Introduction |
|
xxxviii | |
Part I: Networking Fundamentals |
|
|
Chapter 1 The OSI Model and Encapsulation |
|
|
3 | (32) |
|
|
4 | (1) |
|
The Purpose of Reference Models |
|
|
4 | (2) |
|
|
6 | (16) |
|
Layer 1: The Physical Layer |
|
|
7 | (4) |
|
Layer 2: The Data Link Layer |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (2) |
|
Layer 3: The Network Layer |
|
|
15 | (2) |
|
Layer 4: The Transport Layer |
|
|
17 | (2) |
|
Layer 5: The Session Layer |
|
|
19 | (1) |
|
Layer 6: The Presentation Layer |
|
|
20 | (1) |
|
Layer 7: The Application Layer |
|
|
21 | (1) |
|
|
22 | (5) |
|
Layers of the TCP/IP Stack |
|
|
22 | (4) |
|
Common Application Protocols in the TCP/IP Stack |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
Review All the Key Topics |
|
|
28 | (1) |
|
|
29 | (1) |
|
Complete Chapter 1 Hands-On Labs in Network+ Simulator Lite |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (5) |
|
Chapter 2 Network Topologies and Types |
|
|
35 | (44) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
Network Types and Characteristics |
|
|
37 | (5) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
Other Categories of Networks |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
Software-Defined Wide Area Network (SD-WAN) |
|
|
39 | (1) |
|
Multiprotocol Label Switching |
|
|
40 | (1) |
|
Multipoint Generic Routing Encapsulation (mGRE) |
|
|
41 | (1) |
|
Networks Defined Based on Resource Location |
|
|
42 | (3) |
|
|
42 | (1) |
|
|
43 | (2) |
|
Networks Defined by Topology |
|
|
45 | (10) |
|
Physical Versus Logical Topology |
|
|
45 | (1) |
|
|
46 | (2) |
|
|
48 | (2) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (2) |
|
Service-Related Entry Points |
|
|
55 | (1) |
|
|
55 | (5) |
|
|
55 | (3) |
|
Virtual Routers and Firewalls |
|
|
58 | (1) |
|
Virtual Switches (vSwitches) |
|
|
58 | (1) |
|
|
58 | (2) |
|
Other Virtualization Solutions |
|
|
60 | (1) |
|
|
60 | (9) |
|
|
60 | (2) |
|
|
62 | (2) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
Synchronous Optical Network |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
Review All the Key Topics |
|
|
70 | (1) |
|
Complete Tables and Lists from Memory |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (7) |
|
Chapter 3 Network Media Types |
|
|
79 | (26) |
|
|
80 | (1) |
|
Copper and Fiber Media and Connectors |
|
|
80 | (15) |
|
|
80 | (2) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (2) |
|
Twisted-Pair Cable Connectors |
|
|
85 | (1) |
|
Plenum Versus Nonplenum Cable |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (2) |
|
|
89 | (1) |
|
Fiber-Optic Cable Connectors |
|
|
89 | (1) |
|
Fiber Connector Polishing Styles |
|
|
90 | (1) |
|
Ethernet and Fiber Standards |
|
|
90 | (3) |
|
Distance and Speed Limitations |
|
|
93 | (2) |
|
|
95 | (1) |
|
Multiplexing in Fiber-Optic Networks |
|
|
95 | (1) |
|
|
96 | (3) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
Review All the Key Topics |
|
|
100 | (1) |
|
Complete Tables and Lists from Memory |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
101 | (4) |
|
|
105 | (60) |
|
|
106 | (1) |
|
|
106 | (6) |
|
Principles of Binary Numbering |
|
|
106 | (1) |
|
Converting a Binary Number to a Decimal Number |
|
|
107 | (1) |
|
Converting a Decimal Number to a Binary Number |
|
|
107 | (2) |
|
Binary Numbering Practice |
|
|
109 | (1) |
|
Binary Conversion Exercise 1 |
|
|
109 | (1) |
|
Binary Conversion Exercise 1: Solution |
|
|
109 | (1) |
|
Binary Conversion Exercise 2 |
|
|
110 | (1) |
|
Binary Conversion Exercise 2: Solution |
|
|
110 | (1) |
|
Binary Conversion Exercise 3 |
|
|
110 | (1) |
|
Binary Conversion Exercise 3: Solution |
|
|
111 | (1) |
|
Binary Conversion Exercise 4 |
|
|
111 | (1) |
|
Binary Conversion Exercise 4: Solution |
|
|
112 | (1) |
|
|
112 | (6) |
|
|
113 | (1) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (11) |
|
|
119 | (1) |
|
|
120 | (6) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
126 | (2) |
|
Automatic Private IP Addressing |
|
|
128 | (1) |
|
|
129 | (16) |
|
|
129 | (1) |
|
|
130 | (2) |
|
Subnet Notation: Practice Exercise 1 |
|
|
132 | (1) |
|
Subnet Notation: Practice Exercise 1 Solution |
|
|
132 | (1) |
|
Subnet Notation: Practice Exercise 2 |
|
|
132 | (1) |
|
Subnet Notation: Practice Exercise 2 Solution |
|
|
132 | (1) |
|
Extending a Classful Mask |
|
|
132 | (1) |
|
|
133 | (1) |
|
Calculating the Number of Created Subnets |
|
|
133 | (1) |
|
Calculating the Number of Available Hosts |
|
|
134 | (1) |
|
Basic Subnetting Practice: Exercise 1 |
|
|
134 | (1) |
|
Basic Subnetting Practice: Exercise 1 Solution |
|
|
135 | (1) |
|
Basic Subnetting Practice: Exercise 2 |
|
|
136 | (1) |
|
Basic Subnetting Practice: Exercise 2 Solution |
|
|
136 | (1) |
|
Calculating New IP Address Ranges |
|
|
137 | (2) |
|
Advanced Subnetting Practice: Exercise 1 |
|
|
139 | (1) |
|
Advanced Subnetting Practice: Exercise 1 Solution |
|
|
139 | (1) |
|
Advanced Subnetting Practice: Exercise 2 |
|
|
140 | (1) |
|
Advanced Subnetting Practice: Exercise 2 Solution |
|
|
141 | (2) |
|
|
143 | (1) |
|
Classless Interdomain Routing |
|
|
144 | (1) |
|
|
145 | (4) |
|
|
145 | (2) |
|
|
147 | (2) |
|
|
149 | (5) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
Review All the Key Topics |
|
|
155 | (1) |
|
Complete Tables and Lists from Memory |
|
|
156 | (1) |
|
|
156 | (1) |
|
Complete Chapter 4 Hands-On Labs in Network+ Simulator Lite |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (8) |
|
Chapter 5 Common Ports and Protocols |
|
|
165 | (16) |
|
|
166 | (1) |
|
|
166 | (6) |
|
DHCP (Dynamic Host Configuration Protocol) |
|
|
166 | (1) |
|
|
166 | (1) |
|
FTP (File Transfer Protocol) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
Structured Query Language (SQL) Server |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
170 | (2) |
|
|
172 | (3) |
|
Transmission Control Protocol (TCP) |
|
|
172 | (1) |
|
User Datagram Protocol (UDP) |
|
|
172 | (1) |
|
Internet Control Message Protocol (ICMP) |
|
|
173 | (1) |
|
Generic Routing Encapsulation (GRE) |
|
|
173 | (1) |
|
Internet Protocol Security (IPsec) |
|
|
173 | (1) |
|
TCP/IP Suite Protocol Summary |
|
|
173 | (2) |
|
|
175 | (1) |
|
|
175 | (1) |
|
Review All the Key Topics |
|
|
175 | (1) |
|
Complete Tables and Lists from Memory |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (4) |
|
Chapter 6 Network Services |
|
|
181 | (16) |
|
|
182 | (1) |
|
|
182 | (3) |
|
|
185 | (5) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
Review All the Key Topics |
|
|
191 | (1) |
|
Complete Tables and Lists from Memory |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (4) |
|
Chapter 7 Corporate and Datacenter Architectures |
|
|
197 | (14) |
|
|
198 | (1) |
|
The Three-Tiered Network Architecture |
|
|
198 | (2) |
|
|
198 | (1) |
|
The Distribution/Aggregation Layer |
|
|
199 | (1) |
|
|
200 | (1) |
|
Software-Defined Networking |
|
|
200 | (4) |
|
|
202 | (2) |
|
|
204 | (1) |
|
Deciding on an Architecture |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
Review All the Key Topics |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (4) |
|
|
211 | (10) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
214 | (3) |
|
Infrastructure as Code (IaC) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
Review All the Key Topics |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
218 | (3) |
Part II: Network Implementations |
|
|
Chapter 9 Various Network Devices |
|
|
221 | (34) |
|
|
222 | (1) |
|
|
222 | (22) |
|
|
222 | (1) |
|
|
223 | (2) |
|
|
225 | (6) |
|
|
231 | (2) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
Intrusion Detection and Prevention |
|
|
239 | (1) |
|
|
239 | (2) |
|
IDS and IPS Device Categories |
|
|
241 | (1) |
|
Networking Device Summary |
|
|
242 | (2) |
|
|
244 | (4) |
|
Voice over IP Protocols and Components |
|
|
244 | (1) |
|
|
245 | (1) |
|
Physical Access Control Devices |
|
|
245 | (1) |
|
|
246 | (1) |
|
Heating, Ventilation, and Air Conditioning (HVAC) Sensors |
|
|
246 | (1) |
|
Technologies for the Internet of Things |
|
|
246 | (2) |
|
Industrial Control Systems/Supervisory Control and Data Acquisition (SCADA) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
Review All the Key Topics |
|
|
249 | (1) |
|
Complete Tables and Lists from Memory |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (4) |
|
Chapter 10 Routing Technologies and Bandwidth Management |
|
|
255 | (28) |
|
|
256 | (1) |
|
|
256 | (3) |
|
Sources of Routing Information |
|
|
259 | (4) |
|
Directly Connected Routes |
|
|
259 | (1) |
|
|
260 | (1) |
|
Dynamic Routing Protocols |
|
|
261 | (2) |
|
Routing Protocol Characteristics |
|
|
263 | (5) |
|
|
263 | (1) |
|
|
264 | (1) |
|
Interior Versus Exterior Gateway Protocols |
|
|
264 | (1) |
|
Route Advertisement Method |
|
|
264 | (1) |
|
|
265 | (3) |
|
|
268 | (1) |
|
Routing Protocol Examples |
|
|
268 | (2) |
|
|
270 | (6) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
274 | (1) |
|
Policing and Traffic Shaping |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
Review All the Key Topics |
|
|
278 | (1) |
|
Complete Tables and Lists from Memory |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
279 | (4) |
|
Chapter 11 Ethernet Switching |
|
|
283 | (38) |
|
|
284 | (1) |
|
|
284 | (8) |
|
|
284 | (2) |
|
Carrier-Sense Multiple Access with Collision Detection |
|
|
286 | (4) |
|
Distance and Speed Limitations |
|
|
290 | (2) |
|
|
292 | (22) |
|
|
293 | (2) |
|
Switch Configuration for an Access Port |
|
|
295 | (1) |
|
|
296 | (1) |
|
Switch Configuration for a Trunk Port |
|
|
297 | (1) |
|
|
298 | (1) |
|
Corruption of a Switch's MAC Address Table |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
301 | (3) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
307 | (2) |
|
Port Mirroring Configuration |
|
|
309 | (1) |
|
|
309 | (2) |
|
Management Access and Authentication |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
Review All the Key Topics |
|
|
315 | (1) |
|
Complete Tables and Lists from Memory |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (4) |
|
Chapter 12 Wireless Standards |
|
|
321 | (32) |
|
|
322 | (1) |
|
Introducing Wireless LANs |
|
|
322 | (12) |
|
WLAN Concepts and Components |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (3) |
|
|
327 | (2) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (5) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (2) |
|
|
338 | (1) |
|
|
339 | (6) |
|
|
339 | (2) |
|
Approaches to WLAN Security |
|
|
341 | (2) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
345 | (1) |
|
Additional Wireless Options |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
346 | (1) |
|
Review All the Key Topics |
|
|
346 | (1) |
|
Complete Tables and Lists from Memory |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (5) |
Part III: Network Operations |
|
|
Chapter 13 Ensure Network Availability |
|
|
353 | (22) |
|
|
354 | (1) |
|
|
354 | (6) |
|
Performance Metrics/Sensors |
|
|
354 | (2) |
|
|
356 | (4) |
|
Additional Monitoring Topics |
|
|
360 | (8) |
|
|
361 | (2) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
Interface Statistics/Status |
|
|
365 | (3) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
Review All the Key Topics |
|
|
369 | (1) |
|
Complete Tables and Lists from Memory |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
370 | (5) |
|
Chapter 14 Organizational Documents and Policies |
|
|
375 | (18) |
|
|
376 | (1) |
|
|
376 | (2) |
|
|
376 | (1) |
|
|
376 | (1) |
|
Disaster Recovery and Business Continuity Policies |
|
|
377 | (1) |
|
|
377 | (1) |
|
Hardening and Security Policies |
|
|
378 | (7) |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
Bring-Your-Own-Device (BYOD) Policy |
|
|
382 | (1) |
|
Acceptable Use Policy (AUP) |
|
|
382 | (1) |
|
|
383 | (1) |
|
Privileged User Agreement (PUA) |
|
|
383 | (1) |
|
Onboarding/Offboarding Procedures |
|
|
384 | (1) |
|
|
384 | (1) |
|
International Export Controls |
|
|
385 | (1) |
|
Non-Disclosure Agreement (NDA) |
|
|
385 | (1) |
|
|
385 | (2) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
Review All the Key Topics |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
390 | (3) |
|
Chapter 15 High Availability and Disaster Recovery |
|
|
393 | (24) |
|
|
394 | (1) |
|
|
394 | (9) |
|
High Availability (HA) Measurement |
|
|
394 | (1) |
|
|
394 | (1) |
|
Fault-Tolerant Network Design |
|
|
395 | (2) |
|
|
397 | (1) |
|
|
398 | (1) |
|
Design Considerations for High-Availability Networks |
|
|
399 | (1) |
|
High-Availability Best Practices |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
Real-World Case Study: SOHO Network Design |
|
|
403 | (8) |
|
|
403 | (2) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
408 | (1) |
|
|
408 | (1) |
|
|
409 | (1) |
|
Cost Savings Versus Performance |
|
|
409 | (1) |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
Review All the Key Topics |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (4) |
Part IV: Network Security |
|
|
Chapter 16 Common Security Concepts |
|
|
417 | (22) |
|
|
418 | (1) |
|
|
418 | (10) |
|
Confidentiality, Integrity, and Availability (CIA) |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
420 | (2) |
|
|
422 | (1) |
|
|
423 | (1) |
|
Threats, Vulnerabilities, and Exploits |
|
|
423 | (1) |
|
|
423 | (1) |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
|
426 | (1) |
|
Network Segmentation Enforcement |
|
|
427 | (1) |
|
|
427 | (1) |
|
|
427 | (1) |
|
|
427 | (1) |
|
|
428 | (1) |
|
|
428 | (3) |
|
|
428 | (1) |
|
|
429 | (1) |
|
|
429 | (1) |
|
|
429 | (1) |
|
|
429 | (1) |
|
|
429 | (1) |
|
|
430 | (1) |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
431 | (3) |
|
|
431 | (1) |
|
Security Risk Assessments |
|
|
431 | (1) |
|
|
431 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
433 | (1) |
|
Security Information and Event Management (SIEM) |
|
|
433 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
Review All the Key Topics |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
436 | (3) |
|
Chapter 17 Common Types of Attacks |
|
|
439 | (14) |
|
|
440 | (1) |
|
|
440 | (5) |
|
|
440 | (1) |
|
Distributed Denial of Service |
|
|
441 | (1) |
|
On-Path Attack (Formerly Known as Man-in-the-Middle Attack) |
|
|
441 | (1) |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
444 | (1) |
|
Human and Environmental Attacks |
|
|
445 | (1) |
|
Other Miscellaneous Attacks |
|
|
445 | (4) |
|
|
449 | (1) |
|
|
449 | (1) |
|
|
449 | (1) |
|
Review All the Key Topics |
|
|
449 | (1) |
|
|
450 | (1) |
|
Complete Chapter 17 Hands-On Lab in Network+ Simulator Lite |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
450 | (3) |
|
Chapter 18 Network Hardening Techniques |
|
|
453 | (12) |
|
|
454 | (1) |
|
|
454 | (4) |
|
Wireless Security and IoT Considerations |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
460 | (1) |
|
|
460 | (1) |
|
Review All the Key Topics |
|
|
460 | (1) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
461 | (4) |
|
Chapter 19 Remote Access Methods |
|
|
465 | (20) |
|
|
466 | (1) |
|
Virtual Private Networks (VPNs) |
|
|
466 | (8) |
|
Overview of IPsec with IKEv1 |
|
|
468 | (1) |
|
|
469 | (1) |
|
Authentication Header and Encapsulating Security Payload |
|
|
470 | (2) |
|
The Five Steps in Setting Up and Tearing Down an IPsec Site-to-Site VPN Using IKEv1 |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
473 | (1) |
|
Other Remote Access Technologies |
|
|
474 | (4) |
|
Authentication and Authorization Considerations |
|
|
478 | (1) |
|
In-Band vs. Out-of-Band Management |
|
|
479 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
Review All the Key Topics |
|
|
480 | (1) |
|
Complete Tables and Lists from Memory |
|
|
481 | (1) |
|
|
481 | (1) |
|
Complete Chapter 19 Hands-On Lab in Network+ Simulator Lite |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
482 | (3) |
|
Chapter 20 Physical Security |
|
|
485 | (10) |
|
|
486 | (1) |
|
|
486 | (1) |
|
|
486 | (3) |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
Review All the Key Topics |
|
|
490 | (1) |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
491 | (4) |
Part V: Network Troubleshooting |
|
|
Chapter 21 A Network Troubleshooting Methodology |
|
|
495 | (10) |
|
|
496 | (1) |
|
|
496 | (5) |
|
Troubleshooting Fundamentals |
|
|
496 | (2) |
|
Structured Troubleshooting Methodology |
|
|
498 | (3) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
Review All the Key Topics |
|
|
501 | (1) |
|
Complete Tables and Lists from Memory |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
502 | (3) |
|
Chapter 22 Troubleshoot Common Cabling Problems |
|
|
505 | (14) |
|
|
506 | (1) |
|
Specifications and Limitations |
|
|
506 | (1) |
|
Cable Considerations and Applications |
|
|
506 | (1) |
|
|
507 | (2) |
|
|
509 | (5) |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
514 | (1) |
|
Review All the Key Topics |
|
|
514 | (1) |
|
|
515 | (1) |
|
|
515 | (1) |
|
|
515 | (4) |
|
Chapter 23 Network Software Tools and Commands |
|
|
519 | (30) |
|
|
520 | (1) |
|
|
520 | (2) |
|
|
520 | (1) |
|
Protocol Analyzer/Packet Capture |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (21) |
|
|
523 | (1) |
|
|
524 | (1) |
|
|
524 | (4) |
|
|
528 | (1) |
|
|
529 | (1) |
|
|
529 | (2) |
|
|
531 | (1) |
|
|
532 | (1) |
|
|
533 | (1) |
|
|
533 | (2) |
|
|
535 | (2) |
|
|
537 | (1) |
|
|
538 | (4) |
|
|
542 | (1) |
|
|
542 | (1) |
|
|
542 | (1) |
|
Basic Network Platform Commands |
|
|
543 | (1) |
|
|
543 | (1) |
|
|
543 | (1) |
|
|
544 | (1) |
|
Review All the Key Topics |
|
|
544 | (1) |
|
Complete Tables and Lists from Memory |
|
|
544 | (1) |
|
|
545 | (1) |
|
|
545 | (1) |
|
|
545 | (4) |
|
Chapter 24 Troubleshoot Common Wireless Issues |
|
|
549 | (12) |
|
|
550 | (1) |
|
Specifications and Limitations |
|
|
550 | (1) |
|
|
551 | (2) |
|
|
551 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
553 | (1) |
|
Wireless Network Troubleshooting |
|
|
554 | (2) |
|
Wireless Network Troubleshooting Solution |
|
|
555 | (1) |
|
|
556 | (1) |
|
|
556 | (1) |
|
|
556 | (1) |
|
Review All the Key Topics |
|
|
556 | (1) |
|
|
557 | (1) |
|
|
557 | (4) |
|
Chapter 25 Troubleshoot General Network Issues |
|
|
561 | (10) |
|
|
562 | (1) |
|
Considerations for General Network Troubleshooting |
|
|
562 | (1) |
|
|
563 | (3) |
|
|
566 | (1) |
|
|
567 | (1) |
|
|
567 | (1) |
|
Review All the Key Topics |
|
|
567 | (1) |
|
|
567 | (1) |
|
|
568 | (1) |
|
|
568 | (3) |
Part VI: Final Preparation |
|
|
Chapter 26 Final Preparation |
|
|
571 | (8) |
|
Tools for Final Preparation |
|
|
571 | (3) |
|
|
572 | (1) |
|
|
572 | (1) |
|
Simulations and Performance-Based Exercises |
|
|
573 | (1) |
|
End-of-Chapter Review Tools |
|
|
573 | (1) |
|
Suggested Plan for Final Review and Study |
|
|
574 | (2) |
|
Strategies for Taking the Exam |
|
|
576 | (1) |
|
|
577 | (2) |
Glossary of Key Terms |
|
579 | (44) |
Appendix A Answers to Review Questions |
|
623 | (16) |
Appendix B CompTIA Network+ (N10-008) Cert Guide Exam Updates |
|
639 | (2) |
Index |
|
641 | |