CompTIA Network+ N10-007 Exam Cram, 6th Edition

Book description

Prepare for CompTIA Network+ N10-007 exam success with this CompTIA approved Exam Cram from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner.

CompTIA® Network+ N10-007 Exam Cram, Sixth Edition is the perfect study guide to help you pass CompTIA’s Network+ N10-007 exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of security, cloud networking, IPv6, and wireless technologies. The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, Sidebars, and Notes interspersed throughout the text keep you focused on what you need to know. Cram Quizzes help you assess your knowledge, and the Cram Sheet tear card is the perfect last-minute review.

Covers the critical information you’ll need to know to score higher on your CompTIA Network+ (N10-007) exam!

· Understand modern network topologies, protocols, and infrastructure

· Implement networks based on specific requirements

· Install and configure DNS and DHCP

· Monitor and analyze network traffic

· Understand IPv6 and IPv4 addressing, routing, and switching

· Perform basic router/switch installation and configuration

· Explain network device functions in cloud environments

· Efficiently implement and troubleshoot WANs

· Install, configure, secure, and troubleshoot wireless networks

· Apply patches/updates, and support change/configuration management

· Describe unified communication technologies

· Segment and optimize networks

· Identify risks/threats, enforce policies and physical security, configure firewalls, and control access

· Understand essential network forensics concepts

· Troubleshoot routers, switches, wiring, connectivity, and security

Companion Website

The companion website contains the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. This online assessment engine enables you to access the practice tests via the Internet on any desktop, laptop, tablet, or smartphone device with Internet connectivity. The web-based version also enables you to download the software to your desktop, so you can use the practice test even when you don't have an Internet connection. The desktop version syncs with your online version when an Internet connection is established, to update and track your progress. This integrated learning package offers these additional benefits:

· Enables you to focus on individual topic areas or take complete, timed exams

· Presents unique sets of exam-realistic practice questions

· Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

Pearson Test Prep online system requirements:

Browsers: Chrome version 40 and above; Firefox version 35 and above; Safari version 7; Internet Explorer 10, 11; Microsoft Edge; Opera.

Devices: Desktop and laptop computers, tablets running on Android and iOS, smartphones with a minimum screen size of 4.7". Internet access required.

Pearson Test Prep offline system requirements:

Windows 10, Windows 8.1, Windows 7; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases

Table of contents

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Contents at a Glance
  5. Table of Contents
  6. About the Author
  7. Dedication
  8. Acknowledgments
  9. About the Technical Editor
  10. We Want to Hear from You!
  11. Reader Services
  12. Introduction
  13. Chapter 1: Introduction to Networking Technologies
    1. Wired and Wireless Network Topologies
      1. Bus Topology
      2. Ring Topology
      3. Star Topology
      4. Wired Mesh Topology
      5. Wireless Topologies
      6. Hybrid Topologies
    2. Network Types
      1. LANs
      2. WLANs
      3. WANs
      4. MANs
      5. CANs
      6. SANs
      7. PANs
    3. IoT Technologies
      1. Z-Wave
      2. Ant+
      3. Bluetooth
      4. NFC
      5. IR
      6. RFID
      7. 802.11
      8. The Magic Behind 802.11n and 802.11ac
      9. A Summary of 802.11 Wireless Standards
    4. What’s Next?
  14. Chapter 2: Models, Ports, Protocols, and Networking Services
    1. The OSI Networking Model
      1. The OSI Seven-Layer Model
      2. Comparing OSI to the Four-Layer TCP/IP Model
      3. Identifying the OSI Layers at Which Various Network Components Operate
    2. Ports and Protocols
      1. Connection-Oriented Protocols Versus Connectionless Protocols
      2. Internet Protocol
      3. Transmission Control Protocol
      4. User Datagram Protocol
      5. File Transfer Protocol
      6. Secure File Transfer Protocol
      7. Trivial File Transfer Protocol
      8. Simple Mail Transfer Protocol
      9. Hypertext Transfer Protocol
      10. Hypertext Transfer Protocol Secure
      11. Post Office Protocol Version 3/Internet Message Access Protocol Version 4
      12. Telnet
      13. Secure Shell
      14. Internet Control Message Protocol
      15. Network Time Protocol
      16. Lightweight Directory Access Protocol
      17. H.323
      18. Simple Network Management Protocol
      19. Session Initiation Protocol
      20. Remote Desktop Protocol
      21. Server Message Block
      22. Understanding Port Functions
      23. ARP and RARP
    3. Network Services
      1. Domain Name Service (DNS)
      2. The DNS Namespace
      3. Types of DNS Entries
      4. DNS Records
      5. DNS in a Practical Implementation
      6. Dynamic Host Configuration Protocol
      7. The DHCP Process
      8. DHCP and DNS Suffixes
      9. DHCP Relays and IP Helpers
      10. IP Address Management
      11. Network Time Protocol
    4. What’s Next?
  15. Chapter 3: Addressing, Routing, and Switching
    1. IP Addressing
      1. IPv4
      2. IP Address Classes
      3. Subnet Mask Assignment
      4. Subnetting
      5. Identifying the Differences Between IPv4 Public and Private Networks
      6. Classless Interdomain Routing
      7. Default Gateways
      8. Virtual IP
      9. IPv4 Address Types
      10. IPv6 Addressing
      11. Comparing IPv4 and IPv6 Addressing
      12. Assigning IP Addresses
      13. Identifying MAC Addresses
      14. NAT, PAT, SNAT, and DNAT
    2. Managing TCP/IP Routing and Switching
      1. The Default Gateway
      2. Routing Tables
      3. Static Routing
      4. Switching Methods
      5. Software-Defined Networking
      6. Dynamic Routing
      7. Network Traffic
      8. Routing Metrics
      9. Virtual Local-Area Networks
      10. The Spanning Tree Protocol
      11. Interface Configuration and Switch Management
      12. Trunking
      13. Port Mirroring
      14. Port Authentication
      15. Power over Ethernet
      16. DMZ
      17. MAC Address Table
      18. Switch Management
      19. Managed and Unmanaged
      20. Quality of Service
      21. Traffic Shaping
      22. Access Control Lists
    3. What’s Next?
  16. Chapter 4: Network Components and Devices
    1. Common Network Devices
      1. Firewall
      2. Router
      3. Switch
      4. Hub
      5. Bridge
      6. Modems
      7. Wireless Access Point
      8. Media Converter
      9. Wireless Range Extender
      10. VoIP Endpoint
      11. Network Devices Summary
    2. Advanced Networking Devices
      1. Multilayer Switch
      2. Wireless Controller
      3. Load Balancer
      4. IDS/IPS
      5. Proxy Server
      6. VPN Concentrator
      7. AAA/RADIUS Server
      8. UTM Appliances and NGFW/Layer 7 Firewalls
      9. VoIP PBX and Gateway
      10. Content Filter
    3. What’s Next?
  17. Chapter 5: WAN Technologies
    1. WAN Technologies
      1. Integrated Services Digital Network
      2. Leased Lines
      3. Fiber, SONET, and OCx Levels
      4. Frame Relay
      5. Asynchronous Transfer Mode
      6. Copper Versus Fiber
      7. Other WAN Technologies
    2. Internet Access Technologies
      1. DSL Internet Access
      2. Cable Broadband
      3. Broadband Security Considerations
      4. Dial-up
      5. The Public Switched Telephone Network
      6. Satellite Internet Access
      7. Wireless Internet Access
      8. Termination Points
    3. What’s Next?
  18. Chapter 6: Cabling Solutions
    1. General Media Considerations
      1. Broadband Versus Baseband Transmissions
      2. Simplex, Half-Duplex, and Full-Duplex Modes
      3. Data Transmission Rates
      4. Types of Network Media
      5. Types of Media Connectors
      6. Media Couplers/Converters
      7. 568A and 568B Wiring Standards
      8. Straight-Through Versus Crossover Cables
      9. Rollover and Loopback Cables
      10. Components of Wiring Distribution
      11. Ethernet Deployment Standards
    2. Troubleshooting Common Wired Connectivity Issues
      1. Attenuation
      2. Latency
      3. Jitter
      4. Crosstalk
      5. EMI
      6. Open/Short
      7. Incorrect Pin-Out
      8. Incorrect Cable Types
      9. Bad Port
      10. Transceiver Mismatch
      11. TX/RX Reversed
      12. Duplex/Speed Mismatch
      13. Damaged Cables
      14. Bent Pins
      15. Bottlenecks
      16. VLAN Mismatch
      17. Network Connection LED Status Indicators
    3. What’s Next?
  19. Chapter 7: Wireless Solutions
    1. Understanding Wireless Basics
      1. Wireless Channels and Frequencies
      2. Cellular Access
      3. Speed, Distance, and Bandwidth
      4. Channel Bonding
      5. MIMO/MU-MIMO/Unidirectional/Omnidirectional
      6. Site Surveys
      7. Establishing Communications Between Wireless Devices
      8. Configuring the Wireless Connection
    2. Troubleshooting Wireless Issues
      1. Factors Affecting Wireless Signals
      2. Troubleshooting AP Coverage
    3. What’s Next?
  20. Chapter 8: Cloud Computing and Virtualization
    1. Cloud Concepts
      1. Software as a Service
      2. Platform as a Service
      3. Infrastructure as a Service
      4. Other Types of Services
      5. Private Cloud
      6. Public Cloud
      7. Hybrid Cloud
      8. Connectivity Methods
      9. Security Implications and Considerations
      10. The Relationship Between Resources
    2. Virtualization and Storage-Area Networks
      1. Virtualization
      2. Storage-Area Networks
    3. What’s Next?
  21. Chapter 9: Network Operations
    1. Documentation Management
      1. Wiring and Port Locations
      2. Physical and Logical Network Diagrams
      3. Baselines
      4. Policies, Procedures, Configurations, and Regulations
      5. Labeling
    2. Business Continuity and Disaster Recovery
      1. Backups
      2. Backup Best Practices
      3. Using Uninterruptible Power Supplies
      4. Alternatives to UPS
      5. Hot, Warm, and Cold Sites
      6. High Availability and Recovery Concepts
    3. Monitoring Network Performance
      1. Common Reasons to Monitor Networks
      2. SNMP Monitors
      3. Packet Sniffers
      4. Throughput Testing
      5. Port Scanners
      6. Vulnerability Scanners
      7. Network Performance, Load, and Stress Testing
      8. Tracking Event Logs
    4. Remote Access
      1. Remote File Access
      2. VPNs
      3. Site-to-Site and Client-to-Site
      4. HTTPS/Management URL
      5. Out-of-Band Management
    5. What’s Next?
  22. Chapter 10: Network Security
    1. Physical Security and Device Hardening
      1. Adding Physical Security to the Mix
      2. Two-Factor and Multifactor Authentication
      3. Secured Versus Unsecured Protocols
      4. Additional Device Hardening
    2. Authentication and Access Controls
      1. Mandatory Access Control
      2. Discretionary Access Control
      3. Rule-Based Access Control
      4. Role-Based Access Control
      5. RADIUS and TACACS+
      6. Kerberos Authentication
      7. Local Authentication
      8. Lightweight Directory Access Protocol
      9. Using Certificates
      10. Auditing and Logging
      11. Multifactor Authentication Factors
      12. Access Control
    3. Securing Wireless Networks
      1. WPA, WPA2, TKIP-RC4, and CCMP-AES
      2. Wireless Authentication and Authorization
      3. Shared, Preshared, and Open Keys
    4. Common Networking Attacks
      1. Denial-of-Service and Distributed Denial-of-Service Attacks
      2. Other Common Attacks
      3. Vulnerabilities and Prevention
    5. Mitigation Techniques
      1. Signature Management
      2. Device Hardening
      3. Change Native VLAN
      4. Switch and Port Protection
      5. Demilitarized Zones (Perimeter Network)
      6. VLAN Network Segmentation
      7. Privileged User Account
      8. File Integrity Monitoring
      9. Role Separation
      10. Using ACLs to Restrict Access
      11. Honeypots and Honeynets
      12. Penetration Testing
    6. What’s Next?
  23. Chapter 11: Network Troubleshooting
    1. Troubleshooting Steps and Procedures
      1. Identify the Problem
      2. Establish a Theory of Probable Cause
      3. Test the Theory to Determine Cause
      4. Establish a Plan of Action
      5. Implement the Solution or Escalate
      6. Verify Full System Functionality
      7. Document the Findings, Actions, and Outcomes
    2. Hardware and Software Troubleshooting Tools
      1. Wire Crimpers, Strippers, and Snips
      2. Tone Generator and Probes
      3. Loopback Adapter
      4. Protocol Analyzer
      5. Media/Cable Testers
      6. TDR and OTDR
      7. Multimeter
      8. Spectrum Analyzer
      9. Packet Sniffers
      10. Port Scanner
      11. Wi-Fi Analyzer
      12. Bandwidth Speed Tester and Looking Glasses
      13. Environmental Monitors
    3. Command-Line Troubleshooting Tools
      1. The Trace Route Utility (tracert/traceroute)
      2. ping
      3. ARP
      4. The netstat Command
      5. ipconfig
      6. ifconfig
      7. nslookup
      8. dig
      9. The tcpdump Command
      10. The route Utility
      11. nmap
    4. Troubleshooting Common Network Service Issues
      1. Common Problems to Be Aware Of
      2. Hardware Failure
    5. What’s Next?
  24. Glossary
  25. Index

Product information

  • Title: CompTIA Network+ N10-007 Exam Cram, 6th Edition
  • Author(s): Drew Streib, Emmett Dulaney
  • Release date: February 2018
  • Publisher(s): Pearson IT Certification
  • ISBN: 9780134866857