• Complain

Computing Technology Industry Association - CompTIA Network+ Study Guide

Here you can read online Computing Technology Industry Association - CompTIA Network+ Study Guide full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Indianapolis;Indiana, year: 2015, publisher: Sybex, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Computing Technology Industry Association CompTIA Network+ Study Guide

CompTIA Network+ Study Guide: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "CompTIA Network+ Study Guide" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

The CompTIA Network+ Study Guide, 3rd edition, is your one-stop resource for complete coverage of Exam N10-006. This Sybex study guide covers 100% of all exam N10-006 objectives. Content includes assessment tests that check exam readiness, objective map, real-world scenarios, hands-on exercises, key topic exam essentials, and challenging chapter review questions.;Introduction -- Assessment test -- Ch. 1. Introduction to Networks. First Things First: Whats a Network?: The local area network ; Common network components ; Wide area network ; Network architecture : peer-to-peer or client-server? -- Physical Network Topologies: Bus topology ; Star topology ; Ring topology ; Mesh topology ; Point-to-point topology ; Point-to-multipoint topology ; Hybrid topology -- Topology Selection, Backbones, and Segments: Selecting the right topology ; The network backbone ; Network segments -- Summary -- Exam Essentials -- Written Labs -- Review questions -- Ch. 2. The Open Systems Interconnection Specifications. Internetworking Models: The layered approach ; Advantages of reference models -- The OSI Reference Model: The application layer ; The presentation layer ; The session layer ; The transport layer ; The network layer ; The data link layer ; The physical layer -- Introduction to encapsulation -- Modulation techniques -- Summary -- Exam essentials -- Written lab -- Review Questions -- Ch. 3. Networking Topologies, Connectors, And Wiring Standards. Physical Media: Coaxial cable ; Twisted-pair cable ; Fiber-optic cable ; Media converters ; Serial cables -- Cable Properties: Transmission speeds ; Distance ; Duplex ; Noise immunity (Security, EMI) ; Frequency -- Wiring Standards: 568A versus 568B ; Straight-through cable ; Crossover cable ; Rolled/rollover cable ; T1 crossover cable -- Installing Wiring Distributions -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 4. The Current Ethernet Specifications. Network Basics -- Ethernet Basics: Collision domain ; Broadcast domain ; CSMA/CD ; Broadband/baseband ; Bit rates versus baud rate ; Wavelength ; Sampling-size ; Half-and full-duplex Ethernet -- Ethernet at the Data Link Layer: Binary to decimal and hexadecimal conversion ; Ethernet addressing ; Ethernet frames -- Ethernet at the Physical Layer -- Ethernet Over Other Standards (IEEE 1905.1-2013): Ethernet over power line ; Ethernet over HDMI -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 5. Networking Devices. Common Network Connectivity Devices: Network interface card ; Hub ; Bridge ; Switch ; Router ; Firewall ; IDS/IPS ; HIDS ; Access point ; Dynamic host configuration protocol server -- Other Specialized Devices: Multilayer switch ; Load balancer ; Domain name service server ; Proxy server ; Encryption devices ; Analog modem ; Packet shaper ; VPN concentrator -- Planning and Implementing a Basic SOHO Network Using Network Segmentation: Determining requirements ; Switches and bridges at the data link layer ; Hubs at the physical layer ; Environmental considerations -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 6. Introduction to the Internet Protocol. Introducing TCP/IP: A brief history of TCP/IP ; TCP/IP and the DoD model ; The process/application layer protocols ; The host-to-host layer protocols ; The Internet layer protocols -- Data Encapsulation -- Summary -- Exam essentials -- Written lab -- Review Questions -- Ch. 7. IP Addressing. IP Terminology -- Hierarchical IP Addressing Scheme: Network addressing ; Private IP addresses (RFC 1918) -- IPv4 Address Types: Layer 2 broadcasts ; Layer 3 broadcasts ; Unicast address ; Multicast address (Class D) -- Internet Protocol Version 6 (IPv6): Why do we need IPv6? ; The benefits of and uses for IPv6 ; IPv6 addressing and expressions ; Shortened expression ; Address types ; Special addresses ; Stateless auto-configuration (EUI-64) ; DHCPv6 (Stateful) ; Migrating to IPv6 -- Summary -- Exam essentials -- Written Lab: Written Lab 7.1 ; Written Lab 7.2 ; Written Lab 7.3 -- Review questions -- Ch. 8. IP Subnetting, Troubleshooting IP, and Introduction to NAT. Subnetting Basics: How to create subnets ; Subnet masks ; Classless Inter-Domain Routing (CIDR) ; Subnetting Class C addresses ; Subnetting Class B addresses -- Troubleshooting IP Addressing: Determining IP address problems -- Introduction To Network Address Translation (NAT): Types of network address translation ; NAT names ; How NAT works -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 9. Introduction to IP Routing. Routing basics ; The IP routing process ; Testing your IP routing understanding ; Static and dynamic routing ; Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 10. Routing Protocols. Routing Protocol Basics: Administrative distances ; Classes of routing protocols -- Distance Vector Routing Protocols: Routing Information Protocol (RIP) ; RIP version 2 (RIPv2) ; VLSM and discontinuous networks ; EIGRP ; Border Gateway Protocol (BGP) -- Link State Routing Protocols: Open Shortest Path First (OSPF) ; Intermediate System-To-Intermediate System (IS-IS) -- High Availability: Hot Standby Router Protocol (HSRP) ; Virtual router redundancy protocol -- IPv6 Routing Protocols: RIPng ; EIGRPv6 ; OSPFv3 -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 11. Switching and Virtual LANs. Networking before layer 2 switching -- Switching Services: Limitations of layer 2 switching ; Bridging versus LAN switching ; Three switch functions at layer 2 -- Spanning Tree Protocol: Spanning tree port states ; STP convergence ; Rapid spanning tree protocol 802.1w -- Virtual LANs: VLAN basics ; Quality of service ; VLAN memberships ; Static VLANs ; Dynamic VLANs ; Identifying VLANs ; VLAN identification methods -- VLAN Trunking Protocol: VTP modes of operation ; Do we really need to put an IP address on a switch? ; Port security ; Port bonding -- Two Additional Advanced Features of Switches: Power over Ethernet (802.3af, 802.3at) ; Port Mirroring/Spanning (SPAN/RSPAN) -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 12. Wireless Networking. Introduction to wireless technology -- The 802.11 Standards: 2.4GHz (802.11b) ; 2.4GHz (802.11g) ; 5GHz (802.11a) ; 5GHz (802.11h) ; 2.4GHz/5GHz (802.11n) ; 5GHz (802.11ac) -- Comparing 802.11 Standards: Range comparisons -- Wireless Network Components: Wireless access points ; Wireless network interface card ; Wireless antennas -- Installing a Wireless Network: Ad hoc mode : independent basic service set ; Infrastructure mode : basic service set ; Wireless controllers ; Mobile hot spots ; Signal degradation ; Other network infrastructure implementations ; Installing and configuring WLAN hardware -- Site survey -- Wireless Security: Wireless threats ; Open access ; Service set identifiers, wired equivalent privacy, and media access control address authentication ; Remote authentication dial-in user service (802.1x) ; Temporal key integrity protocol ; Wi-Fi protected access or WPA2 pare-shared key -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 13. Authentication and Access Control. Security Filtering: Access control lists ; Tunneling ; Encryption ; Remote access -- Managing User Account and Password Security: Managing user accounts ; Managing passwords ; Single sign-on ; Multifactor authentication -- User-authentication methods: Public Key Infrastructure (PKI) ; Kerberos ; Authentication, Authorization, and Accounting (AAA) ; Web services ; Unified voice services ; Network controllers ; Network Access Control (NAC) ; Challenge Handshake Authentication Protocol (CHAP) ; MS-CHAP ; Extensible Authentication Protocol (EAP) ; Hashes ; Network access control -- Summary -- Exam essentials -- Written lab -- Review questions --;Ch. 14. Network Threats And Mitigation. Recognizing Security Threats: Denial of service ; Distributed DoS (DDos) ; Authentication issues ; Viruses ; Zero day attacks ; Insider threat/malicious employee -- Vulnerabilities: Unnecessary running services ; Open ports ; Unpatched/legacy systems ; Unencrypted channels ; Clear-text credentials ; TEMPEST/RF emanation ; Malicious users ; Buffer overflow ; Wireless threats ; Attackers and their tools ; Misconfiguration issues ; Social Engineering (Phishing) -- Understanding Mitigation Techniques: Active detection ; Passive detection ; Proactive defense ; Basic forensic concepts -- Policies And Procedures: Security policies ; Security training ; Patches and upgrades ; Firmware updates ; Driver updates ; Upgrading versus downgrading -- Anti-Malware Software: Host-based ; Cloud/server-based ; Configuration backups ; Updating antivirus components ; Fixing an infected computer -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 15. Physical Security and Risk. Using hardware and software security devices -- Defining Firewalls: Network-based firewalls ; Host-based firewalls -- Firewall Technologies: Access control lists ; Port security ; Demilitarized zone ; Protocol switching ; Dynamic packet filtering ; Proxy services -- Firewalls at the Application Layer Versus the Network Layer: Stateful versus stateless network layer firewalls ; Application layer firewalls -- Scanning Services and Other Firewall Features: Content filtering ; Signature identification ; Context awareness ; Virtual wire versus routed ; Zones -- Intrusion Detection and Prevention Systems: Network-based IDS ; Host-based IDS ; Vulnerability scanners -- VPN concentrators -- Understanding Problems Affecting Device Security: Physical security ; Logical security configurations ; Risk-related concepts -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 16. Wide Area Networks. Whats a WAN?: Defining WAN terms ; The public switched telephone network ; WAN connection types ; Bandwidth or speed -- T-Series Connections: The T1 connection ; The T3 connection -- Transmission Media: Wired connections ; Wavelength division multiplexing ; Passive optical network ; Wireless technologies -- Broadband Services: ; DSL technology and xDSL ; Cable modem -- Wireless WAN Technologies: Cellular WAN -- WAN Protocols: Integrated services digital network ; Frame relay technology ; Point-to-point protocol ; Asynchronous transfer mode ; MPLS -- WAN Troubleshooting: Loss of internet connectivity ; Interface errors/monitoring ; Split horizon ; DNS issues ; Router configurations ; Company security policy -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 17. Troubleshooting Tools. Protocol analyzers -- Throughput testers -- Connectivity software -- Using Traceroute -- Using ipconfig and ifconfig: Using the ipconfig utility ; Using the ifconfig utility -- Using the ping utility -- Using the Address Resolution Protocol: The Windows ARP table ; Using the arp utility -- Using the nslookup utility -- Resolving names with the hosts table -- Using the Mtr command (pathping) -- Using the route command: Using the route command options ; Some examples of the route command -- Using the nbtstat Utility: The -a switch ; The -A switch ; The -c switch ;The -n switch ; The -r switch ; The -R switch ; The -S switch ; The -s switch -- Using the netstat Utility: The -a switch ; The -e switch ; The -r switch ; The -s switch ; The -p switch ; The -n switch -- Using the File Transfer Protocol: Starting FTP and logging in to an FTP server ; Downloading files ; Uploading files -- Using the Telnet utility: How to enable Telnet in Windows ; Dont use Telnet, use secure shell -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 18. Software and Hardware Tools. Understanding Network Scanners: Packet sniffers/network monitors ; Intrusion detection and prevention software ; Port scanners ; Wi-Fi analyzer -- Baseline -- Network Monitoring and Logging: Network monitoring ; SNMP ; Syslog ; SIEM ; Utilization -- Identifying Hardware Tools: Cable testers ; Protocol analyzer ; Certifiers ; Time-domain reflectometer ; Optical time-domain reflectometer ; Multimeter ; Toner probe ; Butt set ; Punch-down tool ; Cable stripper/snips ; Voltage event recorder (power) ; Environmental monitors -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 19. Network Troubleshooting. Narrowing Down the Problem: Did you check the super simple stuff? ; Is hardware or software causing the problem? ; Is it a workstation or a server problem? ; Which segments of the network are affected? ; Is it bad cabling? -- Troubleshooting Steps: Step 1: Identify the problem ; Step 2: Establish a theory of probable cause ; Step 3: Test the theory to determine cause ; Step 4: Establish a plan of action to resolve the problem and identify potential effects ; Step 5: Implement the solution or escalate as necessary ; Step 6: Verify full system functionality, and if applicable, implement preventative measures ; Step 7: Document findings, actions, and outcomes -- Troubleshooting Tips: Dont overlook the small stuff ; Prioritize your problems ; Check the software configuration ; Dont overlook physical conditions ; Dont overlook cable problems ; Check for viruses -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 20. Management, Monitoring, And Optimization. Managing Network Documentation: Using SNMP ; Schematics and diagrams -- Network Monitoring: Baselines ; On-boarding and off-boarding of mobile devices ; NAC ; Policies, procedures, and regulations ; Safety practices ; Implementing network segmentation -- Network Optimization: Reasons to optimize your networks performance ; How to optimize performance ; Unified communications ; Traffic shaping ; Load balancing ; High availability ; Caching engines ; Fault tolerance ; Archives/backups ; Common address redundancy protocol ; Virtual networking ; Locating and installing equipment ; Change management procedures -- Summary -- Exam essentials -- Written lab -- Review questions -- Appendix A: Answers To the Written Labs: Chapters: 1-7 ; Written Lab: 7.1 ; Written Lab: 7.2 ; Written Lab: 7.3 ; Chapters: 8-20 -- Answers to Review Questions: Chapters: 1-20 -- Appendix C: Subnetting Class A. Subnetting Practice Examples: Class A addresses: Practice Example #1A: 255.255.0.0 (/16) ; Practice Example #2A: 225.255.240.0 (/20) -- Practice Example #3A: 255.255.255.192 (/26) -- Subnetting in your head: Class A addresses -- Written Lab 1 -- Written Lab 2 -- Answers to Written Lab 1 -- Answers to Written Lab 2 -- Index.;

Computing Technology Industry Association: author's other books


Who wrote CompTIA Network+ Study Guide? Find out the surname, the name of the author of the book and a list of all author's works by series.

CompTIA Network+ Study Guide — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "CompTIA Network+ Study Guide" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Senior Acquistions Editor Kenyon Brown Development Editor Kim Wimpsett - photo 1

Senior Acquistions Editor Kenyon Brown Development Editor Kim Wimpsett - photo 2

Senior Acquistions Editor: Kenyon Brown

Development Editor: Kim Wimpsett

Technical Editors: Quentin Doctor and Troy McMillan

Production Editor: Christine O'Connor

Copy Editor: Judy Flynn

Editorial Manager: Mary Beth Wakefield

Production Manager: Kathleen Wisor

Associate Publisher: Jim Minatel

Media Supervising Producer: Richard Graves

Book Designers: Judy Fung and Bill Gibson

Proofreader: Jennifer Bennett, Word One New York

Indexer: Robert Swanson

Project Coordinator, Cover: Brent Savage

Cover Designer: Wiley

Cover Image: Wiley

Copyright 2015 by John Wiley & Sons, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN: 978-1-119-02124-7

ISBN: 978-1-119-02126-1 (ebk.)

ISBN: 978-1-119-02125-4 (ebk.)

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent

professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Control Number: 2014958356

TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA Network+ is a trademark of CompTIA Properties, LLC. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

Acknowledgments

Kim Wimpsett was the development editor of this, the newest book in the Sybex CompTIA series. Thank you, Kim, for working so hard on this book with me.

Kenyon Brown is my new acquisitions editor for this book. Thank you, Kenyon, for making this book a reality!

In addition, Christine O'Connor was an excellent production editor, and she worked really hard to get the book done as quickly as possible, without missing the small mistakes that are so easy to overlook. I am always very pleased when I hear that she will be working with me on a new project. Judy Flynn was my copy editor, and she was patient, helpful, and detailed yet worked extremely hard to get this book on the shelf as quickly as possible, and for that I thank her tremendously.

Quentin Docter reviewed each topic in this guide, scrutinizing the material until we both agreed it was verifiably solid. Thank you, Quentin!

Troy McMillian literally hashed and rehashed each topic in this guide with me at all hours of the day and night. Thank you, Troy, yet again!

About the Authors

Todd Lammle, CompTIA Network+, CCSI, CCNA/CCNP, is the authority on network certification and internetworking. He is a world-renowned author, speaker, trainer, and consultant. Todd has over 25 years of experience working with LANs, WANs, and large licensed and unlicensed wireless networks. He's president and CEO of GlobalNet Training and Consulting, Inc., a network-integration and training firm based in Boulder, Colorado; Dallas, Texas; and San Francisco, California. You can reach Todd through his forum at www.lammle.com/networkplus.

Introduction If youre like most of us in the networking community you - photo 3
Introduction

If you're like most of us in the networking community, you probably have one or more network certifications. If that's you, you're very wise in choosing a CompTIA Network+ (N10-006) certification to proudly add to your repertoire because that achievement will make you all the more valuable as an employee. In these challenging economic times, keeping ahead of the competitioneven standing out among your present colleaguescould make a big difference in whether you gain a promotion or possibly keep your job instead of being the one who gets laid off! Or maybe this is your first attempt at certification because you've decided to venture into a new career in information technology (IT). You've realized that getting into the IT sector is a good way to go because as the information age marches on, the demand for knowledgeable professionals in this dynamic field will only intensify dramatically.

Either way, certification is one of the best things you can do for your career if you are working in, or want to break into, the networking profession because it proves that you know what you're talking about regarding the subjects in which you're certified. It also powerfully endorses you as a professional in a way that's very similar to a physician being board certified in a certain area of expertise.

In this book, you'll find out what the Network+ exam is all about because each chapter covers a part of the exam. I've included some great review questions at the end of each chapter to help crystallize the information you learned and solidly prepare you to ace the exam.

A really cool thing about working in IT is that it's constantly evolving, so there are always new things to learn and fresh challenges to master. Once you obtain your Network+ certification and discover that you're interested in taking it further by getting into more complex networking (and making more money), the Cisco CCNA certification is definitely your next step; you can get the skinny on that and even more in-depth certifications on my blog at

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «CompTIA Network+ Study Guide»

Look at similar books to CompTIA Network+ Study Guide. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «CompTIA Network+ Study Guide»

Discussion, reviews of the book CompTIA Network+ Study Guide and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.