CompTIA Network+ N10-008 Exam Cram
Home > Computing and Information Technology > Computer programming / software engineering > Programming and scripting languages: general > CompTIA Network+ N10-008 Exam Cram
CompTIA Network+ N10-008 Exam Cram

CompTIA Network+ N10-008 Exam Cram


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

CompTIA Network+ N10-008 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Network+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams. Covers the critical information needed to score higher on your Network+ N10-008 exam! * Establish network connectivity by deploying wired and wireless devices * Understand and maintain network documentation * Understand the purpose of network services * Understand basic datacenter, cloud, and virtual networking concepts * Monitor network activity, identifying performance and availability issues * Implement network hardening techniques * Manage, configure, and troubleshoot network infrastructure Prepare for your exam with Pearson Test Prep * Realistic practice questions and answers * Comprehensive reporting and feedback * Customized testing in study, practice exam, or flash card modes * Complete coverage of Network+ N10-008 exam objectives

Table of Contents:
Introduction CHAPTER 1: Network Technologies, Topologies, and Types Wired and Wireless Network Topologies     Bus Topology     Ring Topology     Star Topology (Hub-and-Spoke)     Mesh Topology     Hybrid Topology     Bringing Wireless to a Topology         Infrastructure Wireless Topology         Ad Hoc Wireless Topology         Wireless Mesh Topology Network Types and Characteristics     To Server or Not     LANs     WLANs     WANs     MANs     CANs     SANs     PANs     SDWANs     MPLS     mGRE Network Links and Concepts     DSL Internet Access     Cable Broadband     The Public Switched Telephone Network     Leased Lines         T3 Lines     Metro-Optical     Satellite Internet Access     Termination Points         Demarc, Demarc Extension, and Smart Jacks         CSUs/DSUs         Verify Wiring Installation and Termination     Virtual Networking What's Next? CHAPTER 2: Models, Ports, Protocols, and Network Services The OSI Networking Model     The OSI Seven-Layer Model         Physical Layer (Layer 1)         Data Link Layer (Layer 2)         Network Layer (Layer 3)         Transport Layer (Layer 4)         Session Layer (Layer 5)         Presentation Layer (Layer 6)         Application Layer (Layer 7)         OSI Model Summary     Comparing OSI to the Four-Layer TCP/IP Model     Identifying the OSI Layers at Which Various Network Components Operate     Data Encapsulation/Decapsulation and OSI Ports and Protocols     Connection-Oriented Protocols Versus Connectionless Protocols     Internet Protocol     Transmission Control Protocol         How TCP Works     User Datagram Protocol     Internet Control Message Protocol     IPSec     Generic Routing Encapsulation     File Transfer Protocol     Secure Shell     Secure File Transfer Protocol     Telnet     Simple Mail Transfer Protocol     Domain Name System (DNS)     Dynamic Host Configuration Protocol (DHCP)     Trivial File Transfer Protocol     Hypertext Transfer Protocol     Network Time Protocol (NTP)     Post Office Protocol Version 3/Internet Message Access Protocol Version 4     Simple Network Management Protocol         Components of SNMP         SNMP Management Systems         SNMP Agents         Management Information Bases         SNMP Communities         SNMPv3     Lightweight Directory Access Protocol     Hypertext Transfer Protocol Secure     Server Message Block     Syslog     SMTP TLS     LDAPS     IMAP over SSL     POP3 over SSL     SQL, SQLnet, and MySQL     Remote Desktop Protocol     Session Initiation Protocol     Understanding Port Functions Network Services     Domain Name Service (DNS)     The DNS Namespace     Types of DNS Entries     DNS Records     DNS in a Practical Implementation     Dynamic Host Configuration Protocol     The DHCP Process     DHCP and DNS Suffixes     DHCP Relays and IP Helpers     Network Time Protocol What's Next? CHAPTER 3: Addressing, Routing, and Switching IP Addressing     IPv4     IP Address Classes     Subnet Mask Assignment     Subnetting     Identifying the Differences Between IPv4 Public and Private Networks         Private Address Ranges     Classless Interdomain Routing     Default Gateways     Virtual IP     IPv4 Address Types         Unicast Address         Broadcast Address         Multicast     IPv6 Addressing         Where Have All the IPv4 Addresses Gone?         Identifying IPv6 Addresses         IPv6 Address Types         Global Unicast Addresses         Link-Local Addresses         Site-Local Addresses         Neighbor Discovery     Comparing IPv4 and IPv6 Addressing     Assigning IP Addresses         Static Addressing         Dynamic Addressing         BOOT Protocol (BOOTP)         Automatic Private IP Addressing     Identifying MAC Addresses     NAT and PAT         NAT         PAT         SNAT         DNAT Managing Routing and Switching     The Default Gateway     Routing Tables     Static Routing     Default Route     Switching Methods         Packet Switching         Circuit Switching         Comparing Switching Methods     Dynamic Routing         Distance-Vector Routing         Link-State Routing         Hybrid Routing Protocols     Network Traffic     Routing Metrics     Virtual Local-Area Networks         VLAN Membership         VLAN Segmentation     The Spanning Tree Protocol     Interface Configuration and Switch Management     MDI-X     Trunking     Port Mirroring     Port Authentication     Power over Ethernet (PoE and PoE+)     MAC Address Table     Switch Management     Managed and Unmanaged     Quality of Service     Traffic Shaping     Access Control Lists     ARP and RARP What's Next? CHAPTER 4: Network Implementations Common Networking Devices     Firewall     IDS/IPS     Router     Switch         Hub and Switch Cabling     Multilayer Switch     Hub     Bridge     DSL and Cable Modems     Access Point     Media Converter     Voice Gateway     Repeater     Wireless LAN Controller     Load Balancer     Proxy Server     VPN Concentrators and Headends     Networked Devices Networking Architecture     Three-Tiered Architecture         Core Layer         Distribution/Aggregation Layer         Access/Edge Layer     Software-Defined Networking         Application Layer         Control Layer         Infrastructure Layer         Management Plane     Spine and Leaf     Traffic Flows     Datacenter Location Types     Storage-Area Networks         iSCSI         Fibre Channel and FCoE         Network-Attached Storage What's Next? CHAPTER 5: Cabling Solutions and Issues General Media Considerations     Broadband Versus Baseband Transmissions     Simplex, Half-Duplex, and Full-Duplex Modes     Data Transmission Rates     Types of Network Media         Twisted-Pair Cabling (Copper)         Coaxial Cables         Twinaxial Cables         Fiber-Optic Cables         Plenum Versus PVC Cables     Types of Media Connectors         BNC Connectors         RJ-11 Connectors         RJ-45 Connectors         F-Type Connectors and RG-59 and RG-6 Cables         Fiber Connectors         Transceivers     Media Couplers/Converters     TIA/EIA 568A and 568B Wiring Standards     Straight-Through Versus Crossover Cables     Rollover and Loopback Cables     Components of Wiring Distribution         Network Cross-Connects         Horizontal Cabling         Vertical Cables         Patch Panels         Fiber Distribution Panels         66 and 110 Blocks (T568A, T568B)         MDF and IDF Wiring Closets     Ethernet Copper and Fiber Standards         10BASE-T         100BASE-TX         1000BASE-T         10GBASE-T         40GBASE-T         1000BASE-LX and 1000BASE-SX         10GBASE-LR and 10GBASE-SR     Multiplexing Options Troubleshooting Common Cable Connectivity Issues Limitations, Considerations, and Issues     Throughput, Speed, and Distance     Cabling Specifications/Limitations     Cabling Considerations     Cabling Applications     Attenuation and dB Loss     Interference     Incorrect Pinout     Bad Ports     Open/Short     LED Status Indicators     Incorrect Transceivers     Duplexing Issues     TX/RX Reversed     Dirty Optical Cables Common Tools     Cable Crimpers, Strippers, and Snips/Cutters     Punchdown Tools     Tone Generator     Loopback Adapter     OTDR     Multimeter     Cable Tester     Wire Map     Tap     Fusion Splicer     Spectrum Analyzer     Fiber Light Meter What's Next? CHAPTER 6: Wireless Solutions and Issues Understanding Wireless Basics     Wireless Channels and Frequencies     Cellular Technology Access     Speed, Distance, and Bandwidth     Channel Bonding     MIMO/MU-MIMO/Directional/Omnidirectional         Antenna Ratings         Antenna Coverage     Establishing Communications Between Wireless Devices     Configuring the Wireless Connection Troubleshooting Wireless Issues     Site Surveys     Factors Affecting Wireless Signals     Interference     Reflection, Refraction, and Absorption Troubleshooting AP Coverage What's Next? CHAPTER 7: Cloud Computing Concepts and Options Cloud Concepts     Service Models     Software as a Service     Platform as a Service     Infrastructure as a Service     Desktop as a Service     Deployment Models     Private Cloud     Public Cloud     Hybrid and Community Clouds     Infrastructure as Code     Connectivity Options     Multitenancy     Elasticity     Scalability     Security Implications     The Relationship Between Resources What's Next? CHAPTER 8: Network Operations Organizational Documents and Policies     Wiring and Port Locations         Troubleshooting Using Wiring Schematics     Physical and Logical Network Diagrams     Baseline Configurations     Policies, Procedures, Configurations, and Regulations         Policies         Password-Related Policies         Procedures         Change Management Documentation         Configuration Documentation         Regulations         Labeling High Availability and Disaster Recovery     Backups         Full Backups         Differential Backups         Incremental Backups         Snapshots     Backup Best Practices     Using Uninterruptible Power Supplies         Why Use a UPS?         Power Threats     Beyond the UPS     Cold, Warm, Hot, and Cloud Sites     High Availability and Recovery Concepts     Active-Active Versus Active-Passive Monitoring Network Performance     Common Performance Metrics     SNMP Monitors         Management Information Base (MIB)     Network Performance, Load, and Stress Testing         Performance Tests         Load Tests and Send/Receive Traffic         Stress Tests         Performance Metrics     Network Device Logs         Security Logs         Application Log         System Logs         History Logs         Log Management         Patch Management     Environmental Factors What's Next? CHAPTER 9: Network Security Common Security Concepts     Access Control     Mandatory Access Control     Discretionary Access Control     Rule-Based Access Control     Role-Based Access Control     Defense in Depth         Network Segmentation         Screened Subnet     Separation of Duties     Honeypots     RADIUS and TACACS+     Kerberos Authentication     Local Authentication     Lightweight Directory Access Protocol     Using Certificates     Auditing and Logging     Multifactor Authentication Factors     Additional Access Control Methods         802.1X         Extensible Authentication Protocol (EAP)         Network Access Control (NAC)         MAC Filtering     Risk Management     Penetration Testing     Security Information and Event Management Common Networking Attacks     Denial-of-Service and Distributed Denial-of-Service Attacks         Types of DoS Attacks     Other Common Attacks         Social Engineering         Logic Bomb         Rogue DHCP         Rogue Access Points and Evil Twins         Advertising Wireless Weaknesses         Phishing         Ransomware         DNS Poisoning         ARP Cache Poisoning         Spoofing         Deauthentication         Brute Force         On-Path Attack         VLAN Hopping         ARP Spoofing     Vulnerabilities and Prevention Network Hardening and Physical Security     Disposing of Assets     Implementing Physical Security         Lock and Key         Swipe Card and PIN Access         Biometrics     Two-Factor and Multifactor Authentication     Secured Versus Unsecured Protocols     Hardening Best Practices     Wireless Security         MAC Filtering         Antenna Placement and Power Levels         Isolation         Preshared Keys         Geofencing         Captive Portal     IoT Access Considerations Remote-Access Methods     Remote File Access     VPNs         Components of the VPN Connection         VPN Connection Types         VPN Pros and Cons         IPSec         SSL/TLS/DTLS     Site-to-Site and Client-to-Site     Virtual Desktops     HTTPS/Management URL     Authentication and Authorization Considerations     Out-of-Band Management What's Next? CHAPTER 10: Network Troubleshooting Troubleshooting Steps and Procedures     Identify the Problem         Identify Symptoms         Determine Whether Anything Has Changed         Duplicate the Problem if Possible         Approach Multiple Problems Individually     Establish a Theory of Probable Cause     Test the Theory to Determine the Cause     Establish a Plan of Action     Implement the Solution or Escalate         Determine Whether Escalation Is Necessary     Verify Full System Functionality     Document Findings, Actions, Outcomes, and Lessons Software Troubleshooting Tools     Wi-Fi Analyzer     Protocol Analyzer     Bandwidth Speed Tester     Port Scanner     iperf     NetFlow Analyzer     TFTP Server     Terminal Emulator     IP Scanner     Command-Line Tools     The Trace Route Utility (tracert/traceroute)     ping         The Destination Host Unreachable Message         The Request Timed Out Message         The Unknown Host Message         The Expired TTL Message         Troubleshooting with ping         hostname     ARP         arp ping     The netstat Command         netstat -e         netstat -a         netstat -r         netstat -s         telnet     ipconfig     ifconfig     nslookup     dig     The tcpdump Command     The route Utility     nmap     Basic Network Platform Commands Troubleshooting General Networking Issues     Common Considerations     Common Problems to Be Aware Of         Collisions         Broadcast Storm         Multicast Flooding         Asymmetrical Routing         Switching Loops         Routing Loops         Missing Route         Low Optical Link Budget         Incorrect VLAN         DNS Issues         Incorrect Gateway         Incorrect Subnet Mask         Duplicate or Incorrect IP Address         Duplicate MAC Addresses         Expired IP Address         Rogue DHCP Server         Certificate Issues         NTP Issues/Incorrect Time         DHCP Scope Exhaustion         Blocked Ports, Services, or Addresses         Incorrect Firewall Settings         Incorrect ACL Settings         Unresponsive Service         BYOD Challenges         Licensed Feature Issues     Hardware Failure     Network Performance Issues What's Next? Glossary

About the Author :
Emmett Dulaney (CompTIA Network+, Cloud+, Security+, A+, and others) has been the author of several books on certifications and operating systems over the past 20 years. He is a columnist for Certification Magazine and a professor at a small university in Indiana. He is currently the editor of a journal devoted to business education (and the business of education).


Best Sellers


Product Details
  • ISBN-13: 9780137375653
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson IT Certification
  • Language: English
  • ISBN-10: 0137375654
  • Publisher Date: 13 Sep 2021
  • Binding: Digital download
  • No of Pages: 560


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
CompTIA Network+ N10-008 Exam Cram
Pearson Education (US) -
CompTIA Network+ N10-008 Exam Cram
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CompTIA Network+ N10-008 Exam Cram

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!