Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
CompTIA Network+ Study Guide: Exam N10-007

You're reading from   CompTIA Network+ Study Guide: Exam N10-007 Todd Lammle's bestselling CompTIA Network+ Study Guide for the N10-007 exam!

Arrow left icon
Product type Paperback
Published in May 2018
Publisher Wiley
ISBN-13 9781119432258
Length 1008 pages
Edition 4th Edition
Arrow right icon
Author (1):
Arrow left icon
Todd Lammle Todd Lammle
Author Profile Icon Todd Lammle
Todd Lammle
Arrow right icon
View More author details
Toc

Table of Contents (27) Chapters Close

1. Introduction FREE CHAPTER 2. Chapter 1: Introduction to Networks 3. Chapter 2: The Open Systems Interconnection Specifications 4. Chapter 3: Networking Topologies, Connectors, and Wiring Standards 5. Chapter 4: The Current Ethernet Specifications 6. Chapter 5: Networking Devices 7. Chapter 6: Introduction to the Internet Protocol 8. Chapter 7: IP Addressing 9. Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 10. Chapter 9: Introduction to IP Routing 11. Chapter 10: Routing Protocols 12. Chapter 11: Switching and Virtual LANs 13. Chapter 12: Wireless Networking 14. Chapter 13: Authentication and Access Control 15. Chapter 14: Network Threats and Mitigation 16. Chapter 15: Physical Security and Risk 17. Chapter 16: Wide Area Networks 18. Chapter 17: Troubleshooting Tools 19. Chapter 18: Software and Hardware Tools 20. Chapter 19: Network Troubleshooting 21. Chapter 20: Management, Monitoring, and Optimization 22. Index
23. Advert
24. EULA
Appendix A: Answers to Written Labs
1. Appendix B: Answers to Review Questions
2. Appendix C: Subnetting Class A

Summary

In this chapter, you learned about the two most basic security concerns: security filtering and user authentication. First, we talked about how to allow remote computers to join your network and how to specify the way traffic leaves your network using access control lists. Then, you learned about various tunneling and encryption protocols like SSL, VPN, L2TP, PPTP, and IPSec.

Moving on, we examined several of the ways used today to remotely access networks, including RAS, RDP, PPP, PPPoE, and ICA.

We wrapped things up by discussing solid user-account and password-management policies and why those policies are essential to maintaining tight security on your network. Finally, you learned about authentication methods like PKI, Kerberos, RADIUS, TACACS+, 802.1X, CHAP, MS-CHAP, and EAP—good stuff!

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £13.99/month. Cancel anytime
Visually different images