Nicht aus der Schweiz? Besuchen Sie lehmanns.de
CompTIA Network+ N10-006 Exam Cram - Emmett Dulaney

CompTIA Network+ N10-006 Exam Cram

Emmett Dulaney (Autor)

Media-Kombination
656 Seiten
2015 | 5th edition
Pearson IT Certification
978-0-7897-5410-3 (ISBN)
CHF 76,10 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Prepare for CompTIA Network+ N10-006 exam success with this CompTIA authorized Exam Cram from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner.

 




CompTIA® Network+ N10-006 Exam Cram, Fifth Edition is the perfect study guide to help you pass the CompTIA Network+ N10-006 exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of security, cloud networking, IPv6, and wireless technologies. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, sidebars, and Notes interspersed throughout the text keep you focused on what you need to know. Cram Quizzes help you assess your knowledge, and the Cram Sheet tear card is the perfect last-minute review.




Covers the critical information you’ll need to know to score higher on your CompTIA Network+ (N10-006) exam!




--Understand modern network topologies, protocols, and infrastructure

--Implement networks based on specific requirements

--Install and configure DNS and DHCP

--Monitor and analyze network traffic

--Understand IPv6 and IPv4 addressing, routing, and switching

--Perform basic router/switch installation and configuration

--Explain network device functions in cloud environments

--Efficiently implement and troubleshoot WANs

--Install, configure, secure, and troubleshoot wireless networks

--Apply patches/updates, and support change/configuration management

--Describe unified communication technologies

--Segment and optimize networks

--Identify risks/threats, enforce policies and physical security, configure firewalls, and control access

--Understand essential network forensics concepts

--Troubleshoot routers, switches, wiring, connectivity, and security

 






Companion CD



The companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.

 

Pearson IT Certification Practice Test minimum system requirements:

Windows XP (SP3), Windows Vista (SP2), Windows 7, or Windows 8.1; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512MB RAM; 650MB disk space plus 50MB for each downloaded practice exam; access to the Internet to register and download exam databases

 

Emmett Dulaney (CompTIA Network+, Cloud+, Security+, A+, and others) is the author of numerous books on certifications and operating systems. He is a columnist for Certification Magazine and Campus Technology. He is also an associate professor at a small university and the author of the CompTIA A+ Complete Study Guide and the CompTIA Security+ Study Guide.   Mike Harwood (MCSE, A+, Network+, Server+, Linux+) has more than 14 years of experience in information technology and related fields. He has held a number of roles in the IT field, including network administrator, instructor, technical writer, website designer, consultant, and online marketing strategist. Mike has been a regular on-air technology contributor for CBC radio and has coauthored numerous computer books, including the Network+ Exam Cram published by Pearson.

Introduction

CHAPTER 1 Introduction to Networking

LANs, WANs, MANs, SCADA/ICS, Medianets, and Network Models

    LANs

    WANs

    MANs

    SCADA/ICS

    Medianets

    Network Models

    Centralized Versus Distributed Computing

Network Topologies

    Bus Topology

    Ring Topology

    Star Topology

    Wired Mesh Topology

    Wireless Topologies

    Point-to-Point, Point-to-Multipoint, and Wireless Mesh Topologies

    Hybrid Topologies

Creating a SOHO Network

What’s Next?

CHAPTER 2 The OSI Model and Networking Protocols

The Networking Models

    The OSI Seven-Layer Model

    The TCP/IP Four-Layer Model

    Identifying the OSI Layers at Which Various Network Components Operate

Dynamic Host Configuration Protocol (DHCP)

    The DHCP Process

    DHCP and DNS Suffixes

    DHCP Relays and IP Helpers

Domain Name Service (DNS)

    The DNS Namespace

    Types of DNS Entries

    DNS Records

    DNS in a Practical Implementation

Simple Network Management Protocol (SNMP)

    Components of SNMP

    SNMP Management Systems

    SNMP Agents

    Management Information Bases

    SNMP Communities

    SNMPv3

Protocols

    Connection-Oriented Protocols Versus Connectionless Protocols

    Internet Protocol

    Transmission Control Protocol

    User Datagram Protocol

    File Transfer Protocol

    Secure File Transfer Protocol

    Trivial File Transfer Protocol

    Simple Mail Transfer Protocol

    Hypertext Transfer Protocol

    Hypertext Transfer Protocol Secure

    Post Office Protocol Version 3/Internet Message Access Protocol Version 4

    Telnet

    Secure Shell

    Internet Control Message Protocol

    Address Resolution Protocol/Reverse Address Resolution Protocol

    Network Time Protocol

    Network News Transfer Protocol

    Secure Copy Protocol

    Lightweight Directory Access Protocol

    Internet Group Management Protocol

    Transport Layer Security

    Session Initiation Protocol/Real-Time Transport Protocol

    Remote Desktop Protocol

    Server Message Block

    Understanding Port Functions

What’s Next?

CHAPTER 3 Addressing and Routing

IP Addressing

    IPv4

    IP Address Classes

    Subnet Mask Assignment

    Subnetting

    Identifying the Differences Between IPv4 Public and Private Networks

    Classless Interdomain Routing

    Default Gateways

    IPv4 Address Types

    IPv6 Addressing

    Comparing IPv4 and IPv6 Addressing

    Assigning IP Addresses

    Identifying MAC Addresses

    NAT, PAT, SNAT, and DNAT

Managing TCP/IP Routing

    The Default Gateway

    Routing Tables

    Static Routing

    Dynamic Routing

    Routing Metrics

Configuring Routers and Switches

    Proxy Servers

    The Spanning Tree Protocol

    Trunking

    Port Mirroring

    Port Authentication

    High Availability

What’s Next?

CHAPTER 4 Components and Devices

Common Network Devices

    Access Point

    Analog Modem

    Content Filter

    Firewall

    IDS and IPS

    Hub

    Load Balancer

    Packet Shaper

    Router

    Switch

    Multilayer Switch

    VPN Concentrator

    Network Devices Summary

Switch Configuration

    Virtual Local-Area Networks

    Working with Spanning Tree

    Interface Configuration and Switch Management

    Power over Ethernet

    Switch Management

    Managed and Unmanaged

What’s Next?

CHAPTER 5 Cloud Computing Basics

Cloud Concepts

    Software as a Service

    Platform as a Service

    Infrastructure as a Service

    Private Cloud

    Public Cloud

    Community Cloud

    Hybrid Cloud

Virtualization and Storage-Area Networks

    Virtualization

    Storage-Area Networks

What’s Next?

CHAPTER 6 Installation and Configuration

WAN Technologies

    Switching Methods

    Integrated Services Digital Network

    Leased Lines

    Fiber, SONET, and OCx Levels

    Frame Relay

    Asynchronous Transfer Mode

    Summary of WAN Technologies

    Other WAN Technologies

Internet Access Technologies

    DSL Internet Access

    Cable Internet Access

    Broadband Security Considerations

    Dialup

    The Public Switched Telephone Network

    Satellite Internet Access

    Wireless Internet Access

    Cellular

Safety Practices

    Focusing on Safety

    Electrical Safety and ESD

    Installation Safety

    Fire Suppression

    In Case of an Emergency

Installing and Configuring Equipment

    Distribution Frames

    Cable Management

    Power Management

    Device Placement and Labeling

    Rack Systems

What’s Next?

CHAPTER 7 Cabling and Wiring

General Media Considerations

    Broadband Versus Baseband Transmissions

    Simplex, Half-Duplex, and Full-Duplex Modes

    Media Interference

    Attenuation

    Data Transmission Rates

    Types of Network Media

    Types of Media Connectors

    Media Couplers/Converters

    568A and 568B Wiring Standards

    Straight-Through Versus Crossover Cables

    Rollover and Loopback Cables

    Components of Wiring Distribution

    Helpful Tools

Comparing and Contrasting LAN Technologies

    IEEE 802.2 Standard

    802.3 Ethernet Standards

    Related Network Concepts

    Cram Quiz Answers

Troubleshooting Common Issues

    WAN-Related Issues

    Customer Premise Equipment

    Company Security Policies

    Satellite Issues

What’s Next?

CHAPTER 8 Wireless

Understanding Wireless Basics

    Wireless Access Points

    Wireless Antennas

    Wireless Radio Channels

    Data Rate Versus Goodput

    Beacon Management Frame

    Spread-Spectrum Technology

    Orthogonal Frequency-Division Multiplexing

    Infrared Wireless Networking

    Establishing Communications Between Wireless Devices

    Configuring the Wireless Connection

802.11 Wireless Standards

    The Magic Behind 802.11n and 802.11ac

    A Summary of 802.11 Wireless Standards

Securing Wireless Networks

    Wired Equivalent Privacy

    Wi-Fi Protected Access

    WPA2

    WPA Enterprise

    Other Dangers

Wireless Troubleshooting Checklist

    Factors Affecting Wireless Signals

What’s Next?

CHAPTER 9 Network Management

Documentation Management

    Wiring Schematics

    Physical and Logical Network Diagrams

    Baselines

    Policies, Procedures, Configurations, and Regulations

Monitoring Network Performance

    Common Reasons to Monitor Networks

    Packet Sniffers

    Throughput Testing

    Port Scanners

    Network Performance, Load, and Stress Testing

    Tracking Event Logs

Patches and Updates

What’s Next?

CHAPTER 10 Network Optimization

Unified Communication Technologies

    Quality of Service

    Traffic Shaping

    VoIP

    Video

    Real-Time Services

    Unified Communication Devices

Network Segmentation

    SCADA Systems

    Legacy Systems

    Separate Private/Public Networks

    Honeypots and Honeynets

    Testing Lab

    Load Balancing

    Performance Optimization

    Security

    Compliance

What’s Next?

CHAPTER 11 Network Security

Tunneling, Encryption, and Access Control

    VPNs

    Point-to-Point Tunneling Protocol

    Layer 2 Tunneling Protocol

    IPsec

    Site-to-Site, Host-to-Site, and Host-to-Host

    Overview of Access Control

    Remote-Access Protocols and Services

    Remote-Control Protocols

    MAC Filtering

    TCP/IP Filtering

Disaster Recovery

    Full Backups

    Differential Backups

    Incremental Backups

    Tape Rotations

    Backup Best Practices

    Using Uninterruptible Power Supplies

    Hot and Cold Spares

    Hot, Warm, and Cold Sites

    Risk-Related Policies and Procedures

Managing Common Security Threats

    Viruses

    Worms and Trojan Horses

    Denial-of-Service and Distributed Denial-of-Service Attacks

    Other Common Attacks

    Vulnerabilities and Prevention

Authentication, Authorization, and Accounting (AAA)

    Passwords and Password Policies

    Kerberos Authentication

    Public Key Infrastructure

    TACACS/RADIUS

    Remote Authentication Protocols

    Secured Versus Unsecured Protocols

    Adding Physical Security to the Mix

    Two-factor and Multifactor Authentication

Firewalls, Appliances, and Physical Security

    Stateful and Stateless Firewalls

    Packet-Filtering Firewalls

    Circuit-Level Firewalls

    Application Layer Firewalls

    Comparing Firewall Types

    Firewall Wrap-Up

    Demilitarized Zones (Perimeter Network)

    Other Security Devices

    Physical Security Controls

Responding to Incidents

    First Responders

    Securing the Area

    Document the Scene

    eDiscovery and Evidence/Data Collection

    Chain of Custody

    Final Responsibilities

What’s Next?

CHAPTER 12 Network Troubleshooting

Troubleshooting Steps and Procedures

    Identify the Problem

    Establish a Theory of Probable Cause

    Test the Theory to Determine Cause

    Establish a Plan of Action

    Implement the Solution or Escalate

    Verify Full System Functionality

    Document the Findings, Actions, and Outcomes

Troubleshooting the Network

    Common Problems to Be Aware Of

    Troubleshooting Wiring

    Wiring Issues

    Troubleshooting Infrastructure Hardware

    Configuring and Troubleshooting Client Connectivity

    Troubleshooting an Incorrect VLAN

    Topology Errors

Working with Command-Line Utilities

    The Trace Route Utility (tracert/traceroute)

    ping

    pathping

    ARP

    The netstat Command

    nbtstat

    The ipconfig Command

    ifconfig

    nslookup

    dig

    The host Command

    The route Utility

Networking Tools

    Wire Crimpers, Strippers, and Snips

    Voltage Event Recorder

    Environmental Monitors

    Toner Probes

    Protocol Analyzer

    Media/Cable Testers

    TDR and OTDR

    Multimeter

    Network Qualification Tester

    Butt Set

    Wireless Detection

    Speed Tests and Looking Glasses

Managing Common Security Threats

What’s Next?

Glossary

 

On the CD:

Practice Exam 1

Answers to Practice Exam 1

Practice Exam 2

Answers to Practice Exam 2

 

 

9780789754103    TOC    4/29/2015

 

Erscheint lt. Verlag 18.6.2015
Reihe/Serie Exam Cram
Verlagsort Upper Saddle River
Sprache englisch
Maße 155 x 229 mm
Gewicht 940 g
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Weitere Themen Zertifizierung
ISBN-10 0-7897-5410-X / 078975410X
ISBN-13 978-0-7897-5410-3 / 9780789754103
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich