Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
CompTIA Network+ N10-006 Cert Guide First Edition Copyright © 2015 Pearson Education, Inc. ISBN-10: 0-7897-5408-8 ISBN-13: 978-0-7897-5408-0 Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it. When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing. First Printing: February 2015 Corrections for April 19, 2017 Pg Error – Fourth Printing Correction 92 Chapter 3, Remove and Replace Last Two Paragraphs Replacement Paragraph: A Fully Qualified Domain Name (FQDN) is a series of strings, delimited by a period (as in the example www.ciscopress.com). The rightmost portion represents the top level domain. Examples of top level domains include .com, .mil, and .edu as shown in Figure 3-32. Although there are many other top level domains, these are among some of the more common top level domains seen in the United States. Updated 04/19/2017 Corrections for June 17, 2016 Pg Error – Third Printing Correction 92 Chapter 3, Third Paragraph, Last Two Sentences Should read: Reads: Examples of top-level domains include .com, .mil, .gov, and .edu. Although there are many other toplevel domains, these are among some of the more common domains seen in the United States. Examples of root domains include .com, .mil, .gov, and .edu. Although there are many other root domains, these are among some of the more common domains seen in the United States. Updated 04/19/2017 179 180 Correction to Errata - Chapter 5, Table 5-25, Right Column Header Should read: Reads: Number of Supported Hosts (2h-2, Where h Is the Number of Host Bits) Number of Supported Hosts (sh-2, Where h Is the Number of Borrowed Bits) Chapter 5, First Paragraph, Third Sentence Should read: Reads: To determine in what octet you start To determine in what octet you start counting and by counting and by want increment you count, what increment you count, a new term needs to be a new term needs to be defined. defined. Corrections for November 9, 2015 Pg Error – First Printing Correction 162 Chapter 5, Figure 5-5, PC on bottom right Should read: Reads: 179 Non-Receiver Receiver 10.1.1.3 10.1.1.3 Chapter 5, Table 5-25, Right Column Header Should read: Reads: Number of Supported Hosts (sh-2, Where h Is the Number of Host Bits) Number of Supported Hosts (sh-2, Where h Is the Number of Borrowed Bits) Updated 04/19/2017 179 Chapter 5, First Paragraph, First Sentence Should read: Reads: 220 In this example, where you want to support 100 subnets, 6 host bits are not enough, and 7 host bits are more than enough. In this example, where you want to support 100 host, 6 host bits are not enough, and 7 host bits are more than enough. Chapter 6, First Paragraph, First Sentence Should read: Reads: 324 C2 indicates it wants to belong to the multicast group of 239.1.2.3 by sending an IGMP join message to its default gateway. PC2 indicates it wants to belong to the multicast group of 239.1.2.3 by sending an IGMP join message to its default gateway. Chapter 9, Question 8 Should read: Reads: 489 8. Which traffic-shaping parameter is a measure of the average number of bits transmitted during a timing interval? 8. Which traffic-shaping tool unit of measure represents the number of bits sent during a timing interval? Appendix A, Chapter 11, Answer 8 Should read: Reads: 8. B. 8. D. Corrections for August 7, 2015 Pg Error – First Printing Correction 218 Chapter 6, First Paragraph, Last Sentence Should read: Reads: When client 2 sends a packet to the same web server, its inside local address of When client 2 sends a packet to the same web server, its inside local address of 10.1.1.2 with a port number Updated 04/19/2017 10.1.1.2 with a port number of 1050 is translated into an outside local address of 172.16.1.100 with a port number of 2050. of 1050 is translated into an inside global address of 172.16.1.100 with a port number of 2050. Corrections for June 23, 2015 Pg Error – First Printing Correction 121 Chapter 4, Table 4-2, Distance Limitation for Ethernet Standard 10GBASE-LR Should read: Reads: 10-25 km 10 km Corrections for June 15, 2015 Pg Error – First Printing Correction 121 Chapter 4, Second Paragraph, Third Sentence Should read: Reads: GBICs are interfaces that have a bandwidth capacity of 1 Gbps and are available with MMF, SMF, or UTP connectors. GBICs are interfaces that have a bandwidth capacity of 1 Gbps and are available with MMF, SMF, or UDP connectors. Updated 04/19/2017 Corrections for June 2, 2015 Pg Error – First Printing Correction 95 Chapter 3, Figure 3-33, Step 4 Should read: Reads: 114 DHCPPACK DHCPACK Chapter 4, Principles of Ethernet, First Sentence Should read: Reads: The genesis of Ethernet was 1973, when this technology was developed by Xerox Corporation. The genesis of Ethernet was 1972, when this technology was developed by Xerox Corporation. 121 Chapter 4, Table 4-2Distance Limitation for Ethernet Standard 10GBASE-SR Should read: Reads: 26-400 m 26-82 m 136 Chapter 4, First Paragraph, First Full Sentence Should read: Reads: For example, if the switch applied 10V DC across those wires and noticed 0.4 mA (milliamps) of current, the switch concludes the attached device had 25k ohms of resistance across those wires (based on the formula E=IR, where E represents voltage, I represents current, and R represents resistance). For example, if the switch applied 10V DC across those wires and noticed 0.4 mA (milliamps) of current, the switch concludes the attached device had 25k ohms of resistance across those wires (based on the formula E=IR, where E represents current, I represents current, and R represents resistance). Updated 04/19/2017 210 Chapter 6, Figure 6-10, Last Two Entries for Router R3’s Routing Table Should read: Reads: Network Network 211 S 0/1 0 10.1.4.0/24 E 0/1 0 0 10.1.4.0/24 E 1/0 0 Reads: Network S 0/1 Metric 0 10.1.3.0/24 Interface S 0/0 Chapter 6, Figure 6-12, Third Entry in Router R3’s Routing Table Should read: Reads: Network Interface 10.1.3.0/24 S 0/0 Network Interface 10.1.3.0/24 S 0/1 Metric 0 Chapter 12, Note Metric S 0/0 Should read: Interface Interface 10.1.3.0/24 Chapter 6, Figure 6-11, Third Entry in Router R3’s Routing Table 10.1.3.0/24 399 Metric 10.1.3.0/24 Network 211 Interface Metric 0 Metric 0 Should read: Reads: NOTE Another widely deployed asymmetric encryption algorithm is pretty good privacy (PGP), which is often used to encrypt e-mail traffic. A free variant of PGP is GNU Privacy Guard (GPC). NOTE Another widely deployed encryption algorithm is pretty good privacy (PGP) , which is often used to encrypt e-mail traffic. PGP uses both symmetric and asymmetric algorithms. A free variant of PGP is GNU Privacy Guard (GPG). Updated 04/19/2017 461 Chapter 13, Figure 13-4, Label for the Line from Server 1 to SW2 Reads: VLAN 300 469 Chapter 13, Figure 13-7, Top Access Point Should read: VLAN 100 Should read: Reads: AP-2 514 Glossary, Direct-sequence spread spectrum Should read: (DSSS), Last Sentence of Definition Reads: DSSS is more subject to environmental factors, as opposed to FHSS and OFDN, because it uses an entire frequency spectrum. 517 AP-1 Glossary DSSS is more subject to environmental factors, as opposed to FHSS and OFDM, because it uses an entire frequency spectrum. Should read: Reads: 523 GNU privacy guard (GPC) GNU privacy guard (GPG) Glossary, Password Authentication Protocol (PAP), Second Sentence of Definition Should read: Reads: However, a significant drawback to PAP, other than its unidirectional authentication, is its clear-text transmission of credentials, which could permit an eavesdropper to learn authentication credentials. However, a significant drawback to PPP, other than its unidirectional authentication, is its clear-text transmission of credentials, which could permit an eavesdropper to learn authentication credentials. Updated 04/19/2017 Corrections for May 15, 2015 Pg Error – First Printing Correction 177 Chapter 5, Third Formula Should read: Reads: 394 Number of assignable IP addresses in a subnet = 24 – 2 = 16 – 2 = 14 Number of assignable IP addresses in a subnet = 2^4 – 2 = 14 Chapter 11, Question 8, Answers Should read: Reads: 489 a. Informational (1) b. Critical (2) c. Errors (5) d. Warnings (4) a. Informational (6) b. Critical (2) c. Errors (3) d. Warnings (4) Appendix A, Chapter 11, Answer to Question 8 Should read: Reads: 8. D 8. B Corrections for May 4, 2015 Pg Error Correction 67 Chapter 3, Third Bullet Point Should read: Reads: DB-9 (RS-232): A 9-pin Dsubminiature (DB-9) connector is commonly used as a connector for asynchronous serial communications. One of the more popular uses of a DB-9 connector is to connect the serial port DB-9 (RS-232): A 9-pin D-subminiature (DB-9) connector is an older connector used for low speed asynchronous serial communications, such as a PC to a serial printer, PC to a console port of a router or switch, or PC to an external modem. Updated 04/19/2017 on a computer with an external modem. 99 105 141 Chapter 3, Virtual Servers, content to add at the end of paragraph Add: Chapter 3, Key Topic, Table 3-3, Description for SIP Replace Description with: Replace Description Session Initiation Protocol (SIP) is a signaling, setup and management protocol used with voice and video sessions over IP networks. SIP, in conjunction with other protocols also specifies the encoder / decoder (codec) that will be used for voice and video connections over the network. NOTE to add: Chapter 4, Add NOTE After Example 4-5 and before First-Hop Redundancy The networks and systems supporting virtual servers also commonly have network attached storage, where disk storage is delivered as a service over the network. A technology for network storage is IP based Small Computer System Interface (iSCSI). With iSCSI, a client using the storage is referred to as an initiator, and the system providing the iSCSI storage is called the iSCSI target. The networks supporting the iSCSI are often configured to support larger than normal frame sizes, referred to as jumbo frames. Fibre channel is another technology that can deliver storage services over a network NOTE The virtual terminal (VTY) lines (0-15 in the example) allows for 16 simultaneous connections to the switch by administrators. If more simultaneous connections are required, additional virtual terminal lines could be configured on the switch. Updated 04/19/2017 239 Chapter 7, T3, Second Sentence Should read: Reads: 278 Although a T1 circuit combines 24 DS0s into a single physical connection to offer 1.544 Mbps of bandwidth, a T3 circuit combines 672 DS0s into a single physical connection, which is called a Digital Signal 3 (DS3). Although a T1 circuit combines 24 DS0s into a single physical connection to offer 1.544 Mbps of bandwidth, a T3 circuit combines 672 DS0s into a single physical connection, commonly delivered to the customer over coaxial cable, which is called a Digital Signal 3 (DS3). Chapter 8, 802.11ac, Paragraph Replace Paragraph with: Replace Paragraph 425 Chapter 12, Table 12-2, Description for TACACS+ Replace Description The 802.11ac is a 5-GHz standard that can use more simultaneous streams than 802.11n and features multi-user MIMO (MU-MIMO). A single 80MHz wide stream can support 433Mbps. Replace Description with: Terminal Access Controller Access-Control System Plus (TACACS+) is a Cisco proprietary TCP-based AAA protocol. TACACS+ has 3 separate and distinct sessions or functions for authentication, authorization and accounting. Corrections for May 1, 2015 Pg Error Correction 126 Chapter 4, Figure 4-12, Key Topic, Second Box Should read: Reads: Start-of-Frame Delimiter 1 Byte Start-of-Frame Delimiter 7 Bytes Updated 04/19/2017 126 Chapter 4, Figure 4-12, Key Topic, Last Box Reads: CRC/FCS 4 Bytes Type 4 Bytes 287 Should read: Chapter 8, First Paragraph After Note, Second Sentence Should read: Reads: Figure 8-12 shows a wireless implementation of IEEE 802.1X. Figure 8-12 shows a wireless implementation of IEEE 8021X. Corrections for April 24, 2015 Pg Error Correction 136 Chapter 4, Second Paragraph, First Sentence below Figure 4-20 Should read: Reads: The IEEE 802.3af standard can supply a maximum of 15.4W (Watts) of power. The IEEE 803.af standard can supply a maximum of 15.4W (Watts) of power. 313 Chapter 9, Figure 9-14 Replace with new figure: Replace Figure Updated 04/19/2017 This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process, but are not listed on this errata sheet. Updated 04/19/2017