Also available in other formats.
CompTIA Network+ N10-008 Exam Cram Premium Edition and Practice Test
The exciting new CompTIA Network+ N10-008 Exam Cram Premium Edition and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson IT Certification Practice Test. The Premium Edition eBook and Practice Test contains the following items:
* The CompTIA Network+ N10-008 Exam Cram Premium Edition Practice Test, including four full practice exams and enhanced practice test features
* PDF, EPUB, and Mobi/Kindle formats of the CompTIA Network+ N10-008 Exam Cram from Pearson IT Certification, which are accessible via your PC, tablet, and smartphone
About the Premium Edition Practice Test
This Premium Edition contains an enhanced version of the Pearson Test Prep practice test software with four full practice exams. This integrated learning package
* Enables you to focus on individual topic areas or take complete, timed exams
* Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
* Provides unique sets of exam-realistic practice questions
* Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most
Pearson Test Prep online system requirements
Browsers: Chrome version 73 and above; Safari version 12 and above; Microsoft Edge 44 and above.
Devices: Desktop and laptop computers, tablets running on Android v8.0 and iOS v13, smartphones with a minimum screen size of 4.7". Internet access required.
Pearson Test Prep offline system requirements
Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases
About the Premium Edition eBook
CompTIA Network+ N10-008 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Network+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.  
  
Covers the critical information needed to score higher on your Network+ N10-008 exam!
* Establish network connectivity by deploying wired and wireless devices  
* Understand and maintain network documentation  
* Understand the purpose of network services 
* Understand basic datacenter, cloud, and virtual networking concepts  
* Monitor network activity, identifying performance and availability issues
* Implement network hardening techniques 
* Manage, configure, and troubleshoot network infrastructure
Download the sample pages (includes Chapter 4)
Introduction
CHAPTER 1: Network Technologies, Topologies, and Types
Wired and Wireless Network Topologies
    Bus Topology
    Ring Topology
    Star Topology (Hub-and-Spoke)
    Mesh Topology
    Hybrid Topology
    Bringing Wireless to a Topology
        Infrastructure Wireless Topology
        Ad Hoc Wireless Topology
        Wireless Mesh Topology
Network Types and Characteristics 
    To Server or Not 
    LANs 
    WLANs 
    WANs 
    MANs 
    CANs 
    SANs 
    PANs 
    SDWANs 
    MPLS 
    mGRE 
Network Links and Concepts 
    DSL Internet Access 
    Cable Broadband 
    The Public Switched Telephone Network 
    Leased Lines 
        T3 Lines 
    Metro-Optical 
    Satellite Internet Access 
    Termination Points 
        Demarc, Demarc Extension, and Smart Jacks 
        CSUs/DSUs 
        Verify Wiring Installation and Termination 
    Virtual Networking 
What's Next? 
CHAPTER 2: Models, Ports, Protocols, and Network Services
The OSI Networking Model 
    The OSI Seven-Layer Model 
        Physical Layer (Layer 1) 
        Data Link Layer (Layer 2) 
        Network Layer (Layer 3) 
        Transport Layer (Layer 4) 
        Session Layer (Layer 5) 
        Presentation Layer (Layer 6) 
        Application Layer (Layer 7) 
        OSI Model Summary 
    Comparing OSI to the Four-Layer TCP/IP Model 
    Identifying the OSI Layers at Which Various Network Components Operate 
    Data Encapsulation/Decapsulation and OSI 
Ports and Protocols 
    Connection-Oriented Protocols Versus Connectionless Protocols 
    Internet Protocol 
    Transmission Control Protocol 
        How TCP Works 
    User Datagram Protocol 
    Internet Control Message Protocol 
    IPSec 
    Generic Routing Encapsulation 
    File Transfer Protocol 
    Secure Shell 
    Secure File Transfer Protocol 
    Telnet 
    Simple Mail Transfer Protocol 
    Domain Name System (DNS) 
    Dynamic Host Configuration Protocol (DHCP) 
    Trivial File Transfer Protocol 
    Hypertext Transfer Protocol 
    Network Time Protocol (NTP) 
    Post Office Protocol Version 3/Internet Message Access Protocol Version 4 
    Simple Network Management Protocol 
        Components of SNMP 
        SNMP Management Systems 
        SNMP Agents 
        Management Information Bases 
        SNMP Communities 
        SNMPv3 
    Lightweight Directory Access Protocol 
    Hypertext Transfer Protocol Secure 
    Server Message Block 
    Syslog 
    SMTP TLS 
    LDAPS 
    IMAP over SSL 
    POP3 over SSL 
    SQL, SQLnet, and MySQL 
    Remote Desktop Protocol 
    Session Initiation Protocol 
    Understanding Port Functions 
Network Services 
    Domain Name Service (DNS) 
    The DNS Namespace 
    Types of DNS Entries 
    DNS Records 
    DNS in a Practical Implementation 
    Dynamic Host Configuration Protocol 
    The DHCP Process 
    DHCP and DNS Suffixes 
    DHCP Relays and IP Helpers 
    Network Time Protocol 
What's Next? 
CHAPTER 3: Addressing, Routing, and Switching
IP Addressing 
    IPv4 
    IP Address Classes 
    Subnet Mask Assignment 
    Subnetting 
    Identifying the Differences Between IPv4 Public and Private Networks 
        Private Address Ranges 
    Classless Interdomain Routing 
    Default Gateways 
    Virtual IP 
    IPv4 Address Types 
        Unicast Address 
        Broadcast Address 
        Multicast 
    IPv6 Addressing 
        Where Have All the IPv4 Addresses Gone? 
        Identifying IPv6 Addresses 
        IPv6 Address Types 
        Global Unicast Addresses 
        Link-Local Addresses 
        Site-Local Addresses 
        Neighbor Discovery 
    Comparing IPv4 and IPv6 Addressing 
    Assigning IP Addresses 
        Static Addressing 
        Dynamic Addressing 
        BOOT Protocol (BOOTP) 
        Automatic Private IP Addressing 
    Identifying MAC Addresses 
    NAT and PAT 
        NAT 
        PAT 
        SNAT 
        DNAT 
Managing Routing and Switching 
    The Default Gateway 
    Routing Tables 
    Static Routing 
    Default Route 
    Switching Methods 
        Packet Switching 
        Circuit Switching 
        Comparing Switching Methods 
    Dynamic Routing 
        Distance-Vector Routing 
        Link-State Routing 
        Hybrid Routing Protocols 
    Network Traffic 
    Routing Metrics 
    Virtual Local-Area Networks 
        VLAN Membership 
        VLAN Segmentation 
    The Spanning Tree Protocol 
    Interface Configuration and Switch Management 
    MDI-X 
    Trunking 
    Port Mirroring 
    Port Authentication 
    Power over Ethernet (PoE and PoE+) 
    MAC Address Table 
    Switch Management 
    Managed and Unmanaged 
    Quality of Service 
    Traffic Shaping 
    Access Control Lists 
    ARP and RARP 
What's Next? 
CHAPTER 4: Network Implementations
Common Networking Devices 
    Firewall 
    IDS/IPS 
    Router 
    Switch 
        Hub and Switch Cabling 
    Multilayer Switch 
    Hub 
    Bridge 
    DSL and Cable Modems 
    Access Point 
    Media Converter 
    Voice Gateway 
    Repeater 
    Wireless LAN Controller 
    Load Balancer 
    Proxy Server 
    VPN Concentrators and Headends 
    Networked Devices 
Networking Architecture 
    Three-Tiered Architecture 
        Core Layer 
        Distribution/Aggregation Layer 
        Access/Edge Layer 
    Software-Defined Networking 
        Application Layer 
        Control Layer 
        Infrastructure Layer 
        Management Plane 
    Spine and Leaf 
    Traffic Flows 
    Datacenter Location Types 
    Storage-Area Networks 
        iSCSI 
        Fibre Channel and FCoE 
        Network-Attached Storage 
What's Next? 
CHAPTER 5: Cabling Solutions and Issues
General Media Considerations 
    Broadband Versus Baseband Transmissions 
    Simplex, Half-Duplex, and Full-Duplex Modes 
    Data Transmission Rates 
    Types of Network Media 
        Twisted-Pair Cabling (Copper) 
        Coaxial Cables 
        Twinaxial Cables 
        Fiber-Optic Cables 
        Plenum Versus PVC Cables 
    Types of Media Connectors 
        BNC Connectors 
        RJ-11 Connectors 
        RJ-45 Connectors 
        F-Type Connectors and RG-59 and RG-6 Cables 
        Fiber Connectors 
        Transceivers 
    Media Couplers/Converters 
    TIA/EIA 568A and 568B Wiring Standards 
    Straight-Through Versus Crossover Cables 
    Rollover and Loopback Cables 
    Components of Wiring Distribution 
        Network Cross-Connects 
        Horizontal Cabling 
        Vertical Cables 
        Patch Panels 
        Fiber Distribution Panels 
        66 and 110 Blocks (T568A, T568B) 
        MDF and IDF Wiring Closets 
    Ethernet Copper and Fiber Standards 
        10BASE-T 
        100BASE-TX 
        1000BASE-T 
        10GBASE-T 
        40GBASE-T 
        1000BASE-LX and 1000BASE-SX 
        10GBASE-LR and 10GBASE-SR 
    Multiplexing Options 
Troubleshooting Common Cable Connectivity Issues 
Limitations, Considerations, and Issues 
    Throughput, Speed, and Distance 
    Cabling Specifications/Limitations 
    Cabling Considerations 
    Cabling Applications 
    Attenuation and dB Loss 
    Interference 
    Incorrect Pinout 
    Bad Ports 
    Open/Short 
    LED Status Indicators 
    Incorrect Transceivers 
    Duplexing Issues 
    TX/RX Reversed 
    Dirty Optical Cables 
Common Tools 
    Cable Crimpers, Strippers, and Snips/Cutters 
    Punchdown Tools 
    Tone Generator 
    Loopback Adapter 
    OTDR 
    Multimeter 
    Cable Tester 
    Wire Map 
    Tap 
    Fusion Splicer 
    Spectrum Analyzer 
    Fiber Light Meter 
What's Next? 
CHAPTER 6: Wireless Solutions and Issues
Understanding Wireless Basics 
    Wireless Channels and Frequencies 
    Cellular Technology Access 
    Speed, Distance, and Bandwidth 
    Channel Bonding 
    MIMO/MU-MIMO/Directional/Omnidirectional 
        Antenna Ratings 
        Antenna Coverage 
    Establishing Communications Between Wireless Devices 
    Configuring the Wireless Connection 
Troubleshooting Wireless Issues 
    Site Surveys 
    Factors Affecting Wireless Signals 
    Interference 
    Reflection, Refraction, and Absorption 
Troubleshooting AP Coverage 
What's Next? 
CHAPTER 7: Cloud Computing Concepts and Options
Cloud Concepts 
    Service Models 
    Software as a Service 
    Platform as a Service 
    Infrastructure as a Service 
    Desktop as a Service 
    Deployment Models 
    Private Cloud 
    Public Cloud 
    Hybrid and Community Clouds 
    Infrastructure as Code 
    Connectivity Options 
    Multitenancy 
    Elasticity 
    Scalability 
    Security Implications 
    The Relationship Between Resources 
What's Next? 
CHAPTER 8: Network Operations
Organizational Documents and Policies 
    Wiring and Port Locations 
        Troubleshooting Using Wiring Schematics 
    Physical and Logical Network Diagrams 
    Baseline Configurations 
    Policies, Procedures, Configurations, and Regulations 
        Policies 
        Password-Related Policies 
        Procedures 
        Change Management Documentation 
        Configuration Documentation 
        Regulations 
        Labeling 
High Availability and Disaster Recovery 
    Backups 
        Full Backups 
        Differential Backups 
        Incremental Backups 
        Snapshots 
    Backup Best Practices 
    Using Uninterruptible Power Supplies 
        Why Use a UPS? 
        Power Threats 
    Beyond the UPS 
    Cold, Warm, Hot, and Cloud Sites 
    High Availability and Recovery Concepts 
    Active-Active Versus Active-Passive 
Monitoring Network Performance 
    Common Performance Metrics 
    SNMP Monitors 
        Management Information Base (MIB) 
    Network Performance, Load, and Stress Testing 
        Performance Tests 
        Load Tests and Send/Receive Traffic 
        Stress Tests 
        Performance Metrics 
    Network Device Logs 
        Security Logs 
        Application Log 
        System Logs 
        History Logs 
        Log Management 
        Patch Management 
    Environmental Factors 
What's Next? 
CHAPTER 9: Network Security
Common Security Concepts 
    Access Control 
    Mandatory Access Control 
    Discretionary Access Control 
    Rule-Based Access Control 
    Role-Based Access Control 
    Defense in Depth 
        Network Segmentation 
        Screened Subnet 
    Separation of Duties 
    Honeypots 
    RADIUS and TACACS+ 
    Kerberos Authentication 
    Local Authentication 
    Lightweight Directory Access Protocol 
    Using Certificates 
    Auditing and Logging 
    Multifactor Authentication Factors 
    Additional Access Control Methods 
        802.1X 
        Extensible Authentication Protocol (EAP) 
        Network Access Control (NAC) 
        MAC Filtering 
    Risk Management 
    Penetration Testing 
    Security Information and Event Management 
Common Networking Attacks 
    Denial-of-Service and Distributed Denial-of-Service Attacks 
        Types of DoS Attacks 
    Other Common Attacks 
        Social Engineering 
        Logic Bomb 
        Rogue DHCP 
        Rogue Access Points and Evil Twins 
        Advertising Wireless Weaknesses 
        Phishing 
        Ransomware 
        DNS Poisoning 
        ARP Cache Poisoning 
        Spoofing 
        Deauthentication 
        Brute Force 
        On-Path Attack 
        VLAN Hopping 
        ARP Spoofing 
    Vulnerabilities and Prevention 
Network Hardening and Physical Security 
    Disposing of Assets 
    Implementing Physical Security 
        Lock and Key 
        Swipe Card and PIN Access 
        Biometrics 
    Two-Factor and Multifactor Authentication 
    Secured Versus Unsecured Protocols 
    Hardening Best Practices 
    Wireless Security 
        MAC Filtering 
        Antenna Placement and Power Levels 
        Isolation 
        Preshared Keys 
        Geofencing 
        Captive Portal 
    IoT Access Considerations 
Remote-Access Methods 
    Remote File Access 
    VPNs 
        Components of the VPN Connection 
        VPN Connection Types 
        VPN Pros and Cons 
        IPSec 
        SSL/TLS/DTLS 
    Site-to-Site and Client-to-Site 
    Virtual Desktops 
    HTTPS/Management URL 
    Authentication and Authorization Considerations 
    Out-of-Band Management 
What's Next? 
CHAPTER 10: Network Troubleshooting
Troubleshooting Steps and Procedures 
    Identify the Problem 
        Identify Symptoms 
        Determine Whether Anything Has Changed 
        Duplicate the Problem if Possible 
        Approach Multiple Problems Individually 
    Establish a Theory of Probable Cause 
    Test the Theory to Determine the Cause 
    Establish a Plan of Action 
    Implement the Solution or Escalate 
        Determine Whether Escalation Is Necessary 
    Verify Full System Functionality 
    Document Findings, Actions, Outcomes, and Lessons 
Software Troubleshooting Tools 
    Wi-Fi Analyzer 
    Protocol Analyzer 
    Bandwidth Speed Tester 
    Port Scanner 
    iperf 
    NetFlow Analyzer 
    TFTP Server 
    Terminal Emulator 
    IP Scanner 
    Command-Line Tools 
    The Trace Route Utility (tracert/traceroute) 
    ping 
        The Destination Host Unreachable Message 
        The Request Timed Out Message 
        The Unknown Host Message 
        The Expired TTL Message 
        Troubleshooting with ping 
        hostname 
    ARP 
        arp ping 
    The netstat Command 
        netstat -e 
        netstat -a 
        netstat -r 
        netstat -s 
        telnet 
    ipconfig 
    ifconfig 
    nslookup 
    dig 
    The tcpdump Command 
    The route Utility 
    nmap 
    Basic Network Platform Commands 
Troubleshooting General Networking Issues 
    Common Considerations 
    Common Problems to Be Aware Of 
        Collisions 
        Broadcast Storm 
        Multicast Flooding 
        Asymmetrical Routing 
        Switching Loops 
        Routing Loops 
        Missing Route 
        Low Optical Link Budget 
        Incorrect VLAN 
        DNS Issues 
        Incorrect Gateway 
        Incorrect Subnet Mask 
        Duplicate or Incorrect IP Address 
        Duplicate MAC Addresses 
        Expired IP Address 
        Rogue DHCP Server 
        Certificate Issues 
        NTP Issues/Incorrect Time 
        DHCP Scope Exhaustion 
        Blocked Ports, Services, or Addresses 
        Incorrect Firewall Settings 
        Incorrect ACL Settings 
        Unresponsive Service 
        BYOD Challenges 
        Licensed Feature Issues 
    Hardware Failure 
    Network Performance Issues 
What's Next? 
Glossary
We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.
Download the errata (45 KB .doc)
