CompTIA Network+ Review Guide
eBook - ePub

CompTIA Network+ Review Guide

Exam N10-007

Jon Buhagiar

Share book
  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

CompTIA Network+ Review Guide

Exam N10-007

Jon Buhagiar

Book details
Book preview
Table of contents
Citations

About This Book

Essential last-minute review aid for the updated CompTIA Network+ Exam N10-007

CompTIA Network+ Review Guide Exam N10-007, 4th Edition, is your ideal study companion for preparing for the CompTIA Network+ exam (N10-007). Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CompTIA Network+ Study Guide, CompTIA Network+ Deluxe Study Guide, and CompTIA Network+ Practice Tests. The book is broken into 5 parts, each part corresponding to one of the 5 objective domain areas of the Network+ exam: Network Architecture; Network Operations; Network Security; Troubleshooting; and Industry Standards, Practices, and Network Theory. Readers will also be given access to the comprehensive online Sybex test bank, which includes two bonus practice tests, electronic flashcards, and a glossary of terms that you'll need to know come exam day.

CompTIA's Network+ certification covers advances in networking technology, and reflects changes in associated job tasks. The exam places greater emphasis on network implementation and support, and includes expanded coverage of wireless networking topics. This review guide gives you the opportunity to identify your level of knowledge while there's still time to study, and avoid exam-day surprises.

  • Review network architecture and security
  • Understand network operations and troubleshooting
  • Gain insight into industry standards and best practices
  • Get a firmer grasp of network theory fundamentals

If you're looking for a beginning, vendor-neutral networking certification, look no further than CompTIA Network+.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is CompTIA Network+ Review Guide an online PDF/ePUB?
Yes, you can access CompTIA Network+ Review Guide by Jon Buhagiar in PDF and/or ePUB format, as well as other popular books in Computer Science & Certification Guides in Computer Science. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Sybex
Year
2018
ISBN
9781119432302
Edition
4

Chapter 1
Domain 1.0: Networking Concepts

THE FOLLOWING COMPTIA NETWORK+ OBJECTIVES ARE COVERED IN THIS CHAPTER:
  • images
    1.1 Explain the purposes and uses of ports and protocols.
    • Protocols and ports
      • SSH 22
      • DNS 53
      • SMTP 25
      • SFTP 22
      • FTP 20, 21
      • TFTP 69
      • TELNET 23
      • DHCP 67, 68
      • HTTP 80
      • HTTPS 443
      • SNMP 161
      • RDP 3389
      • NTP 123
      • SIP 5060, 5061
      • SMB 445
      • POP 110
      • IMAP 143
      • LDAP 389
      • LDAPS 636
      • H.323 1720
    • Protocol types
      • ICMP
      • UDP
      • TCP
      • IP
    • Connection-oriented vs. connectionless
  • images
    1.2 Explain devices, applications, protocols and services at their appropriate OSI layers.
    • Layer 7 – Application
    • Layer 6 – Presentation
    • Layer 5 – Session
    • Layer 4 – Transport
    • Layer 3 – Network
    • Layer 2 – Data link
    • Layer 1 – Physical
  • images
    1.3 Explain the concepts and characteristics of routing and switching.
    • Properties of network traffic
      • Collision domains
      • Broadcast domains
      • CSMA/CD
      • CSMA/CA
      • Protocol data units
      • MTU
      • Broadcast
      • Multicast
      • Unicast
    • Segmentation and interface properties
      • VLANs
      • Trunking (802.1Q)
      • Tagging and untagging ports
      • Port mirroring
      • Switching loops/spanning tree
      • PoE and PoE+ (802.3af, 802.3at)
      • DMZ
      • MAC address table
      • ARP table
    • Routing
      • Routing types
        • Static
        • Dynamic
        • Default
      • Routing protocols (IPv4 and IPv6)
        • Distance-vector routing protocols
          • RIP
          • EIGRP
        • Link-state routing protocols
          • OSPF
        • Hybrid
          • BGP
    • IPv6 concepts
      • Addressing
      • Tunneling
      • Dual stack
      • Router advertisement
      • Neighbor discovery
    • Performance concepts
      • Traffic shaping
      • QoS
      • Diffserv
      • CoS
    • NAT/PAT
    • Port forwarding
    • Access control list
    • Distributed switching
    • Packet-switched vs. circuit-switched network
    • Software-defined networking
  • images
    1.4 Given a scenario, configure the appropriate IP addressing components.
    • Private vs. public
    • Loopback and reserved
    • Default gateway
    • Virtual IP
    • Subnet mask
    • Subnetting
      • Classful
        • Classes A, B, C, D, and E
      • Classless
        • VLSM
        • CIDR notation (IPv4 vs. IPv6)
      • Address assignments
        • DHCP
        • DHCPv6
        • Static
        • APIPA
        • EUI64
        • IP reservations
  • images
    1.5 Compare and contrast the characteristics of network topologies, types and technologies.
    • Wired topologies
      • Logical vs. physical
      • Star
      • Ring
      • Mesh
      • Bus
    • Wireless topologies
      • Ad-hoc
      • Infrastructure
      • Mesh
    • Types
      • LAN
      • WLAN
      • WAN
      • MAN
      • CAN
      • SAN
      • PAN
    • Technologies that facilitate the Internet of Things (IoT)
      • Z-Wave
      • Ant+
      • Bluetooth
      • NFC
      • IR
      • RFID
      • 802.11
  • images
    1.6 Given a scenario, implement the appropriate wireless technologies and configurations.
    • 802.11 standards
      • b
      • a
      • g
      • n
      • ac
    • Cellular
      • TDMA
      • CDMA
      • GSM
    • Frequencies
      • 2.4GHz
      • 5.0GHz
    • Speed and distance requirements
    • Channel bandwidth
    • Channel bonding
    • MIMO/MU-MIMO
    • Unidirectional/omnidirectional
    • Site surveys
  • images
    1.7 Summarize cloud concepts and their purposes.
    • Types of services
      • SaaS
      • PaaS
      • IaaS
    • Cloud delivery models
      • Private
      • Public
      • Hybrid
    • Connectivity methods
    • Security implications/considerations
    • Relationship between local and cloud resources
  • images
    1.8 Explain the functions of network services.
    • DNS service
      • Record types
        • A, AAAA
        • TXT (SPF, DKIM)
        • SRV
        • MX
        • CNAME
        • NS
        • PTR
      • Internal vs. external DNS
      • Third-party/cloud-hosted DNS
      • Hierarchy
      • Forward vs. reverse zone
    • DHCP service
      • MAC reservations
      • Pools
      • IP exclusions
      • Scope options
      • Lease time
      • TTL
      • DHCP relay/IP helper
    • NTP
    • IPAM
images
When I first started on my career path as a network professional 25 years ago, I began by learning the basic concepts of networking by reading a book similar to this one. The original networking concepts have not really changed all that much. Some concepts have been replaced by new ones, and some have just become obsolete. This is because networks have evolved and networking needs have changed over the years. Over the course of your career, you too will see similar changes. However, most of the concepts you learn for this objective will become your basis for understanding current and future networks.
When learning network concepts, you might feel you need to know everything before you can learn one thing. This can be an overwhelming feeling for anyone. However, I recommend that you review the sections again once you’ve read the entire chapter. Not only does this help with review and memorization, but the pieces will make more sense once you see the entire picture.
images
For more detailed information on Domain 1’s topics, please see CompTIA Network+ Study Guide, 4th ed. (978-1-119-43225-8) or CompTIA Network+ Certification Kit, 5th ed. (978-1-119-43228-9) published by Sybex.

1.1 Explain the purposes and uses of ports and protocols.

As a network professional, you will be expected to be fluent in acronyms. You’ll run across lots and lots of acronyms, and knowing their definitions is going to be the easy part. Understanding the practical application of these protocols will be what defines your knowledge of networking concepts.

Protocols and Ports

In this section I will introduce numerous protocols that are used to support network communications and administer networking components, as well as configure and troubleshoot networking components. The following are associated with each of these protocols:
  • A transport layer protocol in which it operates
  • A port number where it listens for requests
I will cover the transport layer protocols as well as the entire Open Systems Interconnection (OSI) model in the section “Explain devices, applications, protocols and services at their appropriate OSI layers.”

SSH (22)

Secure Shell (SSH) is a cryptographic protocol that is used to remotely administer Linux server and network equipment through a text console. The SSH protocol uses public key cryptology to authenticate and encrypt network access from the remote computer. This allows the user to securely log in without risk of the password being transmitted in clear text. Once the user is authenticated, all network transmissions are uniquely encrypted. The SSH protocol listens for incoming requests on TCP port 22. It is common practice for cloud providers to use SSH for authentication of administrators. They do this by providing the private key of the key pair to the administrator. I will cover key pairs in Chapter 4, “Domain 4: Network Security.”

DNS (53)

Domain Name Services (DNS) is a distributed director...

Table of contents