Muutke küpsiste eelistusi

CompTIA Networkplus Deluxe Study Guide: Exam N10-006 [Kõva köide]

  • Formaat: Hardback, 960 pages, kõrgus x laius x paksus: 244x196x53 mm, kaal: 1456 g
  • Ilmumisaeg: 04-May-2015
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119021278
  • ISBN-13: 9781119021278
  • Formaat: Hardback, 960 pages, kõrgus x laius x paksus: 244x196x53 mm, kaal: 1456 g
  • Ilmumisaeg: 04-May-2015
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119021278
  • ISBN-13: 9781119021278
The ultimate Network+ exam prep

The CompTIA Network+ Deluxe Study Guide is your CompTIA Authorized resource for preparing for the Network+ exam N10-006. Bestselling author and networking Guru Todd Lammle guides you through 100% of all exam objectives.. Coverage includes network technologies, installation and configuration, media and topologies, security, and much more, plus practical examples drawn from real-world situations. This Deluxe edition is packed with bonus study aids, including an online interactive learning environment with practice exams, flashcards, and e-book files in multiple formats. Practice without buying expensive equipment, and review exam material on the go.

CompTIA's Network+ certification covers advances in networking technology and reflects changes in associated job tasks. The exam emphasizes network implementation and support, and includes expanded coverage of wireless networking topics. This guide is the ultimate in Network+ prep, with expert insight, clear explanation, full coverage, and bonus tools.

  • Review 100% of the Network+ exam objectives
  • Get clear, concise insight on crucial networking maintenance topics
  • Study practical examples drawn from real-world experience

The CompTIA Network+ Deluxe Study Guide gives you the guidance and tools you need to prepare for the exam

Introduction xxix
Assessment Test xli
Chapter 1 Introduction to Networks
1(26)
First Things First: What's a Network?
2(10)
The Local Area Network
3(2)
Common Network Components
5(3)
Wide Area Network
8(2)
Network Architecture: Peer-to-Peer or Client-Server?
10(2)
Physical Network Topologies
12(7)
Bus Topology
12(1)
Star Topology
13(1)
Ring Topology
14(1)
Mesh Topology
15(1)
Point-to-Point Topology
16(1)
Point-to-Multipoint Topology
17(1)
Hybrid Topology
18(1)
Topology Selection, Backbones, and Segments
19(2)
Selecting the Right Topology
19(1)
The Network Backbone
20(1)
Network Segments
20(1)
Summary
21(1)
Exam Essentials
22(1)
Written Labs
22(1)
Review Questions
23(4)
Chapter 2 The Open Systems Interconnection Specifications
27(28)
Internetworking Models
28(2)
The Layered Approach
29(1)
Advantages of Reference Models
29(1)
The OSI Reference Model
30(16)
The Application Layer
32(1)
The Presentation Layer
33(1)
The Session Layer
33(1)
The Transport Layer
33(7)
The Network Layer
40(3)
The Data Link Layer
43(2)
The Physical Layer
45(1)
Introduction to Encapsulation
46(1)
Modulation Techniques
47(1)
Summary
47(1)
Exam Essentials
48(1)
Written Lab
49(1)
Review Questions
50(5)
Chapter 3 Networking Topologies, Connectors, and Wiring Standards
55(36)
Physical Media
57(16)
Coaxial Cable
58(2)
Twisted-Pair Cable
60(4)
Fiber-Optic Cable
64(5)
Media Converters
69(2)
Serial Cables
71(2)
Cable Properties
73(2)
Transmission Speeds
74(1)
Distance
74(1)
Duplex
74(1)
Noise Immunity (Security, EMI)
74(1)
Frequency
75(1)
Wiring Standards
75(7)
568A vs 568B
76(2)
Straight-Through Cable
78(1)
Crossover Cable
78(2)
Rolled/Rollover Cable
80(1)
T1 Crossover Cable
81(1)
Installing Wiring Distributions
82(3)
Summary
85(1)
Exam Essentials
85(1)
Written Lab
86(1)
Review Questions
87(4)
Chapter 4 The Current Ethernet Specifications
91(36)
Network Basics
93(2)
Ethernet Basics
95(6)
Collision Domain
95(1)
Broadcast Domain
96(1)
CSMA/CD
96(2)
Broadband/Baseband
98(1)
Bit Rates vs Baud Rate
98(1)
Wavelength
98(1)
Sampling -Size
99(1)
Half- and Full-Duplex Ethernet
99(2)
Ethernet at the Data Link Layer
101(7)
Binary to Decimal and Hexadecimal Conversion
102(3)
Ethernet Addressing
105(1)
Ethernet Frames
106(2)
Ethernet at the Physical Layer
108(6)
Ethernet over Other Standards (IEEE 1905.1-2013)
114(3)
Ethernet over Power Line
114(2)
Ethernet over HDMI
116(1)
Summary
117(1)
Exam Essentials
117(1)
Written Lab
117(6)
Review Questions
123(4)
Chapter 5 Networking Devices
127(44)
Common Network Connectivity Devices
129(15)
Network Interface Card
130(1)
Hub
131(1)
Bridge
132(1)
Switch
132(1)
Router
133(4)
Firewall
137(1)
IDS/IPS
138(1)
HIDS
138(1)
Access Point
138(1)
Dynamic Host Configuration Protocol Server
139(5)
Other Specialized Devices
144(10)
Multilayer Switch
144(1)
Load Balancer
145(1)
Domain Name Service Server
145(5)
Proxy Server
150(1)
Encryption Devices
151(1)
Analog Modem
152(1)
Packet Shaper
153(1)
VPN Concentrator
153(1)
Planning and Implementing a Basic SOHO Network Using Network Segmentation
154(10)
Determining Requirements
154(7)
Switches and Bridges at the Data Link Layer
161(1)
Hubs at the Physical Layer
162(1)
Environmental Considerations
163(1)
Summary
164(1)
Exam Essentials
164(1)
Written Lab
165(1)
Review Questions
166(5)
Chapter 6 Introduction to the Internet Protocol
171(34)
Introducing TCP/IP
173(21)
A Brief History of TCP/IP
173(1)
TCP/IP and the DoD Model
174(2)
The Process/Application Layer Protocols
176(8)
The Host-to-Host Layer Protocols
184(5)
The Internet Layer Protocols
189(5)
Data Encapsulation
194(4)
Summary
198(1)
Exam Essentials
198(1)
Written Lab
198(2)
Review Questions
200(5)
Chapter 7 IP Addressing
205(28)
IP Terminology
206(1)
The Hierarchical IP Addressing Scheme
207(7)
Network Addressing
208(4)
Private IP Addresses (RFC 1918)
212(2)
IPv4 Address Types
214(2)
Layer 2 Broadcasts
214(1)
Layer 3 Broadcasts
215(1)
Unicast Address
215(1)
Multicast Address (Class D)
215(1)
Internet Protocol Version 6 (IPv6)
216(9)
Why Do We Need IPv6?
216(1)
The Benefits of and Uses for IPv6
217(1)
IPv6 Addressing and Expressions
218(1)
Shortened Expression
219(1)
Address Types
219(1)
Special Addresses
220(1)
Stateless Autoconfiguration (EUI-64)
221(2)
DHCPv6 (Stateful)
223(1)
Migrating to IPv6
223(2)
Summary
225(1)
Exam Essentials
226(1)
Written Lab
227(2)
Written Lab 7.1
227(1)
Written Lab 7.2
227(1)
Written Lab 7.3
228(1)
Review Questions
229(4)
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT
233(44)
Subnetting Basics
234(22)
How to Create Subnets
235(1)
Subnet Masks
236(1)
Classless Inter-Domain Routing (CIDR)
237(2)
Subnetting Class C Addresses
239(10)
Subnetting Class B Addresses
249(7)
Troubleshooting IP Addressing
256(8)
Determining IP Address Problems
259(5)
Introduction to Network Address Translation (NAT)
264(4)
Types of Network Address Translation
265(1)
NAT Names
266(1)
How NAT Works
267(1)
Summary
268(1)
Exam Essentials
269(1)
Written Labs
269(2)
Review Questions
271(6)
Chapter 9 Introduction to IP Routing
277(20)
Routing Basics
278(3)
The IP Routing Process
281(6)
Testing Your IP Routing Understanding
287(1)
Static and Dynamic Routing
288(3)
Summary
291(1)
Exam Essentials
292(1)
Written Lab
292(1)
Review Questions
293(4)
Chapter 10 Routing Protocols
297(36)
Routing Protocol Basics
299(4)
Administrative Distances
300(2)
Classes of Routing Protocols
302(1)
Distance Vector Routing Protocols
303(10)
Routing Information Protocol (RIP)
305(1)
RIP Version 2 (RIPv2)
305(1)
VLSM and Discontiguous Networks
306(3)
EIGRP
309(2)
Border Gateway Protocol (BGP)
311(2)
Link State Routing Protocols
313(4)
Open Shortest Path First (OSPF)
314(2)
Intermediate System-to-Intermediate System (IS-IS)
316(1)
High Availability
317(7)
Hot Standby Router Protocol (HSRP)
319(5)
Virtual Router Redundancy Protocol
324(1)
IPv6 Routing Protocols
324(2)
RIPng
325(1)
EIGRPv6
325(1)
OSPFv3
325(1)
Summary
326(1)
Exam Essentials
326(1)
Written Lab
327(1)
Review Questions
328(5)
Chapter 11 Switching and Virtual LANs
333(44)
Networking Before Layer 2 Switching
335(3)
Switching Services
338(8)
Limitations of Layer 2 Switching
339(1)
Bridging vs LAN Switching
340(1)
Three Switch Functions at Layer 2
340(6)
Spanning Tree Protocol
346(3)
Spanning Tree Port States
347(1)
STP Convergence
347(1)
Rapid Spanning Tree Protocol 802.1w
348(1)
Virtual LANs
349(10)
VLAN Basics
350(3)
Quality of Service
353(1)
VLAN Memberships
354(1)
Static VLANs
354(1)
Dynamic VLANs
355(1)
Identifying VLANs
355(2)
VLAN Identification Methods
357(2)
VLAN Trunking Protocol
359(7)
VTP Modes of Operation
360(1)
Do We Really Need to Put an IP Address on a Switch?
361(2)
Port Security
363(1)
Port Bonding
364(2)
Two Additional Advanced Features of Switches
366(4)
Power over Ethernet (802.3af, 802.3at)
366(2)
Port Mirroring/Spanning (SPAN/RSPAN)
368(2)
Summary
370(1)
Exam Essentials
370(1)
Written Lab
371(1)
Review Questions
372(5)
Chapter 12 Wireless Networking
377(52)
Introduction to Wireless Technology
380(3)
The 802.11 Standards
383(6)
2.4GHz (802.11b)
384(1)
2.4GHz (802.11g)
385(1)
5GHz (802.11a)
386(1)
5GHz (802.11h)
387(1)
2.4GHz/5GHz (802.11n)
388(1)
5GHz (802.11ac)
389(1)
Comparing 802.11 Standards
389(2)
Range Comparisons
390(1)
Wireless Network Components
391(4)
Wireless Access Points
391(1)
Wireless Network Interface Card
392(1)
Wireless Antennas
393(2)
Installing a Wireless Network
395(13)
Ad Hoc Mode: Independent Basic Service Set
395(1)
Infrastructure Mode: Basic Service Set
396(2)
Wireless Controllers
398(1)
Mobile Hot Spots
399(1)
Signal Degradation
400(1)
Other Network Infrastructure Implementations
401(1)
Installing and Configuring WLAN Hardware
402(6)
Site Survey
408(4)
Wireless Security
412(10)
Wireless Threats
412(4)
Open Access
416(1)
Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication
416(1)
Remote Authentication Dial-In User Service (802.1x)
417(1)
Temporal Key Integrity Protocol
418(1)
Wi-Fi Protected Access or WPA2 Pre-Shared Key
419(3)
Summary
422(1)
Exam Essentials
423(1)
Written Lab
423(2)
Review Questions
425(4)
Chapter 13 Authentication and Access Control
429(40)
Security Filtering
431(16)
Access Control Lists
432(2)
Tunneling
434(6)
Encryption
440(5)
Remote Access
445(2)
Managing User Account and Password Security
447(8)
Managing User Accounts
448(2)
Managing Passwords
450(4)
Single Sign-On
454(1)
Multifactor Authentication
455(1)
User-Authentication Methods
455(9)
Public Key Infrastructure (PKI)
455(1)
Kerberos
456(2)
Authentication, Authorization, and Accounting (AAA)
458(1)
Web Services
459(1)
Unified Voice Services
460(1)
Network Controllers
460(1)
Network Access Control (NAC)
460(1)
Challenge Handshake Authentication Protocol (CHAP)
460(1)
MS-CHAP
461(1)
Extensible Authentication Protocol (EAP)
462(1)
Hashes
462(1)
Network Access Control
462(2)
Summary
464(1)
Exam Essentials
464(1)
Written Lab
465(1)
Review Questions
466(3)
Chapter 14 Network Threats and Mitigation
469(56)
Recognizing Security Threats
473(15)
Denial of Service
474(1)
Distributed DoS (DDoS)
475(8)
Authentication Issues
483(1)
Viruses
484(3)
Zero Day Attacks
487(1)
Insider Threat/Malicious Employee
487(1)
Vulnerabilities
488(11)
Unnecessary Running Services
488(1)
Open Ports
488(1)
Unpatched/Legacy Systems
488(1)
Unencrypted Channels
488(1)
Clear-Text Credentials
488(1)
TEMPEST/RF Emanation
489(1)
Malicious Users
489(1)
Buffer Overflow
490(1)
Wireless Threats
490(3)
Attackers and Their Tools
493(4)
Misconfiguration Issues
497(1)
Social Engineering (Phishing)
498(1)
Understanding Mitigation Techniques
499(4)
Active Detection
500(1)
Passive Detection
500(1)
Proactive Defense
500(1)
Basic Forensic Concepts
501(2)
Policies and Procedures
503(11)
Security Policies
504(5)
Security Training
509(1)
Patches and Upgrades
510(2)
Firmware Updates
512(1)
Driver Updates
512(1)
Upgrading vs Downgrading
513(1)
Anti-malware software
514(4)
Host-based
514(1)
Cloud/Server-based
514(1)
Configuration Backups
515(1)
Updating Antivirus Components
515(3)
Fixing an Infected Computer
518(1)
Summary
518(1)
Exam Essentials
518(1)
Written Lab
519(1)
Review Questions
520(5)
Chapter 15 Physical Security and Risk
525(48)
Using Hardware and Software Security Devices
527(2)
Defining Firewalls
529(1)
Network-Based Firewalls
530(1)
Host-Based Firewalls
530(1)
Firewall Technologies
530(10)
Access Control Lists
531(2)
Port Security
533(1)
Demilitarized Zone
534(1)
Protocol Switching
534(3)
Dynamic Packet Filtering
537(1)
Proxy Services
538(2)
Firewalls at the Application Layer vs the Network Layer
540(2)
Stateful vs Stateless Network Layer Firewalls
541(1)
Application Layer Firewalls
542(1)
Scanning Services and Other Firewall Features
542(5)
Content Filtering
544(1)
Signature Identification
544(1)
Context Awareness
544(1)
Virtual Wire vs Routed
545(1)
Zones
545(2)
Intrusion Detection and Prevention Systems
547(5)
Network-Based IDS
549(2)
Host-Based IDS
551(1)
Vulnerability Scanners
551(1)
VPN Concentrators
552(1)
Understanding Problems Affecting Device Security
553(13)
Physical Security
554(4)
Logical Security Configurations
558(2)
Risk-Related Concepts
560(6)
Summary
566(1)
Exam Essentials
566(1)
Written Lab
567(2)
Review Questions
569(4)
Chapter 16 Wide Area Networks
573(42)
What's a WAN?
577(5)
Defining WAN Terms
577(2)
The Public Switched Telephone Network
579(1)
WAN Connection Types
580(1)
Bandwidth or Speed
581(1)
T-Series Connections
582(2)
The T1 Connection
583(1)
The T3 Connection
584(1)
Transmission Media
584(4)
Wired Connections
585(1)
Wavelength Division Multiplexing
585(1)
Passive Optical Network
586(1)
Wireless Technologies
586(2)
Broadband Services
588(5)
DSL Technology and xDSL
589(2)
Cable Modem
591(2)
Wireless WAN Technologies
593(2)
Cellular WAN
593(2)
WAN Protocols
595(8)
Integrated Services Digital Network
595(1)
Frame Relay Technology
596(3)
Point-to-Point Protocol
599(3)
Asynchronous Transfer Mode
602(1)
MPLS
603(1)
WAN Troubleshooting
603(6)
Loss of Internet Connectivity
603(1)
Interface Errors/Monitoring
604(3)
Split Horizon
607(1)
DNS Issues
608(1)
Router Configurations
608(1)
Company Security Policy
609(1)
Summary
609(1)
Exam Essentials
609(1)
Written Lab
610(1)
Review Questions
611(4)
Chapter 17 Troubleshooting Tools
615(56)
Protocol Analyzers
616(2)
Throughput Testers
618(1)
Connectivity Software
619(1)
Using Traceroute
620(2)
Using ipconfig and ifconfig
622(5)
Using the ipconfig Utility
622(4)
Using the ifconfig Utility
626(1)
Using the ping Utility
627(3)
Using the Address Resolution Protocol
630(4)
The Windows ARP Table
630(1)
Using the arp Utility
631(3)
Using the nslookup Utility
634(2)
Resolving Names with the Hosts Table
636(1)
Using the Mtr Command (pathping)
637(1)
Using the route Command
638(3)
Using the route Command Options
639(2)
Some Examples of the route Command
641(1)
Using the nbtstat Utility
641(6)
The --a Switch
642(2)
The --A Switch
644(1)
The --c Switch
644(1)
The --n Switch
645(1)
The --r Switch
645(1)
The --R Switch
646(1)
The --S Switch
646(1)
The --s Switch
647(1)
Using the netstat Utility
647(8)
The --a Switch
650(1)
The --e Switch
651(1)
The --r Switch
652(1)
The --s Switch
652(1)
The --p Switch
652(2)
The --n Switch
654(1)
Using the File Transfer Protocol
655(5)
Starting FTP and Logging In to an FTP Server
656(2)
Downloading Files
658(2)
Uploading Files
660(1)
Using the Telnet Utility
660(2)
How to Enable Telnet in Windows
661(1)
Don't Use Telnet, Use Secure Shell
662(1)
Summary
662(1)
Exam Essentials
663(1)
Written Lab
663(2)
Review Questions
665(6)
Chapter 18 Software and Hardware Tools
671(40)
Understanding Network Scanners
673(8)
Packet Sniffers/Network Monitors
673(2)
Intrusion Detection and Prevention Software
675(2)
Port Scanners
677(3)
Wi-Fi Analyzer
680(1)
Baseline
681(2)
Network Monitoring and Logging
683(8)
Network Monitoring
683(1)
SNMP
684(1)
Syslog
685(2)
SIEM
687(3)
Utilization
690(1)
Identifying Hardware Tools
691(13)
Cable Testers
692(3)
Protocol Analyzer
695(1)
Certifiers
696(1)
Time-Domain Reflectometer
696(1)
Optical Time-Domain Reflectometer
697(1)
Multimeter
698(1)
Toner Probe
698(2)
Butt Set
700(1)
Punch-Down Tool
701(1)
Cable Stripper/Snips
702(1)
Voltage Event Recorder (Power)
702(1)
Environmental Monitors
703(1)
Summary
704(1)
Exam Essentials
704(1)
Written Lab
705(1)
Review Questions
706(5)
Chapter 19 Network Troubleshooting
711(44)
Narrowing Down the Problem
715(14)
Did You Check the Super Simple Stuff?
716(4)
Is Hardware or Software Causing the Problem?
720(1)
Is It a Workstation or a Server Problem?
721(1)
Which Segments of the Network Are Affected?
721(1)
Is It Bad Cabling?
722(7)
Troubleshooting Steps
729(17)
Step 1 Identify the Problem
729(4)
Step 2 Establish a Theory of Probable Cause
733(4)
Step 3 Test the Theory to Determine Cause
737(3)
Step 4 Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
740(1)
Step 5 Implement the Solution or Escalate as Necessary
741(3)
Step 6 Verify Full System Functionality, and If Applicable, Implement Preventative Measures
744(1)
Step 7 Document Findings, Actions, and Outcomes
745(1)
Troubleshooting Tips
746(3)
Don't Overlook the Small Stuff
746(1)
Prioritize Your Problems
746(1)
Check the Software Configuration
747(1)
Don't Overlook Physical Conditions
747(1)
Don't Overlook Cable Problems
748(1)
Check for Viruses
748(1)
Summary
749(1)
Exam Essentials
749(1)
Written Lab
750(1)
Review Questions
751(4)
Chapter 20 Management, Monitoring, and Optimization
755(58)
Managing Network Documentation
761(10)
Using SNMP
761(1)
Schematics and Diagrams
762(9)
Network Monitoring
771(12)
Baselines
771(1)
On-Boarding and Off-Boarding of Mobile Devices
771(1)
NAC
772(1)
Policies, Procedures, and Regulations
772(3)
Safety Practices
775(5)
Implementing Network Segmentation
780(3)
Network Optimization
783(22)
Reasons to Optimize Your Network's Performance
783(3)
How to Optimize Performance
786(2)
Unified Communications
788(1)
Traffic Shaping
788(1)
Load Balancing
789(1)
High Availability
789(1)
Caching Engines
789(1)
Fault Tolerance
790(1)
Archives/Backups
790(1)
Common Address Redundancy Protocol
791(1)
Virtual Networking
791(6)
Locating and Installing Equipment
797(6)
Change Management Procedures
803(2)
Summary
805(1)
Exam Essentials
806(1)
Written Lab
807(1)
Review Questions
808(5)
Appendix A Answers to the Written Labs
813(14)
Chapter 1
814(1)
Chapter 2
814(1)
Chapter 3
815(1)
Chapter 4
815(3)
Chapter 5
818(1)
Chapter 6
818(1)
Chapter 7
819(1)
Written Lab 7.1
819(1)
Written Lab 7.2
820(1)
Written Lab 7.3
820(1)
Chapter 8
820(1)
Chapter 9
821(1)
Chapter 10
821(1)
Chapter 11
822(1)
Chapter 12
822(1)
Chapter 13
823(1)
Chapter 14
823(1)
Chapter 15
824(1)
Chapter 16
824(1)
Chapter 17
825(1)
Chapter 18
825(1)
Chapter 19
825(1)
Chapter 20
826(1)
Appendix B Answers to Review Questions
827(30)
Chapter 1
828(1)
Chapter 2
829(1)
Chapter 3
830(2)
Chapter 4
832(1)
Chapter 5
833(1)
Chapter 6
834(1)
Chapter 7
835(2)
Chapter 8
837(2)
Chapter 9
839(1)
Chapter 10
840(2)
Chapter 11
842(1)
Chapter 12
843(2)
Chapter 13
845(1)
Chapter 14
846(2)
Chapter 15
848(1)
Chapter 16
849(2)
Chapter 17
851(1)
Chapter 18
852(1)
Chapter 19
853(2)
Chapter 20
855(2)
Appendix C Subnetting Class A
857(8)
Subnetting Practice Examples: Class A Addresses
858(3)
Practice Example #1A 255.255.0.0 (/16)
859(1)
Practice Example #2A 255.255.240.0 (/20)
859(1)
Practice Example #3A 255.255.255.192 (/26)
860(1)
Subnetting in Your Head: Class A Addresses
861(1)
Written Lab 1
861(1)
Written Lab 2
862(1)
Answers to Written Lab 1
863(1)
Answers to Written Lab 2
864(1)
Index 865
Todd Lammle, CompTIA Network+, CCSI, CCNA/CCNP, is the authority on network certification and internetworking. He is a world-renowned author, speaker, trainer, and consultant. Todd has over 25 years of experience working with LANs, WANs, and large licensed and unlicensed wireless networks. He's president and CEO of GlobalNet Training and Consulting, Inc., a network integration and training firm located in Boulder, Colorado; Dallas, Texas; and San Francisco, California. You can reach Todd through his forum at www.lammle.com/forum.