CompTIA N10-009 Exam (page: 1)
CompTIA Network+
Updated on: 25-Sep-2025

Viewing Page 1 of 86

SIMULATION
A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS
Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the correct settings:
-Ensure each device accesses only its correctly associated network.
-Disable all unused switchports.
-Require fault-tolerant connections between the switches.
-Only make necessary changes to complete the above requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.






























  1. See Explanation section for answer.

Answer(s): A

Explanation:

Analysis and Configuration Recommendations:
Switch 1 Configurations:
Port 1 to Port 7:
- Ports should have VLANs set according to the devices they connect to. For instance, if a port is connecting to servers, only the VLAN for servers (e.g., VLAN 90) should be enabled and tagged if required.
- Ensure unused VLANs are not active or set to untagged on these ports to prevent unauthorized network access.Port 8:
- This port's configuration needs to align with the devices it connects to. Based on your first image, adjust the VLAN tagging accordingly. If it connects to printers, VLAN 60 should be tagged, and all other VLANs should be disabled or untagged.Switch 3 Configurations:
Ports 2 to 8:
- The configurations here must also match the connected devices. For mobile user connections, only VLANsrelevant to user access (like VLAN 150 for WLAN) should be enabled and set to tagged or untagged based on network policies.
- Any VLAN not associated with the connected devices should be disabled to secure the network.
Fault Tolerant Connections:
Ensure redundancy:
If these switches are connected via multiple ports, configure Link Aggregation Control Protocol (LACP) if not already set up to provide redundancy and increased bandwidth.
Check duplex and speed settings:
Ensure that duplex settings are set to Auto to avoid duplex mismatch which can cause performance issues.
Disabling Unused Ports:
Any port not connected or not planned to be used should be disabled to prevent unauthorized access or network breaches.
Final Checks:
Verify settings:
After configuration changes, verify all settings to ensure they adhere to network policies and the devices are performing as expected.
Documentation:
Update network documentation to reflect changes for future troubleshooting and audits.



SIMULATION
A network technician was recently onboarded to a company. A manager has tasked the technician with documenting the network and has provided the technician with partial information from previous documentation.

INSTRUCTIONS

Click on each switch to perform a network discovery by entering commands into the terminal. Type help to view a list of available commands.
Fill in the missing information using the drop-down menus provided.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

  1. See Explanation section for answer.

Answer(s): A

Explanation:

Steps for Network Documentation:
1. Network Discovery:
Use discovery commands on each switch to collect data about connected devices. Common commands include show mac-address-table to view MAC addresses associated with the ports and show ip interface brief to check the IP configuration of switch interfaces.
2. Document MAC and IP Addresses:
From the MAC address table, document the MAC addresses linked to each port. In your provided image, select the appropriate MAC address for each PC (e.g., PC1, PC2, PC3, PC4) based on their connection to Access Switch 1 or 2.Assign and document IP addresses for each device from the range available in the dropdown (e.g., 10.10.30.51 for PC1).
3. VLAN Assignment:
Assign and document VLANs for each PC according to network segmentation policies. It seems VLAN 10 and 20 are options; ensure each PC is assigned to the correct VLAN based on their network usage (e.g.,regular users, admin, guest network).
4. Interface Configuration:
Document the interface each PC is connected to on their respective Access Switch. Ensure the interface matches the physical connection layout.
Final Verification:
Use commands like show vlan to verify that VLAN assignments are correct across devices.
Use show running-config to verify the overall configuration and ensure it aligns with security and operational policies.



SIMULATION
Users are unable to access files on their department share located on file server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identify any issues, and configure the appropriate solution.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


















  1. See Explanation section for answer.

Answer(s): A

Explanation:

Issue Identified:
Workstation A cannot access File Server 2 due to missing routing information.
Solution:
1. Review Router Configuration:
Analyze the routing tables on Routers A, B, and C to confirm whether routes to the File Server 2 subnet are present.
2. Add Static Route:
Install a static route on the router that connects Workstation A’s network to File Server 2’s network:
Destination Prefix:
Enter the network address of File Server 2.Destination Prefix Mask:
Enter the subnet mask for File Server 2’s network.Interface:
Select the router interface that faces towards File Server 2’s network.
3. Action:
Configure the static route using the routing configuration panel on the router that requires the update.Save the changes and test connectivity from Workstation A to File Server 2 to ensure the issue is resolved.



SIMULATION
A network administrator has been tasked with configuring a network for a new corporate office. The office
consists of two buildings, separated by 50 feet with no physical connectivity. The configuration must meet the following requirements:
Devices in both buildings should be able to access the Internet.
Security insists that all Internet traffic be inspected before entering the network. Desktops should not see traffic destined for other devices.

INSTRUCTIONS

Select the appropriate network device for each location. If applicable, click on the magnifying glass next to any device which may require configuration updates and make any necessary changes.
Not all devices will be used, but all locations should be filled.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


  1. See Explanation section for answer.

Answer(s): A

Explanation:

Central Device Connecting to the Internet (marked with a question mark at the top middle connecting to the Internet):
Device:
Firewall
Reason:
To inspect and filter all internet traffic before it enters the network, ensuring security compliance.
Device between Building A and the Internet (first question mark inside Building A): Device:
Router
Reason:
To route traffic between the internal networks (Building A, Building B) and the internet via the firewall.
Devices inside Building A (two question marks linked to desktops and server infrastructure):
Device:
Switch
Reason:
To connect all desktops and servers within Building A, ensuring that each device can communicate with others within the building without seeing traffic destined for other devices.
Device connecting Building A to Building B (question mark between the two buildings):
Device:
Wireless range extender
Reason:
Given the 50 feet separation and no physical connectivity, a wireless range extender can bridge this gap by extending the wireless signal from Building A to Building B, facilitating network access across both buildings.
Device inside Building B (question mark inside Building B):
Device: Switch
Reason: To provide connectivity for the devices in Building B, allowing them to connect to the network and access resources in Building A as well as the internet.



SIMULATION
A network technician needs to resolve some issues with a customer's SOHO network. The customer reports that some of the devices are not connecting to the network, while others appear to work as intended.

INSTRUCTIONS

Troubleshoot all the network components and review the cable test results by clicking on each device and cable. Type help in each terminal to view a list of available commands.
Diagnose the appropriate component(s) by identifying any components with a problem and recommend a solution to correct each problem.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
























  1. See Explanation section for answer.

Answer(s): A

Explanation:

Router and Firewall Configuration:
Ensure that all routers are configured with correct static routes to facilitate proper network traffic routing between different VLANs and external networks.
Install a firewall at the network's entry point to inspect and filter Internet traffic as required by the security policy.
Switch Configuration:
Configure switches to ensure PCs in different VLANs do not see each other's traffic. Implement VLAN tagging on the switches to segregate traffic between the different departments as indicated.
Cable Test Results:
Address any faulty cables as indicated by the test results. For example, any cable showing physical connection issues (crossed pairs, etc.) should be replaced.
Ensure that cables are appropriately labeled and meet the length requirements to avoid potential transmission issues over long distances.
Device Specific Issues:
For devices showing incorrect configuration details such as bad IP addresses, subnet masks, or DNS configurations, apply appropriate corrections. For instance, resetting IP configurations or updating DNS settings where mismatches are found.
Printer Configuration:
Check the printer configuration to ensure it aligns with the network settings, particularly the IP address, subnet, and gateway to guarantee connectivity for all users needing access.
Overall Network Health:
Continuously monitor the network for any emerging issues, perform regular updates to the firmware of network devices, and ensure compliance with the latest security standards to maintain network integrity and performance.



Viewing Page 1 of 86



Share your comments for CompTIA N10-009 exam with other users:

Jamil aljamil 12/4/2023 4:47:00 AM

it’s good but not senatios based
UNITED KINGDOM


Cath 10/10/2023 10:19:00 AM

q.119 - the correct answer is b - they are not captured in an update set as theyre data.
VIET NAM


P 1/6/2024 11:22:00 AM

good matter
Anonymous


surya 7/30/2023 2:02:00 PM

please upload c_sacp_2308
CANADA


Sasuke 7/11/2023 10:30:00 PM

please upload the dump. thanks very much !!
Anonymous


V 7/4/2023 8:57:00 AM

good questions
UNITED STATES


TTB 8/22/2023 5:30:00 AM

hi, could you please update the latest dump version
Anonymous


T 7/28/2023 9:06:00 PM

this question is keep repeat : you are developing a sales application that will contain several azure cloud services and handle different components of a transaction. different cloud services will process customer orders, billing, payment, inventory, and shipping. you need to recommend a solution to enable the cloud services to asynchronously communicate transaction information by using xml messages. what should you include in the recommendation?
NEW ZEALAND


Gurgaon 9/28/2023 4:35:00 AM

great questions
UNITED STATES


wasif 10/11/2023 2:22:00 AM

its realy good
UNITED ARAB EMIRATES


Shubhra Rathi 8/26/2023 1:12:00 PM

oracle 1z0-1059-22 dumps
Anonymous


Leo 7/29/2023 8:48:00 AM

please share me the pdf..
INDIA


AbedRabbou Alaqabna 12/18/2023 3:10:00 AM

q50: which two functions can be used by an end user when pivoting an interactive report? the correct answer is a, c because we do not have rank in the function pivoting you can check in the apex app
GREECE


Rohan Limaye 12/30/2023 8:52:00 AM

best to practice
Anonymous


Aparajeeta 10/13/2023 2:42:00 PM

so far it is good
Anonymous


Vgf 7/20/2023 3:59:00 PM

please provide me the dump
Anonymous


Deno 10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.
Anonymous


CiscoStudent 11/15/2023 5:29:00 AM

in question 272 the right answer states that an autonomous acces point is "configured and managed by the wlc" but this is not what i have learned in my ccna course. is this a mistake? i understand that lightweight aps are managed by wlc while autonomous work as standalones on the wlan.
Anonymous


pankaj 9/28/2023 4:36:00 AM

it was helpful
Anonymous


User123 10/8/2023 9:59:00 AM

good question
UNITED STATES


vinay 9/4/2023 10:23:00 AM

really nice
Anonymous


Usman 8/28/2023 10:07:00 AM

please i need dumps for isc2 cybersecuity
Anonymous


Q44 7/30/2023 11:50:00 AM

ans is coldline i think
UNITED STATES


Anuj 12/21/2023 1:30:00 PM

very helpful
Anonymous


Giri 9/13/2023 10:31:00 PM

can you please provide dumps so that it helps me more
UNITED STATES


Aaron 2/8/2023 12:10:00 AM

thank you for providing me with the updated question and answers. this version has all the questions from the exam. i just saw them in my exam this morning. i passed my exam today.
SOUTH AFRICA


Sarwar 12/21/2023 4:54:00 PM

how i can see exam questions?
CANADA


Chengchaone 9/11/2023 10:22:00 AM

can you please upload please?
Anonymous


Mouli 9/2/2023 7:02:00 AM

question 75: option c is correct answer
Anonymous


JugHead 9/27/2023 2:40:00 PM

please add this exam
Anonymous


sushant 6/28/2023 4:38:00 AM

please upoad
EUROPEAN UNION


John 8/7/2023 12:09:00 AM

has anyone recently attended safe 6.0 certification? is it the samq question from here.
Anonymous


Blessious Phiri 8/14/2023 3:49:00 PM

expository experience
Anonymous


concerned citizen 12/29/2023 11:31:00 AM

52 should be b&c. controller failure has nothing to do with this type of issue. degraded state tells us its a raid issue, and if the os is missing then the bootable device isnt found. the only other consideration could be data loss but thats somewhat broad whereas b&c show understanding of the specific issues the question is asking about.
UNITED STATES