CompTIA Network+ Study Guide [3rd edition] 9781119021247, 9781119021261, 9781119021254, 0538927941, 1119021243

The CompTIA Network+ Study Guide, 3rd edition, is your one-stop resource for complete coverage of Exam N10-006. This Syb

920 59 30MB

English Pages l, 906 pages : illustrations ; 24 cm Year 2015

Report DMCA / Copyright

DOWNLOAD FILE

CompTIA Network+ Study Guide [3rd edition]
 9781119021247, 9781119021261, 9781119021254, 0538927941, 1119021243

Table of contents :
Introduction --
Assessment test --
Ch. 1. Introduction to Networks. First Things First: What's a Network?: The local area network
Common network components
Wide area network
Network architecture : peer-to-peer or client-server? --
Physical Network Topologies: Bus topology
Star topology
Ring topology
Mesh topology
Point-to-point topology
Point-to-multipoint topology
Hybrid topology --
Topology Selection, Backbones, and Segments: Selecting the right topology
The network backbone
Network segments --
Summary --
Exam Essentials --
Written Labs --
Review questions --
Ch. 2. The Open Systems Interconnection Specifications. Internetworking Models: The layered approach
Advantages of reference models --
The OSI Reference Model: The application layer
The presentation layer
The session layer
The transport layer
The network layer
The data link layer
The physical layer --
Introduction to encapsulation --
Modulation techniques --
Summary --
Exam essentials --
Written lab --
Review Questions --
Ch. 3. Networking Topologies, Connectors, And Wiring Standards. Physical Media: Coaxial cable
Twisted-pair cable
Fiber-optic cable
Media converters
Serial cables --
Cable Properties: Transmission speeds
Distance
Duplex
Noise immunity (Security, EMI)
Frequency --
Wiring Standards: 568A versus 568B
Straight-through cable
Crossover cable
Rolled/rollover cable
T1 crossover cable --
Installing Wiring Distributions --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 4. The Current Ethernet Specifications. Network Basics --
Ethernet Basics: Collision domain
Broadcast domain
CSMA/CD
Broadband/baseband
Bit rates versus baud rate
Wavelength
Sampling-size
Half-and full-duplex Ethernet --
Ethernet at the Data Link Layer: Binary to decimal and hexadecimal conversion
Ethernet addressing
Ethernet frames --
Ethernet at the Physical Layer --
Ethernet Over Other Standards (IEEE 1905.1-2013): Ethernet over power line
Ethernet over HDMI --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 5. Networking Devices. Common Network Connectivity Devices: Network interface card
Hub
Bridge
Switch
Router
Firewall
IDS/IPS
HIDS
Access point
Dynamic host configuration protocol server --
Other Specialized Devices: Multilayer switch
Load balancer
Domain name service server
Proxy server
Encryption devices
Analog modem
Packet shaper
VPN concentrator --
Planning and Implementing a Basic SOHO Network Using Network Segmentation: Determining requirements
Switches and bridges at the data link layer
Hubs at the physical layer
Environmental considerations --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 6. Introduction to the Internet Protocol. Introducing TCP/IP: A brief history of TCP/IP
TCP/IP and the DoD model
The process/application layer protocols
The host-to-host layer protocols
The Internet layer protocols --
Data Encapsulation --
Summary --
Exam essentials --
Written lab --
Review Questions --
Ch. 7. IP Addressing. IP Terminology --
Hierarchical IP Addressing Scheme: Network addressing
Private IP addresses (RFC 1918) --
IPv4 Address Types: Layer 2 broadcasts
Layer 3 broadcasts
Unicast address
Multicast address (Class D) --
Internet Protocol Version 6 (IPv6): Why do we need IPv6?
The benefits of and uses for IPv6
IPv6 addressing and expressions
Shortened expression
Address types
Special addresses
Stateless auto-configuration (EUI-64)
DHCPv6 (Stateful)
Migrating to IPv6 --
Summary --
Exam essentials --
Written Lab: Written Lab 7.1
Written Lab 7.2
Written Lab 7.3 --
Review questions --
Ch. 8. IP Subnetting, Troubleshooting IP, and Introduction to NAT. Subnetting Basics: How to create subnets
Subnet masks
Classless Inter-Domain Routing (CIDR)
Subnetting Class C addresses
Subnetting Class B addresses --
Troubleshooting IP Addressing: Determining IP address problems --
Introduction To Network Address Translation (NAT): Types of network address translation
NAT names
How NAT works --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 9. Introduction to IP Routing. Routing basics
The IP routing process
Testing your IP routing understanding
Static and dynamic routing
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 10. Routing Protocols. Routing Protocol Basics: Administrative distances
Classes of routing protocols --
Distance Vector Routing Protocols: Routing Information Protocol (RIP)
RIP version 2 (RIPv2)
VLSM and discontinuous networks
EIGRP
Border Gateway Protocol (BGP) --
Link State Routing Protocols: Open Shortest Path First (OSPF)
Intermediate System-To-Intermediate System (IS-IS) --
High Availability: Hot Standby Router Protocol (HSRP)
Virtual router redundancy protocol --
IPv6 Routing Protocols: RIPng
EIGRPv6
OSPFv3 --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 11. Switching and Virtual LANs. Networking before layer 2 switching --
Switching Services: Limitations of layer 2 switching
Bridging versus LAN switching
Three switch functions at layer 2 --
Spanning Tree Protocol: Spanning tree port states
STP convergence
Rapid spanning tree protocol 802.1w --
Virtual LANs: VLAN basics
Quality of service
VLAN memberships
Static VLANs
Dynamic VLANs
Identifying VLANs
VLAN identification methods --
VLAN Trunking Protocol: VTP modes of operation
Do we really need to put an IP address on a switch?
Port security
Port bonding --
Two Additional Advanced Features of Switches: Power over Ethernet (802.3af, 802.3at)
Port Mirroring/Spanning (SPAN/RSPAN) --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 12. Wireless Networking. Introduction to wireless technology --
The 802.11 Standards: 2.4GHz (802.11b)
2.4GHz (802.11g)
5GHz (802.11a)
5GHz (802.11h)
2.4GHz/5GHz (802.11n)
5GHz (802.11ac) --
Comparing 802.11 Standards: Range comparisons --
Wireless Network Components: Wireless access points
Wireless network interface card
Wireless antennas --
Installing a Wireless Network: Ad hoc mode : independent basic service set
Infrastructure mode : basic service set
Wireless controllers
Mobile hot spots
Signal degradation
Other network infrastructure implementations
Installing and configuring WLAN hardware --
Site survey --
Wireless Security: Wireless threats
Open access
Service set identifiers, wired equivalent privacy, and media access control address authentication
Remote authentication dial-in user service (802.1x)
Temporal key integrity protocol
Wi-Fi protected access or WPA2 pare-shared key --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 13. Authentication and Access Control. Security Filtering: Access control lists
Tunneling
Encryption
Remote access --
Managing User Account and Password Security: Managing user accounts
Managing passwords
Single sign-on
Multifactor authentication --
User-authentication methods: Public Key Infrastructure (PKI)
Kerberos
Authentication, Authorization, and Accounting (AAA)
Web services
Unified voice services
Network controllers
Network Access Control (NAC)
Challenge Handshake Authentication Protocol (CHAP)
MS-CHAP
Extensible Authentication Protocol (EAP)
Hashes
Network access control --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 14. Network Threats And Mitigation. Recognizing Security Threats: Denial of service
Distributed DoS (DDos)
Authentication issues
Viruses
Zero day attacks
Insider threat/malicious employee --
Vulnerabilities: Unnecessary running services
Open ports
Unpatched/legacy systems
Unencrypted channels
Clear-text credentials
TEMPEST/RF emanation
Malicious users
Buffer overflow
Wireless threats
Attackers and their tools
Misconfiguration issues
Social Engineering (Phishing) --
Understanding Mitigation Techniques: Active detection
Passive detection
Proactive defense
Basic forensic concepts --
Policies And Procedures: Security policies
Security training
Patches and upgrades
Firmware updates
Driver updates
Upgrading versus downgrading --
Anti-Malware Software: Host-based
Cloud/server-based
Configuration backups
Updating antivirus components
Fixing an infected computer --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 15. Physical Security and Risk. Using hardware and software security devices --
Defining Firewalls: Network-based firewalls
Host-based firewalls --
Firewall Technologies: Access control lists
Port security
Demilitarized zone
Protocol switching
Dynamic packet filtering
Proxy services --
Firewalls at the Application Layer Versus the Network Layer: Stateful versus stateless network layer firewalls
Application layer firewalls --
Scanning Services and Other Firewall Features: Content filtering
Signature identification
Context awareness
Virtual wire versus routed
Zones --
Intrusion Detection and Prevention Systems: Network-based IDS
Host-based IDS
Vulnerability scanners --
VPN concentrators --
Understanding Problems Affecting Device Security: Physical security
Logical security configurations
Risk-related concepts --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 16. Wide Area Networks. What's a WAN?: Defining WAN terms
The public switched telephone network
WAN connection types
Bandwidth or speed --
T-Series Connections: The T1 connection
The T3 connection --
Transmission Media: Wired connections
Wavelength division multiplexing
Passive optical network
Wireless technologies --
Broadband Services:
DSL technology and xDSL
Cable modem --
Wireless WAN Technologies: Cellular WAN --
WAN Protocols: Integrated services digital network
Frame relay technology
Point-to-point protocol
Asynchronous transfer mode
MPLS --
WAN Troubleshooting: Loss of internet connectivity
Interface errors/monitoring
Split horizon
DNS issues
Router configurations
Company security policy --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 17. Troubleshooting Tools. Protocol analyzers --
Throughput testers --
Connectivity software --
Using Traceroute --
Using ipconfig and ifconfig: Using the ipconfig utility
Using the ifconfig utility --
Using the ping utility --
Using the Address Resolution Protocol: The Windows ARP table
Using the arp utility --
Using the nslookup utility --
Resolving names with the hosts table --
Using the Mtr command (pathping) --
Using the route command: Using the route command options
Some examples of the route command --
Using the nbtstat Utility: The -a switch
The -A switch
The -c switch
The -n switch
The -r switch
The -R switch
The -S switch
The -s switch --
Using the netstat Utility: The -a switch
The -e switch
The -r switch
The -s switch
The -p switch
The -n switch --
Using the File Transfer Protocol: Starting FTP and logging in to an FTP server
Downloading files
Uploading files --
Using the Telnet utility: How to enable Telnet in Windows
Don't use Telnet, use secure shell --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 18. Software and Hardware Tools. Understanding Network Scanners: Packet sniffers/network monitors
Intrusion detection and prevention software
Port scanners
Wi-Fi analyzer --
Baseline --
Network Monitoring and Logging: Network monitoring
SNMP
Syslog
SIEM
Utilization --
Identifying Hardware Tools: Cable testers
Protocol analyzer
Certifiers
Time-domain reflectometer
Optical time-domain reflectometer
Multimeter
Toner probe
Butt set
Punch-down tool
Cable stripper/snips
Voltage event recorder (power)
Environmental monitors --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 19. Network Troubleshooting. Narrowing Down the Problem: Did you check the super simple stuff?
Is hardware or software causing the problem?
Is it a workstation or a server problem?
Which segments of the network are affected?
Is it bad cabling? --
Troubleshooting Steps: Step 1: Identify the problem
Step 2: Establish a theory of probable cause
Step 3: Test the theory to determine cause
Step 4: Establish a plan of action to resolve the problem and identify potential effects
Step 5: Implement the solution or escalate as necessary
Step 6: Verify full system functionality, and if applicable, implement preventative measures
Step 7: Document findings, actions, and outcomes --
Troubleshooting Tips: Don't overlook the small stuff
Prioritize your problems
Check the software configuration
Don't overlook physical conditions
Don't overlook cable problems
Check for viruses --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 20. Management, Monitoring, And Optimization. Managing Network Documentation: Using SNMP
Schematics and diagrams --
Network Monitoring: Baselines
On-boarding and off-boarding of mobile devices
NAC
Policies, procedures, and regulations
Safety practices
Implementing network segmentation --
Network Optimization: Reasons to optimize your network's performance
How to optimize performance
Unified communications
Traffic shaping
Load balancing
High availability
Caching engines
Fault tolerance
Archives/backups
Common address redundancy protocol
Virtual networking
Locating and installing equipment
Change management procedures --
Summary --
Exam essentials --
Written lab --
Review questions --
Appendix A: Answers To the Written Labs: Chapters: 1-7
Written Lab: 7.1
Written Lab: 7.2
Written Lab: 7.3
Chapters: 8-20 --
Answers to Review Questions: Chapters: 1-20 --
Appendix C: Subnetting Class A. Subnetting Practice Examples: Class A addresses: Practice Example #1A: 255.255.0.0 (/16)
Practice Example #2A: 225.255.240.0 (/20) --
Practice Example #3A: 255.255.255.192 (/26) --
Subnetting in your head: Class A addresses --
Written Lab 1 --
Written Lab 2 --
Answers to Written Lab 1 --
Answers to Written Lab 2 --
Index.

Polecaj historie