ebook img

CompTIA Network+ N10-008 Certification Guide: The ultimate guide to passing the N10-008 exam, 2nd Edition PDF

692 Pages·2022·26.069 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview CompTIA Network+ N10-008 Certification Guide: The ultimate guide to passing the N10-008 exam, 2nd Edition

CompTIA Network+ N10-008 Certification Guide The ultimate guide to passing the N10-008 exam Glen D. Singh BIRMINGHAM—MUMBAI CompTIA Network+ N10-008 Certification Guide Copyright © 2022 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. Group Product Manager: Mohd Riyan Khan Publishing Product Manager: Shrilekha Malpani Senior Content Development Editor: Sayali Pingale Technical Editor: Nithik Cheruvakodan Copy Editor: Safis Editing Book Project Manager: Neil Dmello Proofreader: Safis Editing Indexer: Sejal Dsilva Production Designer: Joshua Misquitta Marketing Coordinator: Nimisha Dua First published: November 2018 Second edition: October 2022 Production reference: 1191022 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. 978-1-80323-606-3 www.packt.com I would like to dedicate this book to the people in our society who have always worked hard in their field of expertise and who have not been recognized for their hard work, commitment, sacrifices, and ideas, but who, most importantly, believed in themselves when no one else did. This book is for you. Always have faith in yourself. With commitment, hard work, and focus, anything can be possible. Never give up, because great things take time. – Glen D. Singh Contributors About the author Glen D. Singh is an information security author and cybersecurity instructor. His areas of expertise are cybersecurity operations, offensive security tactics, and enterprise networking. He is a holder of many certifications, including CEH, CHFI, PAWSP, and 3xCCNA (in CyberOps, Security, and Routing and Switching). Glen loves teaching and mentoring others and sharing his wealth of knowledge and experience as an author. He has written many books that focus on vulnerability discovery and exploitation, threat detection, intrusion analysis, incident response, network security, and enterprise networking. As an aspiring game-changer, Glen is passionate about increasing cybersecurity awareness in his homeland, Trinidad and Tobago. I would like to thank God, the preserver of the universe, for all His divine grace and guidance. I would also like to thank Shrilekha Malpani, Sayali Pingale, Neil D’mello, and the wonderful team at Packt Publishing, who have provided amazing support throughout this journey. To the technical reviewer, Greg Gardner, thank you for your outstanding contribution to making this an amazing book. About the reviewer Greg Gardner is a former U.S. Navy Officer, government consultant, and technology expert. He has worked in the aerospace industry, at several dot-coms, at several data centers, at the Pentagon, and with most federal and many state agencies. He received his Master of Information Technology from Virginia Tech. Greg teaches and writes courseware for A+, Network+, Security+, CND, and CEH. Greg has taught at the high school and undergraduate levels as well as in private industry. He speaks at national technology conferences and has written two cyber-espionage novels. As a long-time member of the IT community, it is my honor to be in the “give back” portion of my career. As a teacher, technology evangelist, and author, I strive to ensure that individuals who are making career changes or simply want to understand the fast-moving IT industry are prepared. Throughout my career, my family and spouse have been my greatest supporters – thank you. Table of Contents Preface xvii Part 1: Networking Concepts 1 Exploring the OSI Model and TCP/IP 3 Technical requirements 4 Understanding TCP/IP 28 The need for networking Data encapsulation concepts 30 models 4 Ethernet header 31 Exploring the OSI model 7 IP headers 32 Application layer 10 TCP header 34 Presentation layer 11 UDP headers 35 Session layer 12 Analyzing network packets 36 Transport layer 12 Summary 45 Network layer 21 Questions 46 Data Link layer 23 Further reading 48 Physical layer 26 2 Network Topologies and Connections 49 Understanding network Client-server 66 topologies 50 Personal area network 66 Types of network topologies 53 Local area network 67 Wide area network 69 Discovering network types 64 Metropolitan area network 72 Peer-to-peer 65 Wireless local area network 73 viii Table of Contents Campus area network 74 Satellite 81 Storage area network 75 Digital Subscriber Line 82 Software-defined wide area network 76 Cable 84 Multiprotocol label switching 77 Leased line 85 Multipoint generic routing encapsulation 78 Metro optical 85 Identifying service-related Summary 86 entry points 80 Questions 86 Comparing provider links 81 Further reading 88 3 Ethernet Technology and Virtualization 89 Technical requirements 90 Hypervisors 115 Types of connections 90 Virtual networking components 119 Lab – creating a virtual machine 122 Copper cables 90 Fiber optic cables 100 Summary 139 Cable management 106 Questions 140 Ethernet standards 109 Further reading 142 Virtual network concepts 113 4 Understanding IPv4 and IPv6 Addressing 143 Technical requirements 144 Extended unique identifier (EUI-64) 168 The need for IP addressing 144 Unicast 170 Public versus private address spaces 147 Multicast 172 Network Address Translation (NAT) 150 Broadcast 173 Exploring the structure of Anycast 173 IPv4 and IPv6 156 Link-local 174 Fundamentals of IPv4 156 Loopback 174 Fundamentals of IPv6 165 Unique local address 176 Default gateway 176 Types of IPv4 and IPv6 addresses 167 Delving into IPv6 concepts 178 Automatic Private IP Addressing Tunneling 179 (APIPA) 167 Dual stack 179 Table of Contents ix Translation 180 Linux operating system 187 Router advertisement 180 Cisco IOS router 190 Stateless Address Autoconfiguration Summary 192 (SLAAC) 180 Questions 192 Configuring IP addresses 182 Further reading 194 Windows operating system 182 5 Applied IPv4 Subnetting 195 Understanding the purpose Step 1 – determining the appropriate of the subnet mask 195 IPv4 block 204 Step 2 – creating new subnets Delving into network prefixes (subnetworks) 206 and subnet masks 196 Step 3 – assigning subnets to each Determining the network network 210 ID 199 Step 4 – performing Variable-Length Understanding the importance Subnet Masking (VLSM) 213 of subnetting 201 Summary 219 IPv4 subnetting and Questions 219 VLSM 204 Further reading 221 6 Exploring Network Protocols and Services 223 Technical requirements 224 Network protocol types 247 Network protocols 224 Internet Control Message Protocol 247 File protocols 225 TCP 250 Remote access protocols 231 UDP 250 Email protocols 235 Network services 250 HTTP and HTTPS 240 Network Time Protocol 250 SQL database protocols 242 Dynamic Host Configuration Lightweight Directory Access Protocol 252 Protocol 243 DNS 256 Syslog 245 Simple Network Management Session Initiation Protocol 246 Protocol 260

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.