CompTIA Network+: Review Guide |
|
|
|
xxiv | |
|
Chapter 1 Domain 1.0: Networking Concepts |
|
|
1 | (142) |
|
1.1 Explain the purposes and uses of ports and protocols. |
|
|
8 | (12) |
|
|
8 | (6) |
|
|
14 | (5) |
|
|
19 | (1) |
|
1.2 Explain devices, applications, protocols and services at their appropriate OSI layers. |
|
|
20 | (10) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (2) |
|
|
25 | (1) |
|
|
26 | (3) |
|
|
29 | (1) |
|
|
29 | (1) |
|
1.3 Explain the concepts and characteristics of routing and switching. |
|
|
30 | (42) |
|
Properties of Network Traffic |
|
|
30 | (5) |
|
Segmentation and Interface Properties |
|
|
35 | (13) |
|
|
48 | (8) |
|
|
56 | (4) |
|
|
60 | (3) |
|
|
63 | (3) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
Packet Switched vs. Circuit-Switched Networks |
|
|
69 | (1) |
|
Software-Defined Networking |
|
|
69 | (1) |
|
|
70 | (2) |
|
1.4 Given a scenario, configure the appropriate IP addressing components. |
|
|
72 | (17) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (8) |
|
|
84 | (4) |
|
|
88 | (1) |
|
1.5 Compare and contrast the characteristics of network topologies, types, and technologies. |
|
|
89 | (14) |
|
|
89 | (5) |
|
|
94 | (4) |
|
|
98 | (1) |
|
Technologies That Facilitate the Internet of Things (IoT) |
|
|
99 | (3) |
|
|
102 | (1) |
|
1.6 Given a scenario, implement the appropriate wireless technologies and configurations. |
|
|
103 | (12) |
|
|
103 | (3) |
|
|
106 | (1) |
|
|
107 | (2) |
|
Speed and Distance Requirements |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
Unidirectional/Omnidirectional |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
1.7 Summarize cloud concepts and their purposes. |
|
|
115 | (6) |
|
|
116 | (1) |
|
|
117 | (2) |
|
|
119 | (1) |
|
Security Implications/Considerations |
|
|
119 | (1) |
|
Relationship between Local and Cloud Resources |
|
|
120 | (1) |
|
|
120 | (1) |
|
1.8 Explain the functions of network services. |
|
|
121 | (22) |
|
|
121 | (8) |
|
|
129 | (5) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (2) |
|
|
137 | (6) |
|
Chapter 2 Domain 2.0: Infrastructure |
|
|
143 | (72) |
|
2.1 Given a scenario, deploy the appropriate cabling solution. |
|
|
148 | (23) |
|
|
148 | (4) |
|
|
152 | (1) |
|
|
153 | (5) |
|
|
158 | (2) |
|
Characteristics of fiber transceivers |
|
|
160 | (1) |
|
|
161 | (3) |
|
|
164 | (2) |
|
Copper termination standards |
|
|
166 | (3) |
|
Ethernet deployment standards |
|
|
169 | (1) |
|
|
170 | (1) |
|
2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them. |
|
|
171 | (5) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
2.3 Explain the purposes and use cases for advanced networking devices. |
|
|
176 | (10) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (2) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
2.4 Explain the purposes of virtualization and network storage technologies. |
|
|
186 | (8) |
|
Virtual networking components |
|
|
186 | (3) |
|
|
189 | (1) |
|
|
190 | (3) |
|
|
193 | (1) |
|
|
194 | (1) |
|
2.5 Compare and contrast WAN technologies. |
|
|
194 | (21) |
|
|
194 | (5) |
|
|
199 | (2) |
|
Characteristics of service |
|
|
201 | (4) |
|
|
205 | (2) |
|
|
207 | (2) |
|
|
209 | (6) |
|
Chapter 3 Domain 3.0: Network Operations |
|
|
215 | (66) |
|
3.1 Given a scenario, use appropriate documentation and diagrams to manage the network. |
|
|
219 | (14) |
|
|
220 | (3) |
|
Standard operating procedures/work instructions |
|
|
223 | (1) |
|
Logical vs. physical diagrams |
|
|
224 | (2) |
|
|
226 | (1) |
|
Change management documentation |
|
|
227 | (1) |
|
Wiring and port locations |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
Network configuration and performance baselines |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
3.2 Compare and contrast business continuity and disaster recovery concepts. |
|
|
233 | (14) |
|
|
234 | (8) |
|
|
242 | (4) |
|
|
246 | (1) |
|
3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs. |
|
|
247 | (10) |
|
|
247 | (5) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (2) |
|
|
256 | (1) |
|
3.4 Given a scenario, use remote access methods. |
|
|
257 | (10) |
|
|
257 | (4) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
264 | (2) |
|
|
266 | (1) |
|
3.5 Identify policies and best practices. |
|
|
267 | (14) |
|
Privileged user agreement |
|
|
268 | (1) |
|
|
268 | (1) |
|
On-boarding/off-boarding procedures |
|
|
268 | (1) |
|
|
269 | (1) |
|
International export controls |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
|
Incident response policies |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
Safety procedures and policies |
|
|
273 | (1) |
|
|
274 | (2) |
|
|
276 | (5) |
|
Chapter 4 Domain 4.0: Network Security |
|
|
281 | (50) |
|
4.1 Summarize the purposes of physical security devices. |
|
|
285 | (7) |
|
|
285 | (4) |
|
|
289 | (3) |
|
|
292 | (1) |
|
4.2 Explain authentication and access controls. |
|
|
292 | (12) |
|
Authentication, authorization, and accounting |
|
|
292 | (4) |
|
Multifactor authentication |
|
|
296 | (1) |
|
|
297 | (6) |
|
|
303 | (1) |
|
4.3 Given a scenario, secure a basic wireless network. |
|
|
304 | (4) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
Authentication and authorization |
|
|
305 | (2) |
|
|
307 | (1) |
|
|
307 | (1) |
|
4.4 Summarize common networking attacks. |
|
|
308 | (5) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
Exploits vs. vulnerabilities |
|
|
312 | (1) |
|
|
312 | (1) |
|
4.5 Given a scenario, implement network device hardening. |
|
|
313 | (5) |
|
Changing default credentials |
|
|
313 | (1) |
|
Avoiding common passwords |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
Disabling unnecessary services |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
4.6 Explain common mitigation techniques and their purposes. |
|
|
318 | (13) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
319 | (2) |
|
|
321 | (2) |
|
|
323 | (1) |
|
File integrity monitoring |
|
|
323 | (1) |
|
|
323 | (1) |
|
Restricting access via ACLs |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (2) |
|
|
327 | (4) |
|
Chapter 5 Domain 5.0 Network Troubleshooting and Tools |
|
|
331 | (80) |
|
5.1 Explain the network troubleshooting methodology. |
|
|
335 | (7) |
|
|
336 | (2) |
|
Establish a theory of probable cause |
|
|
338 | (1) |
|
Test the theory to determine the cause |
|
|
339 | (1) |
|
Establish a plan of action to resolve the problem |
|
|
|
and identify potential effects |
|
|
340 | (1) |
|
Implement the solution or escalate as necessary |
|
|
340 | (1) |
|
Verify full system functionality and, if applicable, implement preventive measures |
|
|
341 | (1) |
|
Document findings, actions, and outcomes |
|
|
341 | (1) |
|
|
341 | (1) |
|
5.2 Given a scenario, use the appropriate tool. |
|
|
342 | (30) |
|
|
342 | (10) |
|
|
352 | (19) |
|
|
371 | (1) |
|
5.3 Given a scenario, troubleshoot common wired connectivity and performance issues. |
|
|
372 | (8) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
Network connection LED status indicators |
|
|
378 | (1) |
|
|
379 | (1) |
|
5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues. |
|
|
380 | (8) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
Incorrect antenna placement |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
5.5 Given a scenario, troubleshoot common network service issues. |
|
|
388 | (23) |
|
|
388 | (5) |
|
|
393 | (1) |
|
|
394 | (2) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
397 | (2) |
|
|
399 | (1) |
|
Untrusted SSL certificate |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
Incorrect host-based firewall settings |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
406 | (5) |
|
Appendix Answers to Review Questions |
|
|
411 | (10) |
|
Chapter 1 Domain 1.0: Networking Concepts |
|
|
412 | (1) |
|
Chapter 2 Domain 2.0: Infrastructure |
|
|
413 | (2) |
|
Chapter 3 Domain 3.0: Network Operations |
|
|
415 | (2) |
|
Chapter 4 Domain 4.0: Network Security |
|
|
417 | (2) |
|
Chapter 5 Domain 5.0 Network Troubleshooting and Tools |
|
|
419 | (2) |
|
|
421 | |
CompTIA Network+: Practice Tests |
|
|
|
xiii | |
|
Chapter 1 Networking Concepts |
|
|
1 | (46) |
|
|
47 | (46) |
|
Chapter 3 Network Operations |
|
|
93 | (42) |
|
Chapter 4 Network Security |
|
|
135 | (40) |
|
Chapter 5 Network Troubleshooting and Tools |
|
|
175 | (60) |
|
Chapter 6 Practice Test 1 |
|
|
235 | (26) |
|
Chapter 7 Practice Test 2 |
|
|
261 | (26) |
|
Appendix Answers to Review Questions |
|
|
287 | (1) |
|
Chapter 1 Networking Concepts |
|
|
288 | (24) |
|
|
312 | (26) |
|
Chapter 3 Network Operations |
|
|
338 | (26) |
|
Chapter 4 Network Security |
|
|
364 | (27) |
|
Chapter 5 Network Troubleshooting and Tools |
|
|
391 | (26) |
|
Chapter 6 Practice Test 1 |
|
|
417 | (15) |
|
Chapter 7 Practice Test 2 |
|
|
432 | (15) |
|
|
447 | |
CompTIA Network+: Study Guide |
|
|
|
xxx | |
|
|
lxvi | |
|
Chapter 1 Introduction to Networks |
|
|
1 | (26) |
|
First Things First: What's a Network? |
|
|
2 | (9) |
|
|
3 | (2) |
|
Common Network Components |
|
|
5 | (2) |
|
|
7 | (2) |
|
Network Architecture: Peer-to-Peer or Client-Server? |
|
|
9 | (2) |
|
Physical Network Topologies |
|
|
11 | (8) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Point-to-Multipoint Topology |
|
|
17 | (1) |
|
|
18 | (1) |
|
Topology Selection, Backbones, and Segments |
|
|
19 | (2) |
|
Selecting the Right Topology |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (4) |
|
Chapter 2 The Open Systems Interconnection Specifications |
|
|
27 | (28) |
|
|
28 | (2) |
|
|
29 | (1) |
|
Advantages of Reference Models |
|
|
29 | (1) |
|
|
30 | (15) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (7) |
|
|
40 | (2) |
|
|
42 | (3) |
|
|
45 | (1) |
|
Introduction to Encapsulation |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (2) |
|
|
50 | (5) |
|
Chapter 3 Networking Topologies, Connectors, and Wiring Standards |
|
|
55 | (36) |
|
|
57 | (16) |
|
|
58 | (2) |
|
|
60 | (4) |
|
|
64 | (5) |
|
|
69 | (1) |
|
|
69 | (2) |
|
|
71 | (2) |
|
|
73 | (2) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
Noise Immunity (Security, EMI) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (7) |
|
|
75 | (2) |
|
|
77 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
80 | (2) |
|
Installing Wiring Distributions |
|
|
82 | (2) |
|
|
82 | (2) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (2) |
|
|
87 | (4) |
|
Chapter 4 The Current Ethernet Specifications |
|
|
91 | (34) |
|
|
92 | (2) |
|
|
94 | (5) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
Half-and Full-Duplex Ethernet |
|
|
98 | (1) |
|
Ethernet at the Data Link Layer |
|
|
99 | (7) |
|
Binary to Decimal and Hexadecimal Conversion |
|
|
100 | (3) |
|
|
103 | (1) |
|
|
104 | (2) |
|
Ethernet at the Physical Layer |
|
|
106 | (5) |
|
Ethernet over Other Standards (IEEE 1905.1-2013) |
|
|
111 | (3) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (5) |
|
|
120 | (5) |
|
Chapter 5 Networking Devices |
|
|
125 | (50) |
|
Common Network Connectivity Devices |
|
|
128 | (18) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
132 | (4) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (2) |
|
Dynamic Host Configuration Protocol Server |
|
|
141 | (5) |
|
|
146 | (1) |
|
Other Specialized Devices |
|
|
146 | (13) |
|
|
147 | (1) |
|
|
147 | (1) |
|
Domain Name Service Server |
|
|
148 | (6) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
Planning and Implementing a Basic SOHO Network Using Network Segmentation |
|
|
159 | (10) |
|
|
159 | (7) |
|
Switches and Bridges at the Data Link Layer |
|
|
166 | (1) |
|
Hubs at the Physical Layer |
|
|
167 | (1) |
|
Environmental Considerations |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (4) |
|
Chapter 6 Introduction to the Internet Protocol |
|
|
175 | (34) |
|
|
177 | (21) |
|
A Brief History of TCP/IP |
|
|
177 | (1) |
|
|
178 | (2) |
|
The Process/Application Layer Protocols |
|
|
180 | (8) |
|
The Host-to-Host Layer Protocols |
|
|
188 | (4) |
|
The Internet Layer Protocols |
|
|
192 | (6) |
|
|
198 | (4) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
204 | (5) |
|
|
209 | (28) |
|
|
210 | (1) |
|
The Hierarchical IP Addressing Scheme |
|
|
211 | (7) |
|
|
212 | (4) |
|
Private IP Addresses (RFC 1918) |
|
|
216 | (2) |
|
|
218 | (2) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
Multicast Address (Class D) |
|
|
219 | (1) |
|
Internet Protocol Version 6 (IPv6) |
|
|
220 | (10) |
|
|
220 | (1) |
|
The Benefits of and Uses for IPv6 |
|
|
221 | (1) |
|
IPv6 Addressing and Expressions |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
Stateless Autoconfiguration (EUI-64) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (3) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (2) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
233 | (4) |
|
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT |
|
|
237 | (42) |
|
|
238 | (22) |
|
|
239 | (1) |
|
|
240 | (1) |
|
Classless Inter-Domain Routing (CIDR) |
|
|
241 | (2) |
|
Subnetting Class C Addresses |
|
|
243 | (10) |
|
Subnetting Class B Addresses |
|
|
253 | (7) |
|
Troubleshooting IP Addressing |
|
|
260 | (8) |
|
Determining IP Address Problems |
|
|
263 | (5) |
|
Introduction to Network Address Translation (NAT) |
|
|
268 | (4) |
|
Types of Network Address Translation |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
270 | (2) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
274 | (5) |
|
Chapter 9 Introduction to IP Routing |
|
|
279 | (22) |
|
|
280 | (3) |
|
|
283 | (6) |
|
Testing Your IP Routing Understanding |
|
|
289 | (2) |
|
Static and Dynamic Routing |
|
|
291 | (3) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (2) |
|
|
296 | (5) |
|
Chapter 10 Routing Protocols |
|
|
301 | (40) |
|
|
302 | (4) |
|
|
303 | (2) |
|
Classes of Routing Protocols |
|
|
305 | (1) |
|
Distance Vector Routing Protocols |
|
|
306 | (9) |
|
Routing Information Protocol (RIP) |
|
|
308 | (1) |
|
|
308 | (1) |
|
VLSM and Discontiguous Networks |
|
|
309 | (3) |
|
|
312 | (2) |
|
Border Gateway Protocol (BGP) |
|
|
314 | (1) |
|
Link State Routing Protocols |
|
|
315 | (4) |
|
Open Shortest Path First (OSPF) |
|
|
316 | (2) |
|
Intermediate System-to-Intermediate System (IS-IS) |
|
|
318 | (1) |
|
|
319 | (7) |
|
Hot Standby Router Protocol (HSRP) |
|
|
321 | (4) |
|
Virtual Router Redundancy Protocol |
|
|
325 | (1) |
|
|
326 | (6) |
|
|
326 | (2) |
|
|
328 | (1) |
|
|
329 | (3) |
|
|
332 | (1) |
|
|
332 | (2) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (5) |
|
Chapter 11 Switching and Virtual LANs |
|
|
341 | (46) |
|
Networking Before Layer 2 Switching |
|
|
343 | (3) |
|
|
346 | (8) |
|
Limitations of Layer 2 Switching |
|
|
347 | (1) |
|
Bridging vs. LAN Switching |
|
|
348 | (1) |
|
Three Switch Functions at Layer 2 |
|
|
348 | (6) |
|
|
354 | (1) |
|
|
354 | (4) |
|
Spanning Tree Port States |
|
|
355 | (1) |
|
|
356 | (1) |
|
Rapid Spanning Tree Protocol 802.1w |
|
|
357 | (1) |
|
|
358 | (9) |
|
|
359 | (3) |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (2) |
|
VLAN Identification Methods |
|
|
366 | (1) |
|
|
367 | (9) |
|
|
368 | (1) |
|
Do We Really Need to Put an IP Address on a Switch? |
|
|
369 | (3) |
|
|
372 | (3) |
|
|
375 | (1) |
|
|
376 | (1) |
|
Two Additional Advanced Features of Switches |
|
|
376 | (4) |
|
Power over Ethernet (802.3af, 802.3at) |
|
|
376 | (3) |
|
Port Mirroring/Spanning (SPAN/RSPAN) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
381 | (2) |
|
|
383 | (4) |
|
Chapter 12 Wireless Networking |
|
|
387 | (52) |
|
Introduction to Wireless Technology |
|
|
390 | (3) |
|
|
393 | (1) |
|
|
393 | (6) |
|
|
395 | (1) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
399 | (1) |
|
Comparing 802.11 Standards |
|
|
399 | (2) |
|
|
400 | (1) |
|
Wireless Network Components |
|
|
401 | (4) |
|
|
401 | (1) |
|
Wireless Network Interface Card |
|
|
402 | (1) |
|
|
403 | (2) |
|
Installing a Wireless Network |
|
|
405 | (13) |
|
Ad Hoc Mode: Independent Basic Service Set |
|
|
405 | (1) |
|
Infrastructure Mode: Basic Service Set |
|
|
406 | (1) |
|
|
407 | (2) |
|
|
409 | (1) |
|
|
410 | (1) |
|
Other Network Infrastructure Implementations |
|
|
410 | (2) |
|
Technologies that facilitate the Internet of Things (IoT) |
|
|
412 | (1) |
|
Installing and Configuring WLAN Hardware |
|
|
412 | (6) |
|
|
418 | (4) |
|
|
418 | (2) |
|
|
420 | (1) |
|
|
421 | (1) |
|
|
421 | (1) |
|
|
422 | (11) |
|
|
422 | (4) |
|
|
426 | (1) |
|
Service Set Identifiers, Wired Equivalent Privacy, |
|
|
|
and Media Access Control Address Authentication |
|
|
426 | (1) |
|
Remote Authentication Dial-In User Service (802.1X) |
|
|
427 | (1) |
|
Temporal Key Integrity Protocol |
|
|
428 | (2) |
|
Wi-Fi Protected Access or WPA2 Pre-Shared Key |
|
|
430 | (3) |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
434 | (1) |
|
|
435 | (4) |
|
Chapter 13 Authentication and Access Control |
|
|
439 | (44) |
|
|
441 | (17) |
|
|
442 | (1) |
|
|
443 | (8) |
|
|
451 | (4) |
|
|
455 | (3) |
|
Managing User Account and Password Security |
|
|
458 | (10) |
|
|
459 | (2) |
|
|
461 | (4) |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
466 | (1) |
|
|
466 | (1) |
|
Multifactor Authentication |
|
|
467 | (1) |
|
User-Authentication Methods |
|
|
468 | (8) |
|
Public Key Infrastructure (PKI) |
|
|
468 | (1) |
|
|
469 | (1) |
|
Authentication, Authorization, and Accounting (AAA) |
|
|
470 | (2) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
472 | (1) |
|
Network Access Control (NAC) |
|
|
472 | (1) |
|
Challenge Handshake Authentication Protocol (CHAP) |
|
|
473 | (1) |
|
|
474 | (1) |
|
Extensible Authentication Protocol (EAP) |
|
|
474 | (1) |
|
|
474 | (1) |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
477 | (1) |
|
|
477 | (2) |
|
|
479 | (4) |
|
Chapter 14 Network Threats and Mitigation |
|
|
483 | (60) |
|
Recognizing Security Threats |
|
|
485 | (15) |
|
|
486 | (1) |
|
|
487 | (8) |
|
|
495 | (1) |
|
|
496 | (3) |
|
|
499 | (1) |
|
Insider Threat/Malicious Employee |
|
|
500 | (1) |
|
|
500 | (12) |
|
Exploits vs. Vulnerabilities |
|
|
500 | (1) |
|
Unnecessary Running Services |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (2) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (3) |
|
Attackers and Their Tools |
|
|
506 | (4) |
|
|
510 | (1) |
|
Social Engineering (Phishing) |
|
|
511 | (1) |
|
Understanding Mitigation Techniques |
|
|
512 | (4) |
|
|
513 | (1) |
|
|
513 | (1) |
|
|
513 | (1) |
|
|
514 | (2) |
|
|
516 | (16) |
|
|
517 | (7) |
|
|
524 | (1) |
|
|
525 | (2) |
|
|
527 | (1) |
|
|
527 | (1) |
|
|
528 | (1) |
|
|
528 | (1) |
|
Upgrading vs. Downgrading |
|
|
528 | (2) |
|
|
530 | (1) |
|
|
531 | (1) |
|
|
532 | (5) |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
534 | (1) |
|
Updating Antivirus Components |
|
|
534 | (2) |
|
Fixing an Infected Computer |
|
|
536 | (1) |
|
|
537 | (1) |
|
|
537 | (1) |
|
|
537 | (2) |
|
|
539 | (4) |
|
Chapter 15 Physical Security and Risk |
|
|
543 | (50) |
|
Using Hardware and Software Security Devices |
|
|
545 | (2) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
548 | (10) |
|
|
549 | (2) |
|
|
551 | (1) |
|
|
552 | (1) |
|
|
553 | (2) |
|
|
555 | (1) |
|
|
556 | (2) |
|
Firewalls at the Application Layer vs. the Network Layer |
|
|
558 | (3) |
|
Stateful vs. Stateless Network Layer Firewalls |
|
|
559 | (1) |
|
|
560 | (1) |
|
Scanning Services and Other Firewall Features |
|
|
561 | (5) |
|
|
562 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
564 | (2) |
|
Intrusion Detection and Prevention Systems |
|
|
566 | (5) |
|
|
567 | (2) |
|
|
569 | (1) |
|
|
570 | (1) |
|
|
571 | (1) |
|
Understanding Problems Affecting Device Security |
|
|
572 | (14) |
|
|
572 | (5) |
|
Logical Security Configurations |
|
|
577 | (2) |
|
|
579 | (7) |
|
|
586 | (1) |
|
|
587 | (1) |
|
|
588 | (1) |
|
|
589 | (4) |
|
Chapter 16 Wide Area Networks |
|
|
593 | (42) |
|
|
596 | (5) |
|
|
596 | (2) |
|
The Public Switched Telephone Network |
|
|
598 | (1) |
|
|
599 | (1) |
|
|
600 | (1) |
|
|
601 | (2) |
|
|
602 | (1) |
|
|
603 | (1) |
|
|
603 | (4) |
|
|
603 | (1) |
|
Wavelength Division Multiplexing |
|
|
604 | (1) |
|
|
605 | (1) |
|
|
605 | (2) |
|
|
607 | (4) |
|
|
608 | (2) |
|
|
610 | (1) |
|
Wireless WAN Technologies |
|
|
611 | (2) |
|
|
612 | (1) |
|
|
613 | (10) |
|
Integrated Services Digital Network |
|
|
613 | (2) |
|
|
615 | (3) |
|
|
618 | (3) |
|
|
621 | (1) |
|
|
621 | (1) |
|
Asynchronous Transfer Mode |
|
|
622 | (1) |
|
|
623 | (1) |
|
|
623 | (6) |
|
Loss of Internet Connectivity |
|
|
624 | (1) |
|
Interface Errors/Monitoring |
|
|
624 | (3) |
|
|
627 | (1) |
|
|
628 | (1) |
|
|
628 | (1) |
|
|
629 | (1) |
|
|
629 | (1) |
|
|
630 | (1) |
|
|
631 | (1) |
|
|
632 | (3) |
|
Chapter 17 Troubleshooting Tools |
|
|
635 | (56) |
|
|
637 | (1) |
|
|
638 | (1) |
|
|
639 | (1) |
|
|
640 | (7) |
|
Using ipconfig and ifconfig |
|
|
642 | (4) |
|
Using the ifconfig Utility |
|
|
646 | (1) |
|
Using the iptables utility |
|
|
646 | (1) |
|
|
647 | (3) |
|
Using the Address Resolution Protocol |
|
|
650 | (4) |
|
|
651 | (1) |
|
|
651 | (3) |
|
Using the nslookup Utility |
|
|
654 | (2) |
|
Resolving Names with the Hosts Table |
|
|
656 | (1) |
|
Using the Mtr Command (pathping) |
|
|
657 | (2) |
|
|
658 | (1) |
|
|
659 | (4) |
|
Using the route Command Options |
|
|
661 | (1) |
|
Some Examples of the route Command |
|
|
662 | (1) |
|
Using the nbtstat Utility |
|
|
663 | (6) |
|
|
663 | (2) |
|
|
665 | (1) |
|
|
665 | (1) |
|
|
666 | (1) |
|
|
666 | (1) |
|
|
667 | (1) |
|
|
668 | (1) |
|
|
668 | (1) |
|
Using the netstat Utility |
|
|
669 | (7) |
|
|
671 | (1) |
|
|
672 | (1) |
|
|
673 | (1) |
|
|
673 | (1) |
|
|
673 | (2) |
|
|
675 | (1) |
|
|
676 | (1) |
|
Examples of Using tcpdump |
|
|
676 | (1) |
|
Using the File Transfer Protocol |
|
|
677 | (5) |
|
Starting FTP and Logging In to an FTP Server |
|
|
678 | (1) |
|
|
679 | (2) |
|
|
681 | (1) |
|
|
682 | (2) |
|
How to Enable Telnet in Windows |
|
|
682 | (1) |
|
Don't Use Telnet, Use Secure Shell |
|
|
683 | (1) |
|
|
684 | (1) |
|
|
684 | (1) |
|
|
685 | (1) |
|
|
686 | (5) |
|
Chapter 18 Software and Hardware Tools |
|
|
691 | (40) |
|
Understanding Network Scanners |
|
|
693 | (9) |
|
Packet Sniffers/Network Monitors |
|
|
693 | (2) |
|
Intrusion Detection and Prevention Software |
|
|
695 | (2) |
|
|
697 | (3) |
|
|
700 | (1) |
|
|
701 | (1) |
|
|
702 | (1) |
|
Network Monitoring and Logging |
|
|
703 | (9) |
|
|
703 | (1) |
|
|
704 | (1) |
|
|
705 | (2) |
|
|
707 | (3) |
|
|
710 | (2) |
|
Identifying Hardware Tools |
|
|
712 | (13) |
|
|
712 | (3) |
|
|
715 | (1) |
|
|
716 | (1) |
|
Time-Domain Reflectometer |
|
|
717 | (1) |
|
Optical Time-Domain Reflectometer |
|
|
717 | (1) |
|
|
718 | (1) |
|
|
719 | (1) |
|
|
720 | (1) |
|
|
721 | (1) |
|
|
721 | (1) |
|
|
722 | (1) |
|
|
723 | (1) |
|
Voltage Event Recorder (Power) |
|
|
723 | (1) |
|
|
724 | (1) |
|
|
725 | (1) |
|
|
725 | (1) |
|
|
726 | (1) |
|
|
727 | (4) |
|
Chapter 19 Network Troubleshooting |
|
|
731 | (50) |
|
Narrowing Down the Problem |
|
|
734 | (15) |
|
Did You Check the Super Simple Stuff? |
|
|
735 | (3) |
|
Is Hardware or Software Causing the Problem? |
|
|
738 | (1) |
|
Is It a Workstation or a Server Problem? |
|
|
739 | (1) |
|
Which Segments of the Network Are Affected? |
|
|
740 | (1) |
|
|
740 | (9) |
|
|
749 | (21) |
|
Step 1: Identify the Problem |
|
|
750 | (4) |
|
Step 2: Establish a Theory of Probable Cause |
|
|
754 | (8) |
|
Step 3: Test the Theory to Determine Cause |
|
|
762 | (2) |
|
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects |
|
|
764 | (2) |
|
Step 5: Implement the Solution or Escalate as Necessary |
|
|
766 | (3) |
|
Step 6: Verify Full System Functionality, and If Applicable, Implement Preventative Measures |
|
|
769 | (1) |
|
Step 7: Document Findings, Actions, and Outcomes |
|
|
769 | (1) |
|
|
770 | (3) |
|
Don't Overlook the Small Stuff |
|
|
770 | (1) |
|
|
771 | (1) |
|
Check the Software Configuration |
|
|
771 | (1) |
|
Don't Overlook Physical Conditions |
|
|
772 | (1) |
|
Don't Overlook Cable Problems |
|
|
772 | (1) |
|
|
773 | (1) |
|
|
773 | (1) |
|
|
774 | (1) |
|
|
774 | (2) |
|
|
776 | (5) |
|
Chapter 20 Management, Monitoring, and Optimization |
|
|
781 | (60) |
|
Managing Network Documentation |
|
|
785 | (10) |
|
|
785 | (1) |
|
|
786 | (9) |
|
|
795 | (13) |
|
|
795 | (1) |
|
|
796 | (1) |
|
On-Boarding and Off-Boarding of Mobile Devices |
|
|
796 | (1) |
|
|
796 | (1) |
|
Policies, Procedures, and Regulations |
|
|
797 | (4) |
|
|
801 | (4) |
|
Implementing Network Segmentation |
|
|
805 | (3) |
|
|
808 | (26) |
|
Reasons to Optimize Your Network's Performance |
|
|
808 | (3) |
|
How to Optimize Performance |
|
|
811 | (2) |
|
|
813 | (1) |
|
|
813 | (1) |
|
|
814 | (1) |
|
|
814 | (1) |
|
|
815 | (1) |
|
|
815 | (1) |
|
|
815 | (1) |
|
Common Address Redundancy Protocol |
|
|
816 | (1) |
|
|
817 | (8) |
|
Locating and Installing Equipment |
|
|
825 | (7) |
|
Change Management Procedures |
|
|
832 | (2) |
|
|
834 | (1) |
|
|
835 | (1) |
|
|
836 | (1) |
|
|
837 | (4) |
|
Appendix A: Answers to Written Labs |
|
|
841 | (14) |
|
Chapter 1 Introduction to Networks |
|
|
842 | (1) |
|
Chapter 2 The Open Systems Interconnection Specifications |
|
|
842 | (1) |
|
Chapter 3 Networking Topologies, Connectors, and Wiring Standards |
|
|
843 | (1) |
|
Chapter 4 The Current Ethernet Specifications |
|
|
843 | (2) |
|
Chapter 5 Networking Devices |
|
|
845 | (1) |
|
Chapter 6 Introduction to the Internet Protocol |
|
|
846 | (1) |
|
|
847 | (1) |
|
|
847 | (1) |
|
|
847 | (1) |
|
|
848 | (1) |
|
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT |
|
|
848 | (1) |
|
Chapter 9 Introduction to IP Routing |
|
|
849 | (1) |
|
Chapter 10 Routing Protocols |
|
|
849 | (1) |
|
Chapter 11 Switching and Virtual LANs |
|
|
850 | (1) |
|
Chapter 12 Wireless Networking |
|
|
850 | (1) |
|
Chapter 13 Authentication and Access Control |
|
|
850 | (1) |
|
Chapter 14 Network Threats and Mitigation |
|
|
851 | (1) |
|
Chapter 15 Physical Security and Risk |
|
|
851 | (1) |
|
Chapter 16 Wide Area Networks |
|
|
852 | (1) |
|
Chapter 17 Troubleshooting Tools |
|
|
852 | (1) |
|
Chapter 18 Software and Hardware Tools |
|
|
853 | (1) |
|
Chapter 19 Network Troubleshooting |
|
|
853 | (1) |
|
Chapter 20 Management, Monitoring, and Optimization |
|
|
854 | (1) |
|
Appendix B: Answers to Review Questions |
|
|
855 | (32) |
|
Chapter 1 Introduction to Networks |
|
|
856 | (1) |
|
Chapter 2 The Open Systems Interconnection Specifications |
|
|
857 | (2) |
|
Chapter 3 Networking Topologies, Connectors, and Wiring Standards |
|
|
859 | (1) |
|
Chapter 4 The Current Ethernet Specifications |
|
|
860 | (1) |
|
Chapter 5 Networking Devices |
|
|
861 | (2) |
|
Chapter 6 Introduction to the Internet Protocol |
|
|
863 | (1) |
|
|
864 | (2) |
|
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT |
|
|
866 | (2) |
|
Chapter 9 Introduction to IP Routing |
|
|
868 | (1) |
|
Chapter 10 Routing Protocols |
|
|
869 | (2) |
|
Chapter 11 Switching and Virtual LANs |
|
|
871 | (1) |
|
Chapter 12 Wireless Networking |
|
|
872 | (2) |
|
Chapter 13 Authentication and Access Control |
|
|
874 | (1) |
|
Chapter 14 Network Threats and Mitigation |
|
|
875 | (2) |
|
Chapter 15 Physical Security and Risk |
|
|
877 | (1) |
|
Chapter 16 Wide Area Networks |
|
|
878 | (2) |
|
Chapter 17 Troubleshooting Tools |
|
|
880 | (1) |
|
Chapter 18 Software and Hardware Tools |
|
|
881 | (2) |
|
Chapter 19 Network Troubleshooting |
|
|
883 | (2) |
|
Chapter 20 Management, Monitoring, and Optimization |
|
|
885 | (2) |
|
Appendix C: Subnetting Class A |
|
|
887 | (8) |
|
Subnetting Practice Examples: Class A Addresses |
|
|
888 | (2) |
|
Practice Example #1A: 255.255.0.0 (/16) |
|
|
888 | (1) |
|
Practice Example #2A: 255.255.240.0 (/20) |
|
|
889 | (1) |
|
Practice Example #3A: 255.255.255.192 (/26) |
|
|
889 | (1) |
|
Subnetting in Your Head: Class A Addresses |
|
|
890 | (1) |
|
|
891 | (1) |
|
|
892 | (1) |
|
|
892 | (1) |
|
|
893 | (2) |
|
|
895 | |