ebook img

CompTIA Network+ Review Guide: Exam N10-008 PDF

746 Pages·2021·33.755 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview CompTIA Network+ Review Guide: Exam N10-008

Table of Contents Cover Title Page Copyright Dedication Acknowledgments About the Author About the Technical Editor Introduction What Is Network+ Certification? Is This Book for You? How Is This Book Organized? Interactive Online Learning Environment and Test Bank Tips for Taking the Network+ Exam How to Contact the Publisher The Exam Objectives The Network+ Exam Objectives Objective Map Network+ Acronyms Network+ Proposed Hardware and Software Chapter 1: Domain 1.0: Networking Fundamentals 1.1 Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts. 1.2 Explain the characteristics of network topologies and network types. 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution. 1.4 Given a scenario, configure a subnet and use appropriate IP addressing schemes. 1.5 Explain common ports and protocols, their application, and encrypted alternatives. 1.6 Explain the use and purpose of network services. 1.7 Explain basic corporate and datacenter network architecture. 1.8 Summarize cloud concepts and connectivity options. Review Questions Chapter 2: Domain 2.0: Network Implementations 2.1 Compare and contrast various devices, their features, and their appropriate placement on the network. 2.2 Compare and contrast routing technologies and bandwidth management concepts. 2.3 Given a scenario, configure and deploy common Ethernet switching features. 2.4 Given a scenario, install and configure the appropriate wireless standards and technologies. Review Questions Chapter 3: Domain 3.0: Network Operations 3.1 Given a scenario, use the appropriate statistics and sensors to ensure network availability. 3.2 Explain the purpose of organizational documents and policies. 3.3 Explain high availability and disaster recovery concepts and summarize which is the best solution. Review Questions Chapter 4: Domain 4.0: Network Security 4.1 Explain common security concepts. 4.2 Compare and contrast common types of attacks. 4.3 Given a scenario, apply network hardening techniques. 4.4 Compare and contrast remote access methods and security implications. 4.5 Explain the importance of physical security. Review Questions Chapter 5: Domain 5.0: Network Troubleshooting 5.1 Explain the network troubleshooting methodology. 5.2 Given a scenario, troubleshoot common cable connectivity issues and select the appropriate tools. 5.3 Given a scenario, use the appropriate network software tools and commands. 5.4 Given a scenario, troubleshoot common wireless connectivity issues. 5.5 Given a scenario, troubleshoot general networking issues. Review Questions Appendix: Answers to Review Questions Chapter 1: Domain 1.0: Networking Fundamentals Chapter 2: Domain 2.0: Network Implementations Chapter 3: Domain 3.0: Network Operations Chapter 4: Domain 4.0: Network Security Chapter 5: Domain 5.0: Network Troubleshooting Index Online Test Bank Register and Access the Online Test Bank End User License Agreement List of Tables Chapter 1 TABLE 1.1 Fiber-optic cable specifications TABLE 1.2 Cable categories and speeds TABLE 1.3 AND Truth Table TABLE 1.4 Key features of UDP and TCP Chapter 2 TABLE 2.1 Cisco administrative distances TABLE 2.2 DSCP markings TABLE 2.3 IEEE STP link costs TABLE 2.4 802.1D vs. 802.1w port states Chapter 3 TABLE 3.1 Severity levels TABLE 3.2 Uptime for nines of an SLA Chapter 5 TABLE 5.1 Rollover cable pinouts TABLE 5.2 EIA/TIA 568 crossover cabling TABLE 5.3 RF absorption rates by common material List of Illustrations Chapter 1 FIGURE 1.1 The layers of the OSI FIGURE 1.2 Transport server port binding FIGURE 1.3 Transport client requests FIGURE 1.4 Logical network addressing FIGURE 1.5 Network layer protocol numbers FIGURE 1.6 The Data Link layer and the sublayers within FIGURE 1.7 The LLC sublayer and the Network layer FIGURE 1.8 An Ethernet II frame FIGURE 1.9 MAC address format FIGURE 1.10 OSI layers and PDUs FIGURE 1.11 Encapsulation and decapsulation FIGURE 1.12 UDP segment FIGURE 1.13 TCP three-way handshake FIGURE 1.14 TCP sliding window example FIGURE 1.15 TCP segment FIGURE 1.16 An IP packet FIGURE 1.17 A typical star topology FIGURE 1.18 A logical ring topology FIGURE 1.19 A physical topology of a full mesh FIGURE 1.20 A comparison of bus networks to SCSI disk networks FIGURE 1.21 A hybrid topology FIGURE 1.22 Typical LAN FIGURE 1.23 Typical WLAN FIGURE 1.24 Typical WAN FIGURE 1.25 Typical SAN FIGURE 1.26 Example of multiple GRE tunnels FIGURE 1.27 Hypervisor types FIGURE 1.28 A DSL network FIGURE 1.29 The broadband cable network FIGURE 1.30 A typical satellite network FIGURE 1.31 A common UTP cable FIGURE 1.32 A common STP cable FIGURE 1.33 Coax cable elements FIGURE 1.34 Cross section of solid core vs. stranded core cables FIGURE 1.35 A typical fiber-optic cable FIGURE 1.36 An RJ-45 connector FIGURE 1.37 An RJ-11 connector FIGURE 1.38 A BNC connector FIGURE 1.39 An F-connector FIGURE 1.40 An LC connector FIGURE 1.41 An ST connector FIGURE 1.42 An SC connector FIGURE 1.43 APC vs. UPC FIGURE 1.44 An MTRJ connector FIGURE 1.45 A typical SFP transceiver FIGURE 1.46 A QSFP transceiver FIGURE 1.47 A media converter FIGURE 1.48 How bidirectional transceivers work FIGURE 1.49 A 66 block panel FIGURE 1.50 A 110 block panel FIGURE 1.51 A Krone block panel FIGURE 1.52 A typical patch panel FIGURE 1.53 A typical fiber distribution panel FIGURE 1.54 Cable management example FIGURE 1.55 TIA/EIA 568A and 568B wiring standard FIGURE 1.56 Straight-through cable wiring FIGURE 1.57 Crossover cable wiring FIGURE 1.58 The static NAT process FIGURE 1.59 Dynamic NAT process FIGURE 1.60 Port address translation process FIGURE 1.61 Port forwarding example FIGURE 1.62 A broadcast frame and IP packet FIGURE 1.63 A unicast frame and packet FIGURE 1.64 IPv6 address example FIGURE 1.65 Breakdown of an IPv6 global unicast address FIGURE 1.66 A link-local prefix FIGURE 1.67 6to4 tunneling FIGURE 1.68 Dual stack example FIGURE 1.69 The DHCP DORA process FIGURE 1.70 The SLAAC process FIGURE 1.71 Padding process of EUI-64 addresses FIGURE 1.72 Bit flipping for EUI-64 addresses FIGURE 1.73 The Windows DHCP/static IP address dialog box FIGURE 1.74 The ANDing process FIGURE 1.75 Subnetting of an IP address FIGURE 1.76 Subnet IDs FIGURE 1.77 Host ID calculations FIGURE 1.78 Creating a subnet calculator FIGURE 1.79 The subnet calculator FIGURE 1.80 Subnetting for hosts FIGURE 1.81 Valid host IDs for a 13-bit host ID‘ FIGURE 1.82 A variable-length subnet mask (VLSM) network FIGURE 1.83 VLSM worksheet FIGURE 1.84 A CIDR calculator FIGURE 1.85 Typical FHRP setup FIGURE 1.86 FTP active and passive modes FIGURE 1.87 An overview of the DHCP process FIGURE 1.88 GRE tunnel example FIGURE 1.89 A GRE Packet FIGURE 1.90 ESP Packet FIGURE 1.91 AH packet FIGURE 1.92 AH and ESP FIGURE 1.93 DNS hierarchy FIGURE 1.94 Primary and secondary DNS servers FIGURE 1.95 DNS queries FIGURE 1.96 The Windows DHCP management console FIGURE 1.97 DHCP Components FIGURE 1.98 The DHCP client lease life cycle FIGURE 1.99 An example of a network router configured with an IP helper FIGURE 1.100 An example of a DHCP relay agent configured on a server FIGURE 1.101 Three-tier vs. collapsed core model FIGURE 1.102 Software-defined networking FIGURE 1.103 A typical spine-leaf network FIGURE 1.104 Data center traffic FIGURE 1.105 A typical storage area network FIGURE 1.106 A comparison between separate SAN and network switching vs. a c... FIGURE 1.107 A private cloud FIGURE 1.108 A public cloud FIGURE 1.109 A hybrid cloud FIGURE 1.110 A community cloud Chapter 2 FIGURE 2.1 Four-port active hub FIGURE 2.2 Hubs, repeaters, and the OSI model FIGURE 2.3 Typical managed switches FIGURE 2.4 Switches and the OSI model FIGURE 2.5 Typical edge router FIGURE 2.6 Routers and the OSI model FIGURE 2.7 Layer 3 switches and the OSI model FIGURE 2.8 WAPs with internal and external antennas FIGURE 2.9 Access points and the OSI model FIGURE 2.10 Wireless LAN controller functionality FIGURE 2.11 Overview of a proxy server implementation FIGURE 2.12 Overview of a reverse proxy server implementation FIGURE 2.13 UC platform and VoIP gateway FIGURE 2.14 VoIP gateway acting as the PSTN FIGURE 2.15 VoIP gateway serving POTS FIGURE 2.16 A typical hardware firewall appliance FIGURE 2.17 Firewalls and the OSI model FIGURE 2.18 NGFW and the OSI model FIGURE 2.19 Typical wired VoIP phone FIGURE 2.20 Network print process FIGURE 2.21 Decentralized print process FIGURE 2.22 Peer-to-peer print process FIGURE 2.23 Centralized print process FIGURE 2.24 Access control schematic FIGURE 2.25 HVAC schematic FIGURE 2.26 SCADA systems FIGURE 2.27 The basic routing process FIGURE 2.28 Two-router network FIGURE 2.29 Default routing example FIGURE 2.30 EIGRP tables FIGURE 2.31 A traffic shaping example FIGURE 2.32 An 802.1Q frame FIGURE 2.33 Hubs, switches, and collision domains FIGURE 2.34 Two broadcast domains connected with a router FIGURE 2.35 The MAC address learning process FIGURE 2.36 Duplicate unicast packets FIGURE 2.37 A broadcast storm FIGURE 2.38 Three switches with redundant links FIGURE 2.39 Three switches with STP calculated FIGURE 2.40 Backup and alternate ports FIGURE 2.41 A flat switched network FIGURE 2.42 A network using VLANs FIGURE 2.43 Routed VLANs FIGURE 2.44 An 802.1Q frame FIGURE 2.45 802.1Q trunk link and broadcasts FIGURE 2.46 Untagging and tagging ports FIGURE 2.47 Voice VLAN ports FIGURE 2.48 LACP port aggregation between two switches FIGURE 2.49 The 2.4 GHz channel plan FIGURE 2.50 The 5 GHz channel plan FIGURE 2.51 802.11ac data rates vs. distance FIGURE 2.52 Channel bonding in the 5 GHz radio band FIGURE 2.53 MIMO wireless example FIGURE 2.54 A Yagi antenna radiation pattern example FIGURE 2.55 An omnidirectional antenna radiation pattern example FIGURE 2.56 Ad hoc wireless network example FIGURE 2.57 Basic service set example FIGURE 2.58 Extended service set example FIGURE 2.59 Mesh WAP example FIGURE 2.60 Wireless authentication for 802.1x/EAP Chapter 3 FIGURE 3.1 Bandwidth vs. utilization FIGURE 3.2 Latency vs. time FIGURE 3.3 Jitter vs. time FIGURE 3.4 SNMP components FIGURE 3.5 SNMP monitor graph FIGURE 3.6 SNMP get and trap methods FIGURE 3.7 Example of an Elasticsearch with Kibana FIGURE 3.8 Event  Viewer filtering FIGURE 3.9 Anatomy of a syslog message

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.