CompTIA Network+ N10-008 Exam Cram (2021)

CompTIA Network+ N10-008 Exam Cram (2021) ensures success with step-by-step guidance and test strategies.

Michael Davis
Contributor
4.1
143
about 1 year ago
Preview (31 of 654 Pages)
100%
Log in to unlock

Page 1

CompTIA Network+ N10-008 Exam Cram (2021) - Page 1 preview image

Loading page ...

Page 2

CompTIA Network+ N10-008 Exam Cram (2021) - Page 2 preview image

Loading page ...

Page 3

CompTIA Network+ N10-008 Exam Cram (2021) - Page 3 preview image

Loading page ...

i

Page 4

CompTIA Network+ N10-008 Exam Cram (2021) - Page 4 preview image

Loading page ...

iCompTIA Network+Certification Guide(Exam N10-008)Unleash your full potential as aNetwork AdministratorEithne Hoganwww.bpbonline.com

Page 5

CompTIA Network+ N10-008 Exam Cram (2021) - Page 5 preview image

Loading page ...

iiCopyright © 2023 BPB OnlineAll rights reserved.No part of this book may be reproduced, stored in a retrieval system,or transmitted in any form or by any means, without the prior written permission ofthe publisher, except in the case of brief quotations embedded in critical articles orreviews.Every effort has been made in the preparation of this book to ensure the accuracy ofthe information presented. However, the information contained in this book is soldwithout warranty, either express or implied. Neither the author, nor BPB Online or itsdealers and distributors, will be held liable for any damages caused or alleged to havebeen caused directly or indirectly by this book.BPB Online has endeavored to provide trademark information about all of thecompanies and products mentioned in this book by the appropriate use of capitals.However, BPB Online cannot guarantee the accuracy of this information.First published: 2023Published by BPB OnlineWeWork119 Marylebone RoadLondon NW1 5PUUK | UAE | INDIA | SINGAPOREISBN978-93-55518-743www.bpbonline.com

Page 6

CompTIA Network+ N10-008 Exam Cram (2021) - Page 6 preview image

Loading page ...

iiiDedicated toMy beloved six children:Samantha,Patrick,Lesleyanne,Kathryn,ChelseaandDylan&My beautiful six grandchildren:Devin,Alannah,Frankie,Kara,Tylerand‘baby on the way’Cook

Page 7

CompTIA Network+ N10-008 Exam Cram (2021) - Page 7 preview image

Loading page ...

ivAbout the AuthorWith over 28 years’ experience as an educator,Eithne Hoganhas accomplished awide diversity of roles. She is currently the coordinator of the Datacenter AcademyProgram supported by Microsoft, in the college she teaches in. With Microsoft’spartnership and expertise, there is a fully functional 3 rack mini scale datacenterlab in the college, which was built in November 2019, to support the teachingand learning of datacenter technologies and server administration to aspiringtechnicians. Eithne is the coordinator and instructor of this program.She is also is a part-time lecturer in other higher education universities, anddelivers the content of several CompTIA certifications there. Additionally, shecurrently manages the college’s local Cisco Network Academy, personally holdingcertificates of recognition in Instructor Excellence and 9 years of active serviceand participation. Furthermore, the CompTIA Academy partnership has beenoperational for 23 years in the college. Eithne oversees this affiliation.Regarding IT, Eithne has written and developed curriculum that is nationallyrecognisedanddelivered.Thiscurriculumincludesnetworkinfrastructure,network topologies, network administration, and switching, routing and wirelesstechnologies. She is the Digital Lead for the community college and alongside othercolleagues, she collaborates and drives the transformation to the digital landscapein teaching and learning practices.

Page 8

CompTIA Network+ N10-008 Exam Cram (2021) - Page 8 preview image

Loading page ...

vAcknowledgementI want to express my deepest gratitude to my family and friends for theircontinuous support and encouragement throughout this book's writing, especiallymy children and my grandchildren. You all make everything I do in life meaningfulbeyond measure. Of that you can be sure.I am also grateful to BPB Publications for their guidance and expertise in bringingthis book to completion. It was a long journey of reviewing and revising this book,with precious participation and committed collaboration of reviewers, technicalexperts, and editors. But like all of these types of journeys, reaching the destinedshores, makes the rocky and the calm seas all the more adventurous.I would also like to acknowledge the colleagues and professionals I have respectedduring many years working in education. You have taught me so much, and givenme the experience, shared stories, and taut training, that has helped me create thepositives in life, and meet and outcreate the bumpier challenges.We do not sail our ship alone.Finally, I would like to thank all the readers who have taken an interest in my bookand for their support in making this project a reality. I hope you learn much fromits contents. I too share the love of opening a new book and embarking on a brandnew learning journey. So I wish you the best, as you read, revise, and learn.Enjoy!

Page 9

CompTIA Network+ N10-008 Exam Cram (2021) - Page 9 preview image

Loading page ...

viPrefaceNetwork administration involves managing and monitoring the functionality,quality and security of a network on a day-to-day basis. Networks are madeup of a diversity of physical devices with an overlay and variety of softwaretypes, configurations and protocols. When we consider the need and range ofunderstanding required to assimilate how hardware and software interact witheach other, even in terms of a standalone PC or laptop, we can scale our thinkingand visualize the sheer scope of knowledge and skills it takes to effectively manageand monitor a network. But believe me when I tell you, the challenge is worth therewards!Network design and implementation is based on organizational needs and changes.The breadth of knowledge administrators possess, encompasses network planningand design, network infrastructure, network operations, an ability to appraise andevaluate security, to perceive network capacity and performance, and an estimatedtarget to be reached, in a world where high availability and continuity of serviceis deemed paramount. Network administrators form the backbone of a company’sassets.This book is designed to provide a comprehensive guide to the job role andduties of a network administrator. It prepares the reader to sit for the CompTIANetwork+ exam, but it does so much more than this. In a thorough manner, thisguide enables the reader to learn specific networking skills and start their journeyin a technical support and IT operational role. It enables the reader to acquire theskillset to install, configure, maintain, and monitor network hardware, software,and effectively handle troubleshooting tools. The book’s content incorporates acuteawareness of security as it pertains to network operations. The book is intendedfor anyone who wishes to understand how to have a rewarding career in networkadministration. I hope you will find this book informative and helpful. Here aresome brief descriptions of all the chapters in the book:Chapter 1: The OSI Model –outlines the need for standards in the IT industry. Thechapter describes the origins and evolution of the OSI model and how the sevenlayers of the OSI model break down the core concepts of networking functionsand processes. Furthermore, the chapter also gives the reader an overview andexplanation of each discrete layer and describes how the layer operates in data

Page 10

CompTIA Network+ N10-008 Exam Cram (2021) - Page 10 preview image

Loading page ...

viitransmission. It explains in detail how encapsulation and decapsulation works asdata traverses networks. The descriptions and illustrations walk the reader throughthe layers of the model, and builds their understanding of network fundamentals.Chapter 2: Network Topologies -presents a detailed overview of networktopologies,includingillustrationsofeachtopologycovered.Thechapterdifferentiates between physical and logical topologies. The chapter shows howvirtual networks function, and explains the critical nature of hypervisors. Thechapter also articulates how understanding of virtualization is paramount intoday’s networking environment.Chapter 3: Cables and Connectors –coversthe cables and connectors used inEthernet, Coax and Fiber networks. Furthermore, the chapter demonstrates thecorrect cable type and matching connector(s) used in networks, to include thecable’s intended purpose. Readers are shown the difference between wired andwireless networks and are given step-by-step instructions for building a straightthroughorcrossovercable,adheringtotheappropriatewiringstandards.Additionally, the chapter details proper cable management procedures.Chapter 4: IP Addressing and Subnetting –permits the reader to learn thefundamental concepts of IP addressing.Thechaptercovers IPv4andIPv6addressing structures, the transition to IPv6 and explains how the transition istaking place. Furthermore, the reader is shown how to subnet and apply bestpractices in creating network subnets. The chapter includes hands-on subnettingpractice. IP addressing makes devices accessible for communication. As such, thechapter includes practical examples based on real scenarios. This chapter helpsthe reader to solve real addressing problems and provides an easy mechanism toidentify addressing schemes in networks.Chapter 5: Ports and Protocols –helps the reader learn the protocols of the TCP/IP suite of protocols. TCP/IP is the only routable protocol and therefore is used indata transmission across all network types, locally and globally, anywhere packetsneed to be sent and delivered. The chapter outlines port numbers and describeshow these numbers are applicable to comprehending functionality and securitypractices. The chapter offers advice to the reader about protocols that might beblocked in firewalls, unless otherwise required.Chapter 6: Implementing and Troubleshooting Network Services –shows coreconcepts of networking services. The reader is walked through a typical installationof a role-based feature in Windows Server 2019. The reader is shown how to install

Page 11

CompTIA Network+ N10-008 Exam Cram (2021) - Page 11 preview image

Loading page ...

viiiand configure DHCP and DNS on a server operating system. This chapter alsooffers a detailed description of NTP as an important network service.Chapter 7: Data Center Technologies –explains with details and numerousillustrations, how datacenter technologies operate. The chapter is focused ondatacenter architecture, storage solutions and RAID. The chapter covers practicalexamples of RAID implementations for given scenarios and demonstrates best usefor specific implementations.Chapter 8: Cloud Concepts –is aimed to give the reader more familiarity withcloud computing, deployment models and service models. This chapter coversreal-world examples of cloud provision and allows the reader to comprehend theappropriate services suited to the needs of an organization. In essence, the chapterinforms the reader and permits them to identify and make good choices, whendiscussing or selecting online services with colleagues or other stakeholders.Chapter 9: Managing Network Devices –is a detailed description of networkdevices and how they are mapped to the layers of the OSI model. The chapter isintended to demonstrate the functionality and purpose of the device in order toenable the reader to identify which device is necessary for a specific job role on thenetwork. Furthermore, the chapter describes how the device operates and showsthe reader what to watch out for, in order to ensure the device is optimally suitedfor its role. The chapter emphasizes how to ensure network performance, integrityand resilience to maintain the expected service levels and maximize bandwidth.Chapter 10: Managing Switching Protocols –takes a deeper dive into switchingtechnologies and protocols such as STP and ARP. The chapter focuses on howswitches make decisions, and how they learn and build their MAC table. Thechapter permits the reader to comprehend switching functionality in order toevaluate, diagnose and troubleshoot switches on a network. Additionally, thechapter introduces the concept of VLANs, explains switch segmentation andshows the reader how to make decisions about the presence of VLANs in theircompanies. The chapter also shows the reader how and when to implement portsecurity.Chapter 11: Managing Routing Protocols –takes a deeper dive into routingtechnologies and protocols such as OSPF, EIGRP, and BGP. The chapter focuseson how routers make decisions, and how they learn and build their routing table.The chapter permits the reader to comprehend routing functionality in orderto evaluate, diagnose and troubleshoot routers on a network. Additionally, the

Page 12

CompTIA Network+ N10-008 Exam Cram (2021) - Page 12 preview image

Loading page ...

ixchapter introduces the concept of subnets, explains router segmentation andshows the reader how to make decisions about the presence of subnets in theircompanies. The chapter also shows the reader how and when to implement staticor dynamic routing and how to competently manage network bandwidth.Chapter 12: Installing and Configuring Wireless Technologies –allows thereader to differentiate between IEEE 802.11 standards. The chapter provides detailon each of these standards, the frequency bands in use and configuration optionsper standard. Furthermore, the chapter also walks the reader through the stepsto configure a SOHO router, adhering to best practices and optimum securitymeasures.Chapter 13: Managing and Monitoring a Network –outlines Windows integratedtools and free open source software, used to manage and monitor networks. Thechapter’s primary intention is to permit the reader to apply this knowledge ina practical way and show them how to use integrated or third-party tools totroubleshoot a system. The chapter offers examples of ways to assess networkperformance and provides mechanisms to narrow down relevant issues thatnegatively impact network operation.Chapter 14: Policies and Procedures in Practice –gives special attention tothe real-world practicalities of running a business or organization. The chapterfocuses on documentation required, and the negotiation needed to manage acorporate network and do so effectively. Furthermore, the chapter emphasisesthe importance of planning, designing and reviewing policies and procedures aspart of the organizations change management ethos and gives recommendationsto the reader, showing them how to be positive collaborators in IT and businessoperations.Chapter15:Resilience,FaultTolerance,andRecoveryoffersadetaileddescription of backup and failover strategies and demonstrates where thesestrategies fit in with high availability planning and with a Disaster Recovery Plan.Furthermore, the chapter shows the reader how to implement RAID and explainswhich failover strategy suits a given scenario. This chapter covers practicalexamples of working with recovery strategies.Chapter 16: Security Concepts –introduces the reader to common securityconcepts. The chapter lays the foundations for further topics covered in theupcoming chapters. Additionally, the chapter shows the user ways to safeguard

Page 13

CompTIA Network+ N10-008 Exam Cram (2021) - Page 13 preview image

Loading page ...

xusers on a network and how to mitigate internal and external threats, therebyprotecting the network users’ privacy and data.Chapter 17: Vulnerabilities, Threats, and Attacks –extends on the concepts of theprevious chapter and offers a detailed description of vulnerabilities, threats andattacks. This chapter shows the reader how to mitigate threats and demonstratesstrategies for eliminating vulnerabilities and loopholes on the network. Thechapter provides practical examples of real-world technology-based attacks andsocial engineering attacks, and offers advice on how to counter these risks andthreats.Chapter 18: Network Hardening Techniques –covers practical techniques relatedto securing and hardening a network. Furthermore, the chapter also allows thereader to learn and apply the strategies to manage workstations, monitor networkdevices, secure hardware and software, and educate users to ensure best practiceswhile accessing the organization’s network resources. The chapter covers networkmanagement policies and protocols such as password complexity, multi-factorauthentication, SMNP and Syslog among others.Chapter 19: Remote Management –shows core concepts of remote managementprocedures and provides practical examples and remote management connectivityoptions to the reader. The chapter includes practical examples and use case scenariosfor diverse VPN configurations. The chapter covers remote desktop connectivityoptions and explains to the reader the context of their use, emphasising securityimplications. Additionally, this chapter provides the reader with a step-by-stepguide to configuring an RDP gateway on a Windows server.Chapter 20: Implementing Physical Security –focuses on the objectives ofphysical security controls and shows the reader effective security methods to beused, and how to implement these methods on networks. Furthermore, the chapteralso instils in the reader the relevance of prevention measures and demonstratesproactive actions used by network administrators to optimize security proceduresand protocols running on the network. These procedures includes perimetersecurity of the building itself and includes the concept of security zones.Chapter 21: Network Troubleshooting –gives special attention to the networktroubleshooting model. The chapter goes through the steps of the troubleshootingmodel and presents the reader with tips and tools for handing each step withproficiency.Thischapterencouragesthereadertofollowthismodeland

Page 14

CompTIA Network+ N10-008 Exam Cram (2021) - Page 14 preview image

Loading page ...

ximethodology, and consequently become equipped with the cognitive awarenessrequired for a job role in administering networks.Chapter22:TroubleshootingCableConnectivitycoverstheskillsandcompetences required to troubleshoot cable connectivity. The chapter presentsbounded media as the fundamental backbone of wired networks and shows thereader how to visually inspect cables and LEDs in Ethernet and fiber networks.Furthermore, the chapter shows the reader how to use hardware tools to diagnoseand troubleshoot defective or incorrectly chosen cabling.Chapter 23: Network Utilities –covers network software tools as used in commandline interface and Cisco’s IOS. The chapter offers real-world examples of problemsthat occur on networks where these tools are invaluable. Furthermore, the readeris shown how to use a wide variety of tools and is given practical case uses for eachtool presented. The chapter demonstrates a range of third-party software toolsand CLI commands, and explains how to use each tool and identify the correctpurpose of its use.Chapter 24: Troubleshooting Wireless Networks –presents a detailed overviewof the infrastructure of wireless networks. Additionally, the chapter focuses onwireless deployments, standards and limitations, common issues and solutionsand other common checks and tests. The chapter encourages the reader to followtroubleshooting methods to work through and resolve the issues that arise inwireless networks and at all times incorporate the learning of network models,such as the OSI model and the network troubleshooting model.Chapter 25: Troubleshooting General Networking Issues –covers the commonconsiderations applicable to general networking issues. The chapter providesthe reader with comprehensive detail on common issues and shows the readerhow to incorporate knowledge of the OSI model, when resolving network issues.Furthermore, the chapter also maps network problems to the relevant layer of theOSI model and offers the reader ways to manage problem-solving. This chapterbrings the learning full cycle and permits the reader to apply the OSI model in apractical way, using it as a tool and guide in network repair.Chapter 26: Network + Practice Exams –provides the reader with practice multiplechoice questions. The questions are aligned with the domains of the Network+, asoutlined in CompTIA’s official exam objectives.

Page 15

CompTIA Network+ N10-008 Exam Cram (2021) - Page 15 preview image

Loading page ...

xiiColoured ImagesPlease follow the link to download theColoured Imagesof the book:https://rebrand.ly/4ab0d8We have code bundles from our rich catalogue of books and videos available athttps://github.com/bpbpublications. Check them out!ErrataWe take immense pride in our work at BPB Publications and follow best practicesto ensure the accuracy of our content to provide with an indulging readingexperience to our subscribers. Our readers are our mirrors, and we use their inputsto reflect and improve upon human errors, if any, that may have occurred duringthe publishing processes involved. To let us maintain the quality and help us reachout to any readers who might be having difficulties due to any unforeseen errors,please write to us at :errata@bpbonline.comYour support, suggestions and feedbacks are highly appreciated by the BPBPublications’ Family.Did you know that BPB offers eBook versions of every book published,with PDF and ePub files available? You can upgrade to the eBook versionat www.bpbonline.com and as a print book customer, you are entitled to adiscount on the eBook copy. Get in touch with us at :business@bpbonline.comfor more details.Atwww.bpbonline.com, you can also read a collection of free technicalarticles, sign up for a range of free newsletters, and receive exclusivediscounts and offers on BPB books and eBooks.

Page 16

CompTIA Network+ N10-008 Exam Cram (2021) - Page 16 preview image

Loading page ...

xiiiPiracyIf you come across any illegal copies of our works in any form on the internet,we would be grateful if you would provide us with the location address orwebsite name. Please contact us atbusiness@bpbonline.comwith a linkto the material.If you are interested in becoming an authorIf there is a topic that you have expertise in, and you are interested in eitherwriting or contributing to a book, please visitwww.bpbonline.com. Wehave worked with thousands of developers and tech professionals, just likeyou, to help them share their insights with the global tech community. Youcan make a general application, apply for a specific hot topic that we arerecruiting an author for, or submit your own idea.ReviewsPlease leave a review. Once you have read and used this book, why notleave a review on the site that you purchased it from? Potential readers canthen see and use your unbiased opinion to make purchase decisions. We atBPB can understand what you think about our products, and our authorscan see your feedback on their book. Thank you!For more information about BPB, please visitwww.bpbonline.com.Join our book's Discord spaceJoin the book's Discord Workspace for Latest updates, Offers, Tech happenings around theworld, New Release and Sessions with the Authors:https://discord.bpbonline.com

Page 17

CompTIA Network+ N10-008 Exam Cram (2021) - Page 17 preview image

Loading page ...

xivTable of Contents1.The OSI Model............................................................................................................1Introduction............................................................................................................1Structure..................................................................................................................2Objectives................................................................................................................2The need for standards.........................................................................................2Standards versus protocols................................................................................3The OSI model........................................................................................................4Protocol data units.............................................................................................7Bit............................................................................................................................8Frame.......................................................................................................................8Segment...................................................................................................................9Packet......................................................................................................................9Analogy for data transmission..........................................................................9The seven layers of the OSI model....................................................................11The physical layer............................................................................................11Modes of communication......................................................................................12The data link layer...........................................................................................14The network layer..................................................................................................15The transport layer..........................................................................................17Scenario.................................................................................................................18The session layer..............................................................................................19The presentation layer......................................................................................20The application layer........................................................................................21Data encapsulation and decapsulation (within the context ofthe OSI model).....................................................................................................22Definingdataencapsulation............................................................................23Dataflowandencapsulation.................................................................................23

Page 18

CompTIA Network+ N10-008 Exam Cram (2021) - Page 18 preview image

Loading page ...

xvStagesofdataflow.................................................................................................24Decapsulation..................................................................................................27Conclusion............................................................................................................27Key learning.........................................................................................................27Key terms..............................................................................................................28Questions..............................................................................................................292.Network Topologies..................................................................................................31Introduction..........................................................................................................31Structure................................................................................................................31Objectives..............................................................................................................32Physical versus logical topologies.....................................................................32Physical topologies...........................................................................................33Bus topology..........................................................................................................34Star topology.........................................................................................................36Ring topology........................................................................................................39Mesh topology.......................................................................................................42Hybrid topology.....................................................................................................46Tree topology..........................................................................................................47Logical topologies.............................................................................................47Logical bus.............................................................................................................48Logical ring...........................................................................................................48Network types......................................................................................................49Personal Area Network (PAN)........................................................................50Local Area Network (LAN).............................................................................50Campus Area Network (CAN)........................................................................51Metropolitan Area Network (MAN)...............................................................51Wide Area Networks (WAN)...........................................................................51WLAN.............................................................................................................52Virtual network concepts....................................................................................53

Page 19

CompTIA Network+ N10-008 Exam Cram (2021) - Page 19 preview image

Loading page ...

xviHypervisors..........................................................................................................54Conclusion............................................................................................................56Key learning.........................................................................................................56Key terms..............................................................................................................57Questions..............................................................................................................583.Cables and Connectors.............................................................................................59Introduction..........................................................................................................59Structure................................................................................................................60Objectives..............................................................................................................60Copper...................................................................................................................60Unshielded twisted pair...................................................................................61Shielded twisted pair (STP).............................................................................64UTP cable types...............................................................................................66Maximum lengths of cable....................................................................................67Ethernet cable color code standards.................................................................69T-568a straight-through Ethernet cable................................................................70Rj-45 crossover Ethernet cable..............................................................................71Ethernet cable instructions...................................................................................71Basic theory...........................................................................................................72UTP testing parameters...................................................................................73Coaxial cable.........................................................................................................74Coaxial cable types...........................................................................................74Cable structure.................................................................................................74Coax connector types.......................................................................................75Fiber.......................................................................................................................76Typesoffibermedia..........................................................................................77Light sources....................................................................................................79Fiber optic cable types and distance.................................................................80Fiber connector types..........................................................................................81Transceiver types.............................................................................................82

Page 20

CompTIA Network+ N10-008 Exam Cram (2021) - Page 20 preview image

Loading page ...

xviiConclusion............................................................................................................82Key learning.........................................................................................................83Key terms..............................................................................................................84Questions..............................................................................................................844.IP Addressing and Subnetting...............................................................................87Introduction..........................................................................................................87Structure................................................................................................................88Objectives..............................................................................................................88IP addressing........................................................................................................89ThesignificanceofIPaddressing:Ananalogy................................................90ThestructureofIPaddresses..........................................................................92IPv4 addressing....................................................................................................94Binary bit position and value..........................................................................95Subnet mask.....................................................................................................97Private vs public addresses................................................................................99IPv4reservedaddresses...................................................................................99Private address space (RFC 1918).................................................................100ClasslessInter-DomainRouting(CIDR)......................................................103Variable Length Subnet Masking (VLSM).....................................................105Sample VLSM scenario.................................................................................105Importantpointstoremember.......................................................................106ThebenefitsofVLSM....................................................................................110DiscoveringanetworkID:ThebitwiseANDoperation................................111ComparingIPv4andIPv6addressstructures..............................................112IPV6 addressing.................................................................................................113AssigningIPv6addresses..............................................................................115IPv4andIPv6coexistence:Migrationtechniques........................................116Subnetting with IPv6.........................................................................................117Conclusion..........................................................................................................118Key learning.......................................................................................................118

Page 21

CompTIA Network+ N10-008 Exam Cram (2021) - Page 21 preview image

Loading page ...

xviiiKey terms............................................................................................................119AnswerstoVLSM/subnettingquestions......................................................120Questions............................................................................................................1215.Ports and Protocols.................................................................................................123Introduction........................................................................................................123Structure..............................................................................................................124Objectives............................................................................................................124The TCP/IP protocol suite...............................................................................125Ports and protocols............................................................................................128Port assignment.................................................................................................129Chart(s) of ports and protocols........................................................................130Internet layer protocols.....................................................................................131Transport layer protocols..................................................................................132Application layer protocols..............................................................................134Conclusion..........................................................................................................140Key learning.......................................................................................................141Questions............................................................................................................1426.Implementing and Troubleshooting Network Services..................................143Introduction........................................................................................................143Structure..............................................................................................................143Objectives............................................................................................................144DHCP...................................................................................................................144ImplementingandconfiguringDHCP..........................................................146Installing the DHCP server role.......................................................................147ConfiguringDHCP.......................................................................................154Domain Name Service (DNS)..........................................................................161How DNS works?..........................................................................................162Network Time Protocol (NTP).........................................................................164Conclusion..........................................................................................................166

Page 22

CompTIA Network+ N10-008 Exam Cram (2021) - Page 22 preview image

Loading page ...

xixKey learning.......................................................................................................167Key terms............................................................................................................167Questions............................................................................................................1687.Data Center Technologies......................................................................................169Introduction........................................................................................................169Structure..............................................................................................................170Objectives............................................................................................................170Data center network architecture....................................................................170Tiered network architecture...........................................................................171Software Defined Networking (SDN).............................................................173Spine and leaf.................................................................................................173Trafficflows....................................................................................................175Storage area networks.......................................................................................175Fault tolerance—RAID......................................................................................176Conclusion..........................................................................................................177Key learning.......................................................................................................178Key terms............................................................................................................178Questions............................................................................................................1788.Cloud Concepts........................................................................................................179Introduction........................................................................................................179Structure..............................................................................................................180Objectives............................................................................................................180Deployment models..........................................................................................181Public cloud...................................................................................................181Private cloud..................................................................................................181Hybrid cloud..................................................................................................182Community cloud..........................................................................................182Service models...................................................................................................183Software as a service (SaaS)...........................................................................184

Page 23

CompTIA Network+ N10-008 Exam Cram (2021) - Page 23 preview image

Loading page ...

xxInfrastructureasaservice(IaaS)...................................................................185Platform as a service (PaaS)..........................................................................185Desktop as a service (DaaS)...........................................................................186Service models: User-managed versus provider managed.........................187Connectivity options.........................................................................................189Virtual private network (VPN).....................................................................189Private-direct connection to the cloud provider.............................................191Multitenancy.................................................................................................191Conclusion..........................................................................................................191Key learning.......................................................................................................192Key terms............................................................................................................192Questions............................................................................................................1939.Managing Network Devices..................................................................................195Introduction........................................................................................................195Structure..............................................................................................................196Objectives............................................................................................................196Network segments..........................................................................................197Repeater.........................................................................................................198Hub................................................................................................................199Network interface card...................................................................................200Layer 2 switch................................................................................................200Bridge.............................................................................................................202Access point...................................................................................................203Router............................................................................................................203Layer 3 capable switch/multilayer switch......................................................204Firewall..........................................................................................................205Voice gateway................................................................................................206Load balancer.................................................................................................206Media converter.............................................................................................207Wireless LAN controller................................................................................207

Page 24

CompTIA Network+ N10-008 Exam Cram (2021) - Page 24 preview image

Loading page ...

xxiCable modem..................................................................................................207DSL modem...................................................................................................208Other (security-related) network devices...........................................................................208Networked devices............................................................................................209InternetofThings(IoT).................................................................................209Conclusion..........................................................................................................210Key learning.......................................................................................................210Key terms............................................................................................................210Questions............................................................................................................21110.Managing Switching Protocols.............................................................................213Introduction........................................................................................................213Structure..............................................................................................................214Objectives............................................................................................................214How a switch works?........................................................................................214VLANs.................................................................................................................216Access ports and trunk ports.........................................................................218Voice VLANs.................................................................................................220ThebenefitsofusingVLANs..............................................................................221Port security........................................................................................................222Secure MAC address types............................................................................222Port violation.................................................................................................223Other protocols..................................................................................................223Link aggregation............................................................................................223Spanning tree protocol......................................................................................225Other STP considerations..............................................................................227Address resolution protocol.................................................................................228Conclusion..........................................................................................................229Key learning.......................................................................................................230Key terms............................................................................................................230Questions............................................................................................................230

Page 25

CompTIA Network+ N10-008 Exam Cram (2021) - Page 25 preview image

Loading page ...

xxii11.Managing Routing Protocols................................................................................231Introduction........................................................................................................231Structure..............................................................................................................232Objectives............................................................................................................232The primary functions and features of a router............................................233Router interfaces............................................................................................233The routing table.................................................................................................235Interconnectingnetworks..............................................................................238Static and dynamic routing..............................................................................241Static routes...................................................................................................241Thebenefitsofstaticrouting...............................................................................242The drawbacks and limitations of static routing.................................................242Dynamic routes..............................................................................................244RoutingInformationProtocol(RIP)...................................................................244IGRP..............................................................................................................245Open Shortest Pathway First (OSPF)................................................................245IntermediateSystemtoIntermediateSystem(IS-IS)....................................247BorderGatewayProtocol(BGP).........................................................................247Administrative Distance (AD)......................................................................247Thebenefitsofdynamicrouting..........................................................................248The drawbacks and limitations of dynamic routing............................................249Bandwidth management..................................................................................249Key terms............................................................................................................249Conclusion..........................................................................................................250Questions............................................................................................................25112.Installing and Configuring Wireless Technologies..........................................253Introduction........................................................................................................253Structure..............................................................................................................255Objectives............................................................................................................255Benefits of wireless technologies.....................................................................255

Page 26

CompTIA Network+ N10-008 Exam Cram (2021) - Page 26 preview image

Loading page ...

xxiiiWireless standards.............................................................................................256Channels and frequency bands.......................................................................257Historical context...........................................................................................258The2.4GHzfrequencyband.........................................................................261The5GHzfrequencyband............................................................................262Channel bonding............................................................................................263Modulationtechniques..................................................................................263Examples of wireless deployments.................................................................265Autonomous AP versus central switching.........................................................268BenefitsofaWLC................................................................................................269Wireless topology modes................................................................................270Antenna types.....................................................................................................270Wirelessidentification....................................................................................272Cellular technologies...........................................................................................273Multiple-inputandmultiple-output(MIMO)...................................................273Configuring a SOHO router.............................................................................274Conclusion..........................................................................................................281Key learning.......................................................................................................281Key terms............................................................................................................282Questions............................................................................................................28213.Managing and Monitoring a Network................................................................283Introduction........................................................................................................283Structure..............................................................................................................284Objectives............................................................................................................284Performance metrics and sensors....................................................................284Performance monitor on a Windows 10 System...........................................286Network availability monitoring...................................................................289Open-source network monitoring tools.........................................................291Simple network management protocol...........................................................291Network device logs.......................................................................................293

Page 27

CompTIA Network+ N10-008 Exam Cram (2021) - Page 27 preview image

Loading page ...

xxivSystem logs.........................................................................................................295Syslog.............................................................................................................297Open-source Syslog servers...........................................................................297Environmental factors and sensors................................................................301NetFlow data..................................................................................................302Conclusion..........................................................................................................303Key learning.......................................................................................................304Key terms............................................................................................................304Questions............................................................................................................30514.Policies and Procedures in Practice......................................................................307Introduction........................................................................................................307Structure..............................................................................................................308Objectives............................................................................................................308Plans and procedures........................................................................................308Change management........................................................................................309Incident response plan......................................................................................310Disaster recovery plan......................................................................................312Business continuity plan...................................................................................314System lifecycle...................................................................................................315Standard operating procedures.......................................................................316Policy compliance..............................................................................................317Hardening and security policies....................................................................317Common documentation..................................................................................319Common agreements (partner integration)...................................................320Non-disclosure agreement (NDA).................................................................320Service-level agreement (SLA).......................................................................321Memorandum of Understanding (MOU)...........................................................321Conclusion..........................................................................................................321Key learning.......................................................................................................322Key terms............................................................................................................322

Page 28

CompTIA Network+ N10-008 Exam Cram (2021) - Page 28 preview image

Loading page ...

xxvQuestions............................................................................................................32315.Resilience, Fault Tolerance,and Recovery.........................................................325Introduction........................................................................................................325Structure..............................................................................................................326Objectives............................................................................................................326Redundancy: hardware and software strategies...........................................326Load balancing...............................................................................................327Multipathing.................................................................................................329Networkinterfacecard(NIC)teaming..........................................................331Implementations of RAID................................................................................332Redundant hardware/clusters........................................................................338Facilities and infrastructure support.............................................................338Redundancy and high availability (HA) concepts.......................................339Network device backup/restore......................................................................340Conclusion..........................................................................................................341Key learning.......................................................................................................342Key terms............................................................................................................342Questions............................................................................................................34316.Security Concepts....................................................................................................345Introduction.............................................................................................................345Structure...................................................................................................................346Objectives.................................................................................................................346Confidentiality, integrity, and availability (CIA)................................................347Threats......................................................................................................................348Common vulnerabilities and exposures (CVE)....................................................349The principle of least privilege (PoLP)................................................................350The Zero Trust model.............................................................................................352Zero Trust through network segmentation..........................................................352Zero day................................................................................................................353

Page 29

CompTIA Network+ N10-008 Exam Cram (2021) - Page 29 preview image

Loading page ...

xxviDefense in Depth....................................................................................................354Authentication methods........................................................................................356Two-factor (2FA)/multifactor authentication.......................................................357Risk management...................................................................................................358Security information and event management (SIEM).......................................359Conclusion...............................................................................................................359Key learning............................................................................................................360Key terms.................................................................................................................361Questions.................................................................................................................36317.Vulnerabilities, Threats, and Attacks...................................................................365Introduction.............................................................................................................365Structure...................................................................................................................366Objectives.................................................................................................................366Technology-based attacks......................................................................................366TheOSImodelandcyber-attackexamples..........................................................367Layer 1: The physical layer.............................................................................368Layer 2: The datalink layer.............................................................................369Layer 3: The network layer.............................................................................370Layer 4: The transport layer...........................................................................372Layers 5, 6, and 7: The session, presentation, and application layers............373Cyber-attacks........................................................................................................373Man in the Middle (MitM) attack.......................................................................374Malware...............................................................................................................375Social engineering...................................................................................................376Conclusion...............................................................................................................378Key learning............................................................................................................379Key terms.................................................................................................................379Questions.................................................................................................................381

Page 30

CompTIA Network+ N10-008 Exam Cram (2021) - Page 30 preview image

Loading page ...

xxvii18.Network Hardening Techniques...........................................................................383Introduction.............................................................................................................383Structure...................................................................................................................384Objectives.................................................................................................................384Securing a workstation..........................................................................................384Techniques to secure a network............................................................................386Access control lists...............................................................................................386Example of ACLs............................................................................................388Router advertisement guard................................................................................389ARP inspection....................................................................................................389DynamicARPInspection(DAI)BestPractice..............................................390DHCP snooping.............................................................................................391VLAN security considerations.............................................................................392Secure SNMP.......................................................................................................393Wireless security..................................................................................................398Wireless encryption protocols..............................................................................399Plan, Plan, Plan..............................................................................................401Wireless access point security measures..............................................................402Best practice: WLAN attack countermeasures...................................................403Wirelessintrusiondetectionsystems(WIDS)/wirelessintrusionpreventionsys-tems(WIPS).........................................................................................................403Penetration testing (pen-testing).........................................................................404Vulnerability scanning........................................................................................405Internet of Things security considerations..........................................................405IoTweaknesses.....................................................................................................406Bestsecuritypractices:IoT..................................................................................406Conclusion...............................................................................................................408Key learning............................................................................................................409Key terms.................................................................................................................409Questions.................................................................................................................409

Page 31

CompTIA Network+ N10-008 Exam Cram (2021) - Page 31 preview image

Loading page ...

xxviii19.Remote Management..............................................................................................411Introduction.............................................................................................................411Structure...................................................................................................................412Objectives.................................................................................................................412Virtual private network (VPN).............................................................................412Site-to-site VPN...................................................................................................414Client-to-site VPN...............................................................................................415Clientless VPN.....................................................................................................416Splittunnelandfulltunnelconfiguration.........................................................418Split tunneling case use an example....................................................................419Remote desktop connection..................................................................................420Remote desktop protocol.......................................................................................422RDP: Security considerations..............................................................................424Remote Desktop Gateway (RDP).........................................................................424ConfiguringanRDPgatewayonaWindowsserver...........................................424Configurationofremotedesktopgateway............................................................426Configuringremotedesktopgatewayservers/settings.........................................427Create computer groups..................................................................................429Virtual network computing (VNC)......................................................................432Virtual desktop.....................................................................................................433Authentication and authorization considerations.............................................434RemoteAuthenticationDial-InUserService(RADIUS)...................................434Terminal Access Controller Access-Control System Plus (TACACS+)..............436In-band versus out-of-band management..........................................................437Telnet/Secure Shell (SSH)....................................................................................439Conclusion...............................................................................................................439Key learning............................................................................................................440Key terms.................................................................................................................440Questions.................................................................................................................440
Preview Mode

This document has 654 pages. Sign in to access the full document!