100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CompTIA Network+ Study Guide: Exam N10-009 (Sybex Study Guide) 6th Edition 2024 with complete solution

Rating
-
Sold
3
Pages
2011
Grade
A+
Uploaded on
26-05-2024
Written in
2023/2024

CompTIA Network+ Study Guide: Exam N10-009 (Sybex Study Guide) 6th Edition 2024 with complete solution Table of Contents 1. Cover 2. Table of Contents 3. Title Page 4. Copyright 5. Acknowledgments 6. About the Authors 7. About the Technical Editor 8. Table of Exercises 9. Introduction 1. What Is the Network+ Certification? 2. Why Become Network+ Certified? 3. How to Become Network+ Certified 4. Tips for Taking the Network+ Exam 5. Who Should Read This Book? 6. What Does This Book Cover? 7. What's Included in the Book 8. Interactive Online Learning Environment and Test Bank 9. How to Use This Book 10. N10-009 Exam Objectives 11. Objective Map 12. Assessment Test 13. Answers to Assessment Test10. Chapter 1: Introduction to Networks 1. First Things First: What's a Network? 2. Physical Network Topologies 3. Topology Selection, Backbones, and Segments 4. Summary 5. Exam Essentials 6. Written Lab 7. Review Questions 11. Chapter 2: The Open Systems Interconnection (OSI) Reference Model 1. Internetworking Models 2. Introduction to Encapsulation 3. Modulation Techniques 4. Summary 5. Exam Essentials 6. Written Lab 7. Review Questions 12. Chapter 3: Networking Connectors and Wiring Standards 1. Physical Media 2. Cable Properties 3. Wiring Standards 4. Installing Wiring Distributions 5. Summary 6. Exam Essentials 7. Written Lab8. Review Questions 13. Chapter 4: The Current Ethernet Specifications 1. Network Basics 2. Ethernet Basics 3. Ethernet at the Data Link Layer 4. Ethernet at the Physical Layer 5. Ethernet over Other Standards (IEEE 1905.1-2013) 6. Summary 7. Exam Essentials 8. Written Lab 9. Review Questions 14. Chapter 5: Networking Devices 1. Common Network Connectivity Devices 2. Other Specialized Devices 3. Networked Devices 4. Planning and Implementing a Basic SOHO Network Using Network Segmentation 5. Summary 6. Exam Essentials 7. Written Lab 8. Review Questions 15. Chapter 6: Introduction to the Internet Protocol 1. Introducing TCP/IP 2. Data Encapsulation3. Summary 4. Exam Essentials 5. Written Lab 6. Review Questions 16. Chapter 7: IP Addressing 1. IP Terminology 2. The Hierarchical IP Addressing Scheme 3. IPv4 Address Types 4. Internet Protocol Version 6 (IPv6) 5. Summary 6. Exam Essentials 7. Written Labs 8. Review Questions 17. Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 1. Subnetting Basics 2. Troubleshooting IP Addressing 3. Introduction to Network Address Translation (NAT) 4. Summary 5. Exam Essentials 6. Written Lab 7. Review Questions 18. Chapter 9: Introduction to IP Routing 1. Routing Basics 2. The IP Routing Process3. Testing Your IP Routing Understanding 4. Static and Dynamic Routing 5. Summary 6. Exam Essentials 7. Written Lab 8. Review Questions 19. Chapter 10: Routing Protocols 1. Routing Protocol Basics 2. Distance-Vector Routing Protocols 3. Link-State Routing Protocols 4. High Available Routes 5. Advanced IPv6 Concepts 6. IPv6 Routing Protocols 7. Summary 8. Exam Essentials 9. Written Lab 10. Review Questions 20. Chapter 11: Switching and Virtual LANs 1. Networking Before Layer 2 Switching 2. Switching Services 3. Spanning Tree Protocol 4. Virtual LANs 5. VLAN Trunking Protocol 6. Advanced Features of Switches7. Summary 8. Exam Essentials 9. Written Lab 10. Review Questions 21. Chapter 12: Wireless Networking 1. Introduction to Wireless Technology 2. Cellular Technologies 3. The 802.11 Standards (Regulatory Impacts) 4. Comparing 802.11 Standards 5. Wireless Network Components 6. Installing a Wireless Network 7. Site Survey 8. Wireless Security 9. Summary 10. Exam Essentials 11. Written Lab 12. Review Questions 22. Chapter 13: Remote Network Access 1. Site-to-Site VPN 2. Client-to-Site VPN 3. Remote Desktop Connection 4. Virtual Network Computing 5. Connection Methods 6. Jump Box/Host7. In-Band vs. Out-of-Band Management 8. Summary 9. Exam Essentials 10. Written Lab 11. Review Questions 23. Chapter 14: Using Statistics and Sensors to Ensure Network Availability 1. Performance Monitoring/Metrics/Sensors 2. SNMP 3. Application Programming Interface Integration 4. Protocol Analyzer/Packet Capture 5. Flow Data 6. Log Aggregation 7. Summary 8. Exam Essentials 9. Written Lab 10. Review Questions 24. Chapter 15: Organizational Documents and Policies 1. Plans and Procedures 2. Hardening and Security Policies 3. Common Documentation 4. IP Address Management 5. Common Agreements 6. Summary 7. Exam Essentials8. Written Lab 9. Review Questions 25. Chapter 16: High Availability and Disaster Recovery 1. Load Balancing 2. Multipathing 3. Network Interface Card (NIC) Teaming 4. Redundant Hardware/Clusters 5. Facilities and Infrastructure Support 6. Redundancy and High Availability Concepts 7. Backups 8. Testing 9. Summary 10. Exam Essentials 11. Written Lab 12. Review Questions 26. Chapter 17: Data Center Architecture and Cloud Concepts 1. Cloud Computing 2. Infrastructure as Code 3. Software-Defined Networking 4. Virtual Extensible Local Area Network 5. Zero Trust Architecture 6. Secure Access Secure Edge/Security Service Edge 7. Summary 8. Exam Essentials9. Written Lab 10. Review Questions 27. Chapter 18: Network Troubleshooting Methodology 1. Narrowing Down the Problem 2. Troubleshooting Steps 3. Troubleshooting Tips 4. Summary 5. Exam Essentials 6. Written Lab 7. Review Questions 28. Chapter 19: Network Software Tools and Commands 1. Software Tools 2. Using traceroute 3. Using ipconfig, ifconfig, and ip 4. Using the ifconfig Utility 5. Using the ip Utility 6. Using the iptables Utility 7. Using the ping Utility 8. The Address Resolution Protocol 9. Using the arp Utility 10. Using the nslookup Utility 11. Resolving Names with the Hosts File 12. Using the mtr Command (pathping) 13. Using the Nmap Utility14. Using the route Command 15. Using the netstat Utility 16. Using tcpdump 17. Basic Networking Device Commands 18. Hardware Tools 19. Summary 20. Exam Essentials 21. Written Lab 22. Review Questions 29. Chapter 20: Network Security Concepts 1. Common Security Terminology 2. AAA Model 3. Regulatory Compliance 4. Summary 5. Exam Essentials 6. Written Lab 7. Review Questions 30. Chapter 21: Common Types of Attacks 1. Technology-Based Attacks 2. Human and Environmental 3. Hardening Security 4. Implementing Network Segmentation 5. Physical Security Concepts 6. Summary7. Exam Essentials 8. Written Lab 9. Review Questions 31. Appendix A: Answers to Written Labs 1. Chapter 1: Introduction to Networks 2. Chapter 2: The Open Systems Interconnection (OSI) Reference Model 3. Chapter 3: Networking Connectors and Wiring Standards 4. Chapter 4: The Current Ethernet Specifications 5. Chapter 5: Networking Devices 6. Chapter 6: Introduction to the Internet Protocol 7. Chapter 7: IP Addressing 8. Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 9. Chapter 9: Introduction to IP Routing 10. Chapter 10: Routing Protocols 11. Chapter 11: Switching and Virtual LANs 12. Chapter 12: Wireless Networking 13. Chapter 13: Remote Network Access 14. Chapter 14: Using Statistics and Sensors to Ensure Network Availability 15. Chapter 15: Organizational Documents and Policies 16. Chapter 16: High Availability and Disaster Recovery 17. Chapter 17: Data Center Architecture and Cloud Concepts18. Chapter 18: Network Troubleshooting Methodology 19. Chapter 19: Network Software Tools and Commands 20. Chapter 20: Network Security Concepts 21. Chapter 21: Common Types of Attacks 32. Appendix B: Answers to Review Questions 1. Chapter 1: Introduction to Networks 2. Chapter 2: The Open Systems Interconnection (OSI) Reference Model 3. Chapter 3: Networking Connectors and Wiring Standards 4. Chapter 4: The Current Ethernet Specifications 5. Chapter 5: Networking Devices 6. Chapter 6: Introduction to the Internet Protocol 7. Chapter 7: IP Addressing 8. Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 9. Chapter 9: Introduction to IP Routing 10. Chapter 10: Routing Protocols 11. Chapter 11: Switching and Virtual LANs 12. Chapter 12: Wireless Networking 13. Chapter 13: Remote Network Access 14. Chapter 14: Using Statistics and Sensors to Ensure Network Availability 15. Chapter 15: Organizational Documents and Policies 16. Chapter 16: High Availability and Disaster Recovery17. Chapter 17: Data Center Architecture and Cloud Concepts 18. Chapter 18: Network Troubleshooting Methodology 19. Chapter 19: Network Software Tools and Commands 20. Chapter 20: Network Security Concepts 21. Chapter 21: Common Types of Attacks 33. Appendix C: Subnetting Class A 1. Subnetting Practice Examples: Class A Addresses 2. Subnetting in Your Head: Class A Addresses 3. Written Lab C.1 4. Written Lab C.2 5. Answers to Written Lab C.1 6. Answers to Written Lab C.2 34. Index 35. End User License Agreement List of Tables 1. Chapter 3 1. TABLE 3.1 Coaxial cable specifications 2. Chapter 4 1. TABLE 4.1 Binary values 2. TABLE 4.2 Binary-to-decimal memorization chart 3. TABLE 4.3 Hex-to-binary-to-decimal chart 4. TABLE 4.4 Common Ethernet cable types 3. Chapter 51. TABLE 5.1 Additional DNS record types 4. Chapter 6 1. TABLE 6.1 Severity levels 2. TABLE 6.2 Key features of TCP and UDP 3. TABLE 6.3 Key protocols that use TCP and UDP 4. TABLE 6.4 Possible protocols found in the Protocol field of an IP header 5. Chapter 7 1. TABLE 7.1 Reserved IP addresses 2. TABLE 7.2 Reserved RFC 1918 IP address space 3. TABLE 7.3 Special IPv6 addresses 6. Chapter 8 1. TABLE 8.1 Default subnet masks 2. TABLE 8.2 CIDR values 3. TABLE 8.3 Advantages and disadvantages of implementing NAT 4. TABLE 8.4 NAT terms 7. Chapter 10 1. TABLE 10.1 Default administrative distances 2. TABLE 10.2 RIPv1 vs. RIPv2 3. TABLE 10.3 OSPF and RIP comparison 8. Chapter 12 1. TABLE 12.1 Wireless agencies and standards 2. TABLE 12.2 Cellular comparisons 3. TABLE 12.3 802.11 committees and subcommittees4. TABLE 12.4 Range and speed comparisons 9. Chapter 14 1. TABLE 14.1 Syslog severity levels 10. Chapter 15 1. TABLE 15.1 Uptime for nines of an SLA 11. Chapter 18 1. TABLE 18.1 Rollover cable pinouts 2. TABLE 18.2 EIA/TIA 568 crossover cabling 12. Chapter 19 1. TABLE 19.1 Options for ping switches 2. TABLE 19.2 arp options 3. TABLE 19.3 pathping options 4. TABLE 19.4 route command options 5. TABLE 19.5 netstat options 6. TABLE 19.6 Output of the show cdp neighbors command List of Illustrations 1. Chapter 1 1. FIGURE 1.1 A basic network 2. FIGURE 1.2 Two separate LANs (workgroups) 3. FIGURE 1.3 A router connects LANs 4. FIGURE 1.4 A network populated with servers and workstations 5. FIGURE 1.5 An internetwork 6. FIGURE 1.6 Multiprotocol Label Switching layout7. FIGURE 1.7 A peer-to-peer network 8. FIGURE 1.8 A client-server network 9. FIGURE 1.9 A typical bus network's physical topology 10. FIGURE 1.10 Typical star topology with a switch 11. FIGURE 1.11 A typical ring topology 12. FIGURE 1.12 A typical mesh topology 13. FIGURE 1.13 Three point-to-point connections 14. FIGURE 1.14 A point-to-multipoint network, example 1 15. FIGURE 1.15 A point-to-multipoint network, example 2 16. FIGURE 1.16 A hybrid network 17. FIGURE 1.17 Backbone and segments on a network 18. FIGURE 1.18 Three-tier versus collapsed-core model 19. FIGURE 1.19 A typical spine-leaf network 20. FIGURE 1.20 Understanding traffic flow in your network 2. Chapter 2 1. FIGURE 2.1 Layer functions 2. FIGURE 2.2 The upper layers 3. FIGURE 2.3 The lower layers 4. FIGURE 2.4 Establishing a connection-oriented session 5. FIGURE 2.5 Transmitting segments with flow control 6. FIGURE 2.6 Windowing 7. FIGURE 2.7 Transport layer reliable delivery 8. FIGURE 2.8 Routing table used in a router 9. FIGURE 2.9 A router in an internetwork10. FIGURE 2.10 Data Link layer 11. FIGURE 2.11 Data encapsulation 3. Chapter 3 1. FIGURE 3.1 A stripped-back thinnet cable 2. FIGURE 3.2 Male and female BNC connectors 3. FIGURE 3.3 Cat 5e UTP cable 4. FIGURE 3.4 RJ-11 and RJ-45 connectors 5. FIGURE 3.5 The pin-outs in an RJ-45 connector, T568B standard 6. FIGURE 3.6 An ST connector 7. FIGURE 3.7 An SC connector 8. FIGURE 3.8 A sample MT-RJ fiber-optic connector 9. FIGURE 3.9 A sample LC fiber-optic connector 10. FIGURE 3.10 An MPO connector 11. FIGURE 3.11 APC and UPC connectors 12. FIGURE 3.12 Bidirectional communication 13. FIGURE 3.13 Single-mode fiber to Ethernet 14. FIGURE 3.14 Multimode fiber to Ethernet 15. FIGURE 3.15 Fiber to coaxial 16. FIGURE 3.16 Single-mode to multimode fiber 17. FIGURE 3.17 RS-232 cable ends 18. FIGURE 3.18 A USB port 19. FIGURE 3.19 A USB plug 20. FIGURE 3.20 T568A wired standard 21. FIGURE 3.21 T568B wired standard22. FIGURE 3.22 Straight-through Ethernet cable 23. FIGURE 3.23 Crossover Ethernet cable 24. FIGURE 3.24 An inexpensive cable tester 25. FIGURE 3.25 UTP gigabit crossover Ethernet cable 26. FIGURE 3.26 Rolled Ethernet cable 27. FIGURE 3.27 A T1 crossover cable 28. FIGURE 3.28 A 110 block 4. Chapter 4 1. FIGURE 4.1 The basic network 2. FIGURE 4.2 CSMA/CD 3. FIGURE 4.3 Shorter and longer wavelengths 4. FIGURE 4.4 Ethernet addressing using MAC addresses 5. FIGURE 4.5 802.3 and Ethernet frame formats in bytes 6. FIGURE 4.6 Ethernet Physical layer specifications 7. FIGURE 4.7 Powerline adapter sets 8. FIGURE 4.8 Basic BPL installation 9. FIGURE 4.9 Ethernet over HDMI 5. Chapter 5 1. FIGURE 5.1 Network interface card 2. FIGURE 5.2 A typical hub 3. FIGURE 5.3 Bridges break up collision domains. 4. FIGURE 5.4 Typical Ethernet switch 5. FIGURE 5.5 Router connected to the Internet, providing access for multiple h...6. FIGURE 5.6 Example of firewalls with a screened subnet or DMZ 7. FIGURE 5.7 Example of an AP in a network 8. FIGURE 5.8 DHCP client sends broadcasts looking for a DHCP server. 9. FIGURE 5.9 A Windows DHCP server's scope options 10. FIGURE 5.10 DHCP client request to a DHCP server 11. FIGURE 5.11 DHCP client parameter request list 12. FIGURE 5.12 DHCP server response 13. FIGURE 5.13 Configuring a DHCP relay 14. FIGURE 5.14 DNS resolution example 15. FIGURE 5.15 A Windows DNS server 16. FIGURE 5.16 A DNS query to 17. FIGURE 5.17 The DNS answer to our query 18. FIGURE 5.18 Internal and external DNS 19. FIGURE 5.19 A proxy server 20. FIGURE 5.20 Encryption appliances 21. FIGURE 5.21 Content filtering appliance 22. FIGURE 5.22 Analog modem 23. FIGURE 5.23 Packet shaper 24. FIGURE 5.24 VPN headend 25. FIGURE 5.25 Media converter 26. FIGURE 5.26 A switch can replace the hub, breaking up collision domains 27. FIGURE 5.27 Routers create an internetwork.28. FIGURE 5.28 Internetworking devices 29. FIGURE 5.29 Switched networks creating an internetwork 30. FIGURE 5.30 A router in an internetwork 31. FIGURE 5.31 A switch in an internetwork 32. FIGURE 5.32 A hub in a network 6. Chapter 6 1. FIGURE 6.1 The DoD model and OSI model 2. FIGURE 6.2 The TCP/IP protocol suite 3. FIGURE 6.3 File Transfer Protocol 4. FIGURE 6.4 SSH 5. FIGURE 6.5 Telnet 6. FIGURE 6.6 Domain Name System 7. FIGURE 6.7 DHCP client four-step process 8. FIGURE 6.8 Trivial FTP 9. FIGURE 6.9 HTTP 10. FIGURE 6.10 Network Time Protocol 11. FIGURE 6.11 Network Management Station 12. FIGURE 6.12 TCP segment format 13. FIGURE 6.13 UDP segment 14. FIGURE 6.14 Port numbers for TCP and UDP 15. FIGURE 6.15 IPv4 header 16. FIGURE 6.16 The Protocol field in an IP header 17. FIGURE 6.17 An ICMP error message is sent to the sending host from the remot...18. FIGURE 6.18 Local ARP broadcast 19. FIGURE 6.19 RARP broadcast example 20. FIGURE 6.20 Generic Routing Encapsulation (GRE) tunnel structure 21. FIGURE 6.21 Data encapsulation 22. FIGURE 6.22 PDU and layer addressing 23. FIGURE 6.23 Port numbers at the Transport layer 7. Chapter 7 1. FIGURE 7.1 Summary of the three classes of networks 2. FIGURE 7.2 IPv6 address example 3. FIGURE 7.3 EUI-64 interface ID assignment 4. FIGURE 7.4 A 6to4 tunnel 8. Chapter 8 1. FIGURE 8.1 Implementing a Class C /25 logical network 2. FIGURE 8.2 Implementing a Class C /26 logical network 3. FIGURE 8.3 Basic IP troubleshooting 4. FIGURE 8.4 IP address problem 1 5. FIGURE 8.5 IP address problem 2 6. FIGURE 8.6 Find the valid host 7. FIGURE 8.7 Find the valid host #2. 8. FIGURE 8.8 Find the valid host address #3. 9. FIGURE 8.9 Find the valid subnet mask. 10. FIGURE 8.10 Where to configure NAT 11. FIGURE 8.11 Basic NAT translation 12. FIGURE 8.12 NAT overloading example (PAT)9. Chapter 9 1. FIGURE 9.1 A simple routing example 2. FIGURE 9.2 IP routing example using two hosts and one router 3. FIGURE 9.3 Frame used from Host_A to the Lab_A router when Host_B is pinged... 4. FIGURE 9.4 IP routing example 1 5. FIGURE 9.5 IP routing example 2 6. FIGURE 9.6 Routing options 7. FIGURE 9.7 Dynamic routing options 8. FIGURE 9.8 DV and LS routing protocols 9. FIGURE 9.9 Hybrid routing 10. Chapter 10 1. FIGURE 10.1 Routing flow tree 2. FIGURE 10.2 The internetwork with distance-vector routing 3. FIGURE 10.3 Converged routing tables 4. FIGURE 10.4 Typical classful network 5. FIGURE 10.5 Classless network design 6. FIGURE 10.6 A discontiguous network 7. FIGURE 10.7 EIGRP tables 8. FIGURE 10.8 Border Gateway Protocol 9. FIGURE 10.9 OSPF design example 10. FIGURE 10.10 IS-IS network terminology 11. FIGURE 10.11 Typical HSRP setup 12. FIGURE 10.12 FHRP and firewalls13. FIGURE 10.13 First two steps to IPv6 autoconfiguration 14. FIGURE 10.14 IPv6 autoconfiguration example 15. FIGURE 10.15 IPv6 neighbor discovery: neighbor solicitation message 11. Chapter 11 1. FIGURE 11.1 A network before switching 2. FIGURE 11.2 The first switched LAN 3. FIGURE 11.3 The typical switched network design 4. FIGURE 11.4 Switches create private domains 5. FIGURE 11.5 Empty forward/filter table on a switch 6. FIGURE 11.6 How switches learn hosts' locations 7. FIGURE 11.7 Forward/filter table 8. FIGURE 11.8 Broadcast storm 9. FIGURE 11.9 Multiple frame copies 10. FIGURE 11.10 Distributed switching 11. FIGURE 11.11 A switched network with switching loops 12. FIGURE 11.12 An optimal hierarchical switch design 13. FIGURE 11.13 Flat network structure 14. FIGURE 11.14 The benefit of a switched network 15. FIGURE 11.15 Physical LANs connected to a router 16. FIGURE 11.16 Switches removing the physical boundary 17. FIGURE 11.17 Access and trunk links in a switched network 18. FIGURE 11.18 IEEE 802.1Q encapsulation with and without the 802.1Q tag19. FIGURE 11.19 Router connecting three VLANs together for interVLAN communica... 20. FIGURE 11.20 Router on a stick: single router interface connecting all three... 21. FIGURE 11.21 With IVR, routing runs on the backplane of the switch, and it a... 22. FIGURE 11.22 VTP modes 23. FIGURE 11.23 Port security on a switch port restricts port access by MAC add... 24. FIGURE 11.24 Flood guard process 25. FIGURE 11.25 Before and after port channels 26. FIGURE 11.26 Non-PoE switch versus a PoE switch 27. FIGURE 11.27 An external power injector used for PoE 28. FIGURE 11.28 Wireless bridge power injector 29. FIGURE 11.29 Switches send frames out the destination port only. 30. FIGURE 11.30 Place a hub between two hosts to troubleshoot. 31. FIGURE 11.31 Port spanning/mirroring 12. Chapter 12 1. FIGURE 12.1 Unlicensed frequencies 2. FIGURE 12.2 Wireless LAN history 3. FIGURE 12.3 802.11b CSMA/CA 4. FIGURE 12.4 ISM 2.4 GHz channels 5. FIGURE 12.5 U-NII 5 GHz band has 12 non-overlapping channels (US)6. FIGURE 12.6 Comparing Wi-Fi 5 to Wi-Fi 6 7. FIGURE 12.7 Current standards for spectrums and speeds 8. FIGURE 12.8 A wireless access point 9. FIGURE 12.9 A wireless NIC 10. FIGURE 12.10 A wireless network in ad hoc mode 11. FIGURE 12.11 A wireless network in infrastructure mode 12. FIGURE 12.12 Extended service set identifier (ESSID) 13. FIGURE 12.13 Stand-alone and controller-based wireless networks 14. FIGURE 12.14 LWAPP 15. FIGURE 12.15 Mobile hot spot 16. FIGURE 12.16 iPhone hot spot 17. FIGURE 12.17 Basic coverage 18. FIGURE 12.18 Enterprise design 19. FIGURE 12.19 A multifloor installation 20. FIGURE 12.20 A heat map of a building 21. FIGURE 12.21 RADIUS authentication server 13. Chapter 13 1. FIGURE 13.1 Site-to-site and client-to-site VPN 2. FIGURE 13.2 Clientless VPN 3. FIGURE 13.3 Split and full tunnels 4. FIGURE 13.4 Clientless VPN 5. FIGURE 13.5 Rolled Ethernet cable 6. FIGURE 13.6 Configuring your console emulation program 7. FIGURE 13.7 A Cisco 2960 console connections8. FIGURE 13.8 Where a jump box is implemented 14. Chapter 14 1. FIGURE 14.1 Network management system/station availability 2. FIGURE 14.2 SNMP components 3. FIGURE 14.3 SNMP monitor graph 4. FIGURE 14.4 SNMP get and trap methods 5. FIGURE 14.5 Protocol analyzer of a TCP packet 6. FIGURE 14.6 Event Viewer Security log 7. FIGURE 14.7 Syslog collector 8. FIGURE 14.8 Anatomy of a Syslog message 15. Chapter 15 1. FIGURE 15.1 A common screened subnet configuration 2. FIGURE 15.2 Simple network physical diagram 3. FIGURE 15.3 Network diagram with firewalls from SmartDraw 4. FIGURE 15.4 A floor plan drawing 5. FIGURE 15.5 A rack diagram 6. FIGURE 15.6 MDF and IDFs 7. FIGURE 15.7 Logical network diagram 8. FIGURE 15.8 Typical wiring diagram 9. FIGURE 15.9 Typical site survey report 16. Chapter 16 1. FIGURE 16.1 Multipathing 2. FIGURE 16.2 Static teaming 3. FIGURE 16.3 Switch-independent setup4. FIGURE 16.4 Switch stacking 5. FIGURE 16.5 Switch cluster 6. FIGURE 16.6 FHRPs use a virtual router with a virtual IP address and virtual... 7. FIGURE 16.7 RAID-1 (mirroring) 8. FIGURE 16.8 RAID-5 (striping with parity) 9. FIGURE 16.9 RAID-6 (striping with two parity schemes) 10. FIGURE 16.10 Rack-mounted PDU 11. FIGURE 16.11 Cloud recovery site 12. FIGURE 16.12 Path redundancy 13. FIGURE 16.13 ISP redundancy 14. FIGURE 16.14 Path and ISP redundancy 15. FIGURE 16.15 HSRP active and standby routers 16. FIGURE 16.16 HSRP active and standby routers 17. FIGURE 16.17 HSRP active and standby routers 17. Chapter 17 1. FIGURE 17.1 A private cloud 2. FIGURE 17.2 A public cloud 3. FIGURE 17.3 A hybrid cloud 4. FIGURE 17.4 SDN controller schematic 18. Chapter 18 1. FIGURE 18.1 A router/switch console connection 2. FIGURE 18.2 Multimode and single-mode fibers 3. FIGURE 18.3 Cannot connect4. FIGURE 18.4 Host could not be found. 5. FIGURE 18.5 Successful ping 6. FIGURE 18.6 Port Security on a switch port restricts port access by MAC addr... 7. FIGURE 18.7 Rogue DHCP 8. FIGURE 18.8 Certificate error 9. FIGURE 18.9 Netstat -a output 10. FIGURE 18.10 Service dependencies 11. FIGURE 18.11 Output from ipconfig /all 12. FIGURE 18.12 Ethernet connection 13. FIGURE 18.13 DNS properties 14. FIGURE 18.14 Obtaining a DNS server address automatically 15. FIGURE 18.15 ipconfig /all output 19. Chapter 19 1. FIGURE 19.1 DHCP capture 2. FIGURE 19.2 Throughput 3. FIGURE 19.3 Quick Assist 4. FIGURE 19.4 Elevating your command prompt 5. FIGURE 19.5 TCP flags 6. FIGURE 19.6 route print output 7. FIGURE 19.7 Sample output of the netstat –a command 8. FIGURE 19.8 A toner probe 9. FIGURE 19.9 An inexpensive cable tester 10. FIGURE 19.10 An inexpensive visual fault locator20. Chapter 20 1. FIGURE 20.1 The CIA triad 2. FIGURE 20.2 Data and encryption 3. FIGURE 20.3 Symmetrical and asymmetrical encryption 4. FIGURE 20.4 Encryption with PKI 5. FIGURE 20.5 Singing with PKI 6. FIGURE 20.6 Authentication components 7. FIGURE 20.7 Authentication methods 8. FIGURE 20.8 An RSA security key fob 9. FIGURE 20.9 Claims-based authentication 10. FIGURE 20.10 TACACS+ login and logout sequence 11. FIGURE 20.11 Role-based access 12. FIGURE 20.12 AAA bank analogy 13. FIGURE 20.13 Regulations, compliance, and policies 14. FIGURE 20.14 Policy for disposing of hazardous waste 21. Chapter 21 1. FIGURE 21.1 Typical DoS attack 2. FIGURE 21.2 Typical reflective attack 3. FIGURE 21.3 Typical amplified attack 4. FIGURE 21.4 Components of a DDoS attack 5. FIGURE 21.5 On-path attack 6. FIGURE 21.6 VLAN hopping 7. FIGURE 21.7 Effects of a rogue DHCP 8. FIGURE 21.8 An evil twin attack9. FIGURE 21.9 Brute-force password attacks 10. FIGURE 21.10 CryptoLocker 11. FIGURE 21.11 A typical corporate network 12. FIGURE 21.12 A typical DMZ with two firewalls 13. FIGURE 21.13 A typical screened subnet with two routers 14. FIGURE 21.14 A typical screened subnet with one firewall 15. FIGURE 21.15 802.1X switch control 16. FIGURE 21.16 NAC and 802.1X 17. FIGURE 21.17 SCADA systems 18. FIGURE 21.18 A typical combination door lock 19. FIGURE 21.19 A USS 20. FIGURE 21.20 A standard cable lock

Show more Read less
Institution
CompTIA Network+
Course
CompTIA Network+











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA Network+
Course
CompTIA Network+

Document information

Uploaded on
May 26, 2024
Number of pages
2011
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Table of Contents
1. Cover
2. Table of Contents
3. Title Page
4. Copyright
5. Acknowledgments
6. About the Authors
7. About the Technical Editor
8. Table of Exercises
9. Introduction
1. What Is the Network+ Certification?
2. Why Become Network+ Certified?
3. How to Become Network+ Certified
4. Tips for Taking the Network+ Exam
5. Who Should Read This Book?
6. What Does This Book Cover?
7. What's Included in the Book
8. Interactive Online Learning Environment and Test Bank
9. How to Use This Book
10. N10-009 Exam Objectives
11. Objective Map
12. Assessment Test
13. Answers to Assessment Test 10. Chapter 1: Introduction to Networks
1. First Things First: What's a Network?
2. Physical Network Topologies
3. Topology Selection, Backbones, and Segments
4. Summary
5. Exam Essentials
6. Written Lab
7. Review Questions
11. Chapter 2: The Open Systems Interconnection (OSI) Reference Model
1. Internetworking Models
2. Introduction to Encapsulation
3. Modulation Techniques
4. Summary
5. Exam Essentials
6. Written Lab
7. Review Questions
12. Chapter 3: Networking Connectors and Wiring Standards
1. Physical Media
2. Cable Properties
3. Wiring Standards
4. Installing Wiring Distributions
5. Summary
6. Exam Essentials
7. Written Lab 8. Review Questions
13. Chapter 4: The Current Ethernet Specifications
1. Network Basics
2. Ethernet Basics
3. Ethernet at the Data Link Layer
4. Ethernet at the Physical Layer
5. Ethernet over Other Standards (IEEE 1905.1-2013)
6. Summary
7. Exam Essentials
8. Written Lab
9. Review Questions
14. Chapter 5: Networking Devices
1. Common Network Connectivity Devices
2. Other Specialized Devices
3. Networked Devices
4. Planning and Implementing a Basic SOHO Network Using Network
Segmentation
5. Summary
6. Exam Essentials
7. Written Lab
8. Review Questions
15. Chapter 6: Introduction to the Internet Protocol
1. Introducing TCP/IP
2. Data Encapsulation

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Wiseman NURSING
View profile
Follow You need to be logged in order to follow users or courses
Sold
6666
Member since
4 year
Number of followers
3838
Documents
25932
Last sold
1 hour ago
Testsprint

Updated exams .Actual tests 100% verified.ATI,NURSING,PMHNP,TNCC,USMLE,ACLS,WGU AND ALL EXAMS guaranteed success.Here, you will find everything you need in NURSING EXAMS AND TESTBANKS.Contact us, to fetch it for you in minutes if we do not have it in this shop.BUY WITHOUT DOUBT!!!!Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied. **Ace Your Exams with Confidence!**

3.9

1367 reviews

5
673
4
246
3
210
2
76
1
162

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions