Atnaujinkite slapukų nuostatas

CompTIA Networkplus Certification Kit: Exam N10007 5th Edition [Minkštas viršelis]

  • Formatas: Paperback / softback, 1320 pages, aukštis x plotis x storis: 220x188x98 mm, weight: 3554 g
  • Išleidimo metai: 30-Apr-2018
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1119432286
  • ISBN-13: 9781119432289
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 1320 pages, aukštis x plotis x storis: 220x188x98 mm, weight: 3554 g
  • Išleidimo metai: 30-Apr-2018
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1119432286
  • ISBN-13: 9781119432289
Kitos knygos pagal šią temą:

Comprehensive Network+ prep in one value-priced bundle

The CompTIA Network+ Certification Kit is the savvy candidate’s smart choice for the ultimate in preparation. Featuring full coverage of all Exam N10-007 objectives, this kit bundles the Deluxe Study Guide and the Review Guide to give you a one-stop resource for comprehensive Network+ review. Detailed discussion of networking concepts, infrastructure, operations, security, and troubleshooting are backed by practical examples and insights drawn from real-world experience to give you the perspective you need to succeed on the exam—and on the job. Concise domain-by-domain review helps you refresh your understanding, while challenging practice questions allow you to gauge your progress toward exam day.

As an indispensable component of comprehensive review, you also get access to the Sybex online learning environment, which features flashcards, bonus practice exams, and more so you can study anytime, anywhere, from nearly any device. When you’re ready to get serious about Network+ preparation, this kit will help you:

  • Master 100 percent of the Network+ exam objectives
  • Apply critical skills to real-world situations
  • Gauge your understanding with challenging chapter questions
  • Access digital study tools, practice tests, and more

CompTIA’s Network+ certification validates your skills and knowledge surrounding current networking technologies and best practices, including installation, configuration, troubleshooting, peripherals, protocols and more. Regularly updated to reflect ever-evolving job tasks, the latest exam emphasizes implementation, support, and wireless networking, so it’s important that your study materials be up-to-date. When you’re ready to prove your abilities with today’s networking hardware peripherals and protocols, the CompTIA Network+ Certification Kit has you covered with the ultimate in Network+ preparation. 

CompTIA Network+: Review Guide
Introduction
xxiv
Chapter 1 Domain 1.0: Networking Concepts
1(142)
1.1 Explain the purposes and uses of ports and protocols.
8(12)
Protocols and Ports
8(6)
Protocol Types
14(5)
Exam Essentials
19(1)
1.2 Explain devices, applications, protocols and services at their appropriate OSI layers.
20(10)
Application Layer
21(1)
Presentation Layer
22(1)
Session Layer
22(1)
Transport Layer
23(2)
Network Layer
25(1)
Data Link Layer
26(3)
Physical Layer
29(1)
Exam Essentials
29(1)
1.3 Explain the concepts and characteristics of routing and switching.
30(42)
Properties of Network Traffic
30(5)
Segmentation and Interface Properties
35(13)
Routing
48(8)
IPv6 Concepts
56(4)
Performance Concepts
60(3)
NAT/PAT
63(3)
Port Forwarding
66(1)
Access Control List
67(1)
Distributed Switching
68(1)
Packet Switched vs. Circuit-Switched Networks
69(1)
Software-Defined Networking
69(1)
Exam Essentials
70(2)
1.4 Given a scenario, configure the appropriate IP addressing components.
72(17)
Private vs. public
72(1)
Loopback and Reserved
73(1)
Default Gateway
74(1)
Virtual IP
74(1)
Subnet Mask
75(1)
Subnetting
76(8)
Address Assignments
84(4)
Exam Essentials
88(1)
1.5 Compare and contrast the characteristics of network topologies, types, and technologies.
89(14)
Wired Topologies
89(5)
Wireless Topologies
94(4)
Types
98(1)
Technologies That Facilitate the Internet of Things (IoT)
99(3)
Exam Essentials
102(1)
1.6 Given a scenario, implement the appropriate wireless technologies and configurations.
103(12)
802.11 Standards
103(3)
Cellular
106(1)
Frequencies
107(2)
Speed and Distance Requirements
109(1)
Channel Bandwidth
110(1)
Channel Bonding
110(1)
MIMO/MU-MIMO
111(1)
Unidirectional/Omnidirectional
112(1)
Site Surveys
113(1)
Exam Essentials
114(1)
1.7 Summarize cloud concepts and their purposes.
115(6)
Types of Services
116(1)
Cloud Delivery Models
117(2)
Connectivity Methods
119(1)
Security Implications/Considerations
119(1)
Relationship between Local and Cloud Resources
120(1)
Exam Essentials
120(1)
1.8 Explain the functions of network services.
121(22)
DNS
121(8)
DHCP Service
129(5)
NTP
134(1)
IPAM
134(1)
Exam Essentials
135(2)
Review Questions
137(6)
Chapter 2 Domain 2.0: Infrastructure
143(72)
2.1 Given a scenario, deploy the appropriate cabling solution.
148(23)
Media types
148(4)
PVC vs. Plenum
152(1)
Connector types
153(5)
Transceivers
158(2)
Characteristics of fiber transceivers
160(1)
Termination points
161(3)
Copper cabling standards
164(2)
Copper termination standards
166(3)
Ethernet deployment standards
169(1)
Exam Essentials
170(1)
2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.
171(5)
Firewall
171(1)
Routers
172(1)
Switches
173(1)
Hubs
173(1)
Bridges
174(1)
Modems
174(1)
Wireless access point
175(1)
Media Converters
175(1)
Wireless range extender
175(1)
VoIP endpoint
176(1)
Exam Essentials
176(1)
2.3 Explain the purposes and use cases for advanced networking devices.
176(10)
Multilayer switch
177(1)
Wireless controller
177(1)
Load balancer
178(1)
IDS and IPS
178(1)
Proxy Servers
179(2)
VPN concentrator
181(1)
AAA/RADIUS server
181(1)
UTM appliance
182(1)
NGFW/Layer 7 firewall
182(1)
VoIP PBX
183(1)
VoIP gateway
184(1)
Content filter
185(1)
Exam Essentials
185(1)
2.4 Explain the purposes of virtualization and network storage technologies.
186(8)
Virtual networking components
186(3)
Network storage types
189(1)
Connection type
190(3)
Jumbo Frames
193(1)
Exam Essentials
194(1)
2.5 Compare and contrast WAN technologies.
194(21)
Service type
194(5)
Transmission mediums
199(2)
Characteristics of service
201(4)
Termination
205(2)
Exam Essentials
207(2)
Review Questions
209(6)
Chapter 3 Domain 3.0: Network Operations
215(66)
3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.
219(14)
Diagram symbols
220(3)
Standard operating procedures/work instructions
223(1)
Logical vs. physical diagrams
224(2)
Rack diagrams
226(1)
Change management documentation
227(1)
Wiring and port locations
228(1)
IDF/MDF documentation
229(1)
Labeling
229(1)
Network configuration and performance baselines
230(1)
Inventory management
231(1)
Exam Essentials
232(1)
3.2 Compare and contrast business continuity and disaster recovery concepts.
233(14)
Availability concepts
234(8)
Recovery
242(4)
Exam Essentials
246(1)
3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.
247(10)
Processes
247(5)
Event management
252(1)
SNMP monitors
253(1)
Metrics
254(2)
Exam Essentials
256(1)
3.4 Given a scenario, use remote access methods.
257(10)
VPN
257(4)
RDP
261(1)
SSH
262(1)
VNC
262(1)
Telnet
263(1)
HTTPS/management URL
263(1)
Remote file access
263(1)
Out-of-band management
264(2)
Exam Essentials
266(1)
3.5 Identify policies and best practices.
267(14)
Privileged user agreement
268(1)
Password policy
268(1)
On-boarding/off-boarding procedures
268(1)
Licensing restrictions
269(1)
International export controls
270(1)
Data loss prevention
270(1)
Remote access policies
270(1)
Incident response policies
271(1)
BYOD
271(1)
AUP
272(1)
NDA
272(1)
System life cycle
272(1)
Safety procedures and policies
273(1)
Exam Essentials
274(2)
Review Questions
276(5)
Chapter 4 Domain 4.0: Network Security
281(50)
4.1 Summarize the purposes of physical security devices.
285(7)
Detection
285(4)
Prevention
289(3)
Exam Essentials
292(1)
4.2 Explain authentication and access controls.
292(12)
Authentication, authorization, and accounting
292(4)
Multifactor authentication
296(1)
Access control
297(6)
Exam Essentials
303(1)
4.3 Given a scenario, secure a basic wireless network.
304(4)
WPA
304(1)
WPA2
305(1)
TKIP-RC4
305(1)
CCMP-AES
305(1)
Authentication and authorization
305(2)
Geofencing
307(1)
Exam Essentials
307(1)
4.4 Summarize common networking attacks.
308(5)
DoS
308(1)
Social engineering
309(1)
Insider threat
309(1)
Logic bomb
309(1)
Rogue access point
310(1)
Evil twin
310(1)
War-driving
310(1)
Phishing
310(1)
Ransomware
310(1)
DNS poisoning
310(1)
ARP poisoning
311(1)
Spoofing
311(1)
Deauthentication
311(1)
Brute force
311(1)
VLAN hopping
311(1)
Man-in-the-middle
312(1)
Exploits vs. vulnerabilities
312(1)
Exam Essentials
312(1)
4.5 Given a scenario, implement network device hardening.
313(5)
Changing default credentials
313(1)
Avoiding common passwords
313(1)
Upgrading firmware
314(1)
Patching and updates
314(1)
File hashing
315(1)
Disabling unnecessary services
315(1)
Using secure protocols
316(1)
Generating new keys
316(1)
Disabling unused ports
317(1)
Exam Essentials
317(1)
4.6 Explain common mitigation techniques and their purposes.
318(13)
Signature management
318(1)
Device hardening
319(1)
Change native VLAN
319(1)
Switch port protection
319(2)
Network segmentation
321(2)
Privileged user account
323(1)
File integrity monitoring
323(1)
Role separation
323(1)
Restricting access via ACLs
324(1)
Honeypot/Honeynet
325(1)
Penetration testing
325(1)
Exam Essentials
325(2)
Review Questions
327(4)
Chapter 5 Domain 5.0 Network Troubleshooting and Tools
331(80)
5.1 Explain the network troubleshooting methodology.
335(7)
Identify the problem
336(2)
Establish a theory of probable cause
338(1)
Test the theory to determine the cause
339(1)
Establish a plan of action to resolve the problem
and identify potential effects
340(1)
Implement the solution or escalate as necessary
340(1)
Verify full system functionality and, if applicable, implement preventive measures
341(1)
Document findings, actions, and outcomes
341(1)
Exam Essentials
341(1)
5.2 Given a scenario, use the appropriate tool.
342(30)
Hardware tools
342(10)
Software tools
352(19)
Exam Essentials
371(1)
5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.
372(8)
Attenuation
372(1)
Latency
373(1)
Jitter
373(1)
Crosstalk
373(1)
EMI
374(1)
Open/Short
374(1)
Incorrect pin-out
374(1)
Incorrect cable type
374(1)
Bad port
375(1)
Transceiver mismatch
375(1)
TX/RX reverse
376(1)
Duplex/speed mismatch
377(1)
Damaged cables
377(1)
Bent pins
377(1)
Bottlenecks
378(1)
VLAN mismatch
378(1)
Network connection LED status indicators
378(1)
Exam Essentials
379(1)
5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues.
380(8)
Reflection
380(1)
Refraction
381(1)
Absorption
381(1)
Latency
382(1)
Jitter
382(1)
Attenuation
382(1)
Incorrect antenna type
383(1)
Interference
383(1)
Incorrect antenna placement
384(1)
Channel overlap
384(1)
Overcapacity
385(1)
Distance limitations
385(1)
Frequency mismatch
386(1)
Wrong SSID
386(1)
Wrong passphrase
386(1)
Security type mismatch
387(1)
Power levels
387(1)
Signal-to-noise ratio
387(1)
Exam Essentials
388(1)
5.5 Given a scenario, troubleshoot common network service issues.
388(23)
Names not resolving
388(5)
Incorrect gateway
393(1)
Incorrect netmask
394(2)
Duplicate IP addresses
396(1)
Duplicate MAC addresses
397(1)
Expired IP address
397(2)
Rogue DHCP server
399(1)
Untrusted SSL certificate
400(1)
Incorrect time
401(1)
Exhausted DHCP scope
402(1)
Blocked TCP/UDP ports
403(1)
Incorrect host-based firewall settings
403(1)
Incorrect ACL settings
404(1)
Unresponsive service
404(1)
Hardware failure
404(1)
Exam Essentials
405(1)
Review Questions
406(5)
Appendix Answers to Review Questions
411(10)
Chapter 1 Domain 1.0: Networking Concepts
412(1)
Chapter 2 Domain 2.0: Infrastructure
413(2)
Chapter 3 Domain 3.0: Network Operations
415(2)
Chapter 4 Domain 4.0: Network Security
417(2)
Chapter 5 Domain 5.0 Network Troubleshooting and Tools
419(2)
Index
421
CompTIA Network+: Practice Tests
Introduction
xiii
Chapter 1 Networking Concepts
1(46)
Chapter 2 Infrastructure
47(46)
Chapter 3 Network Operations
93(42)
Chapter 4 Network Security
135(40)
Chapter 5 Network Troubleshooting and Tools
175(60)
Chapter 6 Practice Test 1
235(26)
Chapter 7 Practice Test 2
261(26)
Appendix Answers to Review Questions
287(1)
Chapter 1 Networking Concepts
288(24)
Chapter 2 Infrastructure
312(26)
Chapter 3 Network Operations
338(26)
Chapter 4 Network Security
364(27)
Chapter 5 Network Troubleshooting and Tools
391(26)
Chapter 6 Practice Test 1
417(15)
Chapter 7 Practice Test 2
432(15)
Index
447
CompTIA Network+: Study Guide
Introduction
xxx
Assessment Test
lxvi
Chapter 1 Introduction to Networks
1(26)
First Things First: What's a Network?
2(9)
The Local Area Network
3(2)
Common Network Components
5(2)
Wide Area Network
7(2)
Network Architecture: Peer-to-Peer or Client-Server?
9(2)
Physical Network Topologies
11(8)
Bus Topology
12(1)
Star Topology
13(1)
Ring Topology
14(1)
Mesh Topology
15(1)
Point-to-Point Topology
16(1)
Point-to-Multipoint Topology
17(1)
Hybrid Topology
18(1)
Topology Selection, Backbones, and Segments
19(2)
Selecting the Right Topology
19(1)
The Network Backbone
20(1)
Network Segments
21(1)
CAN
21(1)
SAN
21(1)
Summary
21(1)
Exam Essentials
22(1)
Written Lab
22(1)
Review Questions
23(4)
Chapter 2 The Open Systems Interconnection Specifications
27(28)
Internetworking Models
28(2)
The Layered Approach
29(1)
Advantages of Reference Models
29(1)
The OSI Reference Model
30(15)
The Application Layer
32(1)
The Presentation Layer
33(1)
The Session Layer
33(1)
The Transport Layer
33(7)
The Network Layer
40(2)
The Data Link Layer
42(3)
The Physical Layer
45(1)
Introduction to Encapsulation
45(1)
Modulation Techniques
46(1)
Summary
47(1)
Exam Essentials
48(1)
Written Lab
48(2)
Review Questions
50(5)
Chapter 3 Networking Topologies, Connectors, and Wiring Standards
55(36)
Physical Media
57(16)
Coaxial Cable
58(2)
Twisted-Pair Cable
60(4)
Fiber-Optic Cable
64(5)
Transceivers
69(1)
Media Converters
69(2)
Serial Cables
71(2)
Cable Properties
73(2)
Transmission Speeds
73(1)
Distance
74(1)
Duplex
74(1)
Noise Immunity (Security, EMI)
74(1)
Frequency
75(1)
Wiring Standards
75(7)
T568A vs. T568B
75(2)
Straight-Through Cable
77(1)
Crossover Cable
78(2)
Rolled/Rollover Cable
80(1)
T1 Crossover Cable
80(2)
Installing Wiring Distributions
82(2)
MDF/IDF
82(2)
Summary
84(1)
Exam Essentials
85(1)
Written Lab
85(2)
Review Questions
87(4)
Chapter 4 The Current Ethernet Specifications
91(34)
Network Basics
92(2)
Ethernet Basics
94(5)
Collision Domain
94(1)
Broadcast Domain
94(1)
CSMA/CD
95(1)
Broadband/Baseband
96(1)
Bit Rates vs. Baud Rate
97(1)
Wavelength
97(1)
Half-and Full-Duplex Ethernet
98(1)
Ethernet at the Data Link Layer
99(7)
Binary to Decimal and Hexadecimal Conversion
100(3)
Ethernet Addressing
103(1)
Ethernet Frames
104(2)
Ethernet at the Physical Layer
106(5)
Ethernet over Other Standards (IEEE 1905.1-2013)
111(3)
Ethernet over Power Line
112(1)
Ethernet over HDMI
113(1)
Summary
114(1)
Exam Essentials
115(1)
Written Lab
115(5)
Review Questions
120(5)
Chapter 5 Networking Devices
125(50)
Common Network Connectivity Devices
128(18)
Network Interface Card
129(1)
Hub
130(1)
Bridge
131(1)
Switch
131(1)
Router
132(4)
Firewall
136(1)
IDS/IPS
137(1)
HIDS
137(1)
Access Point
138(1)
Wireless Range Extender
138(1)
Contention Methods
139(2)
Dynamic Host Configuration Protocol Server
141(5)
IPAM
146(1)
Other Specialized Devices
146(13)
Multilayer Switch
147(1)
Load Balancer
147(1)
Domain Name Service Server
148(6)
Proxy Server
154(1)
Encryption Devices
155(1)
Analog Modem
156(1)
Packet Shaper
157(1)
VPN Concentrator
157(1)
Media Converter
158(1)
VoIP PBX
158(1)
VoIP Endpoint
158(1)
NGFW/Layer 7 Firewall
159(1)
VoIP Gateway
159(1)
Planning and Implementing a Basic SOHO Network Using Network Segmentation
159(10)
Determining Requirements
159(7)
Switches and Bridges at the Data Link Layer
166(1)
Hubs at the Physical Layer
167(1)
Environmental Considerations
168(1)
Summary
169(1)
Exam Essentials
169(1)
Written Lab
170(1)
Review Questions
171(4)
Chapter 6 Introduction to the Internet Protocol
175(34)
Introducing TCP/IP
177(21)
A Brief History of TCP/IP
177(1)
TCP/IP and the DoD Model
178(2)
The Process/Application Layer Protocols
180(8)
The Host-to-Host Layer Protocols
188(4)
The Internet Layer Protocols
192(6)
Data Encapsulation
198(4)
Summary
202(1)
Exam Essentials
202(1)
Written Lab
203(1)
Review Questions
204(5)
Chapter 7 IP Addressing
209(28)
IP Terminology
210(1)
The Hierarchical IP Addressing Scheme
211(7)
Network Addressing
212(4)
Private IP Addresses (RFC 1918)
216(2)
IPv4 Address Types
218(2)
Layer 2 Broadcasts
219(1)
Layer 3 Broadcasts
219(1)
Unicast Address
219(1)
Multicast Address (Class D)
219(1)
Internet Protocol Version 6 (IPv6)
220(10)
Why Do We Need IPv6?
220(1)
The Benefits of and Uses for IPv6
221(1)
IPv6 Addressing and Expressions
222(1)
Shortened Expression
223(1)
Address Types
224(1)
Special Addresses
225(1)
Stateless Autoconfiguration (EUI-64)
226(1)
DHCPv6 (Stateful)
227(1)
Migrating to IPv6
227(3)
Summary
230(1)
Exam Essentials
230(1)
Written Labs
231(2)
Written Lab 7.1
231(1)
Written Lab 7.2
232(1)
Written Lab 7.3
232(1)
Review Questions
233(4)
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT
237(42)
Subnetting Basics
238(22)
How to Create Subnets
239(1)
Subnet Masks
240(1)
Classless Inter-Domain Routing (CIDR)
241(2)
Subnetting Class C Addresses
243(10)
Subnetting Class B Addresses
253(7)
Troubleshooting IP Addressing
260(8)
Determining IP Address Problems
263(5)
Introduction to Network Address Translation (NAT)
268(4)
Types of Network Address Translation
269(1)
NAT Names
269(1)
How NAT Works
270(2)
Summary
272(1)
Exam Essentials
272(1)
Written Lab
273(1)
Review Questions
274(5)
Chapter 9 Introduction to IP Routing
279(22)
Routing Basics
280(3)
The IP Routing Process
283(6)
Testing Your IP Routing Understanding
289(2)
Static and Dynamic Routing
291(3)
Summary
294(1)
Exam Essentials
294(1)
Written Lab
294(2)
Review Questions
296(5)
Chapter 10 Routing Protocols
301(40)
Routing Protocol Basics
302(4)
Administrative Distances
303(2)
Classes of Routing Protocols
305(1)
Distance Vector Routing Protocols
306(9)
Routing Information Protocol (RIP)
308(1)
RIP Version 2 (RIPv2)
308(1)
VLSM and Discontiguous Networks
309(3)
EIGRP
312(2)
Border Gateway Protocol (BGP)
314(1)
Link State Routing Protocols
315(4)
Open Shortest Path First (OSPF)
316(2)
Intermediate System-to-Intermediate System (IS-IS)
318(1)
High Availability
319(7)
Hot Standby Router Protocol (HSRP)
321(4)
Virtual Router Redundancy Protocol
325(1)
Advanced IPv6 Concepts
326(6)
Router Advertisement
326(2)
Neighbor Discovery
328(1)
Tunneling
329(3)
Dual Stack
332(1)
IPv6 Routing Protocols
332(2)
RIPng
333(1)
EIGRPv6
333(1)
OSPFv3
333(1)
Summary
334(1)
Exam Essentials
334(1)
Written Lab
335(1)
Review Questions
336(5)
Chapter 11 Switching and Virtual LANs
341(46)
Networking Before Layer 2 Switching
343(3)
Switching Services
346(8)
Limitations of Layer 2 Switching
347(1)
Bridging vs. LAN Switching
348(1)
Three Switch Functions at Layer 2
348(6)
Distributed Switching
354(1)
Spanning Tree Protocol
354(4)
Spanning Tree Port States
355(1)
STP Convergence
356(1)
Rapid Spanning Tree Protocol 802.1w
357(1)
Virtual LANs
358(9)
VLAN Basics
359(3)
Quality of Service
362(1)
VLAN Memberships
363(1)
Static VLANs
363(1)
Dynamic VLANs
364(1)
Identifying VLANs
364(2)
VLAN Identification Methods
366(1)
VLAN Trunking Protocol
367(9)
VTP Modes of Operation
368(1)
Do We Really Need to Put an IP Address on a Switch?
369(3)
Switch Port Protection
372(3)
Port Bonding
375(1)
Device Hardening
376(1)
Two Additional Advanced Features of Switches
376(4)
Power over Ethernet (802.3af, 802.3at)
376(3)
Port Mirroring/Spanning (SPAN/RSPAN)
379(1)
Summary
380(1)
Exam Essentials
381(1)
Written Lab
381(2)
Review Questions
383(4)
Chapter 12 Wireless Networking
387(52)
Introduction to Wireless Technology
390(3)
Cellular
393(1)
The 802.11 Standards
393(6)
2.4 GHz (802.11b)
395(1)
2.4 GHz (802.11g)
396(1)
5 GHz (802.11a)
397(1)
5 GHz (802.11h)
397(1)
2.4 GHz/5 GHz (802.11n)
398(1)
5 GHz (802.11ac)
399(1)
Comparing 802.11 Standards
399(2)
Range Comparisons
400(1)
Wireless Network Components
401(4)
Wireless Access Points
401(1)
Wireless Network Interface Card
402(1)
Wireless Antennas
403(2)
Installing a Wireless Network
405(13)
Ad Hoc Mode: Independent Basic Service Set
405(1)
Infrastructure Mode: Basic Service Set
406(1)
Wireless Controllers
407(2)
Mobile Hot Spots
409(1)
Signal Degradation
410(1)
Other Network Infrastructure Implementations
410(2)
Technologies that facilitate the Internet of Things (IoT)
412(1)
Installing and Configuring WLAN Hardware
412(6)
Site Survey
418(4)
Providing Capacity
418(2)
Multiple Floors
420(1)
Location-Based WLAN
421(1)
Site Survey Tools
421(1)
Wireless Security
422(11)
Wireless Threats
422(4)
Open Access
426(1)
Service Set Identifiers, Wired Equivalent Privacy,
and Media Access Control Address Authentication
426(1)
Remote Authentication Dial-In User Service (802.1X)
427(1)
Temporal Key Integrity Protocol
428(2)
Wi-Fi Protected Access or WPA2 Pre-Shared Key
430(3)
Summary
433(1)
Exam Essentials
433(1)
Written Lab
434(1)
Review Questions
435(4)
Chapter 13 Authentication and Access Control
439(44)
Security Filtering
441(17)
Access Control Lists
442(1)
Tunneling
443(8)
Encryption
451(4)
Remote Access
455(3)
Managing User Account and Password Security
458(10)
Managing User Accounts
459(2)
Managing Passwords
461(4)
Single Sign-On
465(1)
Local Authentication
466(1)
LDAP
466(1)
Certificates
466(1)
Multifactor Authentication
467(1)
User-Authentication Methods
468(8)
Public Key Infrastructure (PKI)
468(1)
Kerberos
469(1)
Authentication, Authorization, and Accounting (AAA)
470(2)
Web Services
472(1)
Unified Voice Services
472(1)
Network Controllers
472(1)
Network Access Control (NAC)
472(1)
Challenge Handshake Authentication Protocol (CHAP)
473(1)
MS-CHAP
474(1)
Extensible Authentication Protocol (EAP)
474(1)
Hashes
474(1)
Network Access Control
475(1)
Summary
476(1)
Exam Essentials
477(1)
Written Lab
477(2)
Review Questions
479(4)
Chapter 14 Network Threats and Mitigation
483(60)
Recognizing Security Threats
485(15)
Denial of Service
486(1)
Distributed DoS (DDoS)
487(8)
Authentication Issues
495(1)
Viruses
496(3)
Zero-Day Attacks
499(1)
Insider Threat/Malicious Employee
500(1)
Vulnerabilities
500(12)
Exploits vs. Vulnerabilities
500(1)
Unnecessary Running Services
500(1)
Open Ports
500(1)
Unpatched/Legacy Systems
501(1)
Unencrypted Channels
501(1)
TEMPEST/RF Emanation
501(1)
Malicious Users
501(2)
Buffer Overflow
503(1)
DNS Poisoning
503(1)
Wireless Threats
503(3)
Attackers and Their Tools
506(4)
Misconfiguration Issues
510(1)
Social Engineering (Phishing)
511(1)
Understanding Mitigation Techniques
512(4)
Active Detection
513(1)
Passive Detection
513(1)
Proactive Defense
513(1)
Basic Forensic Concepts
514(2)
Policies and Procedures
516(16)
Security Policies
517(7)
Security Training
524(1)
Patches and Upgrades
525(2)
Firmware Updates
527(1)
Driver Updates
527(1)
File Hashing
528(1)
Generating New Keys
528(1)
Upgrading vs. Downgrading
528(2)
Asset Disposal
530(1)
Detection
531(1)
Anti-malware Software
532(5)
Host Based
533(1)
Cloud/Server Based
533(1)
Configuration Backups
534(1)
Updating Antivirus Components
534(2)
Fixing an Infected Computer
536(1)
Summary
537(1)
Exam Essentials
537(1)
Written Lab
537(2)
Review Questions
539(4)
Chapter 15 Physical Security and Risk
543(50)
Using Hardware and Software Security Devices
545(2)
Defining Firewalls
547(1)
Network-Based Firewalls
548(1)
Host-Based Firewalls
548(1)
Firewall Technologies
548(10)
Access Control Lists
549(2)
Port Security
551(1)
Demilitarized Zone
552(1)
Protocol Switching
553(2)
Dynamic Packet Filtering
555(1)
Proxy Services
556(2)
Firewalls at the Application Layer vs. the Network Layer
558(3)
Stateful vs. Stateless Network Layer Firewalls
559(1)
NGFW/Layer7 Firewall
560(1)
Scanning Services and Other Firewall Features
561(5)
Content Filtering
562(1)
Signature Identification
563(1)
Context Awareness
563(1)
Virtual Wire vs. Routed
563(1)
Zones
564(2)
Intrusion Detection and Prevention Systems
566(5)
Network-Based IDS
567(2)
Host-Based IDS
569(1)
Vulnerability Scanners
570(1)
VPN Concentrators
571(1)
Understanding Problems Affecting Device Security
572(14)
Physical Security
572(5)
Logical Security Configurations
577(2)
Risk-Related Concepts
579(7)
Summary
586(1)
Exam Essentials
587(1)
Written Lab
588(1)
Review Questions
589(4)
Chapter 16 Wide Area Networks
593(42)
What's a WAN?
596(5)
Defining WAN Terms
596(2)
The Public Switched Telephone Network
598(1)
WAN Connection Types
599(1)
Bandwidth or Speed
600(1)
T-Series Connections
601(2)
The T1 Connection
602(1)
The T3 Connection
603(1)
Transmission Media
603(4)
Wired Connections
603(1)
Wavelength Division Multiplexing
604(1)
Passive Optical Network
605(1)
Wireless Technologies
605(2)
Broadband Services
607(4)
DSL Technology and xDSL
608(2)
Cable Modem
610(1)
Wireless WAN Technologies
611(2)
Cellular WAN
612(1)
WAN Protocols
613(10)
Integrated Services Digital Network
613(2)
Frame Relay Technology
615(3)
Point-to-Point Protocol
618(3)
DMVPN
621(1)
SIP Trunks
621(1)
Asynchronous Transfer Mode
622(1)
MPLS
623(1)
WAN Troubleshooting
623(6)
Loss of Internet Connectivity
624(1)
Interface Errors/Monitoring
624(3)
Split Horizon
627(1)
DNS Issues
628(1)
Router Configurations
628(1)
Company Security Policy
629(1)
Summary
629(1)
Exam Essentials
630(1)
Written Lab
631(1)
Review Questions
632(3)
Chapter 17 Troubleshooting Tools
635(56)
Protocol Analyzers
637(1)
Throughput Testers
638(1)
Connectivity Software
639(1)
Using traceroute
640(7)
Using ipconfig and ifconfig
642(4)
Using the ifconfig Utility
646(1)
Using the iptables utility
646(1)
Using the ping Utility
647(3)
Using the Address Resolution Protocol
650(4)
The Windows ARP Table
651(1)
Using the arp Utility
651(3)
Using the nslookup Utility
654(2)
Resolving Names with the Hosts Table
656(1)
Using the Mtr Command (pathping)
657(2)
Using the Nmap Utility
658(1)
Using the route Command
659(4)
Using the route Command Options
661(1)
Some Examples of the route Command
662(1)
Using the nbtstat Utility
663(6)
The-a Switch
663(2)
The-A Switch
665(1)
The-c Switch
665(1)
The-n Switch
666(1)
The-r Switch
666(1)
The-R Switch
667(1)
The-S Switch
668(1)
The-s Switch
668(1)
Using the netstat Utility
669(7)
The-a Switch
671(1)
The-e Switch
672(1)
The-r Switch
673(1)
The-s Switch
673(1)
The-p Switch
673(2)
The-n Switch
675(1)
Using tcpdump
676(1)
Examples of Using tcpdump
676(1)
Using the File Transfer Protocol
677(5)
Starting FTP and Logging In to an FTP Server
678(1)
Downloading Files
679(2)
Uploading Files
681(1)
Using the Telnet Utility
682(2)
How to Enable Telnet in Windows
682(1)
Don't Use Telnet, Use Secure Shell
683(1)
Summary
684(1)
Exam Essentials
684(1)
Written Lab
685(1)
Review Questions
686(5)
Chapter 18 Software and Hardware Tools
691(40)
Understanding Network Scanners
693(9)
Packet Sniffers/Network Monitors
693(2)
Intrusion Detection and Prevention Software
695(2)
Port Scanners
697(3)
Wi-Fi Analyzer
700(1)
Bandwidth Speed Tester
701(1)
Baseline
702(1)
Network Monitoring and Logging
703(9)
Network Monitoring
703(1)
SNMP
704(1)
Syslog
705(2)
SIEM
707(3)
Utilization
710(2)
Identifying Hardware Tools
712(13)
Cable Testers
712(3)
Protocol Analyzer
715(1)
Certifiers
716(1)
Time-Domain Reflectometer
717(1)
Optical Time-Domain Reflectometer
717(1)
Multimeter
718(1)
Spectrum Analyzer
719(1)
Toner Generator (Probe)
720(1)
Metrics
721(1)
Butt Set
721(1)
Punch-Down Tool
722(1)
Cable Stripper/Snips
723(1)
Voltage Event Recorder (Power)
723(1)
Environmental Monitors
724(1)
Summary
725(1)
Exam Essentials
725(1)
Written Lab
726(1)
Review Questions
727(4)
Chapter 19 Network Troubleshooting
731(50)
Narrowing Down the Problem
734(15)
Did You Check the Super Simple Stuff?
735(3)
Is Hardware or Software Causing the Problem?
738(1)
Is It a Workstation or a Server Problem?
739(1)
Which Segments of the Network Are Affected?
740(1)
Is It Bad Cabling?
740(9)
Troubleshooting Steps
749(21)
Step 1: Identify the Problem
750(4)
Step 2: Establish a Theory of Probable Cause
754(8)
Step 3: Test the Theory to Determine Cause
762(2)
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
764(2)
Step 5: Implement the Solution or Escalate as Necessary
766(3)
Step 6: Verify Full System Functionality, and If Applicable, Implement Preventative Measures
769(1)
Step 7: Document Findings, Actions, and Outcomes
769(1)
Troubleshooting Tips
770(3)
Don't Overlook the Small Stuff
770(1)
Prioritize Your Problems
771(1)
Check the Software Configuration
771(1)
Don't Overlook Physical Conditions
772(1)
Don't Overlook Cable Problems
772(1)
Check for Viruses
773(1)
Summary
773(1)
Exam Essentials
774(1)
Written Lab
774(2)
Review Questions
776(5)
Chapter 20 Management, Monitoring, and Optimization
781(60)
Managing Network Documentation
785(10)
Using SNMP
785(1)
Schematics and Diagrams
786(9)
Network Monitoring
795(13)
Baselines
795(1)
Processes
796(1)
On-Boarding and Off-Boarding of Mobile Devices
796(1)
NAC
796(1)
Policies, Procedures, and Regulations
797(4)
Safety Practices
801(4)
Implementing Network Segmentation
805(3)
Network Optimization
808(26)
Reasons to Optimize Your Network's Performance
808(3)
How to Optimize Performance
811(2)
Unified Communications
813(1)
Traffic Shaping
813(1)
Load Balancing
814(1)
High Availability
814(1)
Caching Engines
815(1)
Fault Tolerance
815(1)
Archives/Backups
815(1)
Common Address Redundancy Protocol
816(1)
Virtual Networking
817(8)
Locating and Installing Equipment
825(7)
Change Management Procedures
832(2)
Summary
834(1)
Exam Essentials
835(1)
Written Lab
836(1)
Review Questions
837(4)
Appendix A: Answers to Written Labs
841(14)
Chapter 1 Introduction to Networks
842(1)
Chapter 2 The Open Systems Interconnection Specifications
842(1)
Chapter 3 Networking Topologies, Connectors, and Wiring Standards
843(1)
Chapter 4 The Current Ethernet Specifications
843(2)
Chapter 5 Networking Devices
845(1)
Chapter 6 Introduction to the Internet Protocol
846(1)
Chapter 7 IP Addressing
847(1)
Written Lab 7.1
847(1)
Written Lab 7.2
847(1)
Written Lab 7.3
848(1)
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT
848(1)
Chapter 9 Introduction to IP Routing
849(1)
Chapter 10 Routing Protocols
849(1)
Chapter 11 Switching and Virtual LANs
850(1)
Chapter 12 Wireless Networking
850(1)
Chapter 13 Authentication and Access Control
850(1)
Chapter 14 Network Threats and Mitigation
851(1)
Chapter 15 Physical Security and Risk
851(1)
Chapter 16 Wide Area Networks
852(1)
Chapter 17 Troubleshooting Tools
852(1)
Chapter 18 Software and Hardware Tools
853(1)
Chapter 19 Network Troubleshooting
853(1)
Chapter 20 Management, Monitoring, and Optimization
854(1)
Appendix B: Answers to Review Questions
855(32)
Chapter 1 Introduction to Networks
856(1)
Chapter 2 The Open Systems Interconnection Specifications
857(2)
Chapter 3 Networking Topologies, Connectors, and Wiring Standards
859(1)
Chapter 4 The Current Ethernet Specifications
860(1)
Chapter 5 Networking Devices
861(2)
Chapter 6 Introduction to the Internet Protocol
863(1)
Chapter 7 IP Addressing
864(2)
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT
866(2)
Chapter 9 Introduction to IP Routing
868(1)
Chapter 10 Routing Protocols
869(2)
Chapter 11 Switching and Virtual LANs
871(1)
Chapter 12 Wireless Networking
872(2)
Chapter 13 Authentication and Access Control
874(1)
Chapter 14 Network Threats and Mitigation
875(2)
Chapter 15 Physical Security and Risk
877(1)
Chapter 16 Wide Area Networks
878(2)
Chapter 17 Troubleshooting Tools
880(1)
Chapter 18 Software and Hardware Tools
881(2)
Chapter 19 Network Troubleshooting
883(2)
Chapter 20 Management, Monitoring, and Optimization
885(2)
Appendix C: Subnetting Class A
887(8)
Subnetting Practice Examples: Class A Addresses
888(2)
Practice Example #1A: 255.255.0.0 (/16)
888(1)
Practice Example #2A: 255.255.240.0 (/20)
889(1)
Practice Example #3A: 255.255.255.192 (/26)
889(1)
Subnetting in Your Head: Class A Addresses
890(1)
Written Lab 1
891(1)
Written Lab 2
892(1)
Answers to Written Lab 1
892(1)
Answers to Written Lab 2
893(2)
Index
895