You are previewing Mike Meyers’ CompTIA Network+ Certification Passport, Fifth Edition (Exam N10-006), 5th Edition.
O'Reilly logo
Mike Meyers’ CompTIA Network+ Certification Passport, Fifth Edition (Exam N10-006), 5th Edition

Book Description

Bestselling certification author and CompTIA training expert Mike Meyers updates his CompTIA Network+ Certification Passport to give you concise, focused coverage of the new 2015 exam.

In Mike Meyers’ CompTIA Network+ Certification Passport, Fifth Edition, the #1 name in professional certification provides you with an intensive focus only on what you need to know to pass CompTIA Network+ Exam N10-006, the latest exam release. The book is completely revised to cover the 2015 exam objectives. New topics include convergence (video and teleconferencing over networks); cloud and virtualization technologies; enhanced networking security concepts; and industry standards and best practices.

The Passport series provides an accelerated review and exam preparation for CompTIA Network+ candidates. In addition, Mike Meyers guides you on your career path, providing expert tips and sound advice along the way. Electronic content includes a test engine with two complete practice exams, Mike's favorite freeware and shareware networking tools, and a video introduction to CompTIA Network+.

  • A low-priced quick review guide for CompTIA Network+, the leading vendor-neutral networking certification
  • CompTIA reviewed and approved: CAQC (CompTIA Authorized Quality Curriculum)
  • Electronic content includes Total Seminar's Total Tester exam simulator with 200+ practice exam questions, a new collection of Mike's favorite shareware and freeware networking tools and utilities

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. About the Authors
  6. Contents
  7. Acknowledgments
  8. Check-In
  9. 1 Network Fundamentals
    1. Objective 1.01 Overview of How Networks Work
      1. Servers and Clients
      2. Network Components
        1. Ethernet
        2. Hubs and Switches
        3. Software
        4. Applications
        5. Connecting LANs
    2. Objective 1.02 The OSI Seven-Layer Model
      1. The Layers and What They Represent
        1. Layer 1: Physical Layer
        2. Layer 2: Data Link Layer
        3. Layer 3: Network Layer
        4. Layer 4: Transport Layer
        5. Layer 5: Session Layer
        6. Layer 6: Presentation Layer
        7. Layer 7: Application Layer
      2. Using the Seven-Layer Model
    3. Objective 1.03 The TCP/IP Model
      1. The Link Layer
      2. The Internet Layer
      3. The Transport Layer
      4. The Application Layer
      5. CHECKPOINT
      6. REVIEW QUESTIONS
      7. REVIEW ANSWERS
  10. 2 Network Media
    1. Objective 2.01 Coaxial Cabling
      1. Coaxial Cable Types
      2. Coaxial Connectors
    2. Objective 2.02 Twisted-Pair Cabling
      1. UTP Cable Types
        1. Variations in Core Wires and Sheath Materials
      2. UTP Connectors
      3. UTP Wiring Standards
        1. T568A and T568B Wiring Standards
        2. Straight-through and Crossover Cables
        3. Rollover and Loopback
    3. Objective 2.03 Optical Fiber
      1. Optical Fiber Connectors
      2. Mechanical Connection Variations
      3. Uses for Fiber
      4. 1905.1-2013
      5. Implementing Multiple Types of Ethernet
    4. Objective 2.04 Wireless Media Types
      1. 802.11 Wireless Networks
      2. Wireless Basics
        1. BSSID, SSID, and ESSID
        2. Wireless Standards
        3. Wireless Frequency Ranges
      3. Bluetooth
    5. Objective 2.05 Structured Cabling
      1. Cross-connects, MDF, and IDF
      2. Cables
        1. Patch Panel
      3. Equipment Racks
      4. Power Issues
      5. Temperature Requirements
      6. CHECKPOINT
      7. REVIEW QUESTIONS
      8. REVIEW ANSWERS
  11. 3 Network Topologies and Ethernet Standards
    1. Objective 3.01 Network Topologies
      1. The Bus Topology
      2. The Star Topology
      3. The Ring Topology
      4. The Mesh Topology
      5. Point-to-Point and Point-to-Multipoint Topologies
    2. Objective 3.02 CSMA/CD and Ethernet Standards
      1. How Ethernet Works
      2. CSMA/CD
        1. Collisions
      3. Ethernet Standards
      4. Ethernet on the Bus
      5. 10BaseT and 100BaseT
      6. Gigabit Ethernet
        1. 10/100/1000BaseT Summary
      7. 10 Gigabit Ethernet (10 GbE)
    3. Objective 3.03 CSMA/CA: The Wireless Equivalent to CSMA/CD
      1. CHECKPOINT
      2. REVIEW QUESTIONS
      3. REVIEW ANSWERS
  12. 4 Network Hardware
    1. Objective 4.01 Network Interfaces
      1. MAC Address
      2. Organizing the Data: Ethernet Frames
        1. Preamble
        2. Destination and Source MAC Addresses
        3. Type
        4. Data
        5. Frame Check Sequence
    2. Objective 4.02 Switched Ethernet
      1. The Trouble with Hubs
      2. Switches to the Rescue
      3. Managed Switches
      4. Multilayer Switches
      5. Spanning Tree Protocol
    3. Objective 4.03 Connecting Switches
      1. Uplink Ports
      2. Crossover Cables
      3. Port Bonding
    4. Objective 4.04 Routers
    5. Objective 4.05 Wireless Access Points
      1. CHECKPOINT
      2. REVIEW QUESTIONS
      3. REVIEW ANSWERS
  13. 5 TCP/IP
    1. Objective 5.01 The TCP/IP Protocol Suite
      1. Application Protocols
        1. Port Numbers
        2. Sockets
        3. List of Application Protocols
        4. Compound Application Protocols
      2. Transport Protocols
        1. TCP
        2. UDP
      3. Internet Protocols
        1. Internet Protocol (IP)
        2. Internet Control Message Protocol (ICMP)
    2. Objective 5.02 IPv4 Addressing
      1. IP Addresses
      2. IP Addresses in Action
        1. Network IDs
        2. Interconnecting
        3. Subnet Mask
      3. Class IDs
      4. Private versus Public IP Addresses
    3. Objective 5.03 CIDR and Subnetting
      1. Subnetting
        1. Calculating Hosts
        2. Your First Subnet
        3. Calculating Subnets
      2. VLSM
      3. Supernetting
    4. Objective 5.04 IPv6 Addressing
      1. IPv6 Addresses
      2. IPv6 Protocols
        1. ICMPv6
        2. DHCPv6
        3. EUI-64
      3. Tunnels
        1. 6to4
        2. Teredo and Miredo
    5. Objective 5.05 DNS and DHCP
      1. DNS
      2. DHCP
        1. Living with DHCP
      3. CHECKPOINT
      4. REVIEW QUESTIONS
      5. REVIEW ANSWERS
  14. 6 Routing
    1. Objective 6.01 Routing Tables
      1. Freedom from Layer 2
    2. Objective 6.02 Network Address Translation and High Availability
      1. The Setup
      2. Port Address Translation
      3. Port Forwarding
      4. Configuring NAT
      5. High Availability
      6. VRRP and HSRP
      7. Routing DHCP
    3. Objective 6.03 Dynamic Routing
      1. Routing Metrics
      2. Distance Vector
        1. RIPv1
        2. RIPv2
      3. Link State
        1. OSPF
      4. IS-IS
      5. BGP
      6. Dynamic Routing Makes the Internet
        1. Route Redistribution
        2. Administrative Distance
      7. CHECKPOINT
      8. REVIEW QUESTIONS
      9. REVIEW ANSWERS
  15. 7 Virtualization
    1. Objective 7.01 Virtual LANs
      1. Trunking
      2. Configuring a VLAN-Capable Switch
      3. Tagging
      4. VLAN Trunking Protocol
      5. InterVLAN Routing
    2. Objective 7.02 Virtual Computing
      1. Meet the Hypervisor
      2. Why Do We Virtualize?
        1. Power Savings
        2. Hardware Consolidation
        3. System Recovery
        4. System Duplication
        5. Research
    3. Objective 7.03 Virtualization in Modern Networks
      1. Hypervisors
      2. Type 2 Hypervisors
        1. VMware Workstation
        2. VMware Player
        3. Parallels Desktop for Mac, Server for Mac, Workstation
        4. KVM
      3. Type 1/Bare-Metal Hypervisors
        1. ESXi
        2. Hyper-V
      4. Virtual Switches
      5. Virtual Routers and Firewalls
      6. Software-Defined Networking
    4. Objective 7.04 Virtual Private Networks
      1. PPTP VPNs
      2. L2TP VPNs
      3. SSL VPNs
      4. IPsec
      5. GRE
    5. Objective 7.05 SAN/NAS
      1. SAN
        1. Fibre Channel
        2. iSCSI
      2. NAS
    6. Objective 7.06 Cloud Computing
      1. Infrastructure as a Service
      2. Platform as a Service
      3. Software as a Service
      4. Public Cloud
      5. Private Cloud
      6. Community Cloud
      7. Hybrid Cloud
      8. CHECKPOINT
      9. REVIEW QUESTIONS
      10. REVIEW ANSWERS
  16. 8 Wide Area Networking
    1. Objective 8.01 Telephony and Beyond
      1. The Dawn of Long Distance
      2. Digital Telephony
        1. It All Starts with DS0
      3. Copper Carriers: T1 and T3
      4. Fiber Carriers: SONET/SDH and OC
      5. Packet Switching
        1. Frame Relay
        2. ATM
        3. MPLS
      6. Real-world WAN
      7. Alternative to Telephony WAN
    2. Objective 8.02 The Last Mile
      1. Dial-up
        1. Public Switched Telephone Network
        2. ISDN
      2. DSL
        1. SDSL
        2. ADSL
        3. VDSL
        4. DSL Features
        5. Installing DSL
      3. Broadband Cable
      4. Satellite
      5. Cellular WAN
        1. GSM/EDGE
        2. CDMA
        3. HSPA+
        4. WiMAX
        5. LTE
      6. Fiber
    3. Objective 8.03 Using Remote Access
      1. Dial-up to the Internet
      2. Private Dial-up
      3. Dedicated Connection
        1. DSL and Cable
        2. Cable Issues
      4. Remote Terminal
        1. VoIP
        2. Skype
        3. Streaming Media with RTSP
      5. CHECKPOINT
      6. REVIEW QUESTIONS
      7. REVIEW ANSWERS
  17. 9 Network Security
    1. Objective 9.01 Risk-Related Concepts
      1. First Responders
      2. Disaster Recovery
      3. Business Continuity
      4. Battery Backups/UPS
      5. End User Awareness and Training
      6. Adherence to Standards and Policies
      7. Single Point of Failure
        1. Critical Assets
        2. Critical Nodes
      8. Vulnerability Testing
      9. Penetration Testing
    2. Objective 9.02 Common Network Vulnerabilities and Threats
      1. Attacks/Threats
      2. Denial of Service
      3. ARP Cache Poisoning
      4. Packet/Protocol Abuse
      5. Spoofing
      6. Brute Force
      7. Man in the Middle
      8. Session Hijacking
      9. Social Engineering
      10. VLAN Hopping
      11. Compromised System
      12. Insider Threats/Malicious Employees
      13. Zero-Day Attacks
      14. Unnecessary Running Services/Open Ports
      15. Unpatched/Legacy Systems
      16. Unencrypted Channels
      17. Cleartext Credentials
      18. Unsecure Protocols
      19. TEMPEST/RF Emanation
      20. Wireless Threats
        1. Rogue Access Point
        2. Evil Twin
        3. War Driving/War Chalking
        4. Bluejacking/Bluesnarfing
        5. WEP/WPA/WAP2/WPS Attacks
    3. Objective 9.03 Network Hardening Techniques
      1. Anti-malware Software
      2. Switch Port Security
        1. Dynamic ARP Inspection
        2. DHCP Snooping
        3. MAC Address Filtering
        4. VLAN Assignments
      3. Security Policies
        1. Acceptable Use Policy
        2. Network Policies
        3. Adherence to Policies
      4. Disable Unneeded Network Services
      5. Use Secure Protocols
        1. SSH
        2. SNMPv3
        3. SSL/TLS
        4. SFTP
        5. IPsec
      6. Wireless Security
      7. User Authentication
      8. Hashes
        1. EAP
        2. TACACS+
      9. 802.1X
    4. Objective 9.04 Physical Security Controls
      1. Security Guards
      2. Mantraps
      3. Network Closets
      4. Video Monitoring
      5. Door Access Controls
      6. Proximity Readers
      7. Biometrics
      8. Keypad/Cipher Lock
    5. Objective 9.05 Firewalls
      1. Types of Firewalls
      2. Settings/Techniques
        1. Routed and Virtual Wire Firewalls
        2. Access Lists
        3. DMZ
    6. Objective 9.06 Network Access Control Models
      1. Posture Assessment
      2. Guest Network
      3. Quarantined Network
      4. Agents
    7. Objective 9.07 Basic Forensic Concepts
      1. First Responder
      2. Secure the Area
      3. Document the Scene
      4. Evidence/Data Collection
      5. Chain of Custody
      6. Data Transport
      7. Forensics Report
      8. Legal Hold and E-Discovery
      9. CHECKPOINT
      10. REVIEW QUESTIONS
      11. REVIEW ANSWERS
  18. 10 The Complete Network
    1. Objective 10.01 Designing and Building a Network
      1. Define the Network Needs
      2. Documentation
      3. Network Design
        1. Workstations
        2. Servers
        3. Equipment Room
        4. Peripherals
      4. Compatibility Issues
      5. Internal Connections
        1. Structured Cabling
        2. Wireless
        3. VLANs
        4. Network IP Address Scheme
      6. External Connections
    2. Objective 10.02 Unified Communication
      1. It Started with VoIP
      2. Unified Communication Features
      3. UC Network Components
      4. VTC and Medianets
      5. ISDN vs. IP/SIP
      6. QoS and Medianets
    3. Objective 10.03 Specialized Network Devices
      1. Intrusion Detection/Intrusion Prevention
      2. Proxies
      3. VPN Concentrator
    4. Objective 10.04 Industrial Control Systems (ICS)
      1. DCS
      2. PLC
      3. SCADA
        1. Remote Terminal Unit
        2. Segmentation and Industrial Control Systems
      4. CHECKPOINT
      5. REVIEW QUESTIONS
      6. REVIEW ANSWERS
  19. 11 Troubleshooting Networks
    1. Objective 11.01 Troubleshooting Methodology
      1. Identify the Problem
        1. Gather Information, Duplicate the Problem, Question Users, and Identify Symptoms
        2. Determine If Anything Has Changed
        3. Approach Multiple Problems Individually
      2. Establish a Theory of Probable Cause
      3. Test the Theory to Determine the Cause
      4. Establish a Plan of Action and Identify Potential Effects
      5. Implement the Solution or Escalate as Necessary
      6. Verify Full System Functionality and Implement Preventative Measures
      7. Document Findings, Actions, and Outcomes
    2. Objective 11.02 Troubleshooting Tools
      1. Software Tools
      2. ipconfig and ifconfig
        1. ping
      3. tracert
      4. pathping
      5. netstat
      6. nbtstat
      7. nslookup
      8. arp
      9. Looking Glass Sites
      10. Protocol Analyzer
      11. Wi-Fi Analyzer
      12. Speed-Test Sites
      13. Hardware Tools
        1. Line Testers
        2. Light Meter
      14. Tone Locators and Toner Probes
      15. Cable Testers
      16. Multimeters
      17. Certifiers
    3. Objective 11.03 Troubleshooting Wireless Issues
      1. Signal Loss
      2. Interference
      3. Overlapping Channels
      4. Mismatched Channels
      5. Device Saturation
      6. Bandwidth Saturation
      7. Untested Updates
      8. Wrong SSID
      9. Power Levels
      10. Open Networks
      11. Rogue Access Point
      12. Wrong Antenna Type
      13. Incompatibilities
      14. Wrong Encryption
      15. Bounce
      16. MIMO
      17. AP Placement
      18. Antenna Placement
      19. AP Configuration
      20. Thin Client/Thick Client/LWAPP
      21. Environmental Factors
    4. Objective 11.04 Troubleshooting Cable Issues
      1. Shorts/Opens
      2. Incorrect Termination
      3. Crosstalk
      4. EMI/RFI
      5. Distance Limitations
      6. Attenuation/dB Loss
      7. Bad Wiring/Bad Connector
      8. Split Pair
      9. TX/RX Reversed
      10. Incorrect VLAN Assignment
      11. Cable Placement
      12. SFP/GBIC Transceiver Problems—Cable Mismatch
      13. Wavelength Mismatch
      14. Connector Issues
      15. Bend Radius
      16. Distance Limitations
    5. Objective 11.05 Troubleshooting Network Issues
      1. Incorrect IP Configuration/Gateway
      2. Broadcast Storms
      3. Switching Loops
      4. Duplicate IP
      5. Speed/Duplex Mismatch
      6. End-To-End Connectivity
      7. Hardware Failure
      8. Misconfigured DHCP
      9. Misconfigured DNS
      10. Incorrect Interface/Interface Misconfiguration
      11. Interface Errors
      12. Simultaneous Wired/Wireless Connections
      13. Discovering Neighboring Devices/Nodes
      14. Power Failure/Power Anomalies
      15. MTU/MTU Black Hole
      16. Missing IP Routes
      17. NIC Teaming Misconfiguration
      18. Multicast vs. Broadcast
    6. Objective 11.06 Troubleshooting Security Issues
      1. Misconfigured Firewall
      2. Malware
        1. Virus
        2. Worm
        3. Macro
        4. Trojan Horse
        5. Rootkit
        6. Adware/Spyware
        7. Dealing with Malware
      3. DoS
      4. Unneeded Running Services
      5. ICMP-Related Issues
      6. Unpatched Firmware/OS
      7. Malicious Users
      8. Trusted and Untrusted Users
      9. Authentication Issues
        1. Default Settings, Passwords, Accounts, and Groups
        2. AAA
      10. ARP Issues
      11. Banner Grabbing/OUI
      12. Domain/Local Group Configurations
    7. Objective 11.07 Troubleshooting WAN Issues
      1. Loss of Internet Connectivity
      2. Interference
      3. Interface Errors
      4. DNS Issues
      5. Split Horizon
      6. Router Configurations
        1. Routing Protocols
        2. ACLs
        3. Missing Routes
        4. tracert/traceroute
        5. CSU/DSU
        6. Copper Line Drivers/Repeaters
      7. Company Security Policy
      8. CHECKPOINT
      9. REVIEW QUESTIONS
      10. REVIEW ANSWERS
  20. 12 Network Management
    1. Objective 12.01 Network Policies and Procedures
      1. Standard Business Documents
        1. Service Level Agreement
        2. Memorandum of Understanding
        3. Multi-source Agreement
        4. Statement of Work
      2. Electrical Safety
      3. Physical/Installation Safety
      4. Rack Installation and Maintenance
      5. Emergency Procedures
      6. HVAC
    2. Objective 12.02 Network Segmentation, Patching, and Updating
      1. Segmentation and Industrial Control Systems
      2. VLANs
      3. Legacy Systems
      4. Honeypots and Honeynets
      5. Patching and Updates
        1. Operating System Updates
        2. Feature Changes/Updates
        3. Major vs. Minor Updates
        4. Vulnerability Patch
        5. Upgrading vs. Downgrading
        6. How to Patch
    3. Objective 12.03 Wireless Configuration and Management
      1. Site Survey
      2. Power over Ethernet
      3. Bring Your Own Device
      4. SSID Broadcasting
      5. MIMO
      6. VLAN Pooling
      7. Wireless Bridges
    4. Objective 12.04 Network Monitoring
      1. Packet Analyzers
      2. Interface Monitors
      3. SNMP
      4. NetFlow
      5. Performance Monitors
      6. SIEM
      7. Power and Environmental Monitors
      8. Baselines
      9. Log Management
    5. Objective 12.05 Change and Configuration Management
      1. Change Request
        1. Type of Change
        2. Configuration Procedures
        3. Rollback Process
        4. Potential Impact
        5. Notification
      2. Dealing with the Change Management Team
      3. Making the Change Happen
      4. Documenting the Change
      5. Port Mirroring
      6. 802.1X Configuration
      7. CHECKPOINT
      8. REVIEW QUESTIONS
      9. REVIEW ANSWERS
  21. A Career Flight Path
    1. CompTIA Certifications
    2. Microsoft Certifications
    3. Cisco Certifications
  22. B About the Download
    1. Media Center Download
      1. Playing the Mike Meyers Introduction Video
    2. Downloading Total Tester Exam Software
      1. Installing and Running Total Tester
      2. About Total Tester
      3. About the Assessment Test
    3. TotalSims for Network+
    4. Mike’s Video Training
    5. Mike’s Cool Tools
    6. Technical Support
      1. Total Seminars Technical Support
      2. McGraw-Hill Education Content Support
  23. Glossary
  24. Index