Published by Pearson IT Certification (September 13, 2021) © 2022

Emmett Dulaney
    VitalSource eTextbook (Lifetime access)
    €34,99
    Adding to cart… The item has been added
    ISBN-13: 9780137375707

    CompTIA Network+ N10-008 Exam Cram ,7th edition

    Language: English

    Prepare for CompTIA Network+ N10-008 exam success with this Exam Cram from Pearson IT Certification, a leader in IT certification.


    This is the eBook edition of the CompTIA Network+ N10-008 Exam Cram. This eBook does not include access to the Pearson Test Prep practice exams that comes with the print edition.


    CompTIA Network+ N10-008 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Network+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet.


    Covers the critical information needed to score higher on your Network+ N10-008 exam!

    * Establish network connectivity by deploying wired and wireless devices  
    * Understand and maintain network documentation  
    * Understand the purpose of network services
    * Understand basic datacenter, cloud, and virtual networking concepts  
    * Monitor network activity, identifying performance and availability issues
    * Implement network hardening techniques
    * Manage, configure, and troubleshoot network infrastructure
     

    Introduction
    CHAPTER 1: Network Technologies, Topologies, and Types
    Wired and Wireless Network Topologies
        Bus Topology
        Ring Topology
        Star Topology (Hub-and-Spoke)
        Mesh Topology
        Hybrid Topology
        Bringing Wireless to a Topology
            Infrastructure Wireless Topology
            Ad Hoc Wireless Topology
            Wireless Mesh Topology
    Network Types and Characteristics
        To Server or Not
        LANs
        WLANs
        WANs
        MANs
        CANs
        SANs
        PANs
        SDWANs
        MPLS
        mGRE
    Network Links and Concepts
        DSL Internet Access
        Cable Broadband
        The Public Switched Telephone Network
        Leased Lines
            T3 Lines
        Metro-Optical
        Satellite Internet Access
        Termination Points
            Demarc, Demarc Extension, and Smart Jacks
            CSUs/DSUs
            Verify Wiring Installation and Termination
        Virtual Networking
    What's Next?
    CHAPTER 2: Models, Ports, Protocols, and Network Services
    The OSI Networking Model
        The OSI Seven-Layer Model
            Physical Layer (Layer 1)
            Data Link Layer (Layer 2)
            Network Layer (Layer 3)
            Transport Layer (Layer 4)
            Session Layer (Layer 5)
            Presentation Layer (Layer 6)
            Application Layer (Layer 7)
            OSI Model Summary
        Comparing OSI to the Four-Layer TCP/IP Model
        Identifying the OSI Layers at Which Various Network Components Operate
        Data Encapsulation/Decapsulation and OSI
    Ports and Protocols
        Connection-Oriented Protocols Versus Connectionless Protocols
        Internet Protocol
        Transmission Control Protocol
            How TCP Works
        User Datagram Protocol
        Internet Control Message Protocol
        IPSec
        Generic Routing Encapsulation
        File Transfer Protocol
        Secure Shell
        Secure File Transfer Protocol
        Telnet
        Simple Mail Transfer Protocol
        Domain Name System (DNS)
        Dynamic Host Configuration Protocol (DHCP)
        Trivial File Transfer Protocol
        Hypertext Transfer Protocol
        Network Time Protocol (NTP)
        Post Office Protocol Version 3/Internet Message Access Protocol Version 4
        Simple Network Management Protocol
            Components of SNMP
            SNMP Management Systems
            SNMP Agents
            Management Information Bases
            SNMP Communities
            SNMPv3
        Lightweight Directory Access Protocol
        Hypertext Transfer Protocol Secure
        Server Message Block
        Syslog
        SMTP TLS
        LDAPS
        IMAP over SSL
        POP3 over SSL
        SQL, SQLnet, and MySQL
        Remote Desktop Protocol
        Session Initiation Protocol
        Understanding Port Functions
    Network Services
        Domain Name Service (DNS)
        The DNS Namespace
        Types of DNS Entries
        DNS Records
        DNS in a Practical Implementation
        Dynamic Host Configuration Protocol
        The DHCP Process
        DHCP and DNS Suffixes
        DHCP Relays and IP Helpers
        Network Time Protocol
    What's Next?
    CHAPTER 3: Addressing, Routing, and Switching
    IP Addressing
        IPv4
        IP Address Classes
        Subnet Mask Assignment
        Subnetting
        Identifying the Differences Between IPv4 Public and Private Networks
            Private Address Ranges
        Classless Interdomain Routing
        Default Gateways
        Virtual IP
        IPv4 Address Types
            Unicast Address
            Broadcast Address
            Multicast
        IPv6 Addressing
            Where Have All the IPv4 Addresses Gone?
            Identifying IPv6 Addresses
            IPv6 Address Types
            Global Unicast Addresses
            Link-Local Addresses
            Site-Local Addresses
            Neighbor Discovery
        Comparing IPv4 and IPv6 Addressing
        Assigning IP Addresses
            Static Addressing
            Dynamic Addressing
            BOOT Protocol (BOOTP)
            Automatic Private IP Addressing
        Identifying MAC Addresses
        NAT and PAT
            NAT
            PAT
            SNAT
            DNAT
    Managing Routing and Switching
        The Default Gateway
        Routing Tables
        Static Routing
        Default Route
        Switching Methods
            Packet Switching
            Circuit Switching
            Comparing Switching Methods
        Dynamic Routing
            Distance-Vector Routing
            Link-State Routing
            Hybrid Routing Protocols
        Network Traffic
        Routing Metrics
        Virtual Local-Area Networks
            VLAN Membership
            VLAN Segmentation
        The Spanning Tree Protocol
        Interface Configuration and Switch Management
        MDI-X
        Trunking
        Port Mirroring
        Port Authentication
        Power over Ethernet (PoE and PoE+)
        MAC Address Table
        Switch Management
        Managed and Unmanaged
        Quality of Service
        Traffic Shaping
        Access Control Lists
        ARP and RARP
    What's Next?
    CHAPTER 4: Network Implementations
    Common Networking Devices
        Firewall
        IDS/IPS
        Router
        Switch
            Hub and Switch Cabling
        Multilayer Switch
        Hub
        Bridge
        DSL and Cable Modems
        Access Point
        Media Converter
        Voice Gateway
        Repeater
        Wireless LAN Controller
        Load Balancer
        Proxy Server
        VPN Concentrators and Headends
        Networked Devices
    Networking Architecture
        Three-Tiered Architecture
            Core Layer
            Distribution/Aggregation Layer
            Access/Edge Layer
        Software-Defined Networking
            Application Layer
            Control Layer
            Infrastructure Layer
            Management Plane
        Spine and Leaf
        Traffic Flows
        Datacenter Location Types
        Storage-Area Networks
            iSCSI
            Fibre Channel and FCoE
            Network-Attached Storage
    What's Next?
    CHAPTER 5: Cabling Solutions and Issues
    General Media Considerations
        Broadband Versus Baseband Transmissions
        Simplex, Half-Duplex, and Full-Duplex Modes
        Data Transmission Rates
        Types of Network Media
            Twisted-Pair Cabling (Copper)
            Coaxial Cables
            Twinaxial Cables
            Fiber-Optic Cables
            Plenum Versus PVC Cables
        Types of Media Connectors
            BNC Connectors
            RJ-11 Connectors
            RJ-45 Connectors
            F-Type Connectors and RG-59 and RG-6 Cables
            Fiber Connectors
            Transceivers
        Media Couplers/Converters
        TIA/EIA 568A and 568B Wiring Standards
        Straight-Through Versus Crossover Cables
        Rollover and Loopback Cables
        Components of Wiring Distribution
            Network Cross-Connects
            Horizontal Cabling
            Vertical Cables
            Patch Panels
            Fiber Distribution Panels
            66 and 110 Blocks (T568A, T568B)
            MDF and IDF Wiring Closets
        Ethernet Copper and Fiber Standards
            10BASE-T
            100BASE-TX
            1000BASE-T
            10GBASE-T
            40GBASE-T
            1000BASE-LX and 1000BASE-SX
            10GBASE-LR and 10GBASE-SR
        Multiplexing Options
    Troubleshooting Common Cable Connectivity Issues
    Limitations, Considerations, and Issues
        Throughput, Speed, and Distance
        Cabling Specifications/Limitations
        Cabling Considerations
        Cabling Applications
        Attenuation and dB Loss
        Interference
        Incorrect Pinout
        Bad Ports
        Open/Short
        LED Status Indicators
        Incorrect Transceivers
        Duplexing Issues
        TX/RX Reversed
        Dirty Optical Cables
    Common Tools
        Cable Crimpers, Strippers, and Snips/Cutters
        Punchdown Tools
        Tone Generator
        Loopback Adapter
        OTDR
        Multimeter
        Cable Tester
        Wire Map
        Tap
        Fusion Splicer
        Spectrum Analyzer
        Fiber Light Meter
    What's Next?
    CHAPTER 6: Wireless Solutions and Issues
    Understanding Wireless Basics
        Wireless Channels and Frequencies
        Cellular Technology Access
        Speed, Distance, and Bandwidth
        Channel Bonding
        MIMO/MU-MIMO/Directional/Omnidirectional
            Antenna Ratings
            Antenna Coverage
        Establishing Communications Between Wireless Devices
        Configuring the Wireless Connection
    Troubleshooting Wireless Issues
        Site Surveys
        Factors Affecting Wireless Signals
        Interference
        Reflection, Refraction, and Absorption
    Troubleshooting AP Coverage
    What's Next?
    CHAPTER 7: Cloud Computing Concepts and Options
    Cloud Concepts
        Service Models
        Software as a Service
        Platform as a Service
        Infrastructure as a Service
        Desktop as a Service
        Deployment Models
        Private Cloud
        Public Cloud
        Hybrid and Community Clouds
        Infrastructure as Code
        Connectivity Options
        Multitenancy
        Elasticity
        Scalability
        Security Implications
        The Relationship Between Resources
    What's Next?
    CHAPTER 8: Network Operations
    Organizational Documents and Policies
        Wiring and Port Locations
            Troubleshooting Using Wiring Schematics
        Physical and Logical Network Diagrams
        Baseline Configurations
        Policies, Procedures, Configurations, and Regulations
            Policies
            Password-Related Policies
            Procedures
            Change Management Documentation
            Configuration Documentation
            Regulations
            Labeling
    High Availability and Disaster Recovery
        Backups
            Full Backups
            Differential Backups
            Incremental Backups
            Snapshots
        Backup Best Practices
        Using Uninterruptible Power Supplies
            Why Use a UPS?
            Power Threats
        Beyond the UPS
        Cold, Warm, Hot, and Cloud Sites
        High Availability and Recovery Concepts
        Active-Active Versus Active-Passive
    Monitoring Network Performance
        Common Performance Metrics
        SNMP Monitors
            Management Information Base (MIB)
        Network Performance, Load, and Stress Testing
            Performance Tests
            Load Tests and Send/Receive Traffic
            Stress Tests
            Performance Metrics
        Network Device Logs
            Security Logs
            Application Log
            System Logs
            History Logs
            Log Management
            Patch Management
        Environmental Factors
    What's Next?
    CHAPTER 9: Network Security
    Common Security Concepts
        Access Control
        Mandatory Access Control
        Discretionary Access Control
        Rule-Based Access Control
        Role-Based Access Control
        Defense in Depth
            Network Segmentation
            Screened Subnet
        Separation of Duties
        Honeypots
        RADIUS and TACACS+
        Kerberos Authentication
        Local Authentication
        Lightweight Directory Access Protocol
        Using Certificates
        Auditing and Logging
        Multifactor Authentication Factors
        Additional Access Control Methods
            802.1X
            Extensible Authentication Protocol (EAP)
            Network Access Control (NAC)
            MAC Filtering
        Risk Management
        Penetration Testing
        Security Information and Event Management
    Common Networking Attacks
        Denial-of-Service and Distributed Denial-of-Service Attacks
            Types of DoS Attacks
        Other Common Attacks
            Social Engineering
            Logic Bomb
            Rogue DHCP
            Rogue Access Points and Evil Twins
            Advertising Wireless Weaknesses
            Phishing
            Ransomware
            DNS Poisoning
            ARP Cache Poisoning
            Spoofing
            Deauthentication
            Brute Force
            On-Path Attack
            VLAN Hopping
            ARP Spoofing
        Vulnerabilities and Prevention
    Network Hardening and Physical Security
        Disposing of Assets
        Implementing Physical Security
            Lock and Key
            Swipe Card and PIN Access
            Biometrics
        Two-Factor and Multifactor Authentication
        Secured Versus Unsecured Protocols
        Hardening Best Practices
        Wireless Security
            MAC Filtering
            Antenna Placement and Power Levels
            Isolation
            Preshared Keys
            Geofencing
            Captive Portal
        IoT Access Considerations
    Remote-Access Methods
        Remote File Access
        VPNs
            Components of the VPN Connection
            VPN Connection Types
            VPN Pros and Cons
            IPSec
            SSL/TLS/DTLS
        Site-to-Site and Client-to-Site
        Virtual Desktops
        HTTPS/Management URL
        Authentication and Authorization Considerations
        Out-of-Band Management
    What's Next?
    CHAPTER 10: Network Troubleshooting
    Troubleshooting Steps and Procedures
        Identify the Problem
            Identify Symptoms
            Determine Whether Anything Has Changed
            Duplicate the Problem if Possible
            Approach Multiple Problems Individually
        Establish a Theory of Probable Cause
        Test the Theory to Determine the Cause
        Establish a Plan of Action
        Implement the Solution or Escalate
            Determine Whether Escalation Is Necessary
        Verify Full System Functionality
        Document Findings, Actions, Outcomes, and Lessons
    Software Troubleshooting Tools
        Wi-Fi Analyzer
        Protocol Analyzer
        Bandwidth Speed Tester
        Port Scanner
        iperf
        NetFlow Analyzer
        TFTP Server
        Terminal Emulator
        IP Scanner
        Command-Line Tools
        The Trace Route Utility (tracert/traceroute)
        ping
            The Destination Host Unreachable Message
            The Request Timed Out Message
            The Unknown Host Message
            The Expired TTL Message
            Troubleshooting with ping
            hostname
        ARP
            arp ping
        The netstat Command
            netstat -e
            netstat -a
            netstat -r
            netstat -s
            telnet
        ipconfig
        ifconfig
        nslookup
        dig
        The tcpdump Command
        The route Utility
        nmap
        Basic Network Platform Commands
    Troubleshooting General Networking Issues
        Common Considerations
        Common Problems to Be Aware Of
            Collisions
            Broadcast Storm
            Multicast Flooding
            Asymmetrical Routing
            Switching Loops
            Routing Loops
            Missing Route
            Low Optical Link Budget
            Incorrect VLAN
            DNS Issues
            Incorrect Gateway
            Incorrect Subnet Mask
            Duplicate or Incorrect IP Address
            Duplicate MAC Addresses
            Expired IP Address
            Rogue DHCP Server
            Certificate Issues
            NTP Issues/Incorrect Time
            DHCP Scope Exhaustion
            Blocked Ports, Services, or Addresses
            Incorrect Firewall Settings
            Incorrect ACL Settings
            Unresponsive Service
            BYOD Challenges
            Licensed Feature Issues
        Hardware Failure
        Network Performance Issues
    What's Next?
    Glossary