Free N10-009 Exam Braindumps (page: 2)

Page 2 of 107

SIMULATION
A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS
Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the correct settings:
-Ensure each device accesses only its correctly associated network.
-Disable all unused switchports.
-Require fault-tolerant connections between the switches.
-Only make necessary changes to complete the above requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.






























  1. See Explanation section for answer.

Answer(s): A

Explanation:

Analysis and Configuration Recommendations:
Switch 1 Configurations:
Port 1 to Port 7:
- Ports should have VLANs set according to the devices they connect to. For instance, if a port is connecting to servers, only the VLAN for servers (e.g., VLAN 90) should be enabled and tagged if required.
- Ensure unused VLANs are not active or set to untagged on these ports to prevent unauthorized network access.Port 8:
- This port's configuration needs to align with the devices it connects to. Based on your first image, adjust the VLAN tagging accordingly. If it connects to printers, VLAN 60 should be tagged, and all other VLANs should be disabled or untagged.Switch 3 Configurations:
Ports 2 to 8:
- The configurations here must also match the connected devices. For mobile user connections, only VLANsrelevant to user access (like VLAN 150 for WLAN) should be enabled and set to tagged or untagged based on network policies.
- Any VLAN not associated with the connected devices should be disabled to secure the network.
Fault Tolerant Connections:
Ensure redundancy:
If these switches are connected via multiple ports, configure Link Aggregation Control Protocol (LACP) if not already set up to provide redundancy and increased bandwidth.
Check duplex and speed settings:
Ensure that duplex settings are set to Auto to avoid duplex mismatch which can cause performance issues.
Disabling Unused Ports:
Any port not connected or not planned to be used should be disabled to prevent unauthorized access or network breaches.
Final Checks:
Verify settings:
After configuration changes, verify all settings to ensure they adhere to network policies and the devices are performing as expected.
Documentation:
Update network documentation to reflect changes for future troubleshooting and audits.



SIMULATION
A network technician was recently onboarded to a company. A manager has tasked the technician with documenting the network and has provided the technician with partial information from previous documentation.

INSTRUCTIONS

Click on each switch to perform a network discovery by entering commands into the terminal. Type help to view a list of available commands.
Fill in the missing information using the drop-down menus provided.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

  1. See Explanation section for answer.

Answer(s): A

Explanation:

Steps for Network Documentation:
1. Network Discovery:
Use discovery commands on each switch to collect data about connected devices. Common commands include show mac-address-table to view MAC addresses associated with the ports and show ip interface brief to check the IP configuration of switch interfaces.
2. Document MAC and IP Addresses:
From the MAC address table, document the MAC addresses linked to each port. In your provided image, select the appropriate MAC address for each PC (e.g., PC1, PC2, PC3, PC4) based on their connection to Access Switch 1 or 2.Assign and document IP addresses for each device from the range available in the dropdown (e.g., 10.10.30.51 for PC1).
3. VLAN Assignment:
Assign and document VLANs for each PC according to network segmentation policies. It seems VLAN 10 and 20 are options; ensure each PC is assigned to the correct VLAN based on their network usage (e.g.,regular users, admin, guest network).
4. Interface Configuration:
Document the interface each PC is connected to on their respective Access Switch. Ensure the interface matches the physical connection layout.
Final Verification:
Use commands like show vlan to verify that VLAN assignments are correct across devices.
Use show running-config to verify the overall configuration and ensure it aligns with security and operational policies.



SIMULATION
Users are unable to access files on their department share located on file server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identify any issues, and configure the appropriate solution.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


















  1. See Explanation section for answer.

Answer(s): A

Explanation:

Issue Identified:
Workstation A cannot access File Server 2 due to missing routing information.
Solution:
1. Review Router Configuration:
Analyze the routing tables on Routers A, B, and C to confirm whether routes to the File Server 2 subnet are present.
2. Add Static Route:
Install a static route on the router that connects Workstation A’s network to File Server 2’s network:
Destination Prefix:
Enter the network address of File Server 2.Destination Prefix Mask:
Enter the subnet mask for File Server 2’s network.Interface:
Select the router interface that faces towards File Server 2’s network.
3. Action:
Configure the static route using the routing configuration panel on the router that requires the update.Save the changes and test connectivity from Workstation A to File Server 2 to ensure the issue is resolved.



SIMULATION
A network administrator has been tasked with configuring a network for a new corporate office. The office
consists of two buildings, separated by 50 feet with no physical connectivity. The configuration must meet the following requirements:
Devices in both buildings should be able to access the Internet.
Security insists that all Internet traffic be inspected before entering the network. Desktops should not see traffic destined for other devices.

INSTRUCTIONS

Select the appropriate network device for each location. If applicable, click on the magnifying glass next to any device which may require configuration updates and make any necessary changes.
Not all devices will be used, but all locations should be filled.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


  1. See Explanation section for answer.

Answer(s): A

Explanation:

Central Device Connecting to the Internet (marked with a question mark at the top middle connecting to the Internet):
Device:
Firewall
Reason:
To inspect and filter all internet traffic before it enters the network, ensuring security compliance.
Device between Building A and the Internet (first question mark inside Building A): Device:
Router
Reason:
To route traffic between the internal networks (Building A, Building B) and the internet via the firewall.
Devices inside Building A (two question marks linked to desktops and server infrastructure):
Device:
Switch
Reason:
To connect all desktops and servers within Building A, ensuring that each device can communicate with others within the building without seeing traffic destined for other devices.
Device connecting Building A to Building B (question mark between the two buildings):
Device:
Wireless range extender
Reason:
Given the 50 feet separation and no physical connectivity, a wireless range extender can bridge this gap by extending the wireless signal from Building A to Building B, facilitating network access across both buildings.
Device inside Building B (question mark inside Building B):
Device: Switch
Reason: To provide connectivity for the devices in Building B, allowing them to connect to the network and access resources in Building A as well as the internet.






Post your Comments and Discuss CompTIA N10-009 exam with other Community members:

N10-009 Exam Discussions & Posts