Mike Meyers' CompTIA network+ certification passport, (exam n10-005

From the #1 Name in Professional Certification Prepare for CompTIA Network+ Exam N10-005 with McGraw-Hill—a Gold-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day. Get on the fast track to becoming CompTIA Network+ cert...

Descripción completa

Detalles Bibliográficos
Autor Corporativo: Computing Technology Industry Association Content Provider (content provider)
Otros Autores: Meyers, Mike Author (author), Jernigan, Scott Contributor (contributor), Clarke, Glen E Contributor
Formato: Libro electrónico
Idioma:Inglés
Publicado: [Place of publication not identified] McGraw Hill 2012
Edición:4th ed
Colección:CompTIA Authorized
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629465506719
Tabla de Contenidos:
  • Intro
  • Network+
  • Dedication
  • Acknowledgments
  • About the Authors
  • About the Technical Editor
  • About Total Seminars
  • Comptia
  • CompTIA Network+
  • It Pays to Get Certified
  • How Certification Helps Your Career
  • CompTIA Career Pathway
  • Steps to Getting Certified and Staying Certified
  • Join the Professional Community
  • Content Seal of Quality
  • Why CompTIA?
  • How to Obtain More Information
  • CAQC Disclaimer
  • Contents
  • Check-In
  • May I See Your Passport?
  • Your Travel Agent: Mike Meyers
  • Your Destination: CompTIA Network+ Certification
  • Why the Travel Theme?
  • The End of the Trail
  • Chapter 1: Network Fundamentals
  • Objective 1.01 Overview of How Networks Work
  • Servers and Clients
  • Network Components
  • Ethernet
  • Hubs and Switches
  • Software
  • Applications
  • Connecting LANs
  • Objective 1.02 The OSI Seven-Layer Model
  • The Layers and What They Represent
  • Layer 1: Physical Layer
  • Layer 2: Data Link Layer
  • Layer 3: Network Layer
  • Layer 4: Transport Layer
  • Layer 5: Session Layer
  • Layer 6: Presentation Layer
  • Layer 7: Application Layer
  • Using the Seven-Layer Model
  • Objective 1.03 The TCP/IP Model
  • The Link Layer
  • The Internet Layer
  • The Transport Layer
  • Connection-oriented vs. Connectionless Communication
  • Segments Within Packets and Datagrams Within Packets
  • The Application Layer
  • Checkpoint
  • Review Questions
  • Review Answers
  • Chapter 2: Network Media
  • Objective 2.01 Coaxial Cabling
  • Coaxial Cable Types
  • Coaxial Connectors
  • Objective 2.02 Twisted-Pair Cabling
  • UTP Cable Types
  • Variations in Core Wires and Sheath Materials
  • UTP Connectors
  • UTP Wiring Standards
  • T568A and T568B Wiring Standards
  • Straight-through and Crossover Cables
  • Rollover and Loopback
  • Wiring Distribution
  • Patch Panel
  • Cross-connects, MDF, and IDF
  • UTP Testing.
  • Objective 2.03 Optical Fiber
  • Optical Fiber Connectors
  • Uses for Fiber
  • Implementing Multiple Types of Ethernet
  • Objective 2.04 Wireless Media Types
  • 802.11 Wireless Networks
  • Wireless Basics
  • BSSID, SSID, and ESSID
  • Wireless Standards
  • Wireless Frequency Ranges
  • Laser Links
  • Bluetooth
  • Infrared Wireless Networking
  • Checkpoint
  • Review Questions
  • Review Answers
  • Chapter 3: Network Topologies and Standards
  • Objective 3.01 The Bus Topology and Ethernet
  • Ethernet Overview
  • How Ethernet Works
  • CSMA/CD
  • Collisions
  • Termination
  • Cable Breaks
  • Broadcast
  • Bonding
  • Ethernet Standards
  • Ethernet on the Bus
  • Objective 3.02 The Star Bus Topology
  • 10BaseT and 100BaseT
  • Gigabit Ethernet
  • 10/100/1000BaseT Summary
  • 10 Gigabit Ethernet (10 GbE)
  • Objective 3.03 Ring Topologies
  • Objective 3.04 Other Topologies
  • Mesh Topology
  • Point-to-point and Point-to-multipoint
  • CSMA/CA
  • Checkpoint
  • Review Questions
  • Review Answers
  • Chapter 4: Network Hardware
  • Objective 4.01 Network Interfaces
  • MAC Address
  • Organizing the Data: Ethernet Frames
  • Preamble
  • Destination and Source MAC Addresses
  • Type
  • Data
  • Frame Check Sequence
  • Objective 4.02 Repeaters, Hubs, and Bridges
  • Objective 4.03 Switched Ethernet
  • The Trouble with Hubs
  • Switches to the Rescue
  • Spanning Tree Protocol
  • Objective 4.04 Connecting Ethernet Segments
  • Uplink Ports
  • Crossover Cables
  • Objective 4.05 Routers
  • Objective 4.06 Wireless Access Points
  • Checkpoint
  • Review Questions
  • Review Answers
  • Chapter 5: TCP/IP
  • Objective 5.01 The TCP/IP Protocol Suite
  • Application Protocols
  • Port Numbers
  • Sockets
  • List of Application Protocols
  • Compound Application Protocols
  • Transport Protocols
  • TCP
  • UDP
  • Internet Protocols
  • Internet Protocol
  • Internet Control Message Protocol (ICMP).
  • Objective 5.02 IPv4 Addressing
  • IP Addresses
  • IP Addresses in Action
  • Network IDs
  • Interconnecting
  • Subnet Mask
  • Class IDs
  • Private vs Public IP Addresses
  • Need for Changes
  • Objective 5.03 CIDR and Subnetting
  • Subnetting
  • Calculating Hosts
  • Your First Subnet
  • Calculating Subnets
  • Objective 5.04 IPv6 Addressing
  • IPv6 Addresses
  • IPv6 Protocols
  • ICMPv6
  • Objective 5.05 Domain Name System
  • DNS Records
  • DHCP
  • Living with DHCP
  • Checkpoint
  • Review Questions
  • Review Answers
  • Chapter 6: Routing
  • Objective 6.01 Routing Tables
  • Freedom from Layer 2
  • Objective 6.02 Network Address Translation
  • The Setup
  • Port Address Translation
  • Port Forwarding
  • Configuring NAT
  • Objective 6.03 Dynamic Routing
  • Routing Metrics
  • Distance Vector
  • RIPv1
  • RIPv2
  • BGP
  • Link State
  • OSPF
  • IS-IS
  • EIGRP-The Lone Hybrid
  • Dynamic Routing Makes the Internet
  • Checkpoint
  • Review Questions
  • Review Answers
  • Chapter 7: Virtualization
  • Objective 7.01 Virtual LANs
  • Trunking
  • Configuring a VLAN-capable Switch
  • VLAN Trunking Protocol
  • InterVLAN Routing
  • Objective 7.02 Virtual Computing
  • Meet the Hypervisor
  • Why Do We Virtualize?
  • Power Saving
  • Hardware Consolidation
  • System Recovery
  • System Duplication
  • Research
  • Objective 7.03 Virtualization in Modern Networks
  • VMMs and Hypervisors
  • Virtual Machine Managers
  • VMware Workstation
  • Virtual PC
  • Parallels
  • KVM
  • Hypervisors
  • ESX
  • HyperV
  • Virtual Switches
  • Virtual PBX
  • Network as a Service
  • Checkpoint
  • Review Questions
  • Review Answers
  • Chapter 8: Wide Area Networking
  • Objective 8.01 Telephony and Beyond
  • The Dawn of Long Distance
  • Digital Telephony
  • It All Starts with DS0
  • Copper Carriers: T1 and T3
  • Fiber Carriers: SONET/SDH and OC
  • Packet Switching
  • Frame Relay
  • ATM
  • MPLS.
  • Real-World WAN
  • Alternative to Telephony WAN
  • Objective 8.02 The Last Mile
  • Dial-up
  • Public Switched Telephone Network
  • ISDN
  • DSL
  • SDSL
  • ADSL
  • VDSL
  • DSL Features
  • Installing DSL
  • Cable Modems
  • Satellite
  • Cellular WAN
  • Mobile Data Services
  • 802.16
  • LTE
  • Fiber
  • BPL
  • Which Connection?
  • Going Connection Shopping
  • Objective 8.03 Using Remote Access
  • Dial-up to the Internet
  • Private Dial-Up
  • Dedicated Connection
  • DSL and Cable
  • Cable Issues
  • Remote Terminal
  • VoIP
  • RTP
  • SIP and H.323
  • Skype
  • Streaming Media with RSTP
  • Checkpoint
  • Review Questions
  • Review Answers
  • Chapter 9: Network Security
  • Objective 9.01 Common Threats
  • System Crash/Hardware Failure
  • Administrative Access Control
  • Malware
  • Virus
  • Worm
  • Macro Virus
  • Trojan
  • Rootkit
  • Adware/Spyware
  • Dealing with Malware
  • Antimalware Programs
  • Social Engineering
  • Phishing
  • Man in the Middle
  • Denial of Service
  • Physical Intrusion
  • Attacks on Wireless Connections
  • Leeching
  • Cracking Wireless Encryption
  • Rogue Access Points
  • Evil Twin
  • Objective 9.02 Securing User Accounts
  • Authentication
  • Authentication Principles
  • Authentication Protocols
  • Authorization
  • Logon and Access Security
  • Implementing Share-Level Security
  • Implementing User-Level Security
  • Using Passwords
  • Objective 9.03 Firewalls
  • Hiding the IPs
  • Port Filtering
  • Packet Filtering
  • MAC Filtering
  • Personal Firewalls
  • Network Zones
  • Vulnerability Scanners
  • Objective 9.04 Securing Remote Connections
  • IPsec
  • Virtual Private Networks
  • PPTP VPNs
  • L2TP VPNs
  • SSL VPNs
  • Checkpoint
  • Review Questions
  • Review Answers
  • Chapter 10: The Complete Network
  • Objective 10.01 Designing and Implementing a SOHO Network
  • Define the Network Needs
  • Network Design
  • Compatibility Issues.
  • Internal Connections
  • External Connections
  • Peripherals
  • Security
  • Objective 10.02 Implementing a Wireless Network
  • Installing the Access Point
  • Set the Admin Password
  • Change Wireless Settings
  • Implement MAC Filtering
  • Implement Encryption
  • Upgrade the Antenna
  • Security Concerns with Signaling
  • Installing the Client
  • Troubleshooting Wireless Networking
  • Objective 10.03 Specialized Network Devices
  • Objective 10.04 Network Configuration Management
  • Configuration Management Documentation
  • Network Connectivity
  • Baselines
  • Policies, Procedures, and Configurations
  • Regulations
  • Change Management Documentation
  • Checkpoint
  • Review Questions
  • Review Answers
  • Chapter 11: Troubleshooting Networks
  • Objective 11.01 The Troubleshooting Process
  • Identify the Problem
  • Gather Information, Identify Symptoms, and Question Users
  • Determine If Anything Has Changed
  • Establish a Theory of Probable Cause
  • Test the Theory to Determine Cause
  • Establish a Plan of Action and Identify Potential Effects
  • Implement and Test the Solution or Escalate as Necessary
  • Verify Full System Functionality and Implement Preventative Measures
  • Document Findings, Actions, and Outcomes
  • Objective 11.02 Troubleshooting Network Hardware
  • Power Issues
  • Network Media
  • Visual Indications of Problems
  • Check the NIC
  • Bad Modules
  • Troubleshooting Other Physical Network Issues
  • Issues That Need To Be Escalated
  • Objective 11.03 Testing Equipment
  • Multimeters
  • Tone Locators and Toner Probes
  • Cable Testers
  • Checkpoint
  • Review Questions
  • Review Answers
  • Chapter 12: Network Utilities and Optimization
  • Objective 12.01 TCP/IP Utilities
  • ipconfig and ifconfig
  • ipconfig
  • ifconfig
  • tracert
  • arp
  • netstat
  • nbtstat
  • nslookup
  • arping
  • dig
  • mtr
  • route.
  • Objective 12.02 Troubleshooting Network Performance.