been consistently above 90% for the past hour. Which SNMP operation should the technician use to monitor the CPU load over time with minimal network overhead?
SNMP GET
SNMP GETNEXT
SNMP WALK
SNMP TRAP
SNMP traps are unsolicited messages from the agent to the NMS when certain events occur (e.g., CPU threshold exceeded). They reduce overhead because the NMS does not need to poll; the agent sends data only when necessary.
A network administrator is preparing to upgrade the firmware on a critical router. Which document should the administrator consult to understand the steps required to minimize downtime and ensure a successful upgrade?
SLA
Change management plan
The change management plan documents the process for making changes to the network, including risk assessment, detailed steps, testing, approval, and rollback procedures. It is the appropriate resource to ensure a methodical and safe upgrade.
Network diagram
Baseline performance report
An NOC technician receives an alert that latency on a critical WAN link has increased significantly. The technician needs to analyze the latency trend over the past week to identify patterns. Which approach is the most efficient for gathering this historical data?
Use SNMP traps to alert on each latency spike
Use SNMP polling with a suitable MIB to collect latency metrics at regular intervals
Polling gathers data at set intervals, which can be stored for trend analysis. This is the standard method for historical performance monitoring.
Run a continuous ping test and manually log timestamps
Use traceroute to identify each hop and measure latency per hop
A network administrator needs to upgrade the firmware on a critical core router. The admin has downloaded the new firmware and verified its checksum. Which of the following should the admin do before proceeding with the installation?
Back up the current router configuration
A configuration backup allows restoration to the pre-upgrade state if the new firmware causes issues or if rollback is needed.
Change the management IP address
Disable all physical interfaces
Remove the old firmware image
Want more Network Operations practice?
Practice this domainA security analyst notices that an attacker is sending crafted packets with overlapping IP fragments to a target server, causing the server to crash. Which type of attack is described?
Teardrop attack
The Teardrop attack exploits overlapping IP fragments, matching the description.
Smurf attack
Ping flood
SYN flood
A company wants to implement network access control that requires users to authenticate before gaining access to the network. The NAC solution uses a policy that checks for antivirus updates and OS patches. Which component enforces the policy?
Supplicant
Authenticator
The authenticator (e.g., a switch) enforces the policy by controlling the port state based on the authentication result.
Authentication server
Policy server
A security auditor is reviewing firewall logs and notices repeated login attempts from a single external IP address to the company's SSH server. Which type of attack is likely occurring?
Brute force attack
A brute force attack systematically tries passwords or encryption keys. In this case, repeated SSH login attempts from one IP are classic signs of a password guessing attempt.
Man-in-the-middle attack
ARP poisoning
DDoS attack
A network administrator wants to prevent unauthorized devices from connecting to the company's Ethernet ports. The company uses a centralized authentication server. Which IEEE standard should be implemented?
802.1X
IEEE 802.1X provides authentication for devices connecting to a LAN port. It uses EAP exchanges between the supplicant (device), authenticator (switch), and authentication server (RADIUS) to permit or deny access.
802.11i
802.3af
802.1Q
A security analyst notices that a web server is receiving a large number of ICMP echo reply packets from many different external hosts. The server did not send any echo requests. Which type of attack is most likely occurring?
Smurf attack
The Smurf attack uses IP broadcast and spoofing to cause multiple replies to be sent to the victim, creating a flood of ICMP traffic.
Ping flood
ICMP tunneling
Fraggle attack
A company wants to ensure that only authorized employee computers can connect to the wired network. Each computer must be authenticated before it is granted access to the network. Which technology is designed to provide this port-based authentication?
802.1X
802.1X provides port-based authentication for wired and wireless networks, requiring credentials before granting network access.
WPA2
MAC filtering
VPN
Want more Network Security practice?
Practice this domainA user reports intermittent connectivity on a laptop that moves between floors. The signal strength fluctuates. Which tool would best help identify signal interference and dead zones?
Cable tester
Multimeter
Spectrum analyzer
A spectrum analyzer visualizes RF signals, helping to locate interference and weak signal areas.
Protocol analyzer
A user reports that they cannot access the internet, but they can access local resources on the same subnet. The network administrator pings the default gateway and gets a response. Which tool should be used next to trace the path to an external website?
netstat
traceroute
Traceroute (tracert on Windows) sends packets with increasing TTL values to map the route to a destination. It can show where packets stop or time out, helping identify the point of failure.
nslookup
arp
After replacing a faulty switch, several users in the same VLAN report that they cannot communicate with the server that is on a different subnet. The switch is connected to the router via a trunk port. Which command should the administrator run on the router to verify that the VLAN is allowed on the trunk?
show vlan
show interfaces trunk
'show interfaces trunk' lists trunk interfaces, their mode, encapsulation, and the allowed VLAN list. If the required VLAN is not in the allowed list, traffic for that VLAN will not pass over the trunk.
show mac address-table
show ip route
A user reports that they cannot access an internal web server at http://intranet.company.local but can access other internet websites. The technician runs ping intranet.company.local and receives replies successfully. Which tool should the technician use next to isolate the issue?
nslookup
nslookup queries DNS servers to verify hostname-to-IP resolution, which is the most likely cause when ping succeeds but web access fails.
tracert
netstat
ipconfig
A user calls the help desk stating that they cannot access any network resources. The technician asks the user to run ipconfig and the output shows an IP address of 169.254.15.20 with a subnet mask of 255.255.0.0. Which of the following is the most likely cause?
The DNS server is not responding
The DHCP server is unreachable
When DHCP fails, Windows automatically assigns an APIPA address, indicating the device could not contact a DHCP server.
The default gateway is misconfigured
There is a duplicate IP address on the network
A network technician is troubleshooting intermittent internet access for a single user. The user’s workstation can ping the default gateway consistently, but web pages fail to load intermittently. Which of the following should the technician check NEXT?
A) DNS server configuration
Correct. DNS is responsible for resolving domain names to IP addresses. If DNS is intermittent, web pages will fail to load while other IP-based connectivity (like pinging the gateway) works.
B) DHCP lease time
C) Switch port speed and duplex settings
D) Firewall rules blocking ICMP
Want more Network Troubleshooting practice?
Practice this domainThe N10-009 exam has up to 90 questions and must be completed in 90 minutes. The passing score is 720/1000.
The N10-009 exam uses multiple-choice, multiple-select, drag-and-drop, and exhibit-based questions. Exhibit questions show CLI output, network diagrams, or routing tables and ask you to interpret them — exactly the format Courseiva uses.
The exam covers 5 domains: Networking Concepts, Network Implementation, Network Operations, Network Security, Network Troubleshooting. Questions are weighted by domain — higher-weight domains appear more on your actual exam.
No. These are original exam-style practice questions written against the official CompTIA N10-009 exam objectives. They are not copied from the real exam. Courseiva focuses on genuine understanding, not memorisation of braindumps.
Courseiva tracks your accuracy per domain and routes you toward weak areas automatically. Free, no account required.