Book Image

CompTIA Network+ N10-008 Certification Guide - Second Edition

By : Glen D. Singh
Book Image

CompTIA Network+ N10-008 Certification Guide - Second Edition

By: Glen D. Singh

Overview of this book

This book helps you to easily understand core networking concepts without the need of prior industry experience or knowledge within this fi eld of study. This updated second edition of the CompTIA Network+ N10-008 Certification Guide begins by introducing you to the core fundamentals of networking technologies and concepts, before progressing to intermediate and advanced topics using a student-centric approach. You’ll explore best practices for designing and implementing a resilient and scalable network infrastructure to support modern applications and services. Additionally, you’ll learn network security concepts and technologies to effectively secure organizations from cyber attacks and threats. The book also shows you how to efficiently discover and resolve networking issues using common troubleshooting techniques. By the end of this book, you’ll have gained sufficient knowledge to efficiently design, implement, and maintain a network infrastructure as a successful network professional within the industry. You’ll also have gained knowledge of all the official CompTIA Network+ N10-008 exam objectives, networking technologies, and how to apply your skills in the real world.
Table of Contents (26 chapters)
1
Part 1: Networking Concepts
9
Part 2: Network Implementation
13
Part 3: Network Operations
17
Part 4: Network Security and Troubleshooting
22
Chapter 18: Practice Exam

Exploring network-based attacks

Threat actors such as hackers always look for security vulnerabilities in the systems and networks of their targets. A seasoned hacker will attempt to compromise the low-hanging fruits, as these are the security flaws that are easy to exploit on a system and do not require too much complexity in setting up the attack. Quite often, many people think security vulnerabilities are found only on applications and operating systems, but not on the network and its protocols. In the early days of the internet, many networking protocols were not designed with security features since it was not a concern as it is in today’s world. Many of these unsecure network protocols make up the Transmission Control Protocol/Internet Protocol (TCP/IP) networking model, which is implemented on every device that’s connected to a network. Therefore, the TCP/IP networking model contains a lot of vulnerabilities that can easily be exploited by hackers on a network...