Home > Store

CompTIA Network+ N10-006 Exam Cram, Premium Edition and Practice Tests, 5th Edition

Register your product to gain access to bonus material or receive a coupon.

CompTIA Network+ N10-006 Exam Cram, Premium Edition and Practice Tests, 5th Edition

Premium Edition eBook

  • Sorry, this book is no longer in print.
  • About Premium Edition eBooks
  • The Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep practice tests.

    Your purchase will deliver:

    • Link to download the Pearson Test Prep exam engine
    • Access code for question database
    • eBook in the following formats, accessible from your Account page after purchase:

    EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    PDF The popular standard, which reproduces the look and layout of the printed page.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    eBook FAQ

    eBook Download Instructions

Not for Sale


  • Copyright 2015
  • Edition: 5th
  • Premium Edition eBook
  • ISBN-10: 0-13-421178-2
  • ISBN-13: 978-0-13-421178-7

The exciting new CompTIA Network+ N10-006 Exam Cram, Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson IT Certification Practice Test. The Premium Edition eBook and Practice Test contains the following items:

--The Network+ N10-006 Premium Edition Practice Test, including three full practice exams and enhanced practice test features

--PDF and EPUB formats of the CompTIA Network+ N10-006 Exam Cram from Pearson IT Certification, which are accessible via your PC, tablet, and smartphone

--Access to the digital edition of the Cram Sheet, available through product registration at Pearson IT Certification; or see instructions in the back pages of your eBook

About the Premium Edition Practice Test

This Premium Edition contains an enhanced version of the Pearson IT Certification Practice Test (PCPT) software with three full practice exams. In addition, it contains all the chapter-opening assessment questions from the book. This integrated learning package

--Enables you to focus on individual topic areas or take complete, timed exams

--Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions

--Provides unique sets of exam-realistic practice questions

--Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

Pearson IT Certification Practice Test minimum system requirements:

Windows XP (SP3), Windows Vista (SP2), Windows 7, or Windows 8.1; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512MB RAM; 650MB disk space plus 50MB for each downloaded practice exam; access to the Internet to register and download exam databases

About the Premium Edition eBook

CompTIA® Network+ N10-006 Exam Cram, Fifth Edition is the perfect study guide to help you pass the CompTIA Network+ N10-006 exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of security, cloud networking, IPv6, and wireless technologies. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, sidebars, and Notes interspersed throughout the text keep you focused on what you need to know. Cram Quizzes help you assess your knowledge, and the digital edition Cram Sheet is the perfect last-minute review.

Covers the critical information you’ll need to know to score higher on your CompTIA Network+ (N10-006) exam!

--Understand modern network topologies, protocols, and infrastructure

--Implement networks based on specific requirements

--Install and configure DNS and DHCP

--Monitor and analyze network traffic

--Understand IPv6 and IPv4 addressing, routing, and switching

--Perform basic router/switch installation and configuration

--Explain network device functions in cloud environments

--Efficiently implement and troubleshoot WANs

--Install, configure, secure, and troubleshoot wireless networks

--Apply patches/updates, and support change/configuration management

--Describe unified communication technologies

--Segment and optimize networks

--Identify risks/threats, enforce policies and physical security, configure firewalls, and control access

--Understand essential network forensics concepts

--Troubleshoot routers, switches, wiring, connectivity, and security

Sample Content

Table of Contents


CHAPTER 1 Introduction to Networking

LANs, WANs, MANs, SCADA/ICS, Medianets, and Network Models






    Network Models

    Centralized Versus Distributed Computing

Network Topologies

    Bus Topology

    Ring Topology

    Star Topology

    Wired Mesh Topology

    Wireless Topologies

    Point-to-Point, Point-to-Multipoint, and Wireless Mesh Topologies

    Hybrid Topologies

Creating a SOHO Network

What’s Next?

CHAPTER 2 The OSI Model and Networking Protocols

The Networking Models

    The OSI Seven-Layer Model

    The TCP/IP Four-Layer Model

    Identifying the OSI Layers at Which Various Network Components Operate

Dynamic Host Configuration Protocol (DHCP)

    The DHCP Process

    DHCP and DNS Suffixes

    DHCP Relays and IP Helpers

Domain Name Service (DNS)

    The DNS Namespace

    Types of DNS Entries

    DNS Records

    DNS in a Practical Implementation

Simple Network Management Protocol (SNMP)

    Components of SNMP

    SNMP Management Systems

    SNMP Agents

    Management Information Bases

    SNMP Communities



    Connection-Oriented Protocols Versus Connectionless Protocols

    Internet Protocol

    Transmission Control Protocol

    User Datagram Protocol

    File Transfer Protocol

    Secure File Transfer Protocol

    Trivial File Transfer Protocol

    Simple Mail Transfer Protocol

    Hypertext Transfer Protocol

    Hypertext Transfer Protocol Secure

    Post Office Protocol Version 3/Internet Message Access Protocol Version 4


    Secure Shell

    Internet Control Message Protocol

    Address Resolution Protocol/Reverse Address Resolution Protocol

    Network Time Protocol

    Network News Transfer Protocol

    Secure Copy Protocol

    Lightweight Directory Access Protocol

    Internet Group Management Protocol

    Transport Layer Security

    Session Initiation Protocol/Real-Time Transport Protocol

    Remote Desktop Protocol

    Server Message Block

    Understanding Port Functions

What’s Next?

CHAPTER 3 Addressing and Routing

IP Addressing


    IP Address Classes

    Subnet Mask Assignment


    Identifying the Differences Between IPv4 Public and Private Networks

    Classless Interdomain Routing

    Default Gateways

    IPv4 Address Types

    IPv6 Addressing

    Comparing IPv4 and IPv6 Addressing

    Assigning IP Addresses

    Identifying MAC Addresses

    NAT, PAT, SNAT, and DNAT

Managing TCP/IP Routing

    The Default Gateway

    Routing Tables

    Static Routing

    Dynamic Routing

    Routing Metrics

Configuring Routers and Switches

    Proxy Servers

    The Spanning Tree Protocol


    Port Mirroring

    Port Authentication

    High Availability

What’s Next?

CHAPTER 4 Components and Devices

Common Network Devices

    Access Point

    Analog Modem

    Content Filter


    IDS and IPS


    Load Balancer

    Packet Shaper



    Multilayer Switch

    VPN Concentrator

    Network Devices Summary

Switch Configuration

    Virtual Local-Area Networks

    Working with Spanning Tree

    Interface Configuration and Switch Management

    Power over Ethernet

    Switch Management

    Managed and Unmanaged

What’s Next?

CHAPTER 5 Cloud Computing Basics

Cloud Concepts

    Software as a Service

    Platform as a Service

    Infrastructure as a Service

    Private Cloud

    Public Cloud

    Community Cloud

    Hybrid Cloud

Virtualization and Storage-Area Networks


    Storage-Area Networks

What’s Next?

CHAPTER 6 Installation and Configuration

WAN Technologies

    Switching Methods

    Integrated Services Digital Network

    Leased Lines

    Fiber, SONET, and OCx Levels

    Frame Relay

    Asynchronous Transfer Mode

    Summary of WAN Technologies

    Other WAN Technologies

Internet Access Technologies

    DSL Internet Access

    Cable Internet Access

    Broadband Security Considerations


    The Public Switched Telephone Network

    Satellite Internet Access

    Wireless Internet Access


Safety Practices

    Focusing on Safety

    Electrical Safety and ESD

    Installation Safety

    Fire Suppression

    In Case of an Emergency

Installing and Configuring Equipment

    Distribution Frames

    Cable Management

    Power Management

    Device Placement and Labeling

    Rack Systems

What’s Next?

CHAPTER 7 Cabling and Wiring

General Media Considerations

    Broadband Versus Baseband Transmissions

    Simplex, Half-Duplex, and Full-Duplex Modes

    Media Interference


    Data Transmission Rates

    Types of Network Media

    Types of Media Connectors

    Media Couplers/Converters

    568A and 568B Wiring Standards

    Straight-Through Versus Crossover Cables

    Rollover and Loopback Cables

    Components of Wiring Distribution

    Helpful Tools

Comparing and Contrasting LAN Technologies

    IEEE 802.2 Standard

    802.3 Ethernet Standards

    Related Network Concepts

    Cram Quiz Answers

Troubleshooting Common Issues

    WAN-Related Issues

    Customer Premise Equipment

    Company Security Policies

    Satellite Issues

What’s Next?

CHAPTER 8 Wireless

Understanding Wireless Basics

    Wireless Access Points

    Wireless Antennas

    Wireless Radio Channels

    Data Rate Versus Goodput

    Beacon Management Frame

    Spread-Spectrum Technology

    Orthogonal Frequency-Division Multiplexing

    Infrared Wireless Networking

    Establishing Communications Between Wireless Devices

    Configuring the Wireless Connection

802.11 Wireless Standards

    The Magic Behind 802.11n and 802.11ac

    A Summary of 802.11 Wireless Standards

Securing Wireless Networks

    Wired Equivalent Privacy

    Wi-Fi Protected Access


    WPA Enterprise

    Other Dangers

Wireless Troubleshooting Checklist

    Factors Affecting Wireless Signals

What’s Next?

CHAPTER 9 Network Management

Documentation Management

    Wiring Schematics

    Physical and Logical Network Diagrams


    Policies, Procedures, Configurations, and Regulations

Monitoring Network Performance

    Common Reasons to Monitor Networks

    Packet Sniffers

    Throughput Testing

    Port Scanners

    Network Performance, Load, and Stress Testing

    Tracking Event Logs

Patches and Updates

What’s Next?

CHAPTER 10 Network Optimization

Unified Communication Technologies

    Quality of Service

    Traffic Shaping



    Real-Time Services

    Unified Communication Devices

Network Segmentation

    SCADA Systems

    Legacy Systems

    Separate Private/Public Networks

    Honeypots and Honeynets

    Testing Lab

    Load Balancing

    Performance Optimization



What’s Next?

CHAPTER 11 Network Security

Tunneling, Encryption, and Access Control


    Point-to-Point Tunneling Protocol

    Layer 2 Tunneling Protocol


    Site-to-Site, Host-to-Site, and Host-to-Host

    Overview of Access Control

    Remote-Access Protocols and Services

    Remote-Control Protocols

    MAC Filtering

    TCP/IP Filtering

Disaster Recovery

    Full Backups

    Differential Backups

    Incremental Backups

    Tape Rotations

    Backup Best Practices

    Using Uninterruptible Power Supplies

    Hot and Cold Spares

    Hot, Warm, and Cold Sites

    Risk-Related Policies and Procedures

Managing Common Security Threats


    Worms and Trojan Horses

    Denial-of-Service and Distributed Denial-of-Service Attacks

    Other Common Attacks

    Vulnerabilities and Prevention

Authentication, Authorization, and Accounting (AAA)

    Passwords and Password Policies

    Kerberos Authentication

    Public Key Infrastructure


    Remote Authentication Protocols

    Secured Versus Unsecured Protocols

    Adding Physical Security to the Mix

    Two-factor and Multifactor Authentication

Firewalls, Appliances, and Physical Security

    Stateful and Stateless Firewalls

    Packet-Filtering Firewalls

    Circuit-Level Firewalls

    Application Layer Firewalls

    Comparing Firewall Types

    Firewall Wrap-Up

    Demilitarized Zones (Perimeter Network)

    Other Security Devices

    Physical Security Controls

Responding to Incidents

    First Responders

    Securing the Area

    Document the Scene

    eDiscovery and Evidence/Data Collection

    Chain of Custody

    Final Responsibilities

What’s Next?

CHAPTER 12 Network Troubleshooting

Troubleshooting Steps and Procedures

    Identify the Problem

    Establish a Theory of Probable Cause

    Test the Theory to Determine Cause

    Establish a Plan of Action

    Implement the Solution or Escalate

    Verify Full System Functionality

    Document the Findings, Actions, and Outcomes

Troubleshooting the Network

    Common Problems to Be Aware Of

    Troubleshooting Wiring

    Wiring Issues

    Troubleshooting Infrastructure Hardware

    Configuring and Troubleshooting Client Connectivity

    Troubleshooting an Incorrect VLAN

    Topology Errors

Working with Command-Line Utilities

    The Trace Route Utility (tracert/traceroute)




    The netstat Command


    The ipconfig Command




    The host Command

    The route Utility

Networking Tools

    Wire Crimpers, Strippers, and Snips

    Voltage Event Recorder

    Environmental Monitors

    Toner Probes

    Protocol Analyzer

    Media/Cable Testers

    TDR and OTDR


    Network Qualification Tester

    Butt Set

    Wireless Detection

    Speed Tests and Looking Glasses

Managing Common Security Threats

What’s Next?


On the CD:

Practice Exam 1

Answers to Practice Exam 1

Practice Exam 2

Answers to Practice Exam 2

9780789754103    TOC    4/29/2015

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020