Atjaunināt sīkdatņu piekrišanu

E-grāmata: Mike Meyers' CompTIA Network+ Certification Passport, Sixth Edition (Exam N10-007)

4.50/5 (27 ratings by Goodreads)
  • Formāts: 528 pages
  • Izdošanas datums: 27-Jul-2018
  • Izdevniecība: McGraw-Hill Education
  • Valoda: eng
  • ISBN-13: 9781260121193
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 31,56 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 528 pages
  • Izdošanas datums: 27-Jul-2018
  • Izdevniecība: McGraw-Hill Education
  • Valoda: eng
  • ISBN-13: 9781260121193
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Up-to-date, focused coverage of every topic on the CompTIA Network+ exam N10-007

This quick review, cram-style test preparation guide covers 100% of objectives for the CompTIA Network+ exam N10-007. Written in the proven Passport format developed by training guru Mike Meyers, the book enables you to focus on specific topics, determine areas of need, and tailor an effective course for study.

Mike Meyers’ CompTIA Network+ Certification Passport, Sixth Edition (Exam N10-007) contains “Exam Tips” that highlight test topics, “Local Lingo” notes that define need-to-know terms, “Travel Advisories” that alert you to potential exam pitfalls, and “Travel Assistance” icons that point out additional resources. The book features end-of-chapter summaries, accurate practice questions, and in-depth answer explanations.

• CompTIA Approved Quality Content (CAQC) reviewed and approved
• Electronic content includes Total Seminar's Total Tester exam simulator with 200+ practice exam questions, a collection of Mike's favorite shareware and freeware networking utilities, and a video introduction to the CompTIA Network+ exam
• Includes a 10% discount voucher coupon for any CompTIA exam, a $27 value

Acknowledgments xxix
Check-In xxxi
1 Networking Concepts 1(150)
Objective 1.1 Explain the purposes and uses of ports and protocols
2(13)
Protocols and Ports
2(11)
Types of Ports
4(4)
Protocol Types
8(5)
Connection-Oriented vs. Connectionless
13(1)
Checkpoint
13(1)
Review Questions
14(1)
Review Answers
14(1)
Objective 1.2 Explain devices, applications, protocols, and services at their appropriate OSI layers
15(9)
The OSI Seven-Layer Model
15(7)
The Layers and What They Represent
16(6)
Using the Seven-Layer Model
22(1)
Checkpoint
22(1)
Review Questions
23(1)
Review Answers
23(1)
Objective 1.3 Explain the concepts and characteristics of routing and switching
24(43)
Properties of Network Traffic
24(7)
Broadcast domains
24(1)
CSMA/CD
25(1)
Collision domains
25(2)
CSMA/CA
27(1)
Protocol Data Units
28(1)
MTU
29(1)
Unicast/Broadcast/Multicast
30(1)
Segmentation and Interface Properties
31(11)
VLANs
31(1)
Trunking (802.1q)
32(2)
Tagging
34(1)
Port Mirroring
35(1)
Switching Loops/Spanning Tree
36(1)
Power over Ethernet
36(1)
DMZ and Firewall Placement
37(2)
MAC Address Table
39(1)
ARP Table
40(2)
Routing
42(7)
Distance Vector
43(1)
Link State
44(2)
Hybrid
46(2)
Routing Types
48(1)
IPv6 Concepts
49(3)
IPv6 Addressing
49(2)
Tunneling
51(1)
Neighbor Discovery/Router Advertisement
52(1)
Performance Concepts
52(2)
NAT/PAT
54(4)
Port Forwarding
58(2)
Access Control Lists
60(1)
Distributed Switching
61(1)
Packet-Switched vs. Circuit-Switched Network
61(1)
Software Defined Networking
62(1)
Checkpoint
63(3)
Review Questions
66(1)
Review Answers
66(1)
Objective 1.4 Given a scenario, configure the appropriate IP addressing components
67(28)
IP Address/Subnet Mask Pair
67(1)
Classful
68(2)
Loopback
70(1)
Reserved
70(1)
Private vs. Public
70(1)
Classless
71(8)
Subnetting
71(7)
VLSM
78(1)
Supernetting
79(1)
Default Gateway, Virtual IP
79(1)
Address Assignments
80(11)
Static
80(5)
DHCP
85(3)
IP Reservations
88(1)
APIPA
88(2)
DHCPv6
90(1)
EUI-64
91(1)
Checkpoint
91(3)
Review Questions
94(1)
Review Answers
94(1)
Objective 1.5 Compare and contrast the characteristics of network topologies, types, and technologies
95(17)
Wired Topologies
96(6)
Bus Topology
96(1)
Ring Topology
96(1)
Star Topology
97(2)
Logical vs. Physical
99(2)
Mesh Topology
101(1)
Wireless Topologies
102(1)
Mesh
102(1)
Ad Hoc and Infrastructure
102(1)
Network Types
103(3)
LAN
103(1)
WAN
103(1)
MAN
104(1)
CAN
104(1)
SAN
105(1)
WLAN
105(1)
PAN
105(1)
Technologies that Facilitate the Internet of Things (loT)
106(4)
Bluetooth
106(1)
NFC
107(1)
ANT+
107(1)
Z-Wave
108(1)
IR
108(1)
RFID
109(1)
802.11
109(1)
Checkpoint
110(1)
Review Questions
111(1)
Review Answers
111(1)
Objective 1.6 Given a scenario, implement the appropriate wireless technologies and configurations
112(16)
Wireless Basics
112(2)
802.11 Standards
114(1)
MIMO/MU-MIMO and Channel Bonding
115(1)
Speed and Distance Requirements
115(3)
Frequencies and Channel Bandwidth
116(2)
Cellular
118(2)
TDMA
119(1)
GSM/EDGE
119(1)
CDMA
119(1)
Unidirectional/Omnidirectional
120(4)
Site Surveys
124(3)
Checkpoint
127(1)
Review Questions
128(1)
Review Answers
128(1)
Objective 1.7 Summarize cloud concepts and their purposes
128(8)
Types of Services
129(2)
Software as a Service
129(1)
Platform as a Service
130(1)
Infrastructure as a Service
131(1)
Cloud Delivery Models
131(2)
Public Cloud
131(1)
Private Cloud
132(1)
Hybrid Cloud
132(1)
Connectivity Methods
133(1)
Security Implications/Considerations
133(1)
Relationship Between Local Resources and Cloud Resources
134(1)
Checkpoint
135(1)
Review Questions
135(1)
Review Answers
136(1)
Objective 1.8 Explain the functions of network services
136(15)
DNS Service
137(9)
Hierarchy
139(3)
Record Types
142(3)
Forward vs. Reverse Zone
145(1)
Internal vs. External DNS
145(1)
Third-Party/Cloud-Hosted DNS
146(1)
DHCP Service
146(2)
TTL
146(1)
IP Exclusions
147(1)
DHCP Relay/IP Helper
147(1)
NTP
148(1)
IPAM
148(1)
Checkpoint
148(1)
Review Questions
149(1)
Review Answers
150(1)
2 Infrastructure 151(112)
Objective 2.1 Given a scenario, deploy the appropriate cabling solution
152(26)
Media Types and Connector Types
152(10)
Copper
153(6)
Fiber
159(3)
Transceivers
162(1)
GBIC
162(1)
SFP, SPF+
162(1)
Characteristics of Fiber Transceivers
162(1)
QSFP
163(1)
Termination Points
163(2)
Patch Panel
163(2)
Fiber Distribution Panel
165(1)
66 Block
165(1)
110 Block
165(1)
Copper Termination Standards
165(3)
TIA/EIA 568A and TIA/EIA 568B
165(1)
Straight-through and Crossover Cables
166(2)
Copper Cable Standards
168(2)
Coax Standards
168(1)
UTP Standards
169(1)
Ethernet Deployment Standards
170(7)
100BaseT
171(2)
1000BaseT
173(1)
1000BaseLX
174(1)
1000BaseSX
174(1)
10GBaseT
174(3)
Checkpoint
177(1)
Review Questions
177(1)
Review Answers
178(1)
Objective 2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them
178(15)
Firewall
179(2)
Router
181(4)
Routing Tables
182(3)
Hub
185(1)
Switch
186(1)
Bridge
187(1)
Modems
188(1)
Wireless Access Point
189(1)
Media Converter
190(1)
Wireless Range Extender
191(1)
VoIP Endpoint
191(1)
Checkpoint
191(1)
Review Questions
192(1)
Review Answers
192(1)
Objective 2.3 Explain the purposes and use cases for advanced networking devices
193(14)
Multilayer Switch
193(1)
Wireless Controller
194(2)
Load Balancer
196(1)
Content Filter
196(1)
IDS/IPS
197(2)
Proxy Server
199(3)
VPN Concentrator
202(1)
AAA/RADIUS Server
202(1)
UTM Appliance
203(1)
NGFW/Layer 7 Firewall
203(1)
VoIP PBX
204(1)
VoIP Gateway
205(1)
Checkpoint
205(1)
Review Questions
206(1)
Review Answers
206(1)
Objective 2.4 Explain the purposes of virtualization and network storage technologies
207(14)
Virtual Networking Components
207(11)
Hypervisor
207(8)
Virtual NIC
215(1)
Virtual Switch
216(1)
Virtual Router
217(1)
Virtual Firewall
217(1)
SAN
218(1)
Fibre Channel, FCoE
218(1)
iSCSI
219(1)
InfiniBand
219(1)
Jumbo Frames
219(1)
NAS
219(1)
Checkpoint
220(1)
Review Questions
220(1)
Review Answers
221(1)
Objective 2.5 Compare and contrast WAN technologies
221(42)
Telephony and Beyond
221(9)
The Dawn of Long Distance
223(5)
Digital Telephony
228(2)
Service Type
230(17)
T1/T3
230(2)
E1/E3
232(1)
ISDN
233(2)
OC-3 - OC-192
235(2)
Dial-Up
237(5)
Cable Broadband
242(1)
DSL
243(4)
Metropolitan Ethernet
247(1)
Characteristics of Service
247(7)
Frame Relay
247(1)
ATM
248(1)
MPLS
248(4)
PPP
252(1)
PPPoE
252(1)
DMVPN
252(1)
SIP Trunk
253(1)
Termination
254(6)
Demarcation Point
254(4)
Smart Jack
258(1)
CSU/DSU
258(2)
Transmission Mediums
260(1)
Satellite
260(1)
Wireless
261(1)
Fiber
261(1)
Copper
261(1)
Checkpoint
261(1)
Review Questions
262(1)
Review Answers
262(1)
3 Network Operations 263(78)
Objective 3.1 Given a scenario, use appropriate documentation and diagrams to manage the network
264(10)
Diagram Symbols
264(1)
Standard Operating Procedures/Work Instructions
264(1)
Logical vs. Physical Diagrams
265(1)
Change Management Documentation
265(2)
Initiating the Change
266(1)
Dealing with the Change Management Team
266(1)
Making the Change Happen
266(1)
Documenting the Change
267(1)
IDF/MDF Documentation and Rack Diagrams
267(2)
Wiring and Port Locations, Labeling
269(2)
Network Configuration and Performance Baselines
271(1)
Inventory Management
272(1)
Checkpoint
272(1)
Review Questions
273(1)
Review Answers
273(1)
Objective 3.2 Compare and contrast business continuity and disaster recovery concepts
274(11)
Availability Concepts
274(5)
Fault Tolerance
274(1)
High Availability
275(1)
Load Balancing, Clustering
275(1)
NIC Teaming and Port Aggregation
276(1)
Power Management
277(2)
Recovery
279(3)
Cold Sites
279(1)
Warm Sites
280(1)
Hot Sites
280(1)
Backups
280(1)
Snapshots
281(1)
MTBF
282(1)
MTTR
282(1)
SLA Requirements
283(1)
Checkpoint
283(1)
Review Questions
284(1)
Review Answers
285(1)
Objective 3.3 Explain common scanning, monitoring and patching processes, and summarize their expected outputs
285(19)
Processes
286(9)
Log Reviewing
286(1)
Port Scanning
287(1)
Vulnerability Scanning
287(2)
Patch Management
289(2)
Reviewing Baselines
291(1)
Packet/Traffic Analysis
291(4)
Event Management
295(1)
SIEM, Notifications, Alerts
295(1)
SNMP Monitors
296(4)
Metrics
300(3)
Error Rate
300(1)
Utilization
300(1)
Packet Drops
300(1)
Bandwidth/Throughput
301(2)
Checkpoint
303(1)
Review Questions
304(1)
Review Answers
304(1)
Objective 3.4 Given a scenario, use remote access methods
304(23)
VPN
305(3)
IPsec
307(1)
SSL/TLS/DTLS
307(1)
Client-to-Site and Site-to-Site
308(1)
RDP
308(1)
VNC
308(1)
Telnet
309(5)
SSH
313(1)
Remote File Access
314(4)
FTP
314(3)
FTPS
317(1)
SFTP
317(1)
TFTP
318(1)
Out-of-Band Management
318(5)
Console Router
318(4)
Modem
322(1)
HTTPS/Management URL
323(2)
Other Connection Methods
325(1)
Checkpoint
325(1)
Review Questions
326(1)
Review Answers
326(1)
Objective 3.5 Identify policies and best practices
327(14)
Privileged User Agreement
327(1)
Password Policy
327(1)
On-boarding/Off-boarding Procedures
328(1)
Licensing Restrictions
328(1)
International Export Controls
328(1)
Data Loss Prevention
329(1)
Remote Access Policies
329(1)
Incident Response Policies
329(1)
BYOD
329(1)
AUP
330(1)
NDA
331(1)
System Life Cycle
331(1)
Asset Disposal
331(1)
Safety Procedures and Policies
332(5)
Electrical Safety
332(1)
Physical/Installation Safety
333(1)
Rack Installation and Maintenance
334(2)
Emergency Procedures
336(1)
Checkpoint
337(1)
Review Questions
338(1)
Review Answers
339(2)
4 Network Security 341(68)
Objective 4.1 Summarize the purposes of physical security devices
342(4)
Detection
342(1)
Video Surveillance and Motion Detection
342(1)
Asset Tracking Tags
343(1)
Tamper Detection
343(1)
Prevention
343(2)
Badges
343(1)
Key Fob
343(1)
Smart Cards
344(1)
Biometrics
344(1)
Locks
344(1)
Checkpoint
345(1)
Review Questions
345(1)
Review Answers
346(1)
Objective 4.2 Explain authentication and access controls
346(18)
Authentication, Authorization, and Accounting
346(9)
RADIUS
348(1)
TACACS+
349(1)
Kerberos and Single Sign-on
350(2)
Local Authentication
352(1)
LDAP
352(1)
Certificates
353(2)
Auditing and Logging
355(1)
Multifactor Authentication
355(2)
EAP
356(1)
Access Control
357(5)
802.1X
357(2)
NAC
359(1)
Port Security
359(1)
MAC Filtering
360(1)
Captive Portal
361(1)
Access Control Lists
361(1)
Checkpoint
362(1)
Review Questions
363(1)
Review Answers
364(1)
Objective 4.3 Given a scenario, secure a basic wireless network
364(6)
WPA and TKIP-RC4
366(1)
WPA2 and CCMP-AES
366(1)
Authentication and Authorization
367(1)
Shared or Open
367(1)
Pre-shared Key
368(1)
MAC Filtering
368(1)
Geofencing
368(1)
Checkpoint
369(1)
Review Questions
369(1)
Review Answers
370(1)
Objective 4.4 Summarize common networking attacks
370(15)
Exploits vs. Vulnerabilities
370(1)
Denial of Service
371(2)
Reflective
372(1)
Amplified
372(1)
Distributed
372(1)
Social Engineering
373(1)
Phishing
374(1)
Insider Threat
374(1)
Trusted and Untrusted Users
374(1)
Malicious Users
375(1)
Logic Bomb
375(1)
Rogue Access Point and Evil Twin
376(1)
War Driving
376(1)
Ransomware
377(1)
DNS Poisoning
377(1)
ARP Poisoning
378(2)
Spoofing
380(1)
Deauthentication
380(1)
Brute Force
381(1)
VLAN Hopping
381(1)
Man-in-the-Middle
382(1)
Checkpoint
382(2)
Review Questions
384(1)
Review Answers
384(1)
Objective 4.5 Given a scenario, implement network device hardening
385(9)
Changing Default Credentials
385(1)
Avoiding Common Passwords
385(1)
Upgrading Firmware
386(1)
Patching and Updates
386(1)
File Hashing
387(1)
Disabling Unnecessary Services, Disabling Unused Ports
388(2)
Using Secure Protocols
390(1)
Generating New Keys
390(3)
Checkpoint
393(1)
Review Questions
393(1)
Review Answers
394(1)
Objective 4.6 Explain common mitigation techniques and their purposes
394(15)
Signature Management
394(1)
Device Hardening
395(1)
Change Native VLAN
395(1)
Switch Port Protection
396(6)
Spanning Tree
396(1)
BPDU Guard
397(1)
Root Guard
397(1)
Flood Guard
398(1)
DHCP Snooping
399(3)
Network Segmentation
402(1)
DMZ
402(1)
VLAN
402(1)
Privileged User Account
403(1)
Role Separation
403(1)
File Integrity Monitoring
403(1)
Restricting Access via ACLs
404(1)
Honeypot/Honeynet
404(1)
Penetration Testing
405(1)
Checkpoint
406(1)
Review Questions
407(1)
Review Answers
407(2)
5 Network Operations 409(52)
Objective 5.1 Explain the network troubleshooting methodology
410(10)
Identify the Problem
411(2)
Gather Information, Duplicate the Problem, Question Users, and Identify Symptoms
411(1)
Determine If Anything Has Changed
412(1)
Approach Multiple Problems Individually
413(1)
Establish a Theory of Probable Cause
413(2)
Test the Theory to Determine Cause
415(1)
Establish a Plan of Action and Identify Potential Effects
416(1)
Implement the Solution or Escalate as Necessary
416(1)
Verify Full System Functionality and Implement Preventative Measures
417(1)
Document Findings, Actions, and Outcomes
418(1)
Checkpoint
418(1)
Review Questions
419(1)
Review Answers
420(1)
Objective 5.2 Given a scenario, use the appropriate tool
420(18)
Hardware Tools
421(6)
Crimper
421(1)
Cable Tester and OTDR
422(2)
Punchdown Tool
424(1)
Light Meter
424(2)
Tone Generator
426(1)
Loopback Adapter
426(1)
Multimeter
427(1)
Spectrum Analyzer
427(1)
Software Tools
427(9)
Packet Sniffer
428(1)
Port Scanner
428(1)
Wi-Fi Analyzer
428(1)
Bandwidth Speed Tester
429(1)
Command Line
429(7)
Checkpoint
436(1)
Review Questions
437(1)
Review Answers
437(1)
Objective 5.3 Given a scenario, troubleshoot common wired connectivity and performance issues
438(8)
Attenuation
438(1)
Crosstalk
438(2)
Latency
440(1)
Jitter
440(1)
EMI
441(1)
Open/Short and Bent Pins
441(1)
Incorrect Pin-out
441(1)
Incorrect Cable Type
442(1)
Bad Port
442(1)
Transceiver Mismatch
442(1)
TX/RX Reverse
442(1)
Duplex/Speed Mismatch
443(1)
Damaged Cables
443(1)
Bottlenecks
443(1)
ULAN Mismatch
444(1)
Network Connection LED Status Indicators
444(1)
Checkpoint
444(1)
Review Questions
445(1)
Review Answers
445(1)
Objective 5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues
446(7)
Reflection
446(1)
Refraction
446(1)
Absorption
446(1)
Latency, Jitter, and Attenuation
447(1)
Incorrect Antenna Type
447(1)
Interference and Signal-to-Noise Ratio
447(2)
Incorrect Antenna Placement
449(1)
Channel Overlap and Frequency Mismatch
449(1)
Overcapacity
449(1)
Distance Limitations
450(1)
Wrong SSID
450(1)
Wrong Passphrase
450(1)
Security Type Mismatch
450(1)
Power Levels
451(1)
Checkpoint
452(1)
Review Questions
452(1)
Review Answers
453(1)
Objective 5.5 Given a scenario, troubleshoot common network service issues
453(8)
Names Not Resolving
453(1)
Incorrect Gateway
454(1)
Incorrect Netmask
454(1)
Duplicate IP Addresses
454(1)
Duplicate MAC Addresses
454(1)
Expired IP Address
455(1)
Rogue DHCP Server
455(1)
Untrusted SSL Certificate
455(1)
Incorrect Time
455(1)
Exhausted DHCP Scope
456(1)
Incorrect ACL Settings and Blocked TCP/UDP Ports
456(1)
Incorrect Host-Based Firewall Settings
457(1)
Unresponsive Service
457(1)
Hardware Failure
457(1)
Checkpoint
458(1)
Review Questions
458(1)
Review Answers
459(2)
A Career Flight Path 461(2)
CompTIA Certifications
461(1)
Cisco Certifications
461(1)
Microsoft Certifications
462(1)
B About the Online Content 463(6)
System Requirements
463(1)
Your Total Seminars Training Hub Account
463(1)
Single User License Terms and Conditions
464(1)
TotalTester Online
465(1)
Assessment Test
466(1)
TotalSims for Network+
466(1)
Mike's Video Training
466(1)
Playing the Mike Meyers Introduction Video
467(1)
Mike's Cool Tools
467(1)
Technical Support
467(2)
Index 469
Michael Meyers, MCP, CompTIA A+, CompTIA Network+, CompTIA Security+ (Houston, TX), is one of the industry's leading authorities on CompTIA certification. He is the president and founder and Total Seminars, LLC, a major provider of PC and network repair seminars for thousands of organizations including IBM, Lucent Technologies, GE, the FBI, the FAA and the United Nations. Mike is the best-selling author of the A+ Certification All-in-One Exam Guide.





Jonathan S. Weissman, CompTIA A+, CompTIA Network+, CompTIA Security+, CompTIA Server+, CompTIA Linux+, CCNP, CCNA, CEH, CHFI, is a senior lecturer at Rochester Institute of Technology as well as an associate professor and Networking and Cybersecurity program coordinator at Finger Lakes Community College. He is the recipient of ten teaching awards and honors. He is the co-author of Mike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Fifth Edition and Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601), and is the technical editor for many other books. Weissman regularly appears on TV news and talk radio, and in articles, as a networking and cybersecurity expert. Additionally, he presents at conferences and in webinars, runs workshops, and appears in podcasts. He has a masters degree in Computer Science from Brooklyn College and holds 44 industry certifications. @CSCPROF on Twitter.