CompTIA Network+ N10-007 Exam Cram

CompTIA Network+ N10-007 Exam Cram

by Emmett Dulaney

NOOK Book(eBook)

$20.49 $35.99 Save 43% Current price is $20.49, Original price is $35.99. You Save 43%.
View All Available Formats & Editions

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now


Prepare for CompTIA Network+ N10-007 exam success with this CompTIA approved Exam Cram from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner.

This is the eBook version of the print title. Note that the eBook may not provide access to the practice test software that accompanies the print book. Access to the digital edition of the Cram Sheet is available through product registration at Pearson IT Certification; or see the instructions in the back pages of your eBook.

CompTIA® Network+ N10- 007 Exam Cram, Sixth Edition is the perfect study guide to help you pass CompTIA’s Network+ N10-007 exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of security, cloud networking, IPv6, and wireless technologies. The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, Sidebars, and Notes interspersed throughout the text keep you focused on what you need to know. Cram Quizzes help you assess your knowledge, and the Cram Sheet tear card is the perfect last-minute review.

Covers the critical information you’ll need to know to score higher on your CompTIA Network+ (N10-007) exam!

·         Understand modern network topologies, protocols, and infrastructure

·         Implement networks based on specific requirements

·         Install and configure DNS and DHCP

·         Monitor and analyze network traffic

·         Understand IPv6 and IPv4 addressing, routing, and switching

·         Perform basic router/switch installation and configuration

·         Explain network device functions in cloud environments

·         Efficiently implement and troubleshoot WANs

·         Install, configure, secure, and troubleshoot wireless networks

·         Apply patches/updates, and support change/configuration management

·         Describe unified communication technologies

·         Segment and optimize networks

·         Identify risks/threats, enforce policies and physical security, configure firewalls, and control access

·         Understand essential network forensics concepts

·         Troubleshoot routers, switches, wiring, connectivity, and security

Product Details

ISBN-13: 9780134866260
Publisher: Pearson Education
Publication date: 12/28/2017
Series: Exam Cram
Sold by: Barnes & Noble
Format: NOOK Book
Pages: 576
Sales rank: 771,666
File size: 11 MB
Note: This product may take a few minutes to download.

About the Author

Emmett Dulaney (CompTIA Network+, Cloud+, Security+, A+, and others) is the author of numerous books on certifications and operating systems. He is a columnist for Certification Magazine and a professor at a small university. He is also the author of CompTIA A+ Complete Study Guide and CompTIA Security+ Study Guide.

Table of Contents


Chapter 1: Introduction to Networking Technologies

Wired and Wireless Network Topologies

    Bus Topology

    Ring Topology

    Star Topology

    Wired Mesh Topology

    Wireless Topologies

    Hybrid Topologies

Network Types








IoT Technologies








    The Magic Behind 802.11n and 802.11ac

    A Summary of 802.11 Wireless Standards

What’s Next?

Chapter 2: Models, Ports, Protocols, and Networking Services

The OSI Networking Model

    The OSI Seven-Layer Model

    Comparing OSI to the Four-Layer TCP/IP Model

    Identifying the OSI Layers at Which Various Network Components Operate

Ports and Protocols

    Connection-Oriented Protocols Versus Connectionless Protocols

    Internet Protocol

    Transmission Control Protocol

    User Datagram Protocol

    File Transfer Protocol

    Secure File Transfer Protocol

    Trivial File Transfer Protocol

    Simple Mail Transfer Protocol

    Hypertext Transfer Protocol

    Hypertext Transfer Protocol Secure

    Post Office Protocol Version 3/Internet Message Access Protocol Version 4


    Secure Shell

    Internet Control Message Protocol

    Network Time Protocol

    Lightweight Directory Access Protocol


    Simple Network Management Protocol

    Session Initiation Protocol

    Remote Desktop Protocol

    Server Message Block

    Understanding Port Functions

    ARP and RARP

Network Services

    Domain Name Service (DNS)

    The DNS Namespace

    Types of DNS Entries

    DNS Records

    DNS in a Practical Implementation

    Dynamic Host Configuration Protocol

    The DHCP Process

    DHCP and DNS Suffixes

    DHCP Relays and IP Helpers

    IP Address Management

    Network Time Protocol

What’s Next?

Chapter 3: Addressing, Routing, and Switching

IP Addressing


    IP Address Classes

    Subnet Mask Assignment


    Identifying the Differences Between IPv4 Public and Private Networks

    Classless Interdomain Routing

    Default Gateways

    Virtual IP

    IPv4 Address Types

    IPv6 Addressing

    Comparing IPv4 and IPv6 Addressing

    Assigning IP Addresses

    Identifying MAC Addresses

    NAT, PAT, SNAT, and DNAT

Managing TCP/IP Routing and Switching

    The Default Gateway

    Routing Tables

    Static Routing

    Switching Methods

    Software-Defined Networking

    Dynamic Routing

    Network Traffic

    Routing Metrics

    Virtual Local-Area Networks

    The Spanning Tree Protocol

    Interface Configuration and Switch Management


    Port Mirroring

    Port Authentication

    Power over Ethernet


    MAC Address Table

    Switch Management

    Managed and Unmanaged

    Quality of Service

    Traffic Shaping

    Access Control Lists

What’s Next?

Chapter 4: Network Components and Devices

Common Network Devices







    Wireless Access Point

    Media Converter

    Wireless Range Extender

    VoIP Endpoint

    Network Devices Summary

Advanced Networking Devices

    Multilayer Switch

    Wireless Controller

    Load Balancer


    Proxy Server

    VPN Concentrator

    AAA/RADIUS Server

    UTM Appliances and NGFW/Layer 7 Firewalls

    VoIP PBX and Gateway

    Content Filter

What’s Next?

Chapter 5: WAN Technologies

WAN Technologies

    Integrated Services Digital Network

    Leased Lines

    Fiber, SONET, and OCx Levels

    Frame Relay

    Asynchronous Transfer Mode

    Copper Versus Fiber

    Other WAN Technologies

Internet Access Technologies

    DSL Internet Access

    Cable Broadband

    Broadband Security Considerations


    The Public Switched Telephone Network

    Satellite Internet Access

    Wireless Internet Access

    Termination Points

What’s Next?

Chapter 6: Cabling Solutions

General Media Considerations

    Broadband Versus Baseband Transmissions

    Simplex, Half-Duplex, and Full-Duplex Modes

    Data Transmission Rates

    Types of Network Media

    Types of Media Connectors

    Media Couplers/Converters

    568A and 568B Wiring Standards

    Straight-Through Versus Crossover Cables

    Rollover and Loopback Cables

    Components of Wiring Distribution

    Ethernet Deployment Standards

Troubleshooting Common Wired Connectivity Issues







    Incorrect Pin-Out

    Incorrect Cable Types

    Bad Port

    Transceiver Mismatch

    TX/RX Reversed

    Duplex/Speed Mismatch

    Damaged Cables

    Bent Pins


    VLAN Mismatch

    Network Connection LED Status Indicators

What’s Next?

Chapter 7: Wireless Solutions

Understanding Wireless Basics

    Wireless Channels and Frequencies

    Cellular Access

    Speed, Distance, and Bandwidth

    Channel Bonding


    Site Surveys

    Establishing Communications Between Wireless Devices

    Configuring the Wireless Connection

Troubleshooting Wireless Issues

    Factors Affecting Wireless Signals

    Troubleshooting AP Coverage

What’s Next?

Chapter 8: Cloud Computing and Virtualization

Cloud Concepts

    Software as a Service

    Platform as a Service

    Infrastructure as a Service

    Other Types of Services

    Private Cloud

    Public Cloud

    Hybrid Cloud

    Connectivity Methods

    Security Implications and Considerations

    The Relationship Between Resources

Virtualization and Storage-Area Networks


    Storage-Area Networks

What’s Next?

Chapter 9: Network Operations

Documentation Management

    Wiring and Port Locations

    Physical and Logical Network Diagrams


    Policies, Procedures, Configurations, and Regulations


Business Continuity and Disaster Recovery


    Backup Best Practices

    Using Uninterruptible Power Supplies

    Alternatives to UPS

    Hot, Warm, and Cold Sites

    High Availability and Recovery Concepts

Monitoring Network Performance

    Common Reasons to Monitor Networks

    SNMP Monitors

    Packet Sniffers

    Throughput Testing

    Port Scanners

    Vulnerability Scanners

    Network Performance, Load, and Stress Testing

    Tracking Event Logs

Remote Access

    Remote File Access


    Site-to-Site and Client-to-Site

    HTTPS/Management URL

    Out-of-Band Management

What’s Next?

Chapter 10: Network Security

Physical Security and Device Hardening

    Adding Physical Security to the Mix

    Two-Factor and Multifactor Authentication

    Secured Versus Unsecured Protocols

    Additional Device Hardening

Authentication and Access Controls

    Mandatory Access Control

    Discretionary Access Control

    Rule-Based Access Control

    Role-Based Access Control


    Kerberos Authentication

    Local Authentication

    Lightweight Directory Access Protocol

    Using Certificates

    Auditing and Logging

    Multifactor Authentication Factors

    Access Control

Securing Wireless Networks


    Wireless Authentication and Authorization

    Shared, Preshared, and Open Keys

Common Networking Attacks

    Denial-of-Service and Distributed Denial-of-Service Attacks

    Other Common Attacks

    Vulnerabilities and Prevention

Mitigation Techniques

    Signature Management

    Device Hardening

    Change Native VLAN

    Switch and Port Protection

    Demilitarized Zones (Perimeter Network)

    VLAN Network Segmentation

    Privileged User Account

    File Integrity Monitoring

    Role Separation

    Using ACLs to Restrict Access

    Honeypots and Honeynets

    Penetration Testing

What’s Next?

Chapter 11: Network Troubleshooting

Troubleshooting Steps and Procedures

    Identify the Problem

    Establish a Theory of Probable Cause

    Test the Theory to Determine Cause

    Establish a Plan of Action

    Implement the Solution or Escalate

    Verify Full System Functionality

    Document the Findings, Actions, and Outcomes

Hardware and Software Troubleshooting Tools

    Wire Crimpers, Strippers, and Snips

    Tone Generator and Probes

    Loopback Adapter

    Protocol Analyzer

    Media/Cable Testers

    TDR and OTDR


    Spectrum Analyzer

    Packet Sniffers

    Port Scanner

    Wi-Fi Analyzer

    Bandwidth Speed Tester and Looking Glasses

    Environmental Monitors

    Command-Line Troubleshooting Tools

    The Trace Route Utility (tracert/traceroute)



    The netstat Command





    The tcpdump Command

    The route Utility


Troubleshooting Common Network Service Issues

    Common Problems to Be Aware Of

    Hardware Failure

What’s Next?




9780789758750   TOC   2/7/2018


Customer Reviews