CompTIA Network+ N10-006 Exam Cram / Edition 5

CompTIA Network+ N10-006 Exam Cram / Edition 5

by Emmett Dulaney
ISBN-10:
078975410X
ISBN-13:
9780789754103
Pub. Date:
06/17/2015
Publisher:
Pearson Education
ISBN-10:
078975410X
ISBN-13:
9780789754103
Pub. Date:
06/17/2015
Publisher:
Pearson Education
CompTIA Network+ N10-006 Exam Cram / Edition 5

CompTIA Network+ N10-006 Exam Cram / Edition 5

by Emmett Dulaney

Paperback

$44.99
Current price is , Original price is $44.99. You
$44.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Prepare for CompTIA Network+ N10-006 exam success with this CompTIA authorized Exam Cram from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner.


CompTIA® Network+ N10-006 Exam Cram, Fifth Edition is the perfect study guide to help you pass the CompTIA Network+ N10-006 exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of security, cloud networking, IPv6, and wireless technologies. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, sidebars, and Notes interspersed throughout the text keep you focused on what you need to know. Cram Quizzes help you assess your knowledge, and the Cram Sheet tear card is the perfect last-minute review.

Covers the critical information you’ll need to know to score higher on your CompTIA Network+ (N10-006) exam!

—Understand modern network topologies, protocols, and infrastructure

—Implement networks based on specific requirements

—Install and configure DNS and DHCP

—Monitor and analyze network traffic

—Understand IPv6 and IPv4 addressing, routing, and switching

—Perform basic router/switch installation and configuration

—Explain network device functions in cloud environments

—Efficiently implement and troubleshoot WANs

—Install, configure, secure, and troubleshoot wireless networks

—Apply patches/updates, and support change/configuration management

—Describe unified communication technologies

—Segment and optimize networks

—Identify risks/threats, enforce policies and physical security, configure firewalls, and control access

—Understand essential network forensics concepts

—Troubleshoot routers, switches, wiring, connectivity, and security

Companion CD

The companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.

Pearson IT Certification Practice Test minimum system requirements:

Windows XP (SP3), Windows Vista (SP2), Windows 7, or Windows 8.1; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512MB RAM; 650MB disk space plus 50MB for each downloaded practice exam; access to the Internet to register and download exam databases


Product Details

ISBN-13: 9780789754103
Publisher: Pearson Education
Publication date: 06/17/2015
Series: Exam Cram Series
Edition description: 5th Revised ed.
Pages: 656
Product dimensions: 6.00(w) x 8.90(h) x 1.50(d)

About the Author

Emmett Dulaney (CompTIA Network+, Cloud+, Security+, A+, and others) is the author of numerous books on certifications and operating systems. He is a columnist for Certification Magazine and Campus Technology. He is also an associate professor at a small university and the author of the CompTIA A+ Complete Study Guide and the CompTIA Security+ Study Guide.

Mike Harwood (MCSE, A+, Network+, Server+, Linux+) has more than 14 years of experience in information technology and related fields. He has held a number of roles in the IT field, including network administrator, instructor, technical writer, website designer, consultant, and online marketing strategist. Mike has been a regular on-air technology contributor for CBC radio and has coauthored numerous computer books, including the Network+ Exam Cram published by Pearson.

Table of Contents

Introduction

CHAPTER 1 Introduction to Networking

LANs, WANs, MANs, SCADA/ICS, Medianets, and Network Models

LANs

WANs

MANs

SCADA/ICS

Medianets

Network Models

Centralized Versus Distributed Computing

Network Topologies

Bus Topology

Ring Topology

Star Topology

Wired Mesh Topology

Wireless Topologies

Point-to-Point, Point-to-Multipoint, and Wireless Mesh Topologies

Hybrid Topologies

Creating a SOHO Network

What’s Next?

CHAPTER 2 The OSI Model and Networking Protocols

The Networking Models

The OSI Seven-Layer Model

The TCP/IP Four-Layer Model

Identifying the OSI Layers at Which Various Network Components Operate

Dynamic Host Configuration Protocol (DHCP)

The DHCP Process

DHCP and DNS Suffixes

DHCP Relays and IP Helpers

Domain Name Service (DNS)

The DNS Namespace

Types of DNS Entries

DNS Records

DNS in a Practical Implementation

Simple Network Management Protocol (SNMP)

Components of SNMP

SNMP Management Systems

SNMP Agents

Management Information Bases

SNMP Communities

SNMPv3

Protocols

Connection-Oriented Protocols Versus Connectionless Protocols

Internet Protocol

Transmission Control Protocol

User Datagram Protocol

File Transfer Protocol

Secure File Transfer Protocol

Trivial File Transfer Protocol

Simple Mail Transfer Protocol

Hypertext Transfer Protocol

Hypertext Transfer Protocol Secure

Post Office Protocol Version 3/Internet Message Access Protocol Version 4

Telnet

Secure Shell

Internet Control Message Protocol

Address Resolution Protocol/Reverse Address Resolution Protocol

Network Time Protocol

Network News Transfer Protocol

Secure Copy Protocol

Lightweight Directory Access Protocol

Internet Group Management Protocol

Transport Layer Security

Session Initiation Protocol/Real-Time Transport Protocol

Remote Desktop Protocol

Server Message Block

Understanding Port Functions

What’s Next?

CHAPTER 3 Addressing and Routing

IP Addressing

IPv4

IP Address Classes

Subnet Mask Assignment

Subnetting

Identifying the Differences Between IPv4 Public and Private Networks

Classless Interdomain Routing

Default Gateways

IPv4 Address Types

IPv6 Addressing

Comparing IPv4 and IPv6 Addressing

Assigning IP Addresses

Identifying MAC Addresses

NAT, PAT, SNAT, and DNAT

Managing TCP/IP Routing

The Default Gateway

Routing Tables

Static Routing

Dynamic Routing

Routing Metrics

Configuring Routers and Switches

Proxy Servers

The Spanning Tree Protocol

Trunking

Port Mirroring

Port Authentication

High Availability

What’s Next?

CHAPTER 4 Components and Devices

Common Network Devices

Access Point

Analog Modem

Content Filter

Firewall

IDS and IPS

Hub

Load Balancer

Packet Shaper

Router

Switch

Multilayer Switch

VPN Concentrator

Network Devices Summary

Switch Configuration

Virtual Local-Area Networks

Working with Spanning Tree

Interface Configuration and Switch Management

Power over Ethernet

Switch Management

Managed and Unmanaged

What’s Next?

CHAPTER 5 Cloud Computing Basics

Cloud Concepts

Software as a Service

Platform as a Service

Infrastructure as a Service

Private Cloud

Public Cloud

Community Cloud

Hybrid Cloud

Virtualization and Storage-Area Networks

Virtualization

Storage-Area Networks

What’s Next?

CHAPTER 6 Installation and Configuration

WAN Technologies

Switching Methods

Integrated Services Digital Network

Leased Lines

Fiber, SONET, and OCx Levels

Frame Relay

Asynchronous Transfer Mode

Summary of WAN Technologies

Other WAN Technologies

Internet Access Technologies

DSL Internet Access

Cable Internet Access

Broadband Security Considerations

Dialup

The Public Switched Telephone Network

Satellite Internet Access

Wireless Internet Access

Cellular

Safety Practices

Focusing on Safety

Electrical Safety and ESD

Installation Safety

Fire Suppression

In Case of an Emergency

Installing and Configuring Equipment

Distribution Frames

Cable Management

Power Management

Device Placement and Labeling

Rack Systems

What’s Next?

CHAPTER 7 Cabling and Wiring

General Media Considerations

Broadband Versus Baseband Transmissions

Simplex, Half-Duplex, and Full-Duplex Modes

Media Interference

Attenuation

Data Transmission Rates

Types of Network Media

Types of Media Connectors

Media Couplers/Converters

568A and 568B Wiring Standards

Straight-Through Versus Crossover Cables

Rollover and Loopback Cables

Components of Wiring Distribution

Helpful Tools

Comparing and Contrasting LAN Technologies

IEEE 802.2 Standard

802.3 Ethernet Standards

Related Network Concepts

Cram Quiz Answers

Troubleshooting Common Issues

WAN-Related Issues

Customer Premise Equipment

Company Security Policies

Satellite Issues

What’s Next?

CHAPTER 8 Wireless

Understanding Wireless Basics

Wireless Access Points

Wireless Antennas

Wireless Radio Channels

Data Rate Versus Goodput

Beacon Management Frame

Spread-Spectrum Technology

Orthogonal Frequency-Division Multiplexing

Infrared Wireless Networking

Establishing Communications Between Wireless Devices

Configuring the Wireless Connection

802.11 Wireless Standards

The Magic Behind 802.11n and 802.11ac

A Summary of 802.11 Wireless Standards

Securing Wireless Networks

Wired Equivalent Privacy

Wi-Fi Protected Access

WPA2

WPA Enterprise

Other Dangers

Wireless Troubleshooting Checklist

Factors Affecting Wireless Signals

What’s Next?

CHAPTER 9 Network Management

Documentation Management

Wiring Schematics

Physical and Logical Network Diagrams

Baselines

Policies, Procedures, Configurations, and Regulations

Monitoring Network Performance

Common Reasons to Monitor Networks

Packet Sniffers

Throughput Testing

Port Scanners

Network Performance, Load, and Stress Testing

Tracking Event Logs

Patches and Updates

What’s Next?

CHAPTER 10 Network Optimization

Unified Communication Technologies

Quality of Service

Traffic Shaping

VoIP

Video

Real-Time Services

Unified Communication Devices

Network Segmentation

SCADA Systems

Legacy Systems

Separate Private/Public Networks

Honeypots and Honeynets

Testing Lab

Load Balancing

Performance Optimization

Security

Compliance

What’s Next?

CHAPTER 11 Network Security

Tunneling, Encryption, and Access Control

VPNs

Point-to-Point Tunneling Protocol

Layer 2 Tunneling Protocol

IPsec

Site-to-Site, Host-to-Site, and Host-to-Host

Overview of Access Control

Remote-Access Protocols and Services

Remote-Control Protocols

MAC Filtering

TCP/IP Filtering

Disaster Recovery

Full Backups

Differential Backups

Incremental Backups

Tape Rotations

Backup Best Practices

Using Uninterruptible Power Supplies

Hot and Cold Spares

Hot, Warm, and Cold Sites

Risk-Related Policies and Procedures

Managing Common Security Threats

Viruses

Worms and Trojan Horses

Denial-of-Service and Distributed Denial-of-Service Attacks

Other Common Attacks

Vulnerabilities and Prevention

Authentication, Authorization, and Accounting (AAA)

Passwords and Password Policies

Kerberos Authentication

Public Key Infrastructure

TACACS/RADIUS

Remote Authentication Protocols

Secured Versus Unsecured Protocols

Adding Physical Security to the Mix

Two-factor and Multifactor Authentication

Firewalls, Appliances, and Physical Security

Stateful and Stateless Firewalls

Packet-Filtering Firewalls

Circuit-Level Firewalls

Application Layer Firewalls

Comparing Firewall Types

Firewall Wrap-Up

Demilitarized Zones (Perimeter Network)

Other Security Devices

Physical Security Controls

Responding to Incidents

First Responders

Securing the Area

Document the Scene

eDiscovery and Evidence/Data Collection

Chain of Custody

Final Responsibilities

What’s Next?

CHAPTER 12 Network Troubleshooting

Troubleshooting Steps and Procedures

Identify the Problem

Establish a Theory of Probable Cause

Test the Theory to Determine Cause

Establish a Plan of Action

Implement the Solution or Escalate

Verify Full System Functionality

Document the Findings, Actions, and Outcomes

Troubleshooting the Network

Common Problems to Be Aware Of

Troubleshooting Wiring

Wiring Issues

Troubleshooting Infrastructure Hardware

Configuring and Troubleshooting Client Connectivity

Troubleshooting an Incorrect VLAN

Topology Errors

Working with Command-Line Utilities

The Trace Route Utility (tracert/traceroute)

ping

pathping

ARP

The netstat Command

nbtstat

The ipconfig Command

ifconfig

nslookup

dig

The host Command

The route Utility

Networking Tools

Wire Crimpers, Strippers, and Snips

Voltage Event Recorder

Environmental Monitors

Toner Probes

Protocol Analyzer

Media/Cable Testers

TDR and OTDR

Multimeter

Network Qualification Tester

Butt Set

Wireless Detection

Speed Tests and Looking Glasses

Managing Common Security Threats

What’s Next?

Glossary

On the CD:

Practice Exam 1

Answers to Practice Exam 1

Practice Exam 2

Answers to Practice Exam 2

9780789754103 TOC 4/29/2015

From the B&N Reads Blog

Customer Reviews