Atnaujinkite slapukų nuostatas

El. knyga: CompTIA Network+ N10-008 Exam Cram

4.40/5 (19 ratings by Goodreads)
  • Formatas: 560 pages
  • Serija: Exam Cram
  • Išleidimo metai: 24-Aug-2021
  • Leidėjas: Pearson IT Certification
  • Kalba: eng
  • ISBN-13: 9780137375707
Kitos knygos pagal šią temą:
  • Formatas: 560 pages
  • Serija: Exam Cram
  • Išleidimo metai: 24-Aug-2021
  • Leidėjas: Pearson IT Certification
  • Kalba: eng
  • ISBN-13: 9780137375707
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

CompTIA® Network+ N10-008 Exam Cram, Seventh Edition is the perfect study guide to help students pass CompTIA’s Network+ N10-008 exam. It provides coverage and practice questions for every exam topic, including substantial new coverage. The book presents readers with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, Sidebars, and Notes interspersed throughout the text keep students focused on what they need to know. Cram Quizzes help them assess their knowledge, and the Cram Sheet tear card is the perfect last-minute review.

CompTIA Network+ N10-008 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Network+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.


Covers the critical information needed to score higher on your Network+ N10-008 exam!

* Establish network connectivity by deploying wired and wireless devices
* Understand and maintain network documentation
* Understand the purpose of network services
* Understand basic datacenter, cloud, and virtual networking concepts
* Monitor network activity, identifying performance and availability issues
* Implement network hardening techniques
* Manage, configure, and troubleshoot network infrastructure


Prepare for your exam with Pearson Test Prep

* Realistic practice questions and answers
* Comprehensive reporting and feedback
* Customized testing in study, practice exam, or flash card modes
* Complete coverage of Network+ N10-008 exam objectives

Introduction xxiii
Chapter 1 Network Technologies, Topologies, and Types
1(40)
Wired and Wireless Network Topologies
2(12)
Bus Topology
2(1)
Ring Topology
3(2)
Star Topology (Hub-and-Spoke)
5(1)
Mesh Topology
6(1)
Hybrid Topology
7(1)
Bringing Wireless to a Topology
8(1)
Infrastructure Wireless Topology
8(1)
Ad Hoc Wireless Topology
9(1)
Wireless Mesh Topology
10(4)
Network Types and Characteristics
14(8)
To Server or Not
14(1)
LANs
15(1)
WLANs
15(1)
WANs
16(1)
MANs
16(1)
CANs
17(1)
SANs
17(1)
PANs
17(1)
SDWANs
18(1)
MPLS
18(1)
mGRE
19(3)
Network Links and Concepts
22(17)
DSL Internet Access
23(2)
Cable Broadband
25(1)
The Public Switched Telephone Network
26(1)
Leased Lines
27(1)
T3 Lines
28(1)
Metro-Optical
29(2)
Satellite Internet Access
31(1)
Termination Points
32(1)
Demarc, Demarc Extension, and Smart Jacks
32(2)
CSUs/DSUs
34(1)
Verify Wiring Installation and Termination
34(1)
Virtual Networking
34(5)
What's Next?
39(2)
Chapter 2 Models, Ports, Protocols, and Network Services
41(52)
The OSI Networking Model
42(11)
The OSI Seven-Layer Model
42(1)
Physical Layer (Layer 1)
43(1)
Data Link Layer (Layer 2)
44(1)
Network Layer (Layer 3)
44(1)
Transport Layer (Layer 4)
45(1)
Session Layer (Layer 5)
46(1)
Presentation Layer (Layer 6)
46(1)
Application Layer (Layer 7)
47(1)
OSI Model Summary
47(1)
Comparing OSI to the Four-Layer TCP/IP Model
48(1)
Identifying the OSI Layers at Which Various Network Components Operate
49(1)
Data Encapsulation/Decapsulation and OSI
49(4)
Ports and Protocols
53(25)
Connection-Oriented Protocols Versus Connectionless Protocols
54(1)
Internet Protocol
54(1)
Transmission Control Protocol
55(1)
How TCP Works
56(1)
User Datagram Protocol
56(1)
Internet Control Message Protocol
57(1)
IPSec
57(1)
Generic Routing Encapsulation
58(1)
File Transfer Protocol
58(2)
Secure Shell
60(1)
Secure File Transfer Protocol
61(1)
Telnet
61(1)
Simple Mail Transfer Protocol
62(1)
Domain Name System (DNS)
62(1)
Dynamic Host Configuration Protocol (DHCP)
62(1)
Trivial File Transfer Protocol
63(1)
Hypertext Transfer Protocol
64(1)
Network Time Protocol (NTP)
64(1)
Post Office Protocol Version 3/Internet Message Access Protocol Version 4
65(1)
Simple Network Management Protocol
66(1)
Components of SNMP
66(1)
SNMP Management Systems
67(1)
SNMP Agents
67(1)
Management Information Bases
68(1)
SNMP Communities
69(1)
SNMPv3
69(1)
Lightweight Directory Access Protocol
69(1)
Hypertext Transfer Protocol Secure
70(1)
Server Message Block
70(1)
Syslog
70(1)
SMTP TLS
71(1)
LDAPS
71(1)
IMAP over SSL
71(1)
POP3 over SSL
71(1)
SQL, SQLnet, and MySQL
71(1)
Remote Desktop Protocol
72(1)
Session Initiation Protocol
72(1)
Understanding Port Functions
73(5)
Network Services
78(14)
Domain Name Service (DNS)
78(3)
The DNS Namespace
81(2)
Types of DNS Entries
83(1)
DNS Records
83(2)
DNS in a Practical Implementation
85(1)
Dynamic Host Configuration Protocol
86(2)
The DHCP Process
88(1)
DHCP and DNS Suffixes
89(1)
DHCP Relays and IP Helpers
89(1)
Network Time Protocol
89(3)
What's Next?
92(1)
Chapter 3 Addressing, Routing, and Switching
93(58)
IP Addressing
94(26)
IPv4
95(1)
IP Address Classes
95(2)
Subnet Mask Assignment
97(1)
Subnetting
97(1)
Identifying the Differences Between IPv4 Public and Private Networks
98(1)
Private Address Ranges
99(1)
Classless Interdomain Routing
100(1)
Default Gateways
100(2)
Virtual IP
102(1)
IPv4 Address Types
102(1)
Unicast Address
102(1)
Broadcast Address
102(1)
Multicast
102(1)
IPv6 Addressing
103(1)
Where Have All the IPv4 Addresses Gone?
103(1)
Identifying IPv6 Addresses
103(2)
IPv6 Address Types
105(1)
Global Unicast Addresses
105(1)
Link-Local Addresses
106(1)
Site-Local Addresses
106(1)
Neighbor Discovery
107(1)
Comparing IPv4 and IPv6 Addressing
107(1)
Assigning IP Addresses
108(1)
Static Addressing
108(1)
Dynamic Addressing
108(3)
BOOT Protocol (BOOTP)
111(1)
Automatic Private IP Addressing
111(1)
Identifying MAC Addresses
112(2)
NAT and PAT
114(1)
NAT
114(1)
PAT
115(1)
SNAT
116(1)
DNAT
116(4)
Managing Routing and Switching
120(30)
The Default Gateway
120(1)
Routing Tables
121(1)
Static Routing
122(1)
Default Route
123(1)
Switching Methods
123(1)
Packet Switching
123(1)
Circuit Switching
124(1)
Comparing Switching Methods
125(1)
Dynamic Routing
126(1)
Distance-Vector Routing
126(3)
Link-State Routing
129(1)
Hybrid Routing Protocols
130(1)
Network Traffic
130(3)
Routing Metrics
133(1)
Virtual Local-Area Networks
133(2)
VLAN Membership
135(2)
VLAN Segmentation
137(1)
The Spanning Tree Protocol
138(2)
Interface Configuration and Switch Management
140(2)
MDI-X
142(1)
Thinking
142(1)
Port Mirroring
142(1)
Port Authentication
143(1)
Power over Ethernet (PoE and PoE+)
143(1)
MAC Address Table
144(1)
Switch Management
144(1)
Managed and Unmanaged
144(1)
Quality of Service
145(1)
Traffic Shaping
146(1)
Access Control Lists
146(1)
ARP and RARP
147(3)
What's Next?
150(1)
Chapter 4 Network Implementations
151(32)
Common Networking Devices
152(20)
Firewall
153(1)
IDS/IPS
154(1)
Router
155(2)
Switch
157(1)
Hub and Switch Cabling
158(1)
Multilayer Switch
159(1)
Hub
160(1)
Bridge
161(1)
DSL and Cable Modems
161(1)
Access Point
162(1)
Media Converter
163(1)
Voice Gateway
164(1)
Repeater
165(1)
Wireless LAN Controller
165(1)
Load Balancer
165(1)
Proxy Server
166(2)
VPN Concentrators and Headends
168(1)
Networked Devices
168(4)
Networking Architecture
172(9)
Three-Tiered Architecture
172(1)
Core Layer
173(1)
Distribution/Aggregation Layer
173(1)
Access/Edge Layer
174(1)
Software-Defined Networking
174(1)
Application Layer
174(1)
Control Layer
175(1)
Infrastructure Layer
175(1)
Management Plane
175(1)
Spine and Leaf
175(1)
Traffic Flows
176(1)
Datacenter Location Types
176(1)
Storage-Area Networks
177(1)
iSCSI
178(1)
Fibre Channel and FCoE
178(1)
Network-Attached Storage
179(2)
What's Next?
181(2)
Chapter 5 Cabling Solutions and Issues
183(52)
General Media Considerations
184(33)
Broadband Versus Baseband Transmissions
185(1)
Simplex, Half-Duplex, and Full-Duplex Modes
185(1)
Data Transmission Rates
186(1)
Types of Network Media
186(1)
Twisted-Pair Cabling (Copper)
187(3)
Coaxial Cables
190(1)
Twinaxial Cables
191(1)
Fiber-Opttic Cables
192(2)
Plenum Versus PVC Cables
194(1)
Types of Media Connectors
194(1)
BNC Connectors
194(1)
RJ-11 Connectors
195(1)
RJ-45 Connectors
196(1)
F-Type Connectors and RG-59 and RG-6 Cables
197(1)
Fiber Connectors
197(2)
Transceivers
199(1)
Media Couplers/Converters
200(1)
TIA/EIA 568A and 568B Wiring Standards
200(1)
Straight-Through Versus Crossover Cables
201(2)
Rollover and Loopback Cables
203(1)
Components of Wiring Distribution
204(1)
Network Cross-Connects
204(1)
Horizontal Cabling
205(1)
Vertical Cables
206(1)
Patch Panels
207(1)
Fiber Distribution Panels
208(1)
66 and 110 Blocks (T568A, T568B)
208(1)
MDF and IDF Wiring Closets
209(1)
Ethernet Copper and Fiber Standards
210(1)
10BASE-T
210(1)
100BASE-TX
211(1)
1000BASE-T
212(1)
10GBASE-T
212(1)
40GBASE-T
213(1)
1000BASE-LX and 1000BASE-SX
213(1)
10GBASE-LR and 10GBASE-SR
214(1)
Multiplexing Options
214(3)
Troubleshooting Common Cable Connectivity Issues
217(1)
Limitations, Considerations, and Issues
218(8)
Throughput, Speed, and Distance
218(2)
Cabling Specifications/Limitations
220(1)
Cabling Considerations
220(1)
Cabling Applications
221(1)
Attenuation and dB Loss
221(1)
Interference
222(1)
Incorrect Pinout
222(1)
Bad Ports
223(1)
Open/Short
223(1)
LED Status Indicators
224(1)
Incorrect Transceivers
224(1)
Duplexing Issues
224(1)
TX/RX Reversed
225(1)
Dirty Optical Cables
225(1)
Common Tools
226(8)
Cable Crimpers, Strippers, and Snips/Cutters
226(1)
Punchdown Tools
227(1)
Tone Generator
228(1)
Loopback Adapter
228(1)
OTDR
229(1)
Multimeter
230(1)
Cable Tester
230(1)
Wire Map
231(1)
Tap
231(1)
Fusion Splicer
231(1)
Spectrum Analyzer
231(1)
Fiber Light Meter
232(2)
What's Next?
234(1)
Chapter 6 Wireless Solutions and Issues
235(34)
Understanding Wireless Basics
236(21)
Wireless Channels and Frequencies
236(5)
Cellular Technology Access
241(1)
Speed, Distance, and Bandwidth
241(1)
Channel Bonding
242(1)
MIMO/MU-MIMO/Directional/Omnidirectional
243(1)
Antenna Ratings
244(1)
Antenna Coverage
244(2)
Establishing Communications Between Wireless Devices
246(2)
Configuring the Wireless Connection
248(9)
Troubleshooting Wireless Issues
257(10)
Site Surveys
262(1)
Factors Affecting Wireless Signals
262(1)
Interference
262(1)
Reflection, Refraction, and Absorption
263(1)
Troubleshooting AP Coverage
264(3)
What's Next?
267(2)
Chapter 7 Cloud Computing Concepts and Options
269(14)
Cloud Concepts
270(11)
Service Models
271(1)
Software as a Service
271(1)
Platform as a Service
272(1)
Infrastructure as a Service
273(1)
Desktop as a Service
274(1)
Deployment Models
275(1)
Private Cloud
275(1)
Public Cloud
275(1)
Hybrid and Community Clouds
276(1)
Infrastructure as Code
276(1)
Connectivity Options
277(1)
Multitenancy
278(1)
Elasticity
278(1)
Scalability
278(1)
Security Implications
278(1)
The Relationship Between Resources
279(2)
What's Next?
281(2)
Chapter 8 Network Operations
283(60)
Organizational Documents and Policies
284(24)
Wiring and Port Locations
287(2)
Troubleshooting Using Wiring Schematics
289(1)
Physical and Logical Network Diagrams
290(3)
Baseline Configurations
293(2)
Policies, Procedures, Configurations, and Regulations
295(1)
Policies
295(3)
Password-Related Policies
298(3)
Procedures
301(1)
Change Management Documentation
302(1)
Configuration Documentation
303(1)
Regulations
303(1)
Labeling
304(4)
High Availability and Disaster Recovery
308(15)
Backups
309(1)
Full Backups
309(1)
Differential Backups
310(1)
Incremental Backups
310(2)
Snapshots
312(1)
Backup Best Practices
312(1)
Using Uninterruptible Power Supplies
313(1)
Why Use a UPS?
313(1)
Power Threats
313(1)
Beyond the UPS
314(1)
Cold, Warm, Hot, and Cloud Sites
315(1)
High Availability and Recovery Concepts
316(2)
Active-Active Versus Active-Passive
318(5)
Monitoring Network Performance
323(19)
Common Performance Metrics
324(4)
SNMP Monitors
328(1)
Management Information Base (MIB)
329(1)
Network Performance, Load, and Stress Testing
329(1)
Performance Tests
330(1)
Load Tests and Send/Receive Traffic
330(1)
Stress Tests
331(1)
Performance Metrics
331(1)
Network Device Logs
332(1)
Security Logs
332(2)
Application Log
334(1)
System Logs
334(1)
History Logs
335(1)
Log Management
335(1)
Patch Management
336(3)
Environmental Factors
339(3)
What's Next?
342(1)
Chapter 9 Network Security
343(60)
Common Security Concepts
344(21)
Access Control
346(1)
Mandatory Access Control
346(1)
Discretionary Access Control
346(1)
Rule-Based Access Control
347(1)
Role-Based Access Control
348(1)
Defense in Depth
349(1)
Network Segmentation
349(1)
Screened Subnet
349(2)
Separation of Duties
351(1)
Honeypots
351(1)
RADIUS and TACACS+
352(1)
Kerberos Authentication
353(2)
Local Authentication
355(1)
Lightweight Directory Access Protocol
356(1)
Using Certificates
356(1)
Auditing and Logging
357(1)
Multifactor Authentication Factors
357(1)
Additional Access Control Methods
358(1)
802.1X
358(1)
Extensible Authentication Protocol (EAP)
358(1)
Network Access Control (NAC)
359(1)
MAC Filtering
360(1)
Risk Management
361(1)
Penetration Testing
361(1)
Security Information and Event Management
362(3)
Common Networking Attacks
365(12)
Denial-of-Service and Distributed Denial-of-Service Attacks
365(1)
Types of DoS Attacks
366(2)
Other Common Attacks
368(1)
Social Engineering
368(1)
Logic Bomb
368(1)
Rogue DHCP
369(1)
Rogue Access Points and Evil Twins
369(1)
Advertising Wireless Weaknesses
369(1)
Phishing
369(1)
Ransomware
370(1)
DNS Poisoning
370(1)
ARP Cache Poisoning
370(1)
Spoofing
370(1)
Deauthentication
370(1)
Brute Force
371(1)
On-Path Attack
371(1)
VLAN Hopping
371(1)
ARP Spoofing
372(1)
Vulnerabilities and Prevention
372(5)
Network Hardening and Physical Security
377(15)
Disposing of Assets
379(1)
Implementing Physical Security
379(1)
Lock and Key
380(1)
Swipe Card and PIN Access
381(1)
Biometrics
381(1)
Two-Factor and Multifactor Authentication
382(1)
Secured Versus Unsecured Protocols
382(2)
Hardening Best Practices
384(3)
Wireless Security
387(1)
MAC Filtering
388(1)
Antenna Placement and Power Levels
388(1)
Isolation
388(1)
Preshared Keys
388(1)
Geofencing
389(1)
Captive Portal
390(1)
IoT Access Considerations
390(2)
Remote-Access Methods
392(10)
Remote File Access
394(1)
VPNs
394(1)
Components of the VPN Connection
395(1)
VPN Connection Types
396(1)
VPN Pros and Cons
396(1)
IPSec
397(1)
SSL/TLS/DTLS
398(1)
Site-to-Site and Client-to-Site
399(1)
Virtual Desktops
399(1)
HTTPS/Management URL
400(1)
Authentication and Authorization Considerations
400(1)
Out-of-Band Management
400(2)
What's Next?
402(1)
Chapter 10 Network Troubleshooting
403(58)
Troubleshooting Steps and Procedures
404(10)
Identify the Problem
405(1)
Identify Symptoms
406(1)
Determine Whether Anything Has Changed
406(1)
Duplicate the Problem if Possible
407(1)
Approach Multiple Problems Individually
407(1)
Establish a Theory of Probable Cause
407(1)
Test the Theory to Determine the Cause
408(1)
Establish a Plan of Action
408(1)
Implement the Solution or Escalate
409(1)
Determine Whether Escalation Is Necessary
409(1)
Verify Full System Functionality
410(1)
Document Findings, Actions, Outcomes, and Lessons
411(3)
Software Troubleshooting Tools
414(34)
Wi-Fi Analyzer
415(1)
Protocol Analyzer
415(1)
Bandwidth Speed Tester
416(1)
Port Scanner
416(2)
iperf
418(1)
NetFlow Analyzer
419(1)
TFTP Server
419(1)
Terminal Emulator
419(1)
IP Scanner
419(1)
Command-Line Tools
420(1)
The Trace Route Utility (tracert/traceroute)
421(4)
ping
425(1)
The Destination Host Unreachable Message
426(1)
The Request Timed Out Message
426(1)
The Unknown Host Message
427(1)
The Expired TTL Message
428(1)
Troubleshooting with ping
428(2)
hostname
430(1)
ARP
430(1)
arp ping
431(1)
The netstat Command
432(2)
netstat -e
434(1)
netstat -a
434(1)
netstat -r
435(1)
netstat -s
436(1)
telnet
437(1)
ipconfig
437(3)
ifconfig
440(1)
nslookup
441(1)
dig
442(1)
The tcpdump Command
443(1)
The route Utility
443(2)
nmap
445(1)
Basic Network Platform Commands
445(3)
Troubleshooting General Networking Issues
448(11)
Common Considerations
449(1)
Common Problems to Be Aware Of
449(1)
Collisions
450(1)
Broadcast Storm
450(1)
Multicast Flooding
450(1)
Asymmetrical Routing
450(1)
Switching Loops
450(1)
Routing Loops
451(1)
Missing Route
451(1)
Low Optical Link Budget
451(1)
Incorrect VLAN
451(1)
DNS Issues
451(1)
Incorrect Gateway
452(1)
Incorrect Subnet Mask
452(1)
Duplicate or Incorrect IP Address
452(1)
Duplicate MAC Addresses
453(1)
Expired IP Address
453(1)
Rogue DHCP Server
454(1)
Certificate Issues
454(1)
NTP Issues/Incorrect Time
454(1)
DHCP Scope Exhaustion
454(1)
Blocked Ports, Services, or Addresses
454(1)
Incorrect Firewall Settings
455(1)
Incorrect ACL Settings
455(1)
Unresponsive Service
455(1)
BYOD Challenges
455(1)
Licensed Feature Issues
456(1)
Hardware Failure
456(1)
Network Performance Issues
457(2)
What's Next?
459(2)
Glossary 461(50)
Index 511
Emmett Dulaney (CompTIA Network+, Cloud+, Security+, A+, and others) has been the author of several books on certifications and operating systems over the past 20 years. He is a columnist for Certification Magazine and a professor at a small university in Indiana. He is currently the editor of a journal devoted to business education (and the business of education).