Download the errata - Pearson IT Certification

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

IEEE 1355 wikipedia , lookup

Transcript
CompTIA Network+ N10-006 Cert Guide
First Edition
Copyright © 2015 Pearson Education, Inc.
ISBN-10: 0-7897-5408-8
ISBN-13: 978-0-7897-5408-0
Warning and Disclaimer
Every effort has been made to make this book as complete and as accurate as possible, but no warranty
or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall
have neither liability nor responsibility to any person or entity with respect to any loss or damages arising
from the information contained in this book or from the use of the CD or programs accompanying it.
When reviewing corrections, always check the print number of your book. Corrections are made to printed
books with each subsequent printing.
First Printing: February 2015
Corrections for April 19, 2017
Pg
Error – Fourth Printing
Correction
92
Chapter 3, Remove and Replace Last Two
Paragraphs
Replacement Paragraph:
A Fully Qualified Domain Name (FQDN) is a series of
strings, delimited by a period (as in the example
www.ciscopress.com). The rightmost portion
represents the top level domain. Examples of top
level domains include .com, .mil, and .edu as shown
in Figure 3-32. Although there are many other top
level domains, these are among some of the more
common top level domains seen in the United States.
Updated 04/19/2017
Corrections for June 17, 2016
Pg
Error – Third Printing
Correction
92
Chapter 3, Third Paragraph, Last Two
Sentences
Should read:
Reads:
Examples of top-level domains include .com, .mil,
.gov, and .edu. Although there are many other toplevel domains, these are among some of the more
common domains seen in the United States.
Examples of root domains include .com,
.mil, .gov, and .edu. Although there are
many other root domains, these are
among some of the more common domains
seen in the United States.
Updated 04/19/2017
179
180
Correction to Errata - Chapter 5, Table
5-25, Right Column Header
Should read:
Reads:
Number of Supported Hosts
(2h-2, Where h Is the Number of Host Bits)
Number of Supported Hosts
(sh-2, Where h Is the Number of
Borrowed Bits)
Chapter 5, First Paragraph, Third Sentence
Should read:
Reads:
To determine in what octet you start
To determine in what octet you start counting and by
counting and by want increment you count, what increment you count, a new term needs to be
a new term needs to be defined.
defined.
Corrections for November 9, 2015
Pg
Error – First Printing
Correction
162
Chapter 5, Figure 5-5, PC on bottom right
Should read:
Reads:
179
Non-Receiver
Receiver
10.1.1.3
10.1.1.3
Chapter 5, Table 5-25, Right Column
Header
Should read:
Reads:
Number of Supported Hosts
(sh-2, Where h Is the Number of Host Bits)
Number of Supported Hosts
(sh-2, Where h Is the Number of
Borrowed Bits)
Updated 04/19/2017
179
Chapter 5, First Paragraph, First Sentence
Should read:
Reads:
220
In this example, where you want to
support 100 subnets, 6 host bits are not
enough, and 7 host bits are more than
enough.
In this example, where you want to support 100 host,
6 host bits are not enough, and 7 host bits are more
than enough.
Chapter 6, First Paragraph, First Sentence
Should read:
Reads:
324
C2 indicates it wants to belong to the
multicast group of 239.1.2.3 by sending an
IGMP join message to its default gateway.
PC2 indicates it wants to belong to the multicast
group of 239.1.2.3 by sending an IGMP join message
to its default gateway.
Chapter 9, Question 8
Should read:
Reads:
489
8. Which traffic-shaping parameter is a
measure of the average number of bits
transmitted during a timing interval?
8. Which traffic-shaping tool unit of measure
represents the number of bits sent during a timing
interval?
Appendix A, Chapter 11, Answer 8
Should read:
Reads:
8. B.
8. D.
Corrections for August 7, 2015
Pg
Error – First Printing
Correction
218
Chapter 6, First Paragraph, Last Sentence
Should read:
Reads:
When client 2 sends a packet to the same
web server, its inside local address of
When client 2 sends a packet to the same web server,
its inside local address of 10.1.1.2 with a port number
Updated 04/19/2017
10.1.1.2 with a port number of 1050 is
translated into an outside local address of
172.16.1.100 with a port number of 2050.
of 1050 is translated into an inside global address of
172.16.1.100 with a port number of 2050.
Corrections for June 23, 2015
Pg
Error – First Printing
Correction
121
Chapter 4, Table 4-2, Distance Limitation
for Ethernet Standard 10GBASE-LR
Should read:
Reads:
10-25 km
10 km
Corrections for June 15, 2015
Pg
Error – First Printing
Correction
121
Chapter 4, Second Paragraph, Third
Sentence
Should read:
Reads:
GBICs are interfaces that have a bandwidth capacity
of 1 Gbps and are available with MMF, SMF, or UTP
connectors.
GBICs are interfaces that have a
bandwidth capacity of 1 Gbps and are
available with MMF, SMF, or UDP
connectors.
Updated 04/19/2017
Corrections for June 2, 2015
Pg
Error – First Printing
Correction
95
Chapter 3, Figure 3-33, Step 4
Should read:
Reads:
114
DHCPPACK
DHCPACK
Chapter 4, Principles of Ethernet, First
Sentence
Should read:
Reads:
The genesis of Ethernet was 1973, when this
technology was developed by Xerox Corporation.
The genesis of Ethernet was 1972, when
this technology was developed by Xerox
Corporation.
121
Chapter 4, Table 4-2Distance Limitation for
Ethernet Standard 10GBASE-SR
Should read:
Reads:
26-400 m
26-82 m
136
Chapter 4, First Paragraph, First Full
Sentence
Should read:
Reads:
For example, if the switch applied 10V DC across
those wires and noticed 0.4 mA (milliamps) of
current, the switch concludes the attached device had
25k ohms of resistance across those wires (based on
the formula E=IR, where E represents voltage, I
represents current, and R represents resistance).
For example, if the switch applied 10V DC
across those wires and noticed 0.4 mA
(milliamps) of current, the switch
concludes the attached device had 25k
ohms of resistance across those wires
(based on the formula E=IR, where E
represents current, I represents current,
and R represents resistance).
Updated 04/19/2017
210
Chapter 6, Figure 6-10, Last Two Entries
for Router R3’s Routing Table
Should read:
Reads:
Network
Network
211
S 0/1
0
10.1.4.0/24
E 0/1
0
0
10.1.4.0/24
E 1/0
0
Reads:
Network
S 0/1
Metric
0
10.1.3.0/24
Interface
S 0/0
Chapter 6, Figure 6-12, Third Entry in
Router R3’s Routing Table
Should read:
Reads:
Network
Interface
10.1.3.0/24
S 0/0
Network
Interface
10.1.3.0/24
S 0/1
Metric
0
Chapter 12, Note
Metric
S 0/0
Should read:
Interface
Interface
10.1.3.0/24
Chapter 6, Figure 6-11, Third Entry in
Router R3’s Routing Table
10.1.3.0/24
399
Metric
10.1.3.0/24
Network
211
Interface
Metric
0
Metric
0
Should read:
Reads:
NOTE Another widely deployed
asymmetric encryption algorithm is pretty
good privacy (PGP), which is often used to
encrypt e-mail traffic. A free variant of PGP
is GNU Privacy Guard (GPC).
NOTE Another widely deployed encryption algorithm
is pretty good privacy (PGP) , which is often used to
encrypt e-mail traffic. PGP uses both symmetric and
asymmetric algorithms. A free variant of PGP is GNU
Privacy Guard (GPG).
Updated 04/19/2017
461
Chapter 13, Figure 13-4, Label for the Line
from Server 1 to SW2
Reads:
VLAN 300
469
Chapter 13, Figure 13-7, Top Access Point
Should read:
VLAN 100
Should read:
Reads:
AP-2
514
Glossary, Direct-sequence spread spectrum Should read:
(DSSS), Last Sentence of Definition
Reads:
DSSS is more subject to environmental
factors, as opposed to FHSS and OFDN,
because it uses an entire frequency
spectrum.
517
AP-1
Glossary
DSSS is more subject to environmental factors, as
opposed to FHSS and OFDM, because it uses an entire
frequency spectrum.
Should read:
Reads:
523
GNU privacy guard (GPC)
GNU privacy guard (GPG)
Glossary, Password Authentication Protocol
(PAP), Second Sentence of Definition
Should read:
Reads:
However, a significant drawback to PAP, other than its
unidirectional authentication, is its clear-text
transmission of credentials, which could permit an
eavesdropper to learn authentication credentials.
However, a significant drawback to PPP,
other than its unidirectional authentication,
is its clear-text transmission of credentials,
which could permit an eavesdropper to
learn authentication credentials.
Updated 04/19/2017
Corrections for May 15, 2015
Pg
Error – First Printing
Correction
177
Chapter 5, Third Formula
Should read:
Reads:
394
Number of assignable IP addresses in a subnet
= 24 – 2 = 16 – 2 = 14
Number of assignable IP addresses in a subnet = 2^4 – 2
= 14
Chapter 11, Question 8, Answers
Should read:
Reads:
489
a. Informational (1)
b. Critical (2)
c. Errors (5)
d. Warnings (4)
a. Informational (6)
b. Critical (2)
c. Errors (3)
d. Warnings (4)
Appendix A, Chapter 11, Answer to
Question 8
Should read:
Reads:
8. D
8. B
Corrections for May 4, 2015
Pg
Error
Correction
67
Chapter 3, Third Bullet Point
Should read:
Reads:

DB-9 (RS-232): A 9-pin Dsubminiature (DB-9) connector is
commonly used as a connector for
asynchronous serial communications.
One of the more popular uses of a DB-9
connector is to connect the serial port

DB-9 (RS-232): A 9-pin D-subminiature (DB-9)
connector is an older connector used for low speed
asynchronous serial communications, such as a PC
to a serial printer, PC to a console port of a router
or switch, or PC to an external modem.
Updated 04/19/2017
on a computer with an external modem.
99
105
141
Chapter 3, Virtual Servers, content to add
at the end of paragraph
Add:
Chapter 3, Key Topic, Table 3-3,
Description for SIP
Replace Description with:
Replace Description
Session Initiation Protocol (SIP) is a signaling, setup
and management protocol used with voice and video
sessions over IP networks. SIP, in conjunction with
other protocols also specifies the encoder / decoder
(codec) that will be used for voice and video
connections over the network.
NOTE to add:
Chapter 4, Add NOTE After Example 4-5
and before First-Hop Redundancy
The networks and systems supporting virtual servers
also commonly have network attached storage, where
disk storage is delivered as a service over the
network. A technology for network storage is IP
based Small Computer System Interface (iSCSI).
With iSCSI, a client using the storage is referred to as
an initiator, and the system providing the iSCSI
storage is called the iSCSI target. The networks
supporting the iSCSI are often configured to support
larger than normal frame sizes, referred to as jumbo
frames. Fibre channel is another technology that can
deliver storage services over a network
NOTE The virtual terminal (VTY) lines (0-15 in the
example) allows for 16 simultaneous connections to
the switch by administrators. If more simultaneous
connections are required, additional virtual terminal
lines could be configured on the switch.
Updated 04/19/2017
239
Chapter 7, T3, Second Sentence
Should read:
Reads:
278
Although a T1 circuit combines 24 DS0s
into a single physical connection to offer
1.544 Mbps of bandwidth, a T3 circuit
combines 672 DS0s into a single physical
connection, which is called a Digital Signal
3 (DS3).
Although a T1 circuit combines 24 DS0s into a single
physical connection to offer 1.544 Mbps of bandwidth,
a T3 circuit combines 672 DS0s into a single physical
connection, commonly delivered to the customer over
coaxial cable, which is called a Digital Signal 3 (DS3).
Chapter 8, 802.11ac, Paragraph
Replace Paragraph with:
Replace Paragraph
425
Chapter 12, Table 12-2, Description for
TACACS+
Replace Description
The 802.11ac is a 5-GHz standard that can use more
simultaneous streams than 802.11n and features
multi-user MIMO (MU-MIMO). A single 80MHz wide
stream can support 433Mbps.
Replace Description with:
Terminal Access Controller Access-Control System
Plus (TACACS+) is a Cisco proprietary TCP-based AAA
protocol. TACACS+ has 3 separate and distinct
sessions or functions for authentication, authorization
and accounting.
Corrections for May 1, 2015
Pg
Error
Correction
126
Chapter 4, Figure 4-12, Key Topic, Second
Box
Should read:
Reads:
Start-of-Frame Delimiter 1 Byte
Start-of-Frame Delimiter 7 Bytes
Updated 04/19/2017
126
Chapter 4, Figure 4-12, Key Topic, Last
Box
Reads:
CRC/FCS 4 Bytes
Type 4 Bytes
287
Should read:
Chapter 8, First Paragraph After Note,
Second Sentence
Should read:
Reads:
Figure 8-12 shows a wireless implementation of IEEE
802.1X.
Figure 8-12 shows a wireless
implementation of IEEE 8021X.
Corrections for April 24, 2015
Pg
Error
Correction
136
Chapter 4, Second Paragraph, First
Sentence below Figure 4-20
Should read:
Reads:
The IEEE 802.3af standard can supply a maximum of
15.4W (Watts) of power.
The IEEE 803.af standard can supply a
maximum of 15.4W (Watts) of power.
313
Chapter 9, Figure 9-14
Replace with new figure:
Replace Figure
Updated 04/19/2017
This errata sheet is intended to provide updated technical information. Spelling and grammar misprints
are updated during the reprint process, but are not listed on this errata sheet.
Updated 04/19/2017