Log in Sign up
Trang chủeBookI'm a student I'm an educator CompTIA Network+ N10-008 Exam Cram, 7th edition
I'm a student I'm an educator  CompTIA Network+ N10-008 Exam Cram, 7th edition

I'm a student I'm an educator CompTIA Network+ N10-008 Exam Cram, 7th edition

BRAND: PEARSON
Publisher:
PEARSON
Author:
Emmett Dulaney
Edition:
(August 24, 2021) © 2022
eBook ISBN:
9780137375707
Print ISBN:
9780137375769
Type:
1 Year Subscription. Dành cho Cá nhân
eBook edition. 1 Year Subscription. Dành cho Cá nhân | Trường ĐH, Nhóm, Thư Viện: Gọi 0915920514 để báo giá Pearson, Vital Source eBook hoặc mua Sách In

Tổng quan sách

CompTIA® Network+ N10-008 Exam Cram, Phiên bản thứ bảy là hướng dẫn học tập hoàn hảo giúp sinh viên vượt qua kỳ thi CompTIA's Network+ N10-008. Nó cung cấp các câu hỏi bao quát và thực hành cho mọi chủ đề thi, bao gồm cả những nội dung mới đáng kể. Cuốn sách giới thiệu cho người đọc một quy trình chuẩn bị bài kiểm tra có tổ chức thông qua việc sử dụng các yếu tố và kỹ thuật trong chuỗi đã được chứng minh. Danh sách chủ đề thi làm cho việc tham khảo dễ dàng. Cảnh báo bài kiểm tra, Thanh bên và Ghi chú xen kẽ trong suốt văn bản giúp học sinh tập trung vào những gì họ cần biết. Cram Quizzes giúp các em đánh giá kiến ​​thức của mình và thẻ xé Cram Sheet là bài ôn tập hoàn hảo vào phút chót.
  1. Introduction
  2. CHAPTER 1:Network Technologies, Topologies, and TypesWired and Wireless Network Topologies Bus Topology Ring Topology Star Topology (Hub-and-Spoke) Mesh Topology Hybrid Topology Bringing Wireless to a Topology Infrastructure Wireless Topology Ad Hoc Wireless Topology Wireless Mesh TopologyNetwork Types and Characteristics To Server or Not LANs WLANs WANs MANs CANs SANs PANs SDWANs MPLS mGRENetwork Links and Concepts DSL Internet Access Cable Broadband The Public Switched Telephone Network Leased Lines T3 Lines Metro-Optical Satellite Internet Access Termination Points Demarc, Demarc Extension, and Smart Jacks CSUs/DSUs Verify Wiring Installation and Termination Virtual NetworkingWhat's Next?
  3. CHAPTER 2:Models, Ports, Protocols, and Network ServicesThe OSI Networking Model The OSI Seven-Layer Model Physical Layer (Layer 1) Data Link Layer (Layer 2) Network Layer (Layer 3) Transport Layer (Layer 4) Session Layer (Layer 5) Presentation Layer (Layer 6) Application Layer (Layer 7) OSI Model Summary Comparing OSI to the Four-Layer TCP/IP Model Identifying the OSI Layers at Which Various Network Components Operate Data Encapsulation/Decapsulation and OSIPorts and Protocols Connection-Oriented Protocols Versus Connectionless Protocols Internet Protocol Transmission Control Protocol How TCP Works User Datagram Protocol Internet Control Message Protocol IPSec Generic Routing Encapsulation File Transfer Protocol Secure Shell Secure File Transfer Protocol Telnet Simple Mail Transfer Protocol Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Trivial File Transfer Protocol Hypertext Transfer Protocol Network Time Protocol (NTP) Post Office Protocol Version 3/Internet Message Access Protocol Version 4 Simple Network Management Protocol Components of SNMP SNMP Management Systems SNMP Agents Management Information Bases SNMP Communities SNMPv3 Lightweight Directory Access Protocol Hypertext Transfer Protocol Secure Server Message Block Syslog SMTP TLS LDAPS IMAP over SSL POP3 over SSL SQL, SQLnet, and MySQL Remote Desktop Protocol Session Initiation Protocol Understanding Port FunctionsNetwork Services Domain Name Service (DNS) The DNS Namespace Types of DNS Entries DNS Records DNS in a Practical Implementation Dynamic Host Configuration Protocol The DHCP Process DHCP and DNS Suffixes DHCP Relays and IP Helpers Network Time ProtocolWhat's Next?
  4. CHAPTER 3:Addressing, Routing, and SwitchingIP Addressing IPv4 IP Address Classes Subnet Mask Assignment Subnetting Identifying the Differences Between IPv4 Public and Private Networks Private Address Ranges Classless Interdomain Routing Default Gateways Virtual IP IPv4 Address Types Unicast Address Broadcast Address Multicast IPv6 Addressing Where Have All the IPv4 Addresses Gone? Identifying IPv6 Addresses IPv6 Address Types Global Unicast Addresses Link-Local Addresses Site-Local Addresses Neighbor Discovery Comparing IPv4 and IPv6 Addressing Assigning IP Addresses Static Addressing Dynamic Addressing BOOT Protocol (BOOTP) Automatic Private IP Addressing Identifying MAC Addresses NAT and PAT NAT PAT SNAT DNATManaging Routing and Switching The Default Gateway Routing Tables Static Routing Default Route Switching Methods Packet Switching Circuit Switching Comparing Switching Methods Dynamic Routing Distance-Vector Routing Link-State Routing Hybrid Routing Protocols Network Traffic Routing Metrics Virtual Local-Area Networks VLAN Membership VLAN Segmentation The Spanning Tree Protocol Interface Configuration and Switch Management MDI-X Trunking Port Mirroring Port Authentication Power over Ethernet (PoE and PoE+) MAC Address Table Switch Management Managed and Unmanaged Quality of Service Traffic Shaping Access Control Lists ARP and RARPWhat's Next?
  5. CHAPTER 4:Network ImplementationsCommon Networking Devices Firewall IDS/IPS Router Switch Hub and Switch Cabling Multilayer Switch Hub Bridge DSL and Cable Modems Access Point Media Converter Voice Gateway Repeater Wireless LAN Controller Load Balancer Proxy Server VPN Concentrators and Headends Networked DevicesNetworking Architecture Three-Tiered Architecture Core Layer Distribution/Aggregation Layer Access/Edge Layer Software-Defined Networking Application Layer Control Layer Infrastructure Layer Management Plane Spine and Leaf Traffic Flows Datacenter Location Types Storage-Area Networks iSCSI Fibre Channel and FCoE Network-Attached StorageWhat's Next?
  6. CHAPTER 5:Cabling Solutions and IssuesGeneral Media Considerations Broadband Versus Baseband Transmissions Simplex, Half-Duplex, and Full-Duplex Modes Data Transmission Rates Types of Network Media Twisted-Pair Cabling (Copper) Coaxial Cables Twinaxial Cables Fiber-Optic Cables Plenum Versus PVC Cables Types of Media Connectors BNC Connectors RJ-11 Connectors RJ-45 Connectors F-Type Connectors and RG-59 and RG-6 Cables Fiber Connectors Transceivers Media Couplers/Converters TIA/EIA 568A and 568B Wiring Standards Straight-Through Versus Crossover Cables Rollover and Loopback Cables Components of Wiring Distribution Network Cross-Connects Horizontal Cabling Vertical Cables Patch Panels Fiber Distribution Panels 66 and 110 Blocks (T568A, T568B) MDF and IDF Wiring Closets Ethernet Copper and Fiber Standards 10BASE-T 100BASE-TX 1000BASE-T 10GBASE-T 40GBASE-T 1000BASE-LX and 1000BASE-SX 10GBASE-LR and 10GBASE-SR Multiplexing OptionsTroubleshooting Common Cable Connectivity IssuesLimitations, Considerations, and Issues Throughput, Speed, and Distance Cabling Specifications/Limitations Cabling Considerations Cabling Applications Attenuation and dB Loss Interference Incorrect Pinout Bad Ports Open/Short LED Status Indicators Incorrect Transceivers Duplexing Issues TX/RX Reversed Dirty Optical CablesCommon Tools Cable Crimpers, Strippers, and Snips/Cutters Punchdown Tools Tone Generator Loopback Adapter OTDR Multimeter Cable Tester Wire Map Tap Fusion Splicer Spectrum Analyzer Fiber Light MeterWhat's Next?
  7. CHAPTER 6:Wireless Solutions and IssuesUnderstanding Wireless Basics Wireless Channels and Frequencies Cellular Technology Access Speed, Distance, and Bandwidth Channel Bonding MIMO/MU-MIMO/Directional/Omnidirectional Antenna Ratings Antenna Coverage Establishing Communications Between Wireless Devices Configuring the Wireless ConnectionTroubleshooting Wireless Issues Site Surveys Factors Affecting Wireless Signals Interference Reflection, Refraction, and AbsorptionTroubleshooting AP CoverageWhat's Next?
  8. CHAPTER 7:Cloud Computing Concepts and OptionsCloud Concepts Service Models Software as a Service Platform as a Service Infrastructure as a Service Desktop as a Service Deployment Models Private Cloud Public Cloud Hybrid and Community Clouds Infrastructure as Code Connectivity Options Multitenancy Elasticity Scalability Security Implications The Relationship Between ResourcesWhat's Next?
  9. CHAPTER 8:Network OperationsOrganizational Documents and Policies Wiring and Port Locations Troubleshooting Using Wiring Schematics Physical and Logical Network Diagrams Baseline Configurations Policies, Procedures, Configurations, and Regulations Policies Password-Related Policies Procedures Change Management Documentation Configuration Documentation Regulations LabelingHigh Availability and Disaster Recovery Backups Full Backups Differential Backups Incremental Backups Snapshots Backup Best Practices Using Uninterruptible Power Supplies Why Use a UPS? Power Threats Beyond the UPS Cold, Warm, Hot, and Cloud Sites High Availability and Recovery Concepts Active-Active Versus Active-PassiveMonitoring Network Performance Common Performance Metrics SNMP Monitors Management Information Base (MIB) Network Performance, Load, and Stress Testing Performance Tests Load Tests and Send/Receive Traffic Stress Tests Performance Metrics Network Device Logs Security Logs Application Log System Logs History Logs Log Management Patch Management Environmental FactorsWhat's Next?
  10. CHAPTER 9:Network SecurityCommon Security Concepts Access Control Mandatory Access Control Discretionary Access Control Rule-Based Access Control Role-Based Access Control Defense in Depth Network Segmentation Screened Subnet Separation of Duties Honeypots RADIUS and TACACS+ Kerberos Authentication Local Authentication Lightweight Directory Access Protocol Using Certificates Auditing and Logging Multifactor Authentication Factors Additional Access Control Methods 802.1X Extensible Authentication Protocol (EAP) Network Access Control (NAC) MAC Filtering Risk Management Penetration Testing Security Information and Event ManagementCommon Networking Attacks Denial-of-Service and Distributed Denial-of-Service Attacks Types of DoS Attacks Other Common Attacks Social Engineering Logic Bomb Rogue DHCP Rogue Access Points and Evil Twins Advertising Wireless Weaknesses Phishing Ransomware DNS Poisoning ARP Cache Poisoning Spoofing Deauthentication Brute Force On-Path Attack VLAN Hopping ARP Spoofing Vulnerabilities and PreventionNetwork Hardening and Physical Security Disposing of Assets Implementing Physical Security Lock and Key Swipe Card and PIN Access Biometrics Two-Factor and Multifactor Authentication Secured Versus Unsecured Protocols Hardening Best Practices Wireless Security MAC Filtering Antenna Placement and Power Levels Isolation Preshared Keys Geofencing Captive Portal IoT Access ConsiderationsRemote-Access Methods Remote File Access VPNs Components of the VPN Connection VPN Connection Types VPN Pros and Cons IPSec SSL/TLS/DTLS Site-to-Site and Client-to-Site Virtual Desktops HTTPS/Management URL Authentication and Authorization Considerations Out-of-Band ManagementWhat's Next?
  11. CHAPTER 10:Network TroubleshootingTroubleshooting Steps and Procedures Identify the Problem Identify Symptoms Determine Whether Anything Has Changed Duplicate the Problem if Possible Approach Multiple Problems Individually Establish a Theory of Probable Cause Test the Theory to Determine the Cause Establish a Plan of Action Implement the Solution or Escalate Determine Whether Escalation Is Necessary Verify Full System Functionality Document Findings, Actions, Outcomes, and LessonsSoftware Troubleshooting Tools Wi-Fi Analyzer Protocol Analyzer Bandwidth Speed Tester Port Scanner iperf NetFlow Analyzer TFTP Server Terminal Emulator IP Scanner Command-Line Tools The Trace Route Utility (tracert/traceroute) ping The Destination Host Unreachable Message The Request Timed Out Message The Unknown Host Message The Expired TTL Message Troubleshooting with ping hostname ARP arp ping The netstat Command netstat -e netstat -a netstat -r netstat -s telnet ipconfig ifconfig nslookup dig The tcpdump Command The route Utility nmap Basic Network Platform CommandsTroubleshooting General Networking Issues Common Considerations Common Problems to Be Aware Of Collisions Broadcast Storm Multicast Flooding Asymmetrical Routing Switching Loops Routing Loops Missing Route Low Optical Link Budget Incorrect VLAN DNS Issues Incorrect Gateway Incorrect Subnet Mask Duplicate or Incorrect IP Address Duplicate MAC Addresses Expired IP Address Rogue DHCP Server Certificate Issues NTP Issues/Incorrect Time DHCP Scope Exhaustion Blocked Ports, Services, or Addresses Incorrect Firewall Settings Incorrect ACL Settings Unresponsive Service BYOD Challenges Licensed Feature Issues Hardware Failure Network Performance IssuesWhat's Next?Glossary
Chat Zalo