CompTIA Network+ Lab Manual


Gain street-smart skills in network administration

Think of the most common and challenging tasks that network administrators face, then read this book and find out how to perform those tasks, step by step. CompTIA Network + Lab Manual provides an inside look into the field of network administration as though you were actually on the job. You'll find a variety of scenarios and potential roadblocks, as well as clearly mapped sections to help you prepare for the CompTIA Network+ ...

See more details below
Paperback (Lab Manual)
$24.31 price
(Save 18%)$29.99 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (16) from $4.69   
  • New (8) from $7.99   
  • Used (8) from $4.69   


Gain street-smart skills in network administration

Think of the most common and challenging tasks that network administrators face, then read this book and find out how to perform those tasks, step by step. CompTIA Network + Lab Manual provides an inside look into the field of network administration as though you were actually on the job. You'll find a variety of scenarios and potential roadblocks, as well as clearly mapped sections to help you prepare for the CompTIA Network+ Exam N10-005. Learn how to design, implement, configure, maintain, secure, and troubleshoot a network with this street-smart guide.

  • Provides step-by-step instructions for many of the tasks network administrators perform on a day-to-day basis, such as configuring wireless components; placing routers and servers; configuring hubs, switches, and routers; configuring a Windows client; and troubleshooting a network
  • Addresses the CompTIA Network+ Exam N10-005 objectives and also includes a variety of practice labs, giving you plenty of opportunities for hands-on skill-building
  • Organized by the phases of network administration: designing a network, implementing and configuring it, maintenance and security, and troubleshooting

Study, practice, and review for the new CompTIA Network+ N10-005 Exam, or a networking career, with this practical, thorough lab manual.

Read More Show Less

Product Details

  • ISBN-13: 9781118148631
  • Publisher: Wiley
  • Publication date: 2/28/2012
  • Edition description: Lab Manual
  • Edition number: 3
  • Pages: 480
  • Sales rank: 1,505,710
  • Product dimensions: 7.30 (w) x 9.20 (h) x 1.10 (d)

Meet the Author

Toby Skandier, Network+, A+, i-Net+, Server+, is founder of Talskan Technologies, LLC, a technical education provider based in North Carolina. He is the author of Network Administrator Street Smarts: A Real World Guide to CompTIA Network+ Skills and has coauthored numerous books for Sybex, including the CompTIA A+ Complete Study Guide.

Read More Show Less

Table of Contents

Introduction xix

Phase 1 Designing an Internetwork 1

Task 1.1: Drawing an Internetwork 2

Scenario 3

Scope of Task 3

Procedure 4

Criteria for Completion 7

Task 1.2: Identifying Network Components 10

Scenario 11

Scope of Task 11

Procedure 11

Criteria for Completion 12

Task 1.3: Differentiating Ethernet Devices 16

Scenario 17

Scope of Task 17

Procedure 17

Criteria for Completion 20

Task 1.4: Identifying Collision and Broadcast Domains 20

Scenario 20

Scope of Task 20

Procedure 21

Criteria for Completion 22

Task 1.5: Discovering and Filtering MAC Addresses 25

Scenario 26

Scope of Task 26

Procedure 26

Criteria for Completion 39

Task 1.6: Applying the OSI Model 39

Scenario 39

Scope of Task 39

Procedure 40

Criteria for Completion 42

Task 1.7: Developing an IP Addressing Scheme 42

Scenario 42

Scope of Task 42

Procedure 43

Criteria for Completion 53

Task 1.8: Designing a VLAN Scheme 55

Scenario 56

Scope of Task 56

Procedure 57

Criteria for Completion 61

Task 1.9: Planning for Static and Dynamic Routing 62

Scenario 62

Scope of Task 62

Procedure 63

Criteria for Completion 69

Phase 2 Implementing and Configuring the Design 71

Task 2.1: Assigning IP Addresses 72

Scenario 72

Scope of Task 73

Procedure 73

Criteria for Completion 97

Task 2.2: Naming Network Devices 97

Scenario 98

Scope of Task 98

Procedure 99

Criteria for Completion 103

Task 2.3: Implementing Static and Dynamic Routing 103

Scenario 104

Scope of Task 104

Procedure 105

Criteria for Completion 112

Task 2.4: Installing Wireless NICs 112

Scenario 112

Scope of Task 112

Procedure 113

Criteria for Completion 125

Task 2.5: Measuring Wireless Signal Strength 126

Scenario 126

Scope of Task 127

Procedure 127

Criteria for Completion 129

Task 2.6: Implementing Bluetooth 129

Scenario 130

Scope of Task 131

Procedure 131

Criteria for Completion 134

Task 2.7: Implementing Ad Hoc Wireless Networking 135

Scenario 135

Scope of Task 135

Procedure 136

Criteria for Completion 146

Task 2.8: Using an Analog Modem 146

Scenario 147

Scope of Task 147

Procedure 148

Criteria for Completion 160

Task 2.9: Using a DSL Modem 160

Scenario 160

Scope of Task 160

Procedure 161

Criteria for Completion 167

Task 2.10: Using a Router as a Frame Relay Switch 167

Scenario 167

Scope of Task 167

Procedure 168

Criteria for Completion 174

Task 2.11: Simulating T1 CSU/DSUs 174

Scenario 175

Scope of Task 175

Procedure 176

Criteria for Completion 179

Task 2.12: Installing a Virtual Machine 179

Scenario 179

Scope of Task 179

Procedure 180

Criteria for Completion 192

Phase 3 Maintaining and Securing the Network 193

Task 3.1: Creating Local User Accounts 194

Scenario 195

Scope of Task 195

Procedure 196

Criteria for Completion 199

Task 3.2: Creating Local User Groups 200

Scenario 200

Scope of Task 200

Procedure 201

Criteria for Completion 205

Task 3.3: Managing Access to Resources 205

Scenario 205

Scope of Task 206

Procedure 206

Criteria for Completion 219

Task 3.4: Disabling Local User Accounts 219

Scenario 220

Scope of Task 220

Procedure 221

Criteria for Completion 224

Task 3.5: Setting Password Restrictions 224

Scenario 225

Scope of Task 225

Procedure 226

Criteria for Completion 234

Task 3.6: Mitigating the Ping of Death 234

Scenario 235

Scope of Task 235

Procedure 236

Criteria for Completion 239

Task 3.7: Securing Links Between Routers 239

Scenario 239

Scope of Task 240

Procedure 240

Criteria for Completion 245

Task 3.8: Guarding against SYN Flood Attacks 245

Scenario 246

Scope of Task 246

Procedure 246

Criteria for Completion 250

Task 3.9: Implementing File-Level Encryption 250

Scenario 251

Scope of Task 251

Procedure 252

Criteria for Completion 262

Task 3.10: Establishing Data Encryption between Routers 262

Scenario 262

Scope of Task 262

Procedure 263

Criteria for Completion 275

Task 3.11: Creating Data Backups 275

Scenario 276

Scope of Task 276

Procedure 277

Criteria for Completion 292

Task 3.12: Running an Antivirus Scan 292

Scenario 292

Scope of Task 292

Procedure 293

Criteria for Completion 299

Task 3.13: Running an Antispyware Scan 300

Scenario 300

Scope of Task 300

Procedure 301

Criteria for Completion 311

Task 3.14: Searching for Operating System Updates 311

Scenario 312

Scope of Task 312

Procedure 313

Criteria for Completion 319

Phase 4 Troubleshooting the Network 321

Task 4.1: Using ARP Utilities 322

Scenario 323

Scope of Task 323

Procedure 323

Criteria for Completion 326

Task 4.2: Using the NETSTAT Utility 326

Scenario 327

Scope of Task 327

Procedure 327

Criteria for Completion 330

Task 4.3: Using the FTP Utility 330

Scenario 330

Scope of Task 330

Procedure 331

Criteria for Completion 348

Task 4.4: Using Ping Utilities 348

Scenario 348

Scope of Task 348

Procedure 349

Criteria for Completion 352

Task 4.5: Using the IPCONFIG Utility 353

Scenario 353

Scope of Task 353

Procedure 354

Criteria for Completion 361

Task 4.6: Using Traceroute Utilities 361

Scenario 362

Scope of Task 362

Procedure 363

Criteria for Completion 366

Task 4.7: Using Telnet 367

Scenario 367

Scope of Task 367

Procedure 367

Criteria for Completion 371

Task 4.8: Using the NSLOOKUP Utility 372

Scenario 372

Scope of Task 372

Procedure 373

Criteria for Completion 378

Task 4.9a: Using the Built-in Protocol Analyzer 378

Scenario 379

Scope of Task 379

Procedure 379

Criteria for Completion 391

Task 4.9b: Using a Third-Party Protocol Analyzer 391

Scenario 392

Scope of Task 392

Procedure 392

Criteria for Completion 401

Task 4.10: Displaying Computer Event Logs 401

Scenario 401

Scope of Task 402

Procedure 402

Criteria for Completion 413

Index 415

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)