Home > Store

CompTIA Network+ (N10-004) Cert Guide

Register your product to gain access to bonus material or receive a coupon.

CompTIA Network+ (N10-004) Cert Guide

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

  • Contains clear explanations, quizzes, memory tables, study strategies, tips, notes, cautions, key terms, troubleshooting scenarios, CD-based exam questions, last-minute review tearsheet, and more
  • Exclusive "Do I Know This Already?" quizzes help readers gauge knowledge, focus study, and save time
  • The ideal core study resource for 4,000+ new candidates who take the exam every month
  • Instructor's manual available for professors
  • This book will also be available as a bundled package with a MyIT Certification lab, an online product that provides students with the most robust online studie environment available, and provides instuctors with unparalleled assessment tools.
  • Description

    • Copyright 2011
    • Edition: 1st
    • Book
    • ISBN-10: 0-7897-4559-3
    • ISBN-13: 978-0-7897-4559-0

    Learn, prepare, and practice for exam success

    • Master every topic on the newest 2010 Network+ exam.
    • Assess your knowledge and focus your learning.
    • Get the practical workplace knowledge you need!

    Start-to-finish Network+ preparation from top network administrator, consultant, and best-selling Network+ author Mike Harwood!

    Master every Network+ topic!

    • Networking components, devices, media, and connectors
    • TCP/IP protocols, addressing, and routing
    • Ethernet networking standards
    • Wireless networks
    • Wide area networks
    • The OSI Model
    • Network performance and optimization
    • Troubleshooting procedures and best practices
    • Command-line networking tools
    • Network management tools
    • Documentation procedures
    • Network access security
    • Security technologies and malicious software

    Test your knowledge, build your confidence, and succeed!

    • Packed with visuals to help you learn fast
    • Dozens of troubleshooting scenarios
    • Real-world Network+ prep advice from experts
    • Easy-to-use exam preparation task lists

    From Mike Harwood, professional network systems manager, consultant, and author of three best-selling books on the Network+ exam

    CD Features 1 Complete Sample Exam

    • Detailed explanations of correct and incorrect answers
    • Multiple test modes
    • Random questions and order of answers

    Shelving Category: Network Certification

    Sample Content

    Online Sample Chapter

    CompTIA Network+ Cert Guide: Wireless Networking

    Excerpt

    CompTIA Network+ Certification: Test Analysis and Study Tips with Mike Harwood

    Sample Pages

    Download the sample pages (includes Chapter 7 and Index)

    Table of Contents

    Introduction 3

        How This Book Helps You 4

            Exam Objectives and Chapter Organization 4

        Instructional Features 18

        Network Hardware and Software Requirements 19

        Advice on Taking the Exam 20

    Chapter 1 Introduction to Computer Networking 23

        What Is a Network? 24

        LANs and WANs 25

        Peer-to-Peer Versus Client/Server Networks 28

            The Peer-to-Peer Networking Model 28

            Advantages of Peer-to-Peer Networks 29

            Disadvantages of Peer-to-Peer Networks 30

            The Client/Server Networking Model 30

            Servers 31

            Client Computers 32

            Advantages of Client/Server Networking 32

            Disadvantages of Client/Server Networking 32

            Distributed and Centralized Computing 33

        Virtual Private Networks (VPN) 34

            Components of the VPN Connection 35

            VPN Pros and Cons 35

        Virtual Local Area Network (VLAN) 36

            VLAN Membership 37

            Protocol-Based VLANs 37

            Port-Based VLANs 38

            MAC Address-Based VLANs 38

            VLAN Segmentation 39

        LAN Topologies 40

            Physical and Logical Topologies 41

            Bus Topology 41

            Star Topology 42

            Ring Topology 44

            Wired Mesh Topology 45

        Wireless Network Topologies 47

            Infrastructure Wireless Topology 47

            Ad Hoc Wireless Networking 48

            Point-to-Point, Point-to—Multipoint, and Mesh-Wireless Topology 48

            Point-to-Point Networks 48

            Point-to-Multipoint 50

            Mesh Networks 50

            Hybrid Topologies 51

        Summary 52

    Chapter 2 Media and Connectors 61

        Networking Media 62

            Media Interference 62

            Data Transmission Rates 63

            Media Length 63

        Secure Transmission and Physical Media 64

            Installation and Repair 65

            Simplex, Half-Duplex, and Full-Duplex 65

            Cable Media 66

            Twisted-Pair Cable 67

            Coaxial Cable 69

            Fiber-Optic Cable 70

        Media Connectors 72

            RJ Connectors 72

            F-Type Connectors and RG-59/RG-6 Cables 73

            RS-232 Standard 74

            Fiber Connectors 74

            IEEE 1394 (FireWire) 75

            Universal Serial Bus Connectors (USB) 76

            Cable Summary 76

        Wiring Standards and Specialized Cable 77

            568A and 568B Wiring Standards 77

            Straight Versus Crossover Cable 78

            Rollover and Loopback Cables 80

        Components of Wiring Distribution 80

            Network Cross Connects 81

            Horizontal Cabling 81

            Vertical Cable 82

            Patch Panels 83

            Type 66 and Type 110 Punchdown Blocks 84

            MDF and IDF 85

            Demarcation Point 86

            Verify Wiring Installation and Termination 87

        Summary 89

    Chapter 3 Networking Components and Devices 99

        Common Network Devices 100

            Hubs 100

            Network Switches 102

            Switching Methods 105

            Advanced Switch Features 105

            Power over Ethernet (PoE) 106

            Trunking 106

            Port Authentication 107

            Working with Hubs and Switches 107

            Hub and Switch Ports 107

            Hub and Switch Indicator Lights 109

            Rack-Mount, Stackable, and Freestanding Devices 109

            Managed Hubs and Switches 109

            Repeaters 110

            Bridges 110

            Bridge Implementation Considerations 111

            Types of Bridges 114

            Routers 114

            Gateways 117

            Modems 118

            Modem Connection Speeds 119

            Network Interface Cards (NIC) 120

            Types of Network Interfaces 121

            Installing Network Cards 123

            Media Converters 124

            Firewalls 125

            DHCP Server 126

        Specialized Network Devices 127

            Multilayer and Content Switches 127

            Intrusion Detection and Prevention Systems 128

            Load Balancer 129

            Multifunction Network Devices 129

            DNS Server 129

            Bandwidth Shaper 130

            Proxy Server 131

            CSUs/DSUs 133

            Network Devices Summary 134

        Summary 136

    Chapter 4 Understanding the TCP/IP Protocol Suite 145

        A Brief Introduction to Protocols 146

            Protocols from the Sending Device 147

            Protocols on the Receiving Device 147

        Transmission Control Protocol/Internet Protocol (TCP/IP) Protocol Suite 148

            Internet Protocol (IP) 149

            Transmission Control Protocol (TCP) 149

            User Datagram Protocol (UDP) 150

            File Transfer Protocol (FTP) 151

            Secure Shell (SSH) 152

            Secure File Transfer Protocol (SFTP) 152

            Trivial File Transfer Protocol (TFTP) 153

            Simple Mail Transfer Protocol (SMTP) 153

            Hypertext Transfer Protocol (HTTP) 154

            Hypertext Transfer Protocol Secure (HTTPS) 154

            Post Office Protocol Version 3/Internet Message Access Protocol Version 4 (POP3/IMAP4) 155

            Telnet 155

            Internet Control Message Protocol (ICMP) 156

            Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol

            (RARP) 156

            Network Time Protocol (NTP) 157

            Network News Transfer Protocol (NNTP) 157

            Secure Copy Protocol (SCP) 158

            Lightweight Directory Access Protocol (LDAP) 158

            Internet Group Management Protocol (IGMP) 158

            Domain Name System (DNS) 159

            The DNS Namespace 160

            Types of DNS Entries 162

            DNS in a Practical Implementation 163

            Simple Network Management Protocol (SNMP) 163

            Components of SNMP 164

            SNMP Management Systems 164

            SNMP Agents 165

            Management Information Bases (MIB) 165

            SNMP Communities 166

            Dynamic Host Configuration Protocol (DHCP) 167

            Transport Layer Security 170

            Session Initiation Protocol 170

            Real-time Transport Protocol (RTP) 171

            TCP/IP Protocol Suite Summary 171

        Identifying Common TCP/IP Port Numbers 173

        Summary 175

    Chapter 5 TCP/IP Addressing and Routing 185

        Identifying MAC Addresses 186

        Understanding IPv4 Addressing Fundamentals 187

            General IP Addressing Principles 188

            IPv4 Addressing 188

            IPv4 Address Types 190

            Distributing IPv4 Addresses to the Network 191

            Static Addressing 191

            Dynamic Addressing 191

            Bootstrap Protocol (BOOTP) 191

            APIPA and IPv4 192

            Broadcast Addresses and “This Network” 193

            Classless Interdomain Routing (CIDR) 193

            Default Gateways 194

        Understanding Subnetting 195

        Public and Private IP Address Schemes 198

            Private Address Ranges 199

            Practical Uses of Public and Private IP Addressing 200

        IPv6 Addressing 201

            Identifying IPv6 Addresses 201

            IPv6 Address Types 202

        Differentiating Between Routable and Routing Protocols 204

            Routable Protocols 204

            Routing Protocols 205

            Distance-Vector Routing Protocols 206

            Link-State Routing Protocols 208

        NAT, PAT, and SNAT 209

        Summary 211

    Chapter 6 Ethernet Networking Standards 221

        Characteristics Specified in the IEEE 802 Standards 223

            Speed 223

            Access Methods 223

            Carrier Sense Multiple Access/Collision Detection 224

            CSMA/CA 225

            Token Passing 226

            Bonding 226

            Topology 226

            Media 227

        Differentiating Between Baseband and Broadband Signaling 227

            Baseband 227

            Broadband 227

        Ethernet Standards 228

            10Base2 228

            10BaseT 229

            10BaseFL 230

            Fast Ethernet 230

            100BaseTX 231

            100BaseT4 231

            100BaseFX 231

            Fast Ethernet Comparison 231

            Gigabit Ethernet 232

            1000BaseX 232

            1000BaseT 233

            10Gigabit Ethernet 234

            10GBaseSR/SW 234

            10GBaseLR/LW 235

            10GBaseER/EW 235

            10GBaseT 236

        Summary 236

    Chapter 7 Wireless Networking 245

        Understanding Wireless Devices 246

            Wireless Access Point 246

            Wireless Antennas 248

            Antenna Ratings 249

            Types of Wireless Antennas 249

        802.11 Wireless Standards 251

            The Magic Behind 802.11n 254

            Wireless Radio Channels 254

        Spread Spectrum Technology 257

            Frequency-Hopping Spread Spectrum (FHSS) Technology 257

            Direct-Sequence Spread Spectrum (DSSS) Technology 258

            Orthogonal Frequency Division Multiplexing 258

            FHSS, DSSS, OFDM, and 802.11 Standards 258

        Beacon Management Frame 259

        Configuring and Troubleshooting the Wireless Connection 260

            Configuring Communications Between Wireless Devices 262

            Troubleshooting Wireless Signals 264

            Site Surveys 265

            Troubleshooting AP Coverage 266

            Wireless Troubleshooting Checklist 267

        Securing Wireless Networks 268

            Defining Access Control, Authentication, Authorization, and Encryption 268

            Wireless Authentication and Encryption Methods 269

            Wired Equivalent Privacy (WEP) 270

            Wi-Fi Protected Access (WPA) 270

            Temporal Key Integrity Protocol (TKIP) 271

            802.1X 272

            Securing the Access Point 273

        Summary 273

    Chapter 8 Wide Area Networking 283

        Public and Private Networks 284

            Public Networks 284

            Public Switched Telephone Network (PSTN) 284

            The Internet 285

            Advantages and Disadvantages of Public Networks 286

            Private Networks 286

        Switching Methods 287

            Packet Switching 288

            Virtual-Circuit Packet Switching 289

            Datagram Packet Switching 289

            Circuit Switching 290

            Message Switching 290

            Comparing Switching Methods 291

        WAN Technologies 292

            X.25 293

            Frame Relay 293

            T-Carrier Lines 295

            T1/E1/J1 Lines 295

            T3 Lines 297

            SONET/OCx Levels 297

            Asynchronous Transfer Mode (ATM) 298

            Integrated Services Digital Network (ISDN) 299

            Basic Rate Interface (BRI) 301

            Primary Rate Interface (PRI) 301

            Comparing BRI and PRI ISDN 301

            WAN Technology Summary 301

        Internet Access Technologies 302

            POTS Internet Access 303

            POTS Troubleshooting Procedures 303

            Troubleshooting Poor Connection Speeds 305

            Modem-Specific Troubleshooting 306

            xDSL 307

            Cable Internet Access 310

            Satellite Internet Access 313

        Wireless Wide Area Networking 315

        Summary 316

    Chapter 9 OSI Model 325

        OSI Reference Model 101 326

            Layer 1: The Physical Layer 328

            Layer 2: The Data Link Layer 329

            Layer 3: The Network Layer 329

            Switching Methods 330

            Network Layer Addressing 331

            Layer 4: The Transport Layer 331

            Connection-Oriented Protocols 332

            Connectionless Protocols 332

            Flow Control 333

            Layer 5: The Session Layer 333

            Layer 6: The Presentation Layer 333

            Layer 7: The Application Layer 334

            OSI Model Summary 334

    The Layers at Which Devices Operate 335

            Hubs 336

            Switches 336

            Bridges 336

            Routers 336

            NICs 336

            Wireless Access Points (APs) 337

            Summary of the Layers at Which Devices Operate 337

        TCP/IP Protocol Suite Summary 337

        Summary 340

    Chapter 10 Network Performance and Optimization 349

        Understanding Uptime 350

        Understanding the Risks 352

            RAID 353

            RAID 0 354

            Advantages of RAID 0 354

            Disadvantages of RAID 0 355

            Recovering from a Failed RAID 0 Array 355

            RAID 1 355

            Advantages of RAID 1 357

            Disadvantages of RAID 1 357

            Recovering from a Failed RAID 1 Array 358

            RAID 5 358

            Advantages of RAID 5 358

            Disadvantages of RAID 5 359

            Recovering from a RAID 5 Array Failure 359

            RAID 10 360

            Choosing a RAID Level 361

            Hardware and Software RAID 362

            Other Fault-Tolerance Measures 363

            Link Redundancy 363

            Using Uninterruptible Power Supplies 364

            Why Use a UPS? 365

            Power Threats 365

            Using Redundant Power Supplies 366

            Server and Services Fault Tolerance 366

            Using Standby Servers 366

            Server Clustering 367

            Preparing for Memory Failures 368

            Managing Processor Failures 368

        Disaster Recovery 368

            Backup Methods 368

            Full Backups 369

            Incremental Backups 370

            Differential Backups 370

            A Comparison of Backup Methods 371

            Backup Rotation Schedules 371

            Offsite Storage 372

            Backup Best Practices 373

        Hot and Cold Spares 374

            Hot Spare and Hot Swapping 374

            Cold Spare and Cold Swapping 375

            Recovery Sites 375

            Cold Site 375

            Hot Site 376

            Warm Site 376

        Network Optimization Strategies 377

            QoS 377

            Latency-Sensitive High-Bandwidth Applications 378

            Voice over Internet Protocol (VoIP) 378

            Video Applications 379

            Traffic Shaping 379

            Load Balancing 381

            Caching Engines 381

        Summary 382

    Chapter 11 Troubleshooting Procedures and Best Practices 393

        The Art of Troubleshooting 394

            Troubleshooting Servers and Workstations 394

            General Troubleshooting Considerations 395

            Troubleshooting Methods and Procedures 396

            Step 1: Information Gathering–Identify Symptoms and Problems 397

            Information from the Computer 397

            Information from the User 398

            Observation Techniques 399

            Effective Questioning Techniques 399

            Step 2: Identify the Affected Areas of the Network 399

            Step 3: Determine if Anything Has Changed 400

            Changes to the Network 400

            Changes to the Server 401

            Changes to the Workstation 402

            Step 4: Establish the Most Probable Cause 402

            Step 5: Determine if Escalation Is Necessary 403

            Step 6: Create an Action Plan and Solution Identifying Potential Effects 403

            Step 7: Implement and Test the Solution 404

            Step 8: Identify the Results and Effects of the Solution 405

            Step 9: Document the Solution and the Entire Process 406

        Troubleshooting the Network 407

            Troubleshooting Wiring 407

            Where the Cable Is Used 408

            Wiring Issues 409

            Crosstalk 409

            Near-End Crosstalk (NEXT) 409

            Far-End Crosstalk (FEXT) 409

            Electromagnetic interference (EMI) 409

            Attenuation 410

            Open Impedance Mismatch (Echo) 410

            Shorts 410

            Managing Collisions 410

            Troubleshooting Infrastructure Hardware 411

            Configuring and Troubleshooting Client Connectivity 413

            Verifying Client TCP/IP Configurations 413

            Setting Port Speeds and Duplex 415

            Troubleshooting Incorrect VLANs 416

        Identifying Issues That Might Need Escalation 417

        Troubleshooting Wireless Issues 418

            Troubleshooting Wireless Signals 418

            Troubleshooting Wireless Configurations 420

        Summary 421

    Chapter 12 Command-Line Networking Tools 431

        Common Networking Utilities 432

            The ping Utility 432

            Switches for ping 434

            Troubleshooting Steps with ping 435

            Ping Error Messages 436

            The Destination Host Unreachable Message 437

            The Unknown Host Message 438

            The traceroute Utility 439

            Reviewing tracert Command Printouts 441

            The traceroute Command 444

            The mtr Utility 445

            The arp Utility 445

            The ARP Cache 445

            Switches for arp 446

            The arp Command Printout 447

            The arp ping Utility 447

            The netstat Utility 448

            The netstat Command Printouts 450

            netstat -e 450

            netstat -a 451

            netstat -r 452

            netstat -s 453

            The nbtstat Utility 454

            The ipconfig and ifconfig Utilities 456

            The ipconfig Utility 457

            The ipconfig Command Printouts 458

            The ifconfig Command Printout 460

            The nslookup and dig Utilities 461

            The nslookup Utility 461

            The nslookup Command Printout 463

            The dig Utility 464

            The dig Command Printout 465

            The host Command 466

            The route Utility 466

        Summary 468

    Chapter 13 Network Management Tools and Documentation Procedures 479

        Documentation Management 480

            Wiring Schematics 481

            Physical and Logical Network Diagrams 484

            Physical Network Documentation 484

            Logical Network Documentation 485

            Baselines 487

            Policies, Procedures, Configurations, and Regulations 488

            Policy Documentation 488

            Network Procedure Documentation 489

            Configuration Documentation 490

            Regulations 491

        Monitoring the Network to Identify Performance 492

            Throughput Testing 493

            Port Scanners 495

            Network Testing 498

            Performance Testing 498

            Load Testing 498

            Stress Testing 499

            Logging 499

            Security Logs 500

            Application Logs 501

            System Logs 502

            History Logs 502

            Log Management 503

    Networking Tools 503

            Wire Crimpers 504

            Strippers and Snips 504

            Punchdown Tools 505

            Cable Certifiers 505

            Voltage Event Recorders 506

            Temperature Monitors 506

            Toner Probes 508

            Protocol Analyzer 509

            Media/Cable Testers 509

            Media Testers 510

            TDR 510

            OTDR 510

            Multimeter 511

            Network Qualification Tester 512

            Butt Set 512

            Wireless Detector 512

        Summary 513

    Chapter 14 Network Access Security 525

        Understanding Network Security Threats 526

        Security Responsibilities of a Network Administrator 527

        Physical and Logical Security 528

            Physical Security 528

            Network Hardware and Server Room Access 529

            Lock and Key 529

            Swipe Card and PIN Access 529

            Biometrics 530

            Hardware Room Best Practices 531

            Logical Security 532

        Firewalls 532

            The Purpose and Function of a Firewall 534

            Stateful and Stateless Firewalls 536

            Firewall Methods 536

            Network Layer Firewalls 536

            Circuit-Level Firewalls 537

            Application-Layer Firewalls 537

            Demilitarized Zones 538

        Intrusion Detection and Intrusion Prevention Systems 539

        Network Access Security 539

            Access Control Lists 540

            Access Control and MAC Filtering 540

            TCP/IP Filtering 540

            Port Blocking/Filtering 541

        Remote Access Protocols and Services 542

            Routing and Remote Access Service (RRAS) 542

            SLIP 543

            PPP 543

            PPPoE 544

        Tunneling and Encryption 545

            SSL VPNs 546

            VPN Concentrators 546

            Point-to-Point Tunneling Protocol (PPTP) 547

            Layer Two Tunneling Protocol (L2TP) 548

            Advantages of L2TP and PPTP 548

        Inside IPsec 548

            Authentication Headers 549

            Encapsulating Security Payloads 549

            IPsec Transmission Modes 550

        Remote Control Protocols 550

        Summary 551

    Chapter 15 Security Technologies and Malicious Software 561

        Authentication, Authorization, and Accounting (AAA) 562

            Authentication 562

            Password Policies 562

            Password Strength 563

            Multifactor Authentication 565

            Authentication Tokens 565

            Biometrics 565

            Multifactor Authentication/Two-Factor Authentication 566

            Authorization 566

            Accountability 567

        RADIUS and TACACS+ 568

            RADIUS 568

            TACACS+ 570

            Understanding Cryptography Keys 570

            Kerberos Authentication 572

        Public Key Infrastructure 573

            Components of a PKI 574

            Certificates 575

            Certificate Stores 576

            Trusts 576

            Certificate Authorities (CAs) 577

            Public CAs 577

            Private CAs 577

        Network Access Control 578

            Mandatory Access Control (MAC) 578

            Discretionary Access Control (DAC) 579

            Rule-Based Access Control (RBAC) 579

            Role-Based Access Control (RBAC) 579

        Remote Authentication Protocols 580

        Using Secure Protocols 581

        Malicious Software 582

            Malware Distribution 583

            Malware Payloads 584

            More About Viruses 585

            More About Trojan Horses and Worms 586

            Comparing Malware Types 586

            Types of Attacks 587

            Denial of Service and Distributed Denial of Service Attacks 587

            Other Common Attacks 589

            An Ounce of Prevention 590

        Maintaining Operating System Software 592

            Reasons to Use a Service Pack 593

            When to Use a Service Pack 593

            How to Apply a Service Pack 594

            Server Patches 595

        Summary 596

    Appendix A Answers to the Review Questions 605

    Index 639

    Elements on the CD-ROM:

    Appendix B Memory Tables

    Appendix C Memory Tables Answer Key

    Glossary

    TOC, 9780789745590, 7/8/10

    More Information

    Pearson IT Certification Promotional Mailings & Special Offers

    I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

    Overview


    Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

    This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

    Collection and Use of Information


    To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

    Questions and Inquiries

    For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

    Online Store

    For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

    Surveys

    Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

    Contests and Drawings

    Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

    Newsletters

    If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

    Service Announcements

    On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

    Customer Service

    We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

    Other Collection and Use of Information


    Application and System Logs

    Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

    Web Analytics

    Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

    Cookies and Related Technologies

    This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

    Do Not Track

    This site currently does not respond to Do Not Track signals.

    Security


    Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

    Children


    This site is not directed to children under the age of 13.

    Marketing


    Pearson may send or direct marketing communications to users, provided that

    • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
    • Such marketing is consistent with applicable law and Pearson's legal obligations.
    • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
    • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

    Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

    Correcting/Updating Personal Information


    If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

    Choice/Opt-out


    Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

    Sale of Personal Information


    Pearson does not rent or sell personal information in exchange for any payment of money.

    While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

    Supplemental Privacy Statement for California Residents


    California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

    Sharing and Disclosure


    Pearson may disclose personal information, as follows:

    • As required by law.
    • With the consent of the individual (or their parent, if the individual is a minor)
    • In response to a subpoena, court order or legal process, to the extent permitted or required by law
    • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
    • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
    • To investigate or address actual or suspected fraud or other illegal activities
    • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
    • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
    • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

    Links


    This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

    Requests and Contact


    Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

    Changes to this Privacy Notice


    We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

    Last Update: November 17, 2020