Book Image

CompTIA Network+ N10-008 Certification Guide - Second Edition

By : Glen D. Singh
Book Image

CompTIA Network+ N10-008 Certification Guide - Second Edition

By: Glen D. Singh

Overview of this book

This book helps you to easily understand core networking concepts without the need of prior industry experience or knowledge within this fi eld of study. This updated second edition of the CompTIA Network+ N10-008 Certification Guide begins by introducing you to the core fundamentals of networking technologies and concepts, before progressing to intermediate and advanced topics using a student-centric approach. You’ll explore best practices for designing and implementing a resilient and scalable network infrastructure to support modern applications and services. Additionally, you’ll learn network security concepts and technologies to effectively secure organizations from cyber attacks and threats. The book also shows you how to efficiently discover and resolve networking issues using common troubleshooting techniques. By the end of this book, you’ll have gained sufficient knowledge to efficiently design, implement, and maintain a network infrastructure as a successful network professional within the industry. You’ll also have gained knowledge of all the official CompTIA Network+ N10-008 exam objectives, networking technologies, and how to apply your skills in the real world.
Table of Contents (26 chapters)
1
Part 1: Networking Concepts
9
Part 2: Network Implementation
13
Part 3: Network Operations
17
Part 4: Network Security and Troubleshooting
22
Chapter 18: Practice Exam

Virtual network concepts

Long ago, whenever IT professionals set up a server within their organization, the server operating system was installed directly on the storage device, such as the Hard Disk Drive (HDD). If you wanted to install another operating system on the same HDD, you would need to create a logical partition on the HDD and install the second operating system on the new partition. However, when powering on the physical server, only one operating system can be booted in the memory of the server. While running a single operating system at a time on a computer or server, the operating system has full access to all the hardware-based components, such as the processor, memory modules, storage drives, and so on. This allows the operating system to operate to its fullest potential and leverage all the available computing power to perform tasks and calculations.

However, an operating system does not always utilize hardware-based components all the time. There are many times...