CompTIA Network+ N10-008 Exam Cram

Specificaties
E-book, blz. | Engels
Pearson Education | e druk, 2021
ISBN13: 9780137375707
Rubricering
Juridisch :
Pearson Education e druk, 2021 9780137375707
Onderdeel van serie Exam Cram
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

CompTIA® Network+ N10-008 Exam Cram, Seventh Edition is the perfect study guide to help students pass CompTIA's Network+ N10-008 exam. It provides coverage and practice questions for every exam topic, including substantial new coverage. The book presents readers with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, Sidebars, and Notes interspersed throughout the text keep students focused on what they need to know. Cram Quizzes help them assess their knowledge, and the Cram Sheet tear card is the perfect last-minute review.

Specificaties

ISBN13:9780137375707
Taal:Engels
Bindwijze:e-book
Serie:Exam Cram

Inhoudsopgave

Introduction <br> CHAPTER 1: Network Technologies, Topologies, and Types <br>Wired and Wireless Network Topologies <br>&nbsp;&nbsp;&nbsp; Bus Topology <br>&nbsp;&nbsp;&nbsp; Ring Topology <br>&nbsp;&nbsp;&nbsp; Star Topology (Hub-and-Spoke) <br>&nbsp;&nbsp;&nbsp; Mesh Topology <br>&nbsp;&nbsp;&nbsp; Hybrid Topology <br>&nbsp;&nbsp;&nbsp; Bringing Wireless to a Topology <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Infrastructure Wireless Topology <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ad Hoc Wireless Topology <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Wireless Mesh Topology <br>Network Types and Characteristics <br>&nbsp;&nbsp;&nbsp; To Server or Not <br>&nbsp;&nbsp;&nbsp; LANs <br>&nbsp;&nbsp;&nbsp; WLANs <br>&nbsp;&nbsp;&nbsp; WANs <br>&nbsp;&nbsp;&nbsp; MANs <br>&nbsp;&nbsp;&nbsp; CANs <br>&nbsp;&nbsp;&nbsp; SANs <br>&nbsp;&nbsp;&nbsp; PANs <br>&nbsp;&nbsp;&nbsp; SDWANs <br>&nbsp;&nbsp;&nbsp; MPLS <br>&nbsp;&nbsp;&nbsp; mGRE <br>Network Links and Concepts <br>&nbsp;&nbsp;&nbsp; DSL Internet Access <br>&nbsp;&nbsp;&nbsp; Cable Broadband <br>&nbsp;&nbsp;&nbsp; The Public Switched Telephone Network <br>&nbsp;&nbsp;&nbsp; Leased Lines <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; T3 Lines <br>&nbsp;&nbsp;&nbsp; Metro-Optical <br>&nbsp;&nbsp;&nbsp; Satellite Internet Access <br>&nbsp;&nbsp;&nbsp; Termination Points <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Demarc, Demarc Extension, and Smart Jacks <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; CSUs/DSUs <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Verify Wiring Installation and Termination <br>&nbsp;&nbsp;&nbsp; Virtual Networking <br>What's Next? <br> CHAPTER 2: Models, Ports, Protocols, and Network Services <br>The OSI Networking Model <br>&nbsp;&nbsp;&nbsp; The OSI Seven-Layer Model <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Physical Layer (Layer 1) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Data Link Layer (Layer 2) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network Layer (Layer 3) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Transport Layer (Layer 4) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Session Layer (Layer 5) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Presentation Layer (Layer 6) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Application Layer (Layer 7) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OSI Model Summary <br>&nbsp;&nbsp;&nbsp; Comparing OSI to the Four-Layer TCP/IP Model <br>&nbsp;&nbsp;&nbsp; Identifying the OSI Layers at Which Various Network Components Operate <br>&nbsp;&nbsp;&nbsp; Data Encapsulation/Decapsulation and OSI <br>Ports and Protocols <br>&nbsp;&nbsp;&nbsp; Connection-Oriented Protocols Versus Connectionless Protocols <br>&nbsp;&nbsp;&nbsp; Internet Protocol <br>&nbsp;&nbsp;&nbsp; Transmission Control Protocol <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; How TCP Works <br>&nbsp;&nbsp;&nbsp; User Datagram Protocol <br>&nbsp;&nbsp;&nbsp; Internet Control Message Protocol <br>&nbsp;&nbsp;&nbsp; IPSec <br>&nbsp;&nbsp;&nbsp; Generic Routing Encapsulation <br>&nbsp;&nbsp;&nbsp; File Transfer Protocol <br>&nbsp;&nbsp;&nbsp; Secure Shell <br>&nbsp;&nbsp;&nbsp; Secure File Transfer Protocol <br>&nbsp;&nbsp;&nbsp; Telnet <br>&nbsp;&nbsp;&nbsp; Simple Mail Transfer Protocol <br>&nbsp;&nbsp;&nbsp; Domain Name System (DNS) <br>&nbsp;&nbsp;&nbsp; Dynamic Host Configuration Protocol (DHCP) <br>&nbsp;&nbsp;&nbsp; Trivial File Transfer Protocol <br>&nbsp;&nbsp;&nbsp; Hypertext Transfer Protocol <br>&nbsp;&nbsp;&nbsp; Network Time Protocol (NTP) <br>&nbsp;&nbsp;&nbsp; Post Office Protocol Version 3/Internet Message Access Protocol Version 4 <br>&nbsp;&nbsp;&nbsp; Simple Network Management Protocol <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Components of SNMP <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SNMP Management Systems <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SNMP Agents <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Management Information Bases <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SNMP Communities <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SNMPv3 <br>&nbsp;&nbsp;&nbsp; Lightweight Directory Access Protocol <br>&nbsp;&nbsp;&nbsp; Hypertext Transfer Protocol Secure <br>&nbsp;&nbsp;&nbsp; Server Message Block <br>&nbsp;&nbsp;&nbsp; Syslog <br>&nbsp;&nbsp;&nbsp; SMTP TLS <br>&nbsp;&nbsp;&nbsp; LDAPS <br>&nbsp;&nbsp;&nbsp; IMAP over SSL <br>&nbsp;&nbsp;&nbsp; POP3 over SSL <br>&nbsp;&nbsp;&nbsp; SQL, SQLnet, and MySQL <br>&nbsp;&nbsp;&nbsp; Remote Desktop Protocol <br>&nbsp;&nbsp;&nbsp; Session Initiation Protocol <br>&nbsp;&nbsp;&nbsp; Understanding Port Functions <br>Network Services <br>&nbsp;&nbsp;&nbsp; Domain Name Service (DNS) <br>&nbsp;&nbsp;&nbsp; The DNS Namespace <br>&nbsp;&nbsp;&nbsp; Types of DNS Entries <br>&nbsp;&nbsp;&nbsp; DNS Records <br>&nbsp;&nbsp;&nbsp; DNS in a Practical Implementation <br>&nbsp;&nbsp;&nbsp; Dynamic Host Configuration Protocol <br>&nbsp;&nbsp;&nbsp; The DHCP Process <br>&nbsp;&nbsp;&nbsp; DHCP and DNS Suffixes <br>&nbsp;&nbsp;&nbsp; DHCP Relays and IP Helpers <br>&nbsp;&nbsp;&nbsp; Network Time Protocol <br>What's Next? <br> CHAPTER 3: Addressing, Routing, and Switching <br>IP Addressing <br>&nbsp;&nbsp;&nbsp; IPv4 <br>&nbsp;&nbsp;&nbsp; IP Address Classes <br>&nbsp;&nbsp;&nbsp; Subnet Mask Assignment <br>&nbsp;&nbsp;&nbsp; Subnetting <br>&nbsp;&nbsp;&nbsp; Identifying the Differences Between IPv4 Public and Private Networks <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Private Address Ranges <br>&nbsp;&nbsp;&nbsp; Classless Interdomain Routing <br>&nbsp;&nbsp;&nbsp; Default Gateways <br>&nbsp;&nbsp;&nbsp; Virtual IP <br>&nbsp;&nbsp;&nbsp; IPv4 Address Types <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Unicast Address <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Broadcast Address <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Multicast <br>&nbsp;&nbsp;&nbsp; IPv6 Addressing <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Where Have All the IPv4 Addresses Gone? <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Identifying IPv6 Addresses <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IPv6 Address Types <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Global Unicast Addresses <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Link-Local Addresses <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Site-Local Addresses <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Neighbor Discovery <br>&nbsp;&nbsp;&nbsp; Comparing IPv4 and IPv6 Addressing <br>&nbsp;&nbsp;&nbsp; Assigning IP Addresses <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Static Addressing <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Dynamic Addressing <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BOOT Protocol (BOOTP) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Automatic Private IP Addressing <br>&nbsp;&nbsp;&nbsp; Identifying MAC Addresses <br>&nbsp;&nbsp;&nbsp; NAT and PAT <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; NAT <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; PAT <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SNAT <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DNAT <br>Managing Routing and Switching <br>&nbsp;&nbsp;&nbsp; The Default Gateway <br>&nbsp;&nbsp;&nbsp; Routing Tables <br>&nbsp;&nbsp;&nbsp; Static Routing <br>&nbsp;&nbsp;&nbsp; Default Route <br>&nbsp;&nbsp;&nbsp; Switching Methods <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Packet Switching <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Circuit Switching <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Comparing Switching Methods <br>&nbsp;&nbsp;&nbsp; Dynamic Routing <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Distance-Vector Routing <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Link-State Routing <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Hybrid Routing Protocols <br>&nbsp;&nbsp;&nbsp; Network Traffic <br>&nbsp;&nbsp;&nbsp; Routing Metrics <br>&nbsp;&nbsp;&nbsp; Virtual Local-Area Networks <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; VLAN Membership <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; VLAN Segmentation <br>&nbsp;&nbsp;&nbsp; The Spanning Tree Protocol <br>&nbsp;&nbsp;&nbsp; Interface Configuration and Switch Management <br>&nbsp;&nbsp;&nbsp; MDI-X <br>&nbsp;&nbsp;&nbsp; Trunking <br>&nbsp;&nbsp;&nbsp; Port Mirroring <br>&nbsp;&nbsp;&nbsp; Port Authentication <br>&nbsp;&nbsp;&nbsp; Power over Ethernet (PoE and PoE+) <br>&nbsp;&nbsp;&nbsp; MAC Address Table <br>&nbsp;&nbsp;&nbsp; Switch Management <br>&nbsp;&nbsp;&nbsp; Managed and Unmanaged <br>&nbsp;&nbsp;&nbsp; Quality of Service <br>&nbsp;&nbsp;&nbsp; Traffic Shaping <br>&nbsp;&nbsp;&nbsp; Access Control Lists <br>&nbsp;&nbsp;&nbsp; ARP and RARP <br>What's Next? <br> CHAPTER 4: Network Implementations <br>Common Networking Devices <br>&nbsp;&nbsp;&nbsp; Firewall <br>&nbsp;&nbsp;&nbsp; IDS/IPS <br>&nbsp;&nbsp;&nbsp; Router <br>&nbsp;&nbsp;&nbsp; Switch <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Hub and Switch Cabling <br>&nbsp;&nbsp;&nbsp; Multilayer Switch <br>&nbsp;&nbsp;&nbsp; Hub <br>&nbsp;&nbsp;&nbsp; Bridge <br>&nbsp;&nbsp;&nbsp; DSL and Cable Modems <br>&nbsp;&nbsp;&nbsp; Access Point <br>&nbsp;&nbsp;&nbsp; Media Converter <br>&nbsp;&nbsp;&nbsp; Voice Gateway <br>&nbsp;&nbsp;&nbsp; Repeater <br>&nbsp;&nbsp;&nbsp; Wireless LAN Controller <br>&nbsp;&nbsp;&nbsp; Load Balancer <br>&nbsp;&nbsp;&nbsp; Proxy Server <br>&nbsp;&nbsp;&nbsp; VPN Concentrators and Headends <br>&nbsp;&nbsp;&nbsp; Networked Devices <br>Networking Architecture <br>&nbsp;&nbsp;&nbsp; Three-Tiered Architecture <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Core Layer <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Distribution/Aggregation Layer <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Access/Edge Layer <br>&nbsp;&nbsp;&nbsp; Software-Defined Networking <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Application Layer <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Control Layer <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Infrastructure Layer <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Management Plane <br>&nbsp;&nbsp;&nbsp; Spine and Leaf <br>&nbsp;&nbsp;&nbsp; Traffic Flows <br>&nbsp;&nbsp;&nbsp; Datacenter Location Types <br>&nbsp;&nbsp;&nbsp; Storage-Area Networks <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; iSCSI <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fibre Channel and FCoE <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network-Attached Storage <br>What's Next? <br> CHAPTER 5: Cabling Solutions and Issues <br>General Media Considerations <br>&nbsp;&nbsp;&nbsp; Broadband Versus Baseband Transmissions <br>&nbsp;&nbsp;&nbsp; Simplex, Half-Duplex, and Full-Duplex Modes <br>&nbsp;&nbsp;&nbsp; Data Transmission Rates <br>&nbsp;&nbsp;&nbsp; Types of Network Media <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Twisted-Pair Cabling (Copper) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Coaxial Cables <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Twinaxial Cables <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fiber-Optic Cables <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Plenum Versus PVC Cables <br>&nbsp;&nbsp;&nbsp; Types of Media Connectors <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BNC Connectors <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RJ-11 Connectors <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RJ-45 Connectors <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; F-Type Connectors and RG-59 and RG-6 Cables <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fiber Connectors <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Transceivers <br>&nbsp;&nbsp;&nbsp; Media Couplers/Converters <br>&nbsp;&nbsp;&nbsp; TIA/EIA 568A and 568B Wiring Standards <br>&nbsp;&nbsp;&nbsp; Straight-Through Versus Crossover Cables <br>&nbsp;&nbsp;&nbsp; Rollover and Loopback Cables <br>&nbsp;&nbsp;&nbsp; Components of Wiring Distribution <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network Cross-Connects <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Horizontal Cabling <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vertical Cables <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Patch Panels <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fiber Distribution Panels <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 66 and 110 Blocks (T568A, T568B) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; MDF and IDF Wiring Closets <br>&nbsp;&nbsp;&nbsp; Ethernet Copper and Fiber Standards <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 10BASE-T <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 100BASE-TX <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1000BASE-T <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 10GBASE-T <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 40GBASE-T <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1000BASE-LX and 1000BASE-SX <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 10GBASE-LR and 10GBASE-SR <br>&nbsp;&nbsp;&nbsp; Multiplexing Options <br>Troubleshooting Common Cable Connectivity Issues <br>Limitations, Considerations, and Issues <br>&nbsp;&nbsp;&nbsp; Throughput, Speed, and Distance <br>&nbsp;&nbsp;&nbsp; Cabling Specifications/Limitations <br>&nbsp;&nbsp;&nbsp; Cabling Considerations <br>&nbsp;&nbsp;&nbsp; Cabling Applications <br>&nbsp;&nbsp;&nbsp; Attenuation and dB Loss <br>&nbsp;&nbsp;&nbsp; Interference <br>&nbsp;&nbsp;&nbsp; Incorrect Pinout <br>&nbsp;&nbsp;&nbsp; Bad Ports <br>&nbsp;&nbsp;&nbsp; Open/Short <br>&nbsp;&nbsp;&nbsp; LED Status Indicators <br>&nbsp;&nbsp;&nbsp; Incorrect Transceivers <br>&nbsp;&nbsp;&nbsp; Duplexing Issues <br>&nbsp;&nbsp;&nbsp; TX/RX Reversed <br>&nbsp;&nbsp;&nbsp; Dirty Optical Cables <br>Common Tools <br>&nbsp;&nbsp;&nbsp; Cable Crimpers, Strippers, and Snips/Cutters <br>&nbsp;&nbsp;&nbsp; Punchdown Tools <br>&nbsp;&nbsp;&nbsp; Tone Generator <br>&nbsp;&nbsp;&nbsp; Loopback Adapter <br>&nbsp;&nbsp;&nbsp; OTDR <br>&nbsp;&nbsp;&nbsp; Multimeter <br>&nbsp;&nbsp;&nbsp; Cable Tester <br>&nbsp;&nbsp;&nbsp; Wire Map <br>&nbsp;&nbsp;&nbsp; Tap <br>&nbsp;&nbsp;&nbsp; Fusion Splicer <br>&nbsp;&nbsp;&nbsp; Spectrum Analyzer <br>&nbsp;&nbsp;&nbsp; Fiber Light Meter <br>What's Next? <br> CHAPTER 6: Wireless Solutions and Issues <br>Understanding Wireless Basics <br>&nbsp;&nbsp;&nbsp; Wireless Channels and Frequencies <br>&nbsp;&nbsp;&nbsp; Cellular Technology Access <br>&nbsp;&nbsp;&nbsp; Speed, Distance, and Bandwidth <br>&nbsp;&nbsp;&nbsp; Channel Bonding <br>&nbsp;&nbsp;&nbsp; MIMO/MU-MIMO/Directional/Omnidirectional <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Antenna Ratings <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Antenna Coverage <br>&nbsp;&nbsp;&nbsp; Establishing Communications Between Wireless Devices <br>&nbsp;&nbsp;&nbsp; Configuring the Wireless Connection <br>Troubleshooting Wireless Issues <br>&nbsp;&nbsp;&nbsp; Site Surveys <br>&nbsp;&nbsp;&nbsp; Factors Affecting Wireless Signals <br>&nbsp;&nbsp;&nbsp; Interference <br>&nbsp;&nbsp;&nbsp; Reflection, Refraction, and Absorption <br>Troubleshooting AP Coverage <br>What's Next? <br> CHAPTER 7: Cloud Computing Concepts and Options <br>Cloud Concepts <br>&nbsp;&nbsp;&nbsp; Service Models <br>&nbsp;&nbsp;&nbsp; Software as a Service <br>&nbsp;&nbsp;&nbsp; Platform as a Service <br>&nbsp;&nbsp;&nbsp; Infrastructure as a Service <br>&nbsp;&nbsp;&nbsp; Desktop as a Service <br>&nbsp;&nbsp;&nbsp; Deployment Models <br>&nbsp;&nbsp;&nbsp; Private Cloud <br>&nbsp;&nbsp;&nbsp; Public Cloud <br>&nbsp;&nbsp;&nbsp; Hybrid and Community Clouds <br>&nbsp;&nbsp;&nbsp; Infrastructure as Code <br>&nbsp;&nbsp;&nbsp; Connectivity Options <br>&nbsp;&nbsp;&nbsp; Multitenancy <br>&nbsp;&nbsp;&nbsp; Elasticity <br>&nbsp;&nbsp;&nbsp; Scalability <br>&nbsp;&nbsp;&nbsp; Security Implications <br>&nbsp;&nbsp;&nbsp; The Relationship Between Resources <br>What's Next? <br> CHAPTER 8: Network Operations <br>Organizational Documents and Policies <br>&nbsp;&nbsp;&nbsp; Wiring and Port Locations <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Troubleshooting Using Wiring Schematics <br>&nbsp;&nbsp;&nbsp; Physical and Logical Network Diagrams <br>&nbsp;&nbsp;&nbsp; Baseline Configurations <br>&nbsp;&nbsp;&nbsp; Policies, Procedures, Configurations, and Regulations <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Policies <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Password-Related Policies <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Procedures <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Change Management Documentation <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Configuration Documentation <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Regulations <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Labeling <br>High Availability and Disaster Recovery <br>&nbsp;&nbsp;&nbsp; Backups <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Full Backups <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Differential Backups <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Incremental Backups <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Snapshots <br>&nbsp;&nbsp;&nbsp; Backup Best Practices <br>&nbsp;&nbsp;&nbsp; Using Uninterruptible Power Supplies <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Why Use a UPS? <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Power Threats <br>&nbsp;&nbsp;&nbsp; Beyond the UPS <br>&nbsp;&nbsp;&nbsp; Cold, Warm, Hot, and Cloud Sites <br>&nbsp;&nbsp;&nbsp; High Availability and Recovery Concepts <br>&nbsp;&nbsp;&nbsp; Active-Active Versus Active-Passive <br>Monitoring Network Performance <br>&nbsp;&nbsp;&nbsp; Common Performance Metrics <br>&nbsp;&nbsp;&nbsp; SNMP Monitors <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Management Information Base (MIB) <br>&nbsp;&nbsp;&nbsp; Network Performance, Load, and Stress Testing <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Performance Tests <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Load Tests and Send/Receive Traffic <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Stress Tests <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Performance Metrics <br>&nbsp;&nbsp;&nbsp; Network Device Logs <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Security Logs <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Application Log <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; System Logs <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; History Logs <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Log Management <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Patch Management <br>&nbsp;&nbsp;&nbsp; Environmental Factors <br>What's Next? <br> CHAPTER 9: Network Security <br>Common Security Concepts <br>&nbsp;&nbsp;&nbsp; Access Control <br>&nbsp;&nbsp;&nbsp; Mandatory Access Control <br>&nbsp;&nbsp;&nbsp; Discretionary Access Control <br>&nbsp;&nbsp;&nbsp; Rule-Based Access Control <br>&nbsp;&nbsp;&nbsp; Role-Based Access Control <br>&nbsp;&nbsp;&nbsp; Defense in Depth <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network Segmentation <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Screened Subnet <br>&nbsp;&nbsp;&nbsp; Separation of Duties <br>&nbsp;&nbsp;&nbsp; Honeypots <br>&nbsp;&nbsp;&nbsp; RADIUS and TACACS+ <br>&nbsp;&nbsp;&nbsp; Kerberos Authentication <br>&nbsp;&nbsp;&nbsp; Local Authentication <br>&nbsp;&nbsp;&nbsp; Lightweight Directory Access Protocol <br>&nbsp;&nbsp;&nbsp; Using Certificates <br>&nbsp;&nbsp;&nbsp; Auditing and Logging <br>&nbsp;&nbsp;&nbsp; Multifactor Authentication Factors <br>&nbsp;&nbsp;&nbsp; Additional Access Control Methods <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 802.1X <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Extensible Authentication Protocol (EAP) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network Access Control (NAC) <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; MAC Filtering <br>&nbsp;&nbsp;&nbsp; Risk Management <br>&nbsp;&nbsp;&nbsp; Penetration Testing <br>&nbsp;&nbsp;&nbsp; Security Information and Event Management <br>Common Networking Attacks <br>&nbsp;&nbsp;&nbsp; Denial-of-Service and Distributed Denial-of-Service Attacks <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Types of DoS Attacks <br>&nbsp;&nbsp;&nbsp; Other Common Attacks <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Social Engineering <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Logic Bomb <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Rogue DHCP <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Rogue Access Points and Evil Twins <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Advertising Wireless Weaknesses <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Phishing <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ransomware <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DNS Poisoning <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ARP Cache Poisoning <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Spoofing <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Deauthentication <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Brute Force <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; On-Path Attack <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; VLAN Hopping <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ARP Spoofing <br>&nbsp;&nbsp;&nbsp; Vulnerabilities and Prevention <br>Network Hardening and Physical Security <br>&nbsp;&nbsp;&nbsp; Disposing of Assets <br>&nbsp;&nbsp;&nbsp; Implementing Physical Security <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lock and Key <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Swipe Card and PIN Access <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Biometrics <br>&nbsp;&nbsp;&nbsp; Two-Factor and Multifactor Authentication <br>&nbsp;&nbsp;&nbsp; Secured Versus Unsecured Protocols <br>&nbsp;&nbsp;&nbsp; Hardening Best Practices <br>&nbsp;&nbsp;&nbsp; Wireless Security <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; MAC Filtering <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Antenna Placement and Power Levels <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Isolation <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Preshared Keys <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Geofencing <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Captive Portal <br>&nbsp;&nbsp;&nbsp; IoT Access Considerations <br>Remote-Access Methods <br>&nbsp;&nbsp;&nbsp; Remote File Access <br>&nbsp;&nbsp;&nbsp; VPNs <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Components of the VPN Connection <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; VPN Connection Types <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; VPN Pros and Cons <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IPSec <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SSL/TLS/DTLS <br>&nbsp;&nbsp;&nbsp; Site-to-Site and Client-to-Site <br>&nbsp;&nbsp;&nbsp; Virtual Desktops <br>&nbsp;&nbsp;&nbsp; HTTPS/Management URL <br>&nbsp;&nbsp;&nbsp; Authentication and Authorization Considerations <br>&nbsp;&nbsp;&nbsp; Out-of-Band Management <br>What's Next? <br> CHAPTER 10: Network Troubleshooting <br>Troubleshooting Steps and Procedures <br>&nbsp;&nbsp;&nbsp; Identify the Problem <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Identify Symptoms <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Determine Whether Anything Has Changed <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Duplicate the Problem if Possible <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Approach Multiple Problems Individually <br>&nbsp;&nbsp;&nbsp; Establish a Theory of Probable Cause <br>&nbsp;&nbsp;&nbsp; Test the Theory to Determine the Cause <br>&nbsp;&nbsp;&nbsp; Establish a Plan of Action <br>&nbsp;&nbsp;&nbsp; Implement the Solution or Escalate <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Determine Whether Escalation Is Necessary <br>&nbsp;&nbsp;&nbsp; Verify Full System Functionality <br>&nbsp;&nbsp;&nbsp; Document Findings, Actions, Outcomes, and Lessons <br>Software Troubleshooting Tools <br>&nbsp;&nbsp;&nbsp; Wi-Fi Analyzer <br>&nbsp;&nbsp;&nbsp; Protocol Analyzer <br>&nbsp;&nbsp;&nbsp; Bandwidth Speed Tester <br>&nbsp;&nbsp;&nbsp; Port Scanner <br>&nbsp;&nbsp;&nbsp; iperf <br>&nbsp;&nbsp;&nbsp; NetFlow Analyzer <br>&nbsp;&nbsp;&nbsp; TFTP Server <br>&nbsp;&nbsp;&nbsp; Terminal Emulator <br>&nbsp;&nbsp;&nbsp; IP Scanner <br>&nbsp;&nbsp;&nbsp; Command-Line Tools <br>&nbsp;&nbsp;&nbsp; The Trace Route Utility (tracert/traceroute) <br>&nbsp;&nbsp;&nbsp; ping <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Destination Host Unreachable Message <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Request Timed Out Message <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Unknown Host Message <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Expired TTL Message <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Troubleshooting with ping <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hostname <br>&nbsp;&nbsp;&nbsp; ARP <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; arp ping <br>&nbsp;&nbsp;&nbsp; The netstat Command <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; netstat -e <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; netstat -a <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; netstat -r <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; netstat -s <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; telnet <br>&nbsp;&nbsp;&nbsp; ipconfig <br>&nbsp;&nbsp;&nbsp; ifconfig <br>&nbsp;&nbsp;&nbsp; nslookup <br>&nbsp;&nbsp;&nbsp; dig <br>&nbsp;&nbsp;&nbsp; The tcpdump Command <br>&nbsp;&nbsp;&nbsp; The route Utility <br>&nbsp;&nbsp;&nbsp; nmap <br>&nbsp;&nbsp;&nbsp; Basic Network Platform Commands <br>Troubleshooting General Networking Issues <br>&nbsp;&nbsp;&nbsp; Common Considerations <br>&nbsp;&nbsp;&nbsp; Common Problems to Be Aware Of <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Collisions <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Broadcast Storm <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Multicast Flooding <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Asymmetrical Routing <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Switching Loops <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Routing Loops <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Missing Route <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Low Optical Link Budget <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Incorrect VLAN <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DNS Issues <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Incorrect Gateway <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Incorrect Subnet Mask <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Duplicate or Incorrect IP Address <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Duplicate MAC Addresses <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Expired IP Address <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Rogue DHCP Server <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Certificate Issues <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; NTP Issues/Incorrect Time <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DHCP Scope Exhaustion <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Blocked Ports, Services, or Addresses <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Incorrect Firewall Settings <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Incorrect ACL Settings <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Unresponsive Service <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BYOD Challenges <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Licensed Feature Issues <br>&nbsp;&nbsp;&nbsp; Hardware Failure <br>&nbsp;&nbsp;&nbsp; Network Performance Issues <br>What's Next? <br>Glossary <br> <br>

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        CompTIA Network+ N10-008 Exam Cram