[FREE PDF sample] Comptia network+ n10-008 exam cram 7th edition emmett dulaney ebooks

Page 1


Visit to download the full and correct content document: https://ebookmass.com/product/comptia-network-n10-008-exam-cram-7th-edition-em mett-dulaney/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

CompTIA Network+ Certification All-in-One Exam Guide (Exam N10-008), 8th Edition Mike Meyers

https://ebookmass.com/product/comptia-network-certification-allin-one-exam-guide-exam-n10-008-8th-edition-mike-meyers/

Mike Meyers' CompTIA Network+ Certification Passport, Seventh Edition (Exam N10-008) Jonathan S. Weissman

https://ebookmass.com/product/mike-meyers-comptia-networkcertification-passport-seventh-edition-exam-n10-008-jonathan-sweissman/

CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition (Exam N10-008), 8th Edition Mike Meyers

https://ebookmass.com/product/comptia-network-certification-allin-one-exam-guide-eighth-edition-exam-n10-008-8th-edition-mikemeyers/

CompTIA Network+ Certification All in One Exam Guide, Seventh Edition (Exam N10 007) 7th Edition, (Ebook PDF)

https://ebookmass.com/product/comptia-network-certification-allin-one-exam-guide-seventh-edition-exam-n10-007-7th-edition-ebookpdf/

Mike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual (Exam N10-008), , 6th Edition Mike Meyers

https://ebookmass.com/product/mike-meyers-comptia-network-guideto-managing-and-troubleshooting-networks-lab-manualexam-n10-008-6th-edition-mike-meyers/

CompTIA Network+ Certification All-In-One Exam Guide, Seventh Edition (Exam N10-007) Meyers

https://ebookmass.com/product/comptia-network-certification-allin-one-exam-guide-seventh-edition-exam-n10-007-meyers/

Mike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition (Exam N10-008), 6th Edition Mike Meyers & Jonathan S. Weissman

https://ebookmass.com/product/mike-meyers-comptia-network-guideto-managing-and-troubleshooting-networks-lab-manual-sixthedition-exam-n10-008-6th-edition-mike-meyers-jonathan-s-weissman/

Mike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition (Exam N10-008), 6th Edition Mike Meyers & Jonathan S. Weissman

https://ebookmass.com/product/mike-meyers-comptia-network-guideto-managing-and-troubleshooting-networks-lab-manual-sixthedition-exam-n10-008-6th-edition-mike-meyers-jonathan-sweissman-2/

CompTIA Network+ Certification Study Guide, Seventh Edition (Exam N10-007) Glen E. Clarke [Clarke

https://ebookmass.com/product/comptia-network-certificationstudy-guide-seventh-edition-exam-n10-007-glen-e-clarke-clarke/

About This eBook

ePUB is an open, industry-standard format for eBooks. However, support of ePUB and its many features varies across reading devices and applications. Use your device or app settings to customize the presentation to your liking. Settings that you can customize often include font, font size, single or double column, landscape or portrait mode, and figures that you can click or tap to enlarge. For additional information about the settings and features on your reading device or app, visit the device manufacturer’s Web site.

Many titles include programming code or configuration examples. To optimize the presentation of these elements, view the eBook in single-column, landscape mode and adjust the font size to the smallest setting. In addition to presenting code and configurations in the reflowable text format, we have included images of the code that mimic the presentation found in the print book; therefore, where the reflowable format may compromise the presentation of the code listing, you will see a “Click here to view code image” link. Click the link to view the print-fidelity code image. To return to the previous page viewed, click the Back button on your device or app.

CompTIA® Network+ N10-008 Exam Cram

Copyright © 2022 by Pearson Education, Inc.

All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein.

ISBN-13: 978-0-13-737576-9

ISBN-10: 0-13-737576-X

ScoutAutomatedPrintCode

Trademarks

All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Pearson IT Certification cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book.

Special Sales

For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions;

custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at corpsales@pearsoned.com or (800) 382-3419.

For government sales inquiries, please contact governmentsales@pearsoned.com.

For questions about sales outside the U.S., please contact intlcs@pearson.com.

Editor-in-Chief

Mark Taub

Director ITP Production Management

Brett Bartow

Executive Editor

Nancy Davis

Development Editor

Ellie Bru

Managing Editor

Sandra Schroeder

Senior Project Editor

Tonya Simpson

Copy Editor

Chuck Hutchinson

Indexer

Timothy Wright

Proofreader

Abigail Manheim

Technical Editor

Chris Crayton

Publishing Coordinator

Cover Designer

Compositor codeMantra

Contents at a Glance

Introduction

CHAPTER 1 Network Technologies, Topologies, and Types

CHAPTER 2 Models, Ports, Protocols, and Network Services

CHAPTER 3 Addressing, Routing, and Switching

CHAPTER 4 Network Implementations

CHAPTER 5 Cabling Solutions and Issues

CHAPTER 6 Wireless Solutions and Issues

CHAPTER 7 Cloud Computing Concepts and Options

CHAPTER 8 Network Operations

CHAPTER 9 Network Security

CHAPTER 10 Network Troubleshooting

Glossary

Index

Table of Contents

Introduction

CHAPTER 1:

Network Technologies, Topologies, and Types

Wired and Wireless Network Topologies

Bus Topology

Ring Topology

Star Topology (Hub-and-Spoke)

Mesh Topology

Hybrid Topology

Bringing Wireless to a Topology

Infrastructure Wireless Topology

Ad Hoc Wireless Topology

Wireless Mesh Topology

Network Types and Characteristics

To Server or Not LANs

mGRE

Network Links and Concepts

DSL Internet Access

Cable Broadband

The Public Switched Telephone Network

Leased Lines

T3 Lines

Metro-Optical

Satellite Internet Access

Termination Points

Demarc, Demarc Extension, and Smart Jacks

CSUs/DSUs

Verify Wiring Installation and Termination

Virtual Networking

What’s Next?

CHAPTER 2:

Models, Ports, Protocols, and Network Services

The OSI Networking Model

The OSI Seven-Layer Model

Physical Layer (Layer 1)

Data Link Layer (Layer 2)

Network Layer (Layer 3)

Transport Layer (Layer 4)

Session Layer (Layer 5)

Presentation Layer (Layer 6)

Application Layer (Layer 7)

OSI Model Summary

Comparing OSI to the Four-Layer TCP/IP Model

Identifying the OSI Layers at Which Various Network Components Operate

Data Encapsulation/Decapsulation and OSI

Ports and Protocols

Connection-Oriented Protocols Versus Connectionless Protocols

Internet Protocol

Transmission Control Protocol How TCP Works

User Datagram Protocol

Internet Control Message Protocol

IPSec

Generic Routing Encapsulation

File Transfer Protocol

Secure Shell

Secure File Transfer Protocol

Telnet

Simple Mail Transfer Protocol

Domain Name System (DNS)

Dynamic Host Configuration Protocol (DHCP)

Trivial File Transfer Protocol

Hypertext Transfer Protocol

Network Time Protocol (NTP)

Post Office Protocol Version 3/Internet Message Access

Protocol Version 4

Simple Network Management Protocol

Components of SNMP

SNMP Management Systems

SNMP Agents

Management Information Bases

SNMP Communities

SNMPv3

Lightweight Directory Access Protocol

Hypertext Transfer Protocol Secure

Server Message Block

Syslog

SMTP TLS

LDAPS

IMAP over SSL

POP3 over SSL

SQL, SQLnet, and MySQL

Remote Desktop Protocol

Session Initiation Protocol

Understanding Port Functions

Network Services

Domain Name Service (DNS)

The DNS Namespace

Types of DNS Entries

DNS Records

DNS in a Practical Implementation

Dynamic Host Configuration Protocol

The DHCP Process

DHCP and DNS Suffixes

DHCP Relays and IP Helpers

Network Time Protocol

What’s Next?

CHAPTER 3: Addressing, Routing, and Switching

IP Addressing

IPv4

IP Address Classes

Subnet Mask Assignment

Subnetting

Identifying the Differences Between IPv4 Public and Private Networks

Private Address Ranges

Classless Interdomain Routing

Default Gateways

Virtual IP

IPv4 Address Types

Unicast Address

Broadcast Address

Multicast

IPv6 Addressing

Where Have All the IPv4 Addresses Gone?

Identifying IPv6 Addresses

IPv6 Address Types

Global Unicast Addresses

Link-Local Addresses

Site-Local Addresses

Neighbor Discovery

Comparing IPv4 and IPv6 Addressing

Assigning IP Addresses

Static Addressing

Dynamic Addressing

BOOT Protocol (BOOTP)

Automatic Private IP Addressing

Identifying MAC Addresses

NAT and PAT

NAT

PAT

SNAT

DNAT

Managing Routing and Switching

The Default Gateway

Routing Tables

Static Routing

Default Route

Switching Methods

Packet Switching

Circuit Switching

Comparing Switching Methods

Dynamic Routing

Distance-Vector Routing

Link-State Routing

Hybrid Routing Protocols

Network Traffic

Routing Metrics

Virtual Local-Area Networks

VLAN Membership

VLAN Segmentation

The Spanning Tree Protocol

Interface Configuration and Switch Management

MDI-X

Trunking

Port Mirroring

Port Authentication

Power over Ethernet (PoE and PoE+)

MAC Address Table

Switch Management

Managed and Unmanaged

Quality of Service

Traffic Shaping

Access Control Lists

ARP and RARP What’s Next?

CHAPTER 4: Network Implementations

Common Networking Devices

Firewall

IDS/IPS

Router

Switch

Hub and Switch Cabling

Multilayer Switch

Hub

Bridge

DSL and Cable Modems

Access Point

Media Converter

Voice Gateway

Repeater

Wireless LAN Controller

Load Balancer

Proxy Server

VPN Concentrators and Headends

Networked Devices

Networking Architecture

Three-Tiered Architecture

Core Layer

Distribution/Aggregation Layer

Access/Edge Layer

Software-Defined Networking

Application Layer

Control Layer

Infrastructure Layer

Management Plane

Spine and Leaf

Traffic Flows

Datacenter Location Types

Storage-Area Networks

iSCSI

Fibre Channel and FCoE

Network-Attached Storage

What’s Next?

CHAPTER 5:

Cabling Solutions and Issues

General Media Considerations

Broadband Versus Baseband Transmissions

Simplex, Half-Duplex, and Full-Duplex Modes

Data Transmission Rates

Types of Network Media

Twisted-Pair Cabling (Copper)

Coaxial Cables

Twinaxial Cables

Fiber-Optic Cables

Plenum Versus PVC Cables

Types of Media Connectors

BNC Connectors

RJ-11 Connectors

RJ-45 Connectors

F-Type Connectors and RG-59 and RG-6 Cables

Fiber Connectors

Transceivers

Media Couplers/Converters

TIA/EIA 568A and 568B Wiring Standards

Straight-Through Versus Crossover Cables

Rollover and Loopback Cables

Components of Wiring Distribution

Network Cross-Connects

Horizontal Cabling

Vertical Cables

Patch Panels

Fiber Distribution Panels

66 and 110 Blocks (T568A, T568B)

MDF and IDF Wiring Closets

Ethernet Copper and Fiber Standards

10BASE-T

100BASE-TX

1000BASE-T

10GBASE-T

40GBASE-T

1000BASE-LX and 1000BASE-SX

10GBASE-LR and 10GBASE-SR

Multiplexing Options

Troubleshooting Common Cable Connectivity Issues

Limitations, Considerations, and Issues

Throughput, Speed, and Distance

Cabling Specifications/Limitations

Cabling Considerations

Cabling Applications

Attenuation and dB Loss

Interference

Incorrect Pinout

Bad Ports

Open/Short

LED Status Indicators

Incorrect Transceivers

Duplexing Issues

TX/RX Reversed

Dirty Optical Cables

Common Tools

Cable Crimpers, Strippers, and Snips/Cutters

Punchdown Tools

Tone Generator

Loopback Adapter

OTDR

Multimeter

Cable Tester

Wire Map

Tap

Fusion Splicer

Spectrum Analyzer

Fiber Light Meter

What’s Next?

CHAPTER 6:

Wireless Solutions and Issues

Understanding Wireless Basics

Wireless Channels and Frequencies

Cellular Technology Access

Speed, Distance, and Bandwidth

Channel Bonding

MIMO/MU-MIMO/Directional/Omnidirectional

Antenna Ratings

Antenna Coverage

Establishing Communications Between Wireless Devices

Configuring the Wireless Connection

Troubleshooting Wireless Issues

Site Surveys

Factors Affecting Wireless Signals

Interference

Reflection, Refraction, and Absorption

Troubleshooting AP Coverage

What’s Next?

CHAPTER 7:

Cloud Computing Concepts and Options

Cloud Concepts

Service Models

Software as a Service

Platform as a Service

Infrastructure as a Service

Desktop as a Service

Deployment Models

Private Cloud

Public Cloud

Hybrid and Community Clouds

Infrastructure as Code

Connectivity Options

Multitenancy

Elasticity

Scalability

Security Implications

The Relationship Between Resources

What’s Next?

CHAPTER 8: Network Operations

Organizational Documents and Policies

Wiring and Port Locations

Troubleshooting Using Wiring Schematics

Physical and Logical Network Diagrams

Baseline Configurations

Policies, Procedures, Configurations, and Regulations

Policies

Password-Related Policies

Procedures

Change Management Documentation

Configuration Documentation

Regulations

Labeling

High Availability and Disaster Recovery

Backups

Full Backups

Differential Backups

Incremental Backups

Snapshots

Backup Best Practices

Using Uninterruptible Power Supplies

Why Use a UPS?

Power Threats

Beyond the UPS

Cold, Warm, Hot, and Cloud Sites

High Availability and Recovery Concepts

Active-Active Versus Active-Passive

Monitoring Network Performance

Common Performance Metrics

SNMP Monitors

Management Information Base (MIB)

Network Performance, Load, and Stress Testing

Performance Tests

Load Tests and Send/Receive Traffic

Stress Tests

Performance Metrics

Network Device Logs

Security Logs

Application Log

System Logs

History Logs

Log Management

Patch Management

Environmental Factors

What’s Next?

CHAPTER 9:

Network Security

Common Security Concepts

Access Control

Mandatory Access Control

Discretionary Access Control

Rule-Based Access Control

Role-Based Access Control

Defense in Depth

Network Segmentation

Screened Subnet

Separation of Duties

Honeypots

RADIUS and TACACS+

Kerberos Authentication

Local Authentication

Lightweight Directory Access Protocol

Using Certificates

Auditing and Logging

Multifactor Authentication Factors

Additional Access Control Methods

802.1X

Extensible Authentication Protocol (EAP)

Network Access Control (NAC)

MAC Filtering

Risk Management

Penetration Testing

Security Information and Event Management

Common Networking Attacks

Denial-of-Service and Distributed Denial-of-Service Attacks

Types of DoS Attacks

Other Common Attacks

Social Engineering

Logic Bomb

Rogue DHCP

Rogue Access Points and Evil Twins

Advertising Wireless Weaknesses

Phishing

Ransomware

DNS Poisoning

ARP Cache Poisoning

Spoofing

Deauthentication

Brute Force

On-Path Attack

VLAN Hopping

ARP Spoofing

Vulnerabilities and Prevention

Network Hardening and Physical Security

Disposing of Assets

Implementing Physical Security

Lock and Key

Swipe Card and PIN Access

Biometrics

Two-Factor and Multifactor Authentication

Secured Versus Unsecured Protocols

Hardening Best Practices

Wireless Security

MAC Filtering

Antenna Placement and Power Levels

Isolation

Preshared Keys

Geofencing

Captive Portal

IoT Access Considerations

Remote-Access Methods

Remote File Access

VPNs

Components of the VPN Connection

VPN Connection Types

VPN Pros and Cons

IPSec

SSL/TLS/DTLS

Site-to-Site and Client-to-Site

Virtual Desktops

HTTPS/Management URL

Authentication and Authorization Considerations

Out-of-Band Management

What’s Next?

CHAPTER 10: Network Troubleshooting

Troubleshooting Steps and Procedures

Identify the Problem

Identify Symptoms

Determine Whether Anything Has Changed

Duplicate the Problem if Possible

Approach Multiple Problems Individually

Establish a Theory of Probable Cause

Test the Theory to Determine the Cause

Establish a Plan of Action

Implement the Solution or Escalate

Determine Whether Escalation Is Necessary

Verify Full System Functionality

Document Findings, Actions, Outcomes, and Lessons

Software Troubleshooting Tools

Wi-Fi Analyzer

Protocol Analyzer

Bandwidth Speed Tester

Port Scanner

iperf

NetFlow Analyzer

TFTP Server

Terminal Emulator

IP Scanner

Command-Line Tools

The Trace Route Utility (tracert/traceroute)

ping

The Destination Host Unreachable Message

The Request Timed Out Message

The Unknown Host Message

The Expired TTL Message

Troubleshooting with ping hostname

ARP arp ping

The netstat Command

netstat -e

netstat -a

netstat -r

netstat -s

telnet

ipconfig ifconfig

nslookup dig

The tcpdump Command

The route Utility nmap

Basic Network Platform Commands

Troubleshooting General Networking Issues

Common Considerations

Common Problems to Be Aware Of Collisions

Broadcast Storm

Multicast Flooding

Asymmetrical Routing

Switching Loops

Routing Loops

Missing Route

Low Optical Link Budget

Incorrect VLAN

DNS Issues

Incorrect Gateway

Incorrect Subnet Mask

Duplicate or Incorrect IP Address

Duplicate MAC Addresses

Expired IP Address

Rogue DHCP Server

Certificate Issues

NTP Issues/Incorrect Time

DHCP Scope Exhaustion

Blocked Ports, Services, or Addresses

Incorrect Firewall Settings

Incorrect ACL Settings

Unresponsive Service

BYOD Challenges

Licensed Feature Issues

Hardware Failure

Network Performance Issues

What’s Next?

Glossary Index

About the Author

Emmett Dulaney (CompTIA Network+, Cloud+, Security+, A+, and others) has been the author of several books on certifications and operating systems over the past 20 years. He is a columnist for CertificationMagazineand a professor at a small university in Indiana. He is currently the editor of a journal devoted to business education (and the business of education).

Dedication

ForElijah,Wolfgang,Teresa,andHarrison:thesecondround —EmmettDulaney

Acknowledgments

Thanks are due to Eleanor (Ellie) Bru for working on this title once more and making it as strong as it can be. An enormous amount of credit for this book goes to Chris Crayton, without whom this edition would be only a shadow of what it is. It was an honor to work with him again, and I owe him enormous gratitude. Thanks continue to be due to Mike Harwood, who wrote the first few editions, and to the team of talented individuals at Pearson who work behind the scenes and make each title the best it can be.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
[FREE PDF sample] Comptia network+ n10-008 exam cram 7th edition emmett dulaney ebooks by Education Libraries - Issuu