Mike Meyers' CompTIA Network+ Certification Passport, Seventh Edition (Exam N10-008), 7th Edition

Book description

Fully updated coverage of every topic on the latest version of the CompTIA Network+ exam

This quick review, cram-style test preparation guide offers 100% coverage of all objectives for the current version of the challenging CompTIA Network+ exam. Written in the proven Passport format developed by training guru Mike Meyers, the book enables you to focus on specific topics, determine areas of need, and tailor an effective course for study.

Mike Meyers’ CompTIA Network+ Certification Passport, Seventh Edition (Exam N10-008) contains contains expert guidance from networking experts who provide insightful tips and sound advice with an intensive focus on only what you need to know to pass the CompTIA Network+ Exam N10-008. The book provides practice questions and content review after each objective to help readers with exam mastery and exam Tips identify critical content to prepare for. Practice questions provide an accurate simulation of what to expect on the real test and provide in-depth answer explanations.

  • Includes a 10% discount voucher coupon for any CompTIA exam, a $33 value
  • Online content includes 200+ practice questions in the Total Tester exam engine, a new collection of Mike's favorite shareware and freeware networking utilities, and training videos

Table of contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. Contents
  6. Acknowledgments
  7. Introduction
  8. 1.0 Networking Fundamentals
    1. Objective 1.1 Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts
      1. OSI Model
        1. Layer 1 – Physical
        2. Layer 2 – Data Link
        3. Layer 3 – Network
        4. Layer 4 – Transport
        5. Layer 5 – Session
        6. Layer 6 – Presentation
        7. Layer 7 – Application
      2. Data Encapsulation and Decapsulation Within the OSI Model Context
        1. Ethernet Header, Internet Protocol (IP) Header, Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) Headers, Payload
        2. TCP Flags
        3. Maximum Transmission Unit (MTU)
      3. REVIEW
        1. 1.1 QUESTIONS
        2. 1.1 ANSWERS
    2. Objective 1.2 Explain the characteristics of network topologies and network types
      1. Bus
      2. Ring
      3. Hybrid
      4. Star/Hub-and-Spoke
      5. Mesh
      6. Network Types and Characteristics
        1. Client-Server
        2. Peer-to-Peer
        3. Local Area Network (LAN)
        4. Wide Area Network (WAN)
        5. Metropolitan Area Network (MAN)
        6. Wireless Local Area Network (WLAN)
        7. Personal Area Network (PAN)
        8. Campus Area Network (CAN)
        9. Storage Area Network (SAN)
        10. Multiprotocol Label Switching (MPLS)
        11. Software-Defined Wide Area Network (SDWAN)
        12. Multipoint Generic Routing Encapsulation (mGRE)
      7. Service-Related Entry Point
        1. Demarcation Point
        2. Smartjack
      8. Virtual Network Concepts
        1. Hypervisor
        2. Virtual Network Interface Card (vNIC)
        3. vSwitch
        4. Network Function Virtualization
      9. Provider Links
        1. Satellite
        2. Digital Subscriber Line (DSL)
        3. Cable
        4. Leased Line
        5. Metro-Optical
      10. REVIEW
        1. 1.2 QUESTIONS
        2. 1.2 ANSWERS
    3. Objective 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution
      1. Copper
        1. Twisted Pair
        2. Coaxial/RG-6
        3. Twinaxial
        4. Termination Standards
      2. Fiber
        1. Single-mode
        2. Multimode
      3. Connector Types
        1. Local Connector (LC), Straight Tip (ST), Subscriber Connector (SC), Mechanical Transfer (MT), Registered Jack (RJ)
        2. RJ11, RJ45, F-type Connector
        3. Transceivers/Media Converters
        4. Transceiver type
      4. Cable Management
        1. Patch Panel/Patch Bay
        2. Fiber Distribution Panel
        3. Punchdown Block
      5. Ethernet Standards
        1. Copper
        2. Fiber
      6. REVIEW
        1. 1.3 QUESTIONS
        2. 1.3 ANSWERS
    4. Objective 1.4 Given a scenario, configure a subnet and use appropriate IP addressing schemes
      1. Public vs. Private
        1. RFC 1918
        2. Network Address Translation (NAT)
        3. Port Address Translation (PAT)
      2. IPv4 vs. IPv6
        1. Automatic Private IP Addressing (APIPA), Link-Local
        2. Extended Unique Identifier (EUI-64)
        3. Broadcast
        4. Multicast
        5. Unicast
        6. Anycast
        7. Loopback
      3. Default Gateway
      4. IPv4 Subnetting
        1. Classful
        2. Classless (Variable-Length Subnet Mask)
        3. Classless Inter-Domain Routing (CIDR) Notation
      5. IPv6 Concepts
        1. Tunneling
        2. Dual Stack
        3. Shorthand Notation
        4. Router Advertisement, Stateless Address Autoconfiguration (SLAAC)
      6. Virtual IP (VIP)
      7. Subinterfaces
      8. REVIEW
        1. 1.4 QUESTIONS
        2. 1.4 ANSWERS
    5. Objective 1.5 Explain common ports and protocols, their application, and encrypted alternatives
      1. Protocols and Ports
        1. Types of Ports
        2. Port States
        3. Commonly Used Ports
      2. IP Protocol Types
        1. TCP and UDP
        2. Internet Control Message Protocol (ICMP)
        3. Generic Routing Encapsulation (GRE)
        4. Internet Protocol Security (IPsec)
      3. Connectionless vs. Connection-Oriented
      4. REVIEW
        1. 1.5 QUESTIONS
        2. 1.5 ANSWERS
    6. Objective 1.6 Explain the use and purpose of network services
      1. DHCP
        1. Scope, Scope Options
        2. Lease Time, Available Leases
        3. Dynamic Assignment
        4. Static Assignment
        5. Exclusion Ranges
        6. Reservation
        7. DHCP Relay, IP Helper/UDP Forwarding
      2. DNS
        1. Zone Transfers
        2. Global Hierarchy
        3. Time to Live (TTL), DNS Caching
        4. Recursive Lookup/Iterative Lookup
        5. Record Types
        6. Reverse DNS/Reverse Lookup/Forward Lookup
        7. Internal vs. External DNS
      3. NTP
        1. Stratum, Clients, Servers
      4. REVIEW
        1. 1.6 QUESTIONS
        2. 1.6 ANSWERS
    7. Objective 1.7 Explain basic corporate and datacenter network architecture
      1. Three-Tiered
        1. Access/Edge
        2. Distribution/Aggregation Layer
        3. Core
      2. Software-Defined Networking
        1. Control Layer, Infrastructure Layer
        2. Management Plane, Application Layer
      3. Spine and Leaf
        1. Software-Defined Network
        2. Top-of-Rack Switching
        3. Backbone
      4. Traffic Flows
        1. North-South
        2. East-West
      5. Branch Office vs. On-Premises Datacenter vs. Colocation
      6. Storage Area Networks
        1. Connection Types
      7. REVIEW
        1. 1.7 QUESTIONS
        2. 1.7 ANSWERS
    8. Objective 1.8 Summarize cloud concepts and connectivity options
      1. Deployment Models
        1. Public
        2. Private
        3. Hybrid
        4. Community
      2. Service Models
        1. Software as a Service (SaaS)
        2. Infrastructure as a Service (IaaS)
        3. Platform as a Service (PaaS)
        4. Desktop as a Service (DaaS)
      3. Infrastructure as Code
        1. Automation/Orchestration
      4. Connectivity Options
        1. Virtual Private Network (VPN)
        2. Private-Direct Connection to Cloud Provider
      5. Multitenancy
      6. Scalability
      7. Elasticity
      8. Security Implications
      9. REVIEW
        1. 1.8 QUESTIONS
        2. 1.8 ANSWERS
  9. 2.0 Network Implementations
    1. Objective 2.1 Compare and contrast various devices, their features, and their appropriate placement on the network
      1. Networking Devices
        1. Layer 2 Switch
        2. Layer 3 Capable Switch
        3. Router
        4. Hub
        5. Access Point
        6. Bridge
        7. Wireless LAN Controller
        8. Load Balancer
        9. Proxy Server
        10. Cable Modem
        11. DSL Modem
        12. Repeater
        13. Voice Gateway
        14. Media Converter
        15. Firewall
        16. Intrusion Prevention System(IPS)/Intrusion Detection System (IDS) Device
        17. VPN Headend
      2. Networked Devices
        1. Voice over Internet Protocol (VoIP) Phone
        2. Printer
        3. Physical Access Control Devices
        4. Cameras
        5. Heating, Ventilation, and Air Conditioning (HVAC) Sensors
        6. Internet of Things (IoT)
      3. Industrial Control Systems/Supervisory Control and Data Acquisition (SCADA)
      4. REVIEW
        1. 2.1 QUESTIONS
        2. 2.1 ANSWERS
    2. Objective 2.2 Compare and contrast routing technologies and bandwidth management concepts
      1. Routing
        1. Dynamic Routing
        2. Static Routing
        3. Default Route
        4. Administrative Distance
        5. Exterior vs. Interior
        6. Time to Live
      2. Bandwidth Management
        1. Quality of Service (QoS), Traffic Shaping
      3. REVIEW
        1. 2.2 QUESTIONS
        2. 2.2 ANSWERS
    3. Objective 2.3 Given a scenario, configure and deploy common Ethernet switching features
      1. Data Virtual Local Area Network (VLAN)
      2. Voice VLAN
      3. Port Configurations
        1. Port Tagging/802.1Q
        2. Port Aggregation
        3. Duplex
        4. Speed
        5. Flow Control
        6. Port Mirroring
        7. Port Security
        8. Jumbo Frames
        9. Auto-Medium-Dependent Interface Crossover (MDI-X)
      4. Media Access Control (MAC) Address Tables
      5. Power over Ethernet (PoE)/Power over Ethernet Plus (PoE+)
      6. Spanning Tree Protocol
      7. Carrier-Sense Multiple Access with Collision Detection (CSMA/CD)
      8. Address Resolution Protocol (ARP)
      9. Neighbor Discovery Protocol
      10. REVIEW
        1. 2.3 QUESTIONS
        2. 2.3 ANSWERS
    4. Objective 2.4 Given a scenario, install and configure the appropriate wireless standards and technologies
      1. 802.11 Standards
        1. a
        2. b
        3. g
        4. n (Wi-Fi 4)
        5. ac (Wi-Fi 5)
        6. ax (Wi-Fi 6)
      2. Frequencies and Range
        1. 2.4 GHz
        2. 5.0 GHz
      3. Channels
        1. Regulatory Impacts
      4. Channel Bonding
      5. Service Set Identifier (SSID)
        1. Basic Service Set
        2. Independent Basic Service Set (Ad-hoc)
        3. Extended Service Set
        4. Roaming
      6. Antenna Types
        1. Omni
        2. Directional
      7. Encryption Standards
        1. Wi-Fi Protected Access (WPA)/WPA2 Personal [Advanced Encryption Standard (AES)/Temporal Key Integrity Protocol (TKIP)]
        2. WPA/WPA2 Enterprise (AES/TKIP)
      8. Cellular Technologies
        1. Global System for Mobile Communications (GSM)
        2. Code-Division Multiple Access (CDMA)
        3. Long-Term Evolution (LTE)
        4. 3G, 4G, 5G
      9. Multiple Input, Multiple Output (MIMO) and Multi-user MIMO (MU-MIMO)
      10. REVIEW
        1. 2.4 QUESTIONS
        2. 2.4 ANSWERS
  10. 3.0 Network Operations
    1. Objective 3.1 Given a scenario, use the appropriate statistics and sensors to ensure network availability
      1. Performance Metrics/Sensors
        1. Device/Chassis
        2. Network Metrics
      2. SNMP
        1. Management Information Bases (MIBs)
        2. Object Identifiers (OIDs)
        3. Traps
      3. Network Device Logs
        1. Log Reviews
        2. Logging Levels/Severity Levels
      4. Interface Statistics/Status
        1. Link State (Up/Down)
        2. Speed/Duplex
        3. Send/Receive Traffic
        4. Cyclic Redundancy Checks (CRCs)
        5. Protocol Packet and Byte Counts
      5. Interface Errors or Alerts
        1. CRC Errors
        2. Giants
        3. Runts
        4. Encapsulation Errors
      6. Environmental Factors and Sensors: Temperature, Humidity, Electrical, Flooding
      7. Baselines
      8. NetFlow Data
      9. Uptime/Downtime
      10. REVIEW
        1. 3.1 QUESTIONS
        2. 3.1 ANSWERS
    2. Objective 3.2 Explain the purpose of organizational documents and policies
      1. Plans and Procedures
        1. Change Management
        2. Incident Response Plan
        3. Disaster Recovery Plan
        4. Business Continuity Plan
        5. System Life Cycle
        6. Standard Operating Procedures
      2. Hardening and Security Policies
        1. Password Policy
        2. Acceptable Use Policy
        3. Bring Your Own Device (BYOD) Policy
        4. Remote Access Policy
        5. Onboarding and Offboarding Policy
        6. Security Policy
        7. Data Loss Prevention
      3. Common Documentation
        1. Physical Network Diagram
        2. Logical Network Diagram
        3. Wiring Diagram
        4. Site Survey Report
        5. Audit and Assessment Report
        6. Baseline Configurations
      4. Common Agreements
        1. Non-Disclosure Agreement (NDA)
        2. Service-Level Agreement (SLA)
        3. Memorandum of Understanding (MOU)
      5. REVIEW
        1. 3.2 QUESTIONS
        2. 3.2 ANSWERS
    3. Objective 3.3 Explain high availability and disaster recovery concepts and summarize which is the best solution
      1. Load Balancing
      2. Multipathing
      3. Network Interface Card (NIC) Teaming
      4. Redundant Hardware/Clusters
        1. Switches
        2. Routers
        3. Firewalls
      5. Facilities and Infrastructure Support
        1. Uninterruptible Power Supply (UPS)
        2. Power Distribution Units (PDUs)
        3. Generator
        4. HVAC
        5. Fire Suppression
      6. Redundancy and High Availability (HA) Concepts
        1. Cold Site
        2. Warm Site
        3. Hot Site
        4. Cloud Site
        5. Active-Active vs. Active-Passive
        6. Mean Time to Repair (MTTR)
        7. Mean Time Between Failure (MTBF)
        8. Recovery Time Objective (RTO)
        9. Recovery Point Objective (RPO)
      7. Network Device Backup/Restore
        1. Configuration
        2. State
      8. REVIEW
        1. 3.3 QUESTIONS
        2. 3.3 ANSWERS
  11. 4.0 Network Security
    1. Objective 4.1 Explain common security concepts
      1. Confidentiality, Integrity, Availability (CIA)
      2. Threats
        1. Internal
        2. External
      3. Vulnerabilities
        1. Common Vulnerabilities and Exposures (CVE)
        2. Zero-Day
      4. Exploits
      5. Least Privilege
      6. Role-Based Access
      7. Zero Trust
      8. Defense in Depth
        1. Network Segmentation Enforcement
        2. Screened Subnet [Previously Known as Demilitarized Zone (DMZ)]
        3. Separation of Duties
        4. Network Access Control
        5. Honeypot
      9. Authentication Methods
        1. Multifactor
        2. Terminal Access Controller Access-Control System Plus (TACACS+)
        3. Remote Authentication Dial-in User Service (RADIUS)
        4. Single Sign-On (SSO)
        5. LDAP
        6. Kerberos
        7. Local Authentication
        8. Extensible Authentication Protocol (EAP)
        9. 802.1X
      10. Risk Management
        1. Security Risk Assessments
        2. Business Risk Assessments
      11. Security Information and Event Management (SIEM)
      12. REVIEW
        1. 4.1 QUESTIONS
        2. 4.1 ANSWERS
    2. Objective 4.2 Compare and contrast common types of attacks
      1. Technology-Based
        1. Denial-of-Service (DoS)/Distributed Denial-of-Service (DDoS)
        2. On-Path Attack (Previously Known as Man-in-the-Middle Attack)
        3. ARP Spoofing
        4. DNS Poisoning
        5. VLAN Hopping
        6. Rogue DHCP
        7. Rogue Access Point (AP)
        8. Evil Twin
        9. Ransomware
        10. Password Attacks
        11. MAC Spoofing
        12. IP Spoofing
        13. Deauthentication
        14. Malware
      2. Human and Environmental
        1. Social Engineering
      3. REVIEW
        1. 4.2 QUESTIONS
        2. 4.2 ANSWERS
    3. Objective 4.3 Given a scenario, apply network hardening techniques
      1. Best Practices
        1. Secure SNMP
        2. Router Advertisement (RA) Guard
        3. Port Security
        4. Dynamic ARP Inspection
        5. Control Plane Policing
        6. Private VLANs
        7. Disable Unneeded Switchports
        8. Disable Unneeded Network Services
        9. Change Default Passwords
        10. Password Complexity/Length
        11. Enable DHCP Snooping
        12. Change Default VLAN
        13. Patch and Firmware Management
        14. Access Control List
        15. Firewall Rules
        16. Role-Based Access
      2. Wireless Security
        1. MAC Filtering
        2. Antenna Placement
        3. Power Levels
        4. Wireless Client Isolation
        5. Guest Network Isolation
        6. Preshared Keys (PSKs)
        7. EAP
        8. Geofencing
        9. Captive Portal
      3. IoT Access Considerations
      4. REVIEW
        1. 4.3 QUESTIONS
        2. 4.3 ANSWERS
    4. Objective 4.4 Compare and contrast remote access methods and security implications
      1. Site-to-Site VPN
      2. Client-to-Site VPN
        1. Clientless VPN
        2. Split Tunnel vs. Full Tunnel
      3. Remote Desktop Connection
      4. Remote Desktop Gateway
      5. SSH
      6. Virtual Network Computing (VNC)
      7. Virtual Desktop
      8. Authentication and Authorization Considerations
      9. In-Band vs. Out-of-Band Management
      10. REVIEW
        1. 4.4 QUESTIONS
        2. 4.4 ANSWERS
    5. Objective 4.5 Explain the importance of physical security
      1. Detection Methods
        1. Camera
        2. Motion Detection
        3. Asset Tags
        4. Tamper Detection
      2. Prevention Methods
        1. Employee Training
        2. Access Control Hardware
        3. Locking Racks, Locking Cabinets
        4. Access Control Vestibule (Previously Known as a Mantrap)
        5. Smart Lockers
      3. Asset Disposal
        1. Factory Reset/Wipe Configuration
        2. Sanitize Devices for Disposal
      4. REVIEW
        1. 4.5 QUESTIONS
        2. 4.5 ANSWERS
  12. 5.0 Network Troubleshooting
    1. Objective 5.1 Explain the network troubleshooting methodology
      1. Identify the Problem
        1. Gather Information
        2. Question Users
        3. Identify Symptoms
        4. Determine if Anything Has Changed
        5. Duplicate the Problem, if Possible
        6. Approach Multiple Problems Individually
      2. Establish a Theory of Probable Cause
        1. Question the Obvious
        2. Consider Multiple Approaches
      3. Test the Theory to Determine the Cause
        1. If the Theory Is Confirmed, Determine the Next Steps to Resolve the Problem
        2. If the Theory Is Not Confirmed, Reestablish a New Theory or Escalate
        3. Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
        4. Implement the Solution or Escalate As Necessary
      4. Verify Full System Functionality and, if Applicable, Implement Preventive Measures
      5. Document Findings, Actions, Outcomes, and Lessons Learned
      6. REVIEW
        1. 5.1 QUESTIONS
        2. 5.1 ANSWERS
    2. Objective 5.2 Given a scenario, troubleshoot common cable connectivity issues and select the appropriate tools
      1. Specifications and Limitations
        1. Throughput
        2. Speed
        3. Distance
      2. Cable Considerations
        1. Shielded and Unshielded
        2. Plenum and Riser-Rated
      3. Cable Application
        1. Rollover Cable/Console Cable
        2. Crossover Cable
        3. Power over Ethernet
      4. Common Issues
        1. Attenuation
        2. Interference
        3. Decibel (dB) Loss
        4. Incorrect Pinout
        5. Bad Ports
        6. Open/Short
        7. Light-Emitting Diode (LED) Status Indicators
        8. Incorrect Transceivers
        9. Duplexing Issues
        10. Transmit and Receive (TX/RX) Reversed
        11. Dirty Optical Cables
      5. Common Tools
        1. Cable Crimper
        2. Punchdown Tool
        3. Tone Generator
        4. Loopback Adapter
        5. Optical Time-Domain Reflectometer (OTDR)
        6. Multimeter
        7. Cable Tester
        8. Wire Map
        9. Tap
        10. Fusion Splicers
        11. Spectrum Analyzers
        12. Snips/Cutters
        13. Cable Stripper
        14. Fiber Light Meter
      6. REVIEW
        1. 5.2 QUESTIONS
        2. 5.2 ANSWERS
    3. Objective 5.3 Given a scenario, use the appropriate network software tools and commands
      1. Software Tools
        1. WiFi Analyzer
        2. Protocol Analyzer/Packet Capture
        3. Bandwidth Speed Tester
        4. Port Scanner
        5. iperf
        6. NetFlow Analyzers
        7. Trivial File Transfer Protocol (TFTP) Server
        8. Terminal Emulator
        9. IP Scanner
      2. Command Line Tool
        1. ping
        2. ipconfig/ifconfig/ip
        3. nslookup/dig
        4. traceroute/tracert
        5. arp
        6. netstat
        7. hostname
        8. route
        9. telnet
        10. tcpdump
        11. nmap
      3. Basic Network Platform Commands
        1. show interface
        2. show config
        3. show route
      4. REVIEW
        1. 5.3 QUESTIONS
        2. 5.3 ANSWERS
    4. Objective 5.4 Given a scenario, troubleshoot common wireless connectivity issues
      1. Specifications and Limitations
        1. Throughput
        2. Speed
        3. Distance
        4. Received Signal Strength Indication (RSSI) Signal Strength
        5. Effective Isotropic Radiated Power (EIRP)/Power Settings
      2. Considerations
        1. Antennas
        2. Channel Utilization
        3. AP Association Time
        4. Site Survey
      3. Common Issues
        1. Interference
        2. Antenna Cable Attenuation/Signal Loss
        3. RF Attenuation/Signal Loss
        4. Wrong SSID
        5. Incorrect Passphrase
        6. Encryption Protocol Mismatch
        7. Insufficient Wireless Coverage
        8. Captive Portal Issues
        9. Client Disassociation Issues
      4. REVIEW
        1. 5.4 QUESTIONS
        2. 5.4 ANSWERS
    5. Objective 5.5 Given a scenario, troubleshoot general networking issues
      1. Considerations
        1. Device Configuration Review
        2. Routing Tables
        3. Interface Status
        4. VLAN Assignment
        5. Network Performance Baselines
      2. Common Issues
        1. Collisions
        2. Broadcast Storm
        3. Duplicate MAC Address
        4. Duplicate IP Address
        5. Multicast Flooding
        6. Asymmetrical Routing
        7. Switching Loops
        8. Routing Loops
        9. Rogue DHCP Server
        10. DHCP Scope Exhaustion
        11. IP Setting Issues
        12. Missing Route
        13. Low Optical Link Budget
        14. Certificate Issues
        15. Hardware Failure
        16. Host-Based/Network-Based Firewall Settings
        17. Blocked Services, Ports, or Addresses
        18. Incorrect VLAN
        19. DNS Issues
        20. NTP Issues
        21. BYOD Challenges
        22. Licensed Feature Issues
        23. Network Performance Issues
      3. REVIEW
        1. 5.5 QUESTIONS
        2. 5.5 ANSWERS
  13. A About the Online Content
    1. System Requirements
    2. Your Total Seminars Training Hub Account
      1. Privacy Notice
    3. Single User License Terms and Conditions
    4. TotalTester Online
      1. Pre-Assessment Test
    5. Other Book Resources
      1. TotalSims for Network+
      2. Mike’s Video Training
      3. Mike’s Cool Tools
    6. Technical Support
  14. Index

Product information

  • Title: Mike Meyers' CompTIA Network+ Certification Passport, Seventh Edition (Exam N10-008), 7th Edition
  • Author(s): Mike Meyers, Jonathan S. Weissman
  • Release date: February 2023
  • Publisher(s): McGraw-Hill
  • ISBN: 9781264268979