O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Network+ N10-007 Exam Cram, 6/e

Book Description

The CompTIA Network+ N10-007 Exam Cram, Sixth Edition has been updated to prepare candidates for the new exam, using the proven Exam Cram method of study.

The CompTIA Network+ N10-007 Exam Cram, Sixth Edition is the perfect study guide to help you pass the CompTIA Network+ N10-007 exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of security, cloud networking, IPv6, and wireless technologies. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, sidebars, and Notes interspersed throughout the text keep you focused on what you need to know. Cram Quizzes help you assess your knowledge, and the Cram Sheet tear card is the perfect last-minute review.

As with all Exam Cram books, it includes:

  • Chapters that map directly to the exam objectives
  • Comprehensive foundational learning on all topics covered on the exam
  • An extensive collection of practice questions
  • Access to the Pearson Test Prep practice test software that provides real-time practice and feedback, online or offline
  • The Cram Sheet tear-out card including tips, acronyms, and memory joggers not available anywhere else - perfect for last-minute study

Table of Contents

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Contents at a Glance
  5. Table of Contents
  6. About the Author
  7. Dedication
  8. Acknowledgments
  9. About the Technical Editor
  10. We Want to Hear from You!
  11. Reader Services
  12. Introduction
  13. Chapter 1: Introduction to Networking Technologies
    1. Wired and Wireless Network Topologies
      1. Bus Topology
      2. Ring Topology
      3. Star Topology
      4. Wired Mesh Topology
      5. Wireless Topologies
      6. Hybrid Topologies
    2. Network Types
      1. LANs
      2. WLANs
      3. WANs
      4. MANs
      5. CANs
      6. SANs
      7. PANs
    3. IoT Technologies
      1. Z-Wave
      2. Ant+
      3. Bluetooth
      4. NFC
      5. IR
      6. RFID
      7. 802.11
      8. The Magic Behind 802.11n and 802.11ac
      9. A Summary of 802.11 Wireless Standards
    4. What’s Next?
  14. Chapter 2: Models, Ports, Protocols, and Networking Services
    1. The OSI Networking Model
      1. The OSI Seven-Layer Model
      2. Comparing OSI to the Four-Layer TCP/IP Model
      3. Identifying the OSI Layers at Which Various Network Components Operate
    2. Ports and Protocols
      1. Connection-Oriented Protocols Versus Connectionless Protocols
      2. Internet Protocol
      3. Transmission Control Protocol
      4. User Datagram Protocol
      5. File Transfer Protocol
      6. Secure File Transfer Protocol
      7. Trivial File Transfer Protocol
      8. Simple Mail Transfer Protocol
      9. Hypertext Transfer Protocol
      10. Hypertext Transfer Protocol Secure
      11. Post Office Protocol Version 3/Internet Message Access Protocol Version 4
      12. Telnet
      13. Secure Shell
      14. Internet Control Message Protocol
      15. Network Time Protocol
      16. Lightweight Directory Access Protocol
      17. H.323
      18. Simple Network Management Protocol
      19. Session Initiation Protocol
      20. Remote Desktop Protocol
      21. Server Message Block
      22. Understanding Port Functions
      23. ARP and RARP
    3. Network Services
      1. Domain Name Service (DNS)
      2. The DNS Namespace
      3. Types of DNS Entries
      4. DNS Records
      5. DNS in a Practical Implementation
      6. Dynamic Host Configuration Protocol
      7. The DHCP Process
      8. DHCP and DNS Suffixes
      9. DHCP Relays and IP Helpers
      10. IP Address Management
      11. Network Time Protocol
    4. What’s Next?
  15. Chapter 3: Addressing, Routing, and Switching
    1. IP Addressing
      1. IPv4
      2. IP Address Classes
      3. Subnet Mask Assignment
      4. Subnetting
      5. Identifying the Differences Between IPv4 Public and Private Networks
      6. Classless Interdomain Routing
      7. Default Gateways
      8. Virtual IP
      9. IPv4 Address Types
      10. IPv6 Addressing
      11. Comparing IPv4 and IPv6 Addressing
      12. Assigning IP Addresses
      13. Identifying MAC Addresses
      14. NAT, PAT, SNAT, and DNAT
    2. Managing TCP/IP Routing and Switching
      1. The Default Gateway
      2. Routing Tables
      3. Static Routing
      4. Switching Methods
      5. Software-Defined Networking
      6. Dynamic Routing
      7. Network Traffic
      8. Routing Metrics
      9. Virtual Local-Area Networks
      10. The Spanning Tree Protocol
      11. Interface Configuration and Switch Management
      12. Trunking
      13. Port Mirroring
      14. Port Authentication
      15. Power over Ethernet
      16. DMZ
      17. MAC Address Table
      18. Switch Management
      19. Managed and Unmanaged
      20. Quality of Service
      21. Traffic Shaping
      22. Access Control Lists
    3. What’s Next?
  16. Chapter 4: Network Components and Devices
    1. Common Network Devices
      1. Firewall
      2. Router
      3. Switch
      4. Hub
      5. Bridge
      6. Modems
      7. Wireless Access Point
      8. Media Converter
      9. Wireless Range Extender
      10. VoIP Endpoint
      11. Network Devices Summary
    2. Advanced Networking Devices
      1. Multilayer Switch
      2. Wireless Controller
      3. Load Balancer
      4. IDS/IPS
      5. Proxy Server
      6. VPN Concentrator
      7. AAA/RADIUS Server
      8. UTM Appliances and NGFW/Layer 7 Firewalls
      9. VoIP PBX and Gateway
      10. Content Filter
    3. What’s Next?
  17. Chapter 5: WAN Technologies
    1. WAN Technologies
      1. Integrated Services Digital Network
      2. Leased Lines
      3. Fiber, SONET, and OCx Levels
      4. Frame Relay
      5. Asynchronous Transfer Mode
      6. Copper Versus Fiber
      7. Other WAN Technologies
    2. Internet Access Technologies
      1. DSL Internet Access
      2. Cable Broadband
      3. Broadband Security Considerations
      4. Dial-up
      5. The Public Switched Telephone Network
      6. Satellite Internet Access
      7. Wireless Internet Access
      8. Termination Points
    3. What’s Next?
  18. Chapter 6: Cabling Solutions
    1. General Media Considerations
      1. Broadband Versus Baseband Transmissions
      2. Simplex, Half-Duplex, and Full-Duplex Modes
      3. Data Transmission Rates
      4. Types of Network Media
      5. Types of Media Connectors
      6. Media Couplers/Converters
      7. 568A and 568B Wiring Standards
      8. Straight-Through Versus Crossover Cables
      9. Rollover and Loopback Cables
      10. Components of Wiring Distribution
      11. Ethernet Deployment Standards
    2. Troubleshooting Common Wired Connectivity Issues
      1. Attenuation
      2. Latency
      3. Jitter
      4. Crosstalk
      5. EMI
      6. Open/Short
      7. Incorrect Pin-Out
      8. Incorrect Cable Types
      9. Bad Port
      10. Transceiver Mismatch
      11. TX/RX Reversed
      12. Duplex/Speed Mismatch
      13. Damaged Cables
      14. Bent Pins
      15. Bottlenecks
      16. VLAN Mismatch
      17. Network Connection LED Status Indicators
    3. What’s Next?
  19. Chapter 7: Wireless Solutions
    1. Understanding Wireless Basics
      1. Wireless Channels and Frequencies
      2. Cellular Access
      3. Speed, Distance, and Bandwidth
      4. Channel Bonding
      5. MIMO/MU-MIMO/Unidirectional/Omnidirectional
      6. Site Surveys
      7. Establishing Communications Between Wireless Devices
      8. Configuring the Wireless Connection
    2. Troubleshooting Wireless Issues
      1. Factors Affecting Wireless Signals
      2. Troubleshooting AP Coverage
    3. What’s Next?
  20. Chapter 8: Cloud Computing and Virtualization
    1. Cloud Concepts
      1. Software as a Service
      2. Platform as a Service
      3. Infrastructure as a Service
      4. Other Types of Services
      5. Private Cloud
      6. Public Cloud
      7. Hybrid Cloud
      8. Connectivity Methods
      9. Security Implications and Considerations
      10. The Relationship Between Resources
    2. Virtualization and Storage-Area Networks
      1. Virtualization
      2. Storage-Area Networks
    3. What’s Next?
  21. Chapter 9: Network Operations
    1. Documentation Management
      1. Wiring and Port Locations
      2. Physical and Logical Network Diagrams
      3. Baselines
      4. Policies, Procedures, Configurations, and Regulations
      5. Labeling
    2. Business Continuity and Disaster Recovery
      1. Backups
      2. Backup Best Practices
      3. Using Uninterruptible Power Supplies
      4. Alternatives to UPS
      5. Hot, Warm, and Cold Sites
      6. High Availability and Recovery Concepts
    3. Monitoring Network Performance
      1. Common Reasons to Monitor Networks
      2. SNMP Monitors
      3. Packet Sniffers
      4. Throughput Testing
      5. Port Scanners
      6. Vulnerability Scanners
      7. Network Performance, Load, and Stress Testing
      8. Tracking Event Logs
    4. Remote Access
      1. Remote File Access
      2. VPNs
      3. Site-to-Site and Client-to-Site
      4. HTTPS/Management URL
      5. Out-of-Band Management
    5. What’s Next?
  22. Chapter 10: Network Security
    1. Physical Security and Device Hardening
      1. Adding Physical Security to the Mix
      2. Two-Factor and Multifactor Authentication
      3. Secured Versus Unsecured Protocols
      4. Additional Device Hardening
    2. Authentication and Access Controls
      1. Mandatory Access Control
      2. Discretionary Access Control
      3. Rule-Based Access Control
      4. Role-Based Access Control
      5. RADIUS and TACACS+
      6. Kerberos Authentication
      7. Local Authentication
      8. Lightweight Directory Access Protocol
      9. Using Certificates
      10. Auditing and Logging
      11. Multifactor Authentication Factors
      12. Access Control
    3. Securing Wireless Networks
      1. WPA, WPA2, TKIP-RC4, and CCMP-AES
      2. Wireless Authentication and Authorization
      3. Shared, Preshared, and Open Keys
    4. Common Networking Attacks
      1. Denial-of-Service and Distributed Denial-of-Service Attacks
      2. Other Common Attacks
      3. Vulnerabilities and Prevention
    5. Mitigation Techniques
      1. Signature Management
      2. Device Hardening
      3. Change Native VLAN
      4. Switch and Port Protection
      5. Demilitarized Zones (Perimeter Network)
      6. VLAN Network Segmentation
      7. Privileged User Account
      8. File Integrity Monitoring
      9. Role Separation
      10. Using ACLs to Restrict Access
      11. Honeypots and Honeynets
      12. Penetration Testing
    6. What’s Next?
  23. Chapter 11: Network Troubleshooting
    1. Troubleshooting Steps and Procedures
      1. Identify the Problem
      2. Establish a Theory of Probable Cause
      3. Test the Theory to Determine Cause
      4. Establish a Plan of Action
      5. Implement the Solution or Escalate
      6. Verify Full System Functionality
      7. Document the Findings, Actions, and Outcomes
    2. Hardware and Software Troubleshooting Tools
      1. Wire Crimpers, Strippers, and Snips
      2. Tone Generator and Probes
      3. Loopback Adapter
      4. Protocol Analyzer
      5. Media/Cable Testers
      6. TDR and OTDR
      7. Multimeter
      8. Spectrum Analyzer
      9. Packet Sniffers
      10. Port Scanner
      11. Wi-Fi Analyzer
      12. Bandwidth Speed Tester and Looking Glasses
      13. Environmental Monitors
    3. Command-Line Troubleshooting Tools
      1. The Trace Route Utility (tracert/traceroute)
      2. ping
      3. ARP
      4. The netstat Command
      5. ipconfig
      6. ifconfig
      7. nslookup
      8. dig
      9. The tcpdump Command
      10. The route Utility
      11. nmap
    4. Troubleshooting Common Network Service Issues
      1. Common Problems to Be Aware Of
      2. Hardware Failure
    5. What’s Next?
  24. Glossary
  25. Index