Details

CompTIA Network+ Study Guide


CompTIA Network+ Study Guide

Exam N10-007
4. Aufl.

von: Todd Lammle

32,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 19.04.2018
ISBN/EAN: 9781119432265
Sprache: englisch
Anzahl Seiten: 1008

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>To complement the <i>CompTIA Network+ Study Guide: Exam N10-007</i>, 4e, and the CompTIA <i>Network+ Deluxe Study Guide: Exam N10-007</i>, 4e, look at <i>CompTIA Network+ Practice Tests: Exam N10-007</i> (9781119432128).</b></p> <p><b>Todd Lammle's bestselling <i>CompTIA Network+ Study Guide</i> for the N10-007 exam!</b></p> <p>CompTIA's Network+ certification tells the world you have the skills to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols. First, however, you have to pass the exam! This detailed CompTIA Authorized study guide by networking guru Todd Lammle has everything you need to prepare for the CompTIA Network+ Exam N10-007.</p> <p>Todd covers all exam objectives, explains key topics, offers plenty of practical examples, and draws upon his own invaluable 30 years of networking experience to help you learn. The Study Guide prepares you for Exam N10-007, the new CompTIA Network+ Exam:</p> <ul> <li>Covers all exam objectives including network technologies, network installation and configuration, network media and topologies, security, and much more</li> <li>Includes practical examples review questions, as well as access to practice exams and flashcards to reinforce learning</li> <li>Networking guru and expert author Todd Lammle offers valuable insights and tips drawn from real-world experience</li> </ul> <p>Plus, receive one year of FREE access to a robust set of online interactive learning tools, including hundreds of sample practice questions, a pre-assessment test, bonus practice exams, and over 100 electronic flashcards. Prepare for the exam and enhance your career—starting now!</p>
<p>Introduction xxx</p> <p>Assessment Test lxvi</p> <p><b>Chapter 1 Introduction to Networks 1</b></p> <p>First Things First: What’s a Network? 2</p> <p>The Local Area Network 3</p> <p>Common Network Components 5</p> <p>Wide Area Network 7</p> <p>Network Architecture: Peer-to-Peer or Client-Server? 9</p> <p>Physical Network Topologies 11</p> <p>Bus Topology 12</p> <p>Star Topology 13</p> <p>Ring Topology 14</p> <p>Mesh Topology 15</p> <p>Point-to-Point Topology 16</p> <p>Point-to-Multipoint Topology 17</p> <p>Hybrid Topology 18</p> <p>Topology Selection, Backbones, and Segments 19</p> <p>Selecting the Right Topology 19</p> <p>The Network Backbone 20</p> <p>Network Segments 21</p> <p>CAN 21</p> <p>SAN 21</p> <p>Summary 21</p> <p>Exam Essentials 22</p> <p>Written Lab 22</p> <p>Review Questions 23</p> <p><b>Chapter 2 The Open Systems Interconnection Specifications 27</b></p> <p>Internetworking Models 28</p> <p>The Layered Approach 29</p> <p>Advantages of Reference Models 29</p> <p>The OSI Reference Model 30</p> <p>The Application Layer 32</p> <p>The Presentation Layer 33</p> <p>The Session Layer 33</p> <p>The Transport Layer 33</p> <p>The Network Layer 40</p> <p>The Data Link Layer 42</p> <p>The Physical Layer 45</p> <p>Introduction to Encapsulation 45</p> <p>Modulation Techniques 46</p> <p>Summary 47</p> <p>Exam Essentials 48</p> <p>Written Lab 48</p> <p>Review Questions 50</p> <p><b>Chapter 3 Networking Topologies, Connectors, and Wiring Standards 55</b></p> <p>Physical Media 57</p> <p>Coaxial Cable 58</p> <p>Twisted-Pair Cable 60</p> <p>Fiber-Optic Cable 64</p> <p>Transceivers 69</p> <p>Media Converters 69</p> <p>Serial Cables 71</p> <p>Cable Properties 73</p> <p>Transmission Speeds 73</p> <p>Distance 74</p> <p>Duplex 74</p> <p>Noise Immunity (Security, EMI) 74</p> <p>Frequency 75</p> <p>Wiring Standards 75</p> <p>T568A vs. T568B 75</p> <p>Straight-Through Cable 77</p> <p>Crossover Cable 78</p> <p>Rolled/Rollover Cable 80</p> <p>T1 Crossover Cable 80</p> <p>Installing Wiring Distributions 82</p> <p>MDF/IDF 82</p> <p>Summary 84</p> <p>Exam Essentials 85</p> <p>Written Lab 85</p> <p>Review Questions 87</p> <p><b>Chapter 4 The Current Ethernet Specifications 91</b></p> <p>Network Basics 92</p> <p>Ethernet Basics 94</p> <p>Collision Domain 94</p> <p>Broadcast Domain 94</p> <p>CSMA/CD 95</p> <p>Broadband/Baseband 96</p> <p>Bit Rates vs. Baud Rate 97</p> <p>Wavelength 97</p> <p>Half- and Full-Duplex Ethernet 98</p> <p>Ethernet at the Data Link Layer 99</p> <p>Binary to Decimal and Hexadecimal Conversion 100</p> <p>Ethernet Addressing 103</p> <p>Ethernet Frames 104</p> <p>Ethernet at the Physical Layer 106</p> <p>Ethernet over Other Standards (IEEE 1905.1-2013) 111</p> <p>Ethernet over Power Line 112</p> <p>Ethernet over HDMI 113</p> <p>Summary 114</p> <p>Exam Essentials 115</p> <p>Written Lab 115</p> <p>Review Questions 120</p> <p><b>Chapter 5 Networking Devices 125</b></p> <p>Common Network Connectivity Devices 128</p> <p>Network Interface Card 129</p> <p>Hub 130</p> <p>Bridge 131</p> <p>Switch 131</p> <p>Router 132</p> <p>Firewall 136</p> <p>IDS/IPS 137</p> <p>HIDS 137</p> <p>Access Point 138</p> <p>Wireless Range Extender 138</p> <p>Contention Methods 139</p> <p>Dynamic Host Configuration Protocol Server 141</p> <p>IPAM 146</p> <p>Other Specialized Devices 146</p> <p>Multilayer Switch 147</p> <p>Load Balancer 147</p> <p>Domain Name Service Server 148</p> <p>Proxy Server 154</p> <p>Encryption Devices 155</p> <p>Analog Modem 156</p> <p>Packet Shaper 157</p> <p>VPN Concentrator 157</p> <p>Media Converter 158</p> <p>VoIP PBX 158</p> <p>VoIP Endpoint 158</p> <p>NGFW/Layer 7 Firewall 159</p> <p>VoIP Gateway 159</p> <p>Planning and Implementing a Basic SOHO Network Using Network Segmentation 159</p> <p>Determining Requirements 159</p> <p>Switches and Bridges at the Data Link Layer 166</p> <p>Hubs at the Physical Layer 167</p> <p>Environmental Considerations 168</p> <p>Summary 169</p> <p>Exam Essentials 169</p> <p>Written Lab 170</p> <p>Review Questions 171</p> <p><b>Chapter 6 Introduction to the Internet Protocol 175</b></p> <p>Introducing TCP/IP 177</p> <p>A Brief History of TCP/IP 177</p> <p>TCP/IP and the DoD Model 178</p> <p>The Process/Application Layer Protocols 180</p> <p>The Host-to-Host Layer Protocols 188</p> <p>The Internet Layer Protocols 192</p> <p>Data Encapsulation 198</p> <p>Summary 202</p> <p>Exam Essentials 202</p> <p>Written Lab 203</p> <p>Review Questions 204</p> <p><b>Chapter 7 IP Addressing 209</b></p> <p>IP Terminology 210</p> <p>The Hierarchical IP Addressing Scheme 211</p> <p>Network Addressing 212</p> <p>Private IP Addresses (RFC 1918) 216</p> <p>IPv4 Address Types 218</p> <p>Layer 2 Broadcasts 219</p> <p>Layer 3 Broadcasts 219</p> <p>Unicast Address 219</p> <p>Multicast Address (Class D) 219</p> <p>Internet Protocol Version 6 (IPv6) 220</p> <p>Why Do We Need IPv6? 220</p> <p>The Benefits of and Uses for IPv6 221</p> <p>IPv6 Addressing and Expressions 222</p> <p>Shortened Expression 223</p> <p>Address Types 224</p> <p>Special Addresses 225</p> <p>Stateless Autoconfiguration (EUI-64) 226</p> <p>DHCPv6 (Stateful) 227</p> <p>Migrating to IPv6 227</p> <p>Summary 230</p> <p>Exam Essentials 230</p> <p>Written Labs 231</p> <p>Written Lab 7.1 231</p> <p>Written Lab 7.2 232</p> <p>Written Lab 7.3 232</p> <p>Review Questions 233</p> <p><b>Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT 237</b></p> <p>Subnetting Basics 238</p> <p>How to Create Subnets 239</p> <p>Subnet Masks 240</p> <p>Classless Inter-Domain Routing (CIDR) 241</p> <p>Subnetting Class C Addresses 243</p> <p>Subnetting Class B Addresses 253</p> <p>Troubleshooting IP Addressing 260</p> <p>Determining IP Address Problems 263</p> <p>Introduction to Network Address Translation (NAT) 268</p> <p>Types of Network Address Translation 269</p> <p>NAT Names 269</p> <p>How NAT Works 270</p> <p>Summary 272</p> <p>Exam Essentials 272</p> <p>Written Lab 273</p> <p>Review Questions 274</p> <p><b>Chapter 9 Introduction to IP Routing 279</b></p> <p>Routing Basics 280</p> <p>The IP Routing Process 283</p> <p>Testing Your IP Routing Understanding 289</p> <p>Static and Dynamic Routing 291</p> <p>Summary 294</p> <p>Exam Essentials 294</p> <p>Written Lab 294</p> <p>Review Questions 296</p> <p><b>Chapter 10 Routing Protocols 301</b></p> <p>Routing Protocol Basics 302</p> <p>Administrative Distances 303</p> <p>Classes of Routing Protocols 305</p> <p>Distance Vector Routing Protocols 306</p> <p>Routing Information Protocol (RIP) 308</p> <p>RIP Version 2 (RIPv2) 308</p> <p>VLSM and Discontiguous Networks 309</p> <p>EIGRP 312</p> <p>Border Gateway Protocol (BGP) 314</p> <p>Link State Routing Protocols 315</p> <p>Open Shortest Path First (OSPF) 316</p> <p>Intermediate System-to-Intermediate System (IS-IS) 318</p> <p>High Availability 319</p> <p>Hot Standby Router Protocol (HSRP) 321</p> <p>Virtual Router Redundancy Protocol 325</p> <p>Advanced IPv6 Concepts 326</p> <p>Router Advertisement 326</p> <p>Neighbor Discovery 328</p> <p>Tunneling 329</p> <p>Dual Stack 332</p> <p>IPv6 Routing Protocols 332</p> <p>RIPng 333</p> <p>EIGRPv6 333</p> <p>OSPFv3 333</p> <p>Summary 334</p> <p>Exam Essentials 334</p> <p>Written Lab 335</p> <p>Review Questions 336</p> <p><b>Chapter 11 Switching and Virtual LANs 341</b></p> <p>Networking Before Layer 2 Switching 343</p> <p>Switching Services 346</p> <p>Limitations of Layer 2 Switching 347</p> <p>Bridging vs. LAN Switching 348</p> <p>Three Switch Functions at Layer 2 348</p> <p>Distributed Switching 354</p> <p>Spanning Tree Protocol 354</p> <p>Spanning Tree Port States 355</p> <p>STP Convergence 356</p> <p>Rapid Spanning Tree Protocol 802.1w 357</p> <p>Virtual LANs 358</p> <p>VLAN Basics 359</p> <p>Quality of Service 362</p> <p>VLAN Memberships 363</p> <p>Static VLANs 363</p> <p>Dynamic VLANs 364</p> <p>Identifying VLANs 364</p> <p>VLAN Identification Methods 366</p> <p>VLAN Trunking Protocol 367</p> <p>VTP Modes of Operation 368</p> <p>Do We Really Need to Put an IP Address on a Switch? 369</p> <p>Switch Port Protection 372</p> <p>Port Bonding 375</p> <p>Device Hardening 376</p> <p>Two Additional Advanced Features of Switches 376</p> <p>Power over Ethernet (802.3af, 802.3at) 376</p> <p>Port Mirroring/Spanning (SPAN/RSPAN) 379</p> <p>Summary 380</p> <p>Exam Essentials 381</p> <p>Written Lab 381</p> <p>Review Questions 383</p> <p><b>Chapter 12 Wireless Networking 387</b></p> <p>Introduction to Wireless Technology 390</p> <p>Cellular 393</p> <p>The 802.11 Standards 393</p> <p>2.4 GHz (802.11b) 395</p> <p>2.4 GHz (802.11g) 396</p> <p>5 GHz (802.11a) 397</p> <p>5 GHz (802.11h) 397</p> <p>2.4 GHz/5 GHz (802.11n) 398</p> <p>5 GHz (802.11ac) 399</p> <p>Comparing 802.11 Standards 399</p> <p>Range Comparisons 400</p> <p>Wireless Network Components 401</p> <p>Wireless Access Points 401</p> <p>Wireless Network Interface Card 402</p> <p>Wireless Antennas 403</p> <p>Installing a Wireless Network 405</p> <p>Ad Hoc Mode: Independent Basic Service Set 405</p> <p>Infrastructure Mode: Basic Service Set 406</p> <p>Wireless Controllers 407</p> <p>Mobile Hot Spots 409</p> <p>Signal Degradation 410</p> <p>Other Network Infrastructure Implementations 410</p> <p>Technologies that facilitate the Internet of Things (IoT) 412</p> <p>Installing and Configuring WLAN Hardware 412</p> <p>Site Survey 418</p> <p>Providing Capacity 418</p> <p>Multiple Floors 420</p> <p>Location-Based WLAN 421</p> <p>Site Survey Tools 421</p> <p>Wireless Security 422</p> <p>Wireless Threats 422</p> <p>Open Access 426</p> <p>Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication 426</p> <p>Remote Authentication Dial-In User Service (802.1X) 427</p> <p>Temporal Key Integrity Protocol 428</p> <p>Wi-Fi Protected Access or WPA2 Pre-Shared Key 430</p> <p>Summary 433</p> <p>Exam Essentials 433</p> <p>Written Lab 434</p> <p>Review Questions 435</p> <p><b>Chapter 13 Authentication and Access Control 439</b></p> <p>Security Filtering 441</p> <p>Access Control Lists 442</p> <p>Tunneling 443</p> <p>Encryption 451</p> <p>Remote Access 455</p> <p>Managing User Account and Password Security 458</p> <p>Managing User Accounts 459</p> <p>Managing Passwords 461</p> <p>Single Sign-On 465</p> <p>Local Authentication 466</p> <p>LDAP 466</p> <p>Certificates 466</p> <p>Multifactor Authentication 467</p> <p>User-Authentication Methods 468</p> <p>Public Key Infrastructure (PKI) 468</p> <p>Kerberos 469</p> <p>Authentication, Authorization, and Accounting (AAA) 470</p> <p>Web Services 472</p> <p>Unified Voice Services 472</p> <p>Network Controllers 472</p> <p>Network Access Control (NAC) 472</p> <p>Challenge Handshake Authentication Protocol (CHAP) 473</p> <p>MS-CHAP 474</p> <p>Extensible Authentication Protocol (EAP) 474</p> <p>Hashes 474</p> <p>Network Access Control 475</p> <p>Summary 476</p> <p>Exam Essentials 477</p> <p>Written Lab 477</p> <p>Review Questions 479</p> <p><b>Chapter 14 Network Threats and Mitigation 483</b></p> <p>Recognizing Security Threats 485</p> <p>Denial of Service 486</p> <p>Distributed DoS (DDoS) 487</p> <p>Authentication Issues 495</p> <p>Viruses 496</p> <p>Zero-Day Attacks 499</p> <p>Insider Threat/Malicious Employee 500</p> <p>Vulnerabilities 500</p> <p>Exploits vs. Vulnerabilities 500</p> <p>Unnecessary Running Services 500</p> <p>Open Ports 500</p> <p>Unpatched/Legacy Systems 501</p> <p>Unencrypted Channels 501</p> <p>TEMPEST/RF Emanation 501</p> <p>Malicious Users 501</p> <p>Buffer Overflow 503</p> <p>DNS Poisoning 503</p> <p>Wireless Threats 503</p> <p>Attackers and Their Tools 506</p> <p>Misconfiguration Issues 510</p> <p>Social Engineering (Phishing) 511</p> <p>Understanding Mitigation Techniques 512</p> <p>Active Detection 513</p> <p>Passive Detection 513</p> <p>Proactive Defense 513</p> <p>Basic Forensic Concepts 514</p> <p>Policies and Procedures 516</p> <p>Security Policies 517</p> <p>Security Training 524</p> <p>Patches and Upgrades 525</p> <p>Firmware Updates 527</p> <p>Driver Updates 527</p> <p>File Hashing 528</p> <p>Generating New Keys 528</p> <p>Upgrading vs. Downgrading 528</p> <p>Asset Disposal 530</p> <p>Detection 531</p> <p>Anti-malware Software 532</p> <p>Host Based 533</p> <p>Cloud/Server Based 533</p> <p>Configuration Backups 534</p> <p>Updating Antivirus Components 534</p> <p>Fixing an Infected Computer 536</p> <p>Summary 537</p> <p>Exam Essentials 537</p> <p>Written Lab 537</p> <p>Review Questions 539</p> <p><b>Chapter 15 Physical Security and Risk 543</b></p> <p>Using Hardware and Software Security Devices 545</p> <p>Defining Firewalls 547</p> <p>Network-Based Firewalls 548</p> <p>Host-Based Firewalls 548</p> <p>Firewall Technologies 548</p> <p>Access Control Lists 549</p> <p>Port Security 551</p> <p>Demilitarized Zone 552</p> <p>Protocol Switching 553</p> <p>Dynamic Packet Filtering 555</p> <p>Proxy Services 556</p> <p>Firewalls at the Application Layer vs. the Network Layer 558</p> <p>Stateful vs. Stateless Network Layer Firewalls 559</p> <p>NGFW/Layer7 Firewall 560</p> <p>Scanning Services and Other Firewall Features 561</p> <p>Content Filtering 562</p> <p>Signature Identification 563</p> <p>Context Awareness 563</p> <p>Virtual Wire vs. Routed 563</p> <p>Zones 564</p> <p>Intrusion Detection and Prevention Systems 566</p> <p>Network-Based IDS 567</p> <p>Host-Based IDS 569</p> <p>Vulnerability Scanners 570</p> <p>VPN Concentrators 571</p> <p>Understanding Problems Affecting Device Security 572</p> <p>Physical Security 572</p> <p>Logical Security Configurations 577</p> <p>Risk-Related Concepts 579</p> <p>Summary 586</p> <p>Exam Essentials 587</p> <p>Written Lab 588</p> <p>Review Questions 589</p> <p><b>Chapter 16 Wide Area Networks 593</b></p> <p>What’s a WAN? 596</p> <p>Defining WAN Terms 596</p> <p>The Public Switched Telephone Network 598</p> <p>WAN Connection Types 599</p> <p>Bandwidth or Speed 600</p> <p>T-Series Connections 601</p> <p>The T1 Connection 602</p> <p>The T3 Connection 603</p> <p>Transmission Media 603</p> <p>Wired Connections 603</p> <p>Wavelength Division Multiplexing 604</p> <p>Passive Optical Network 605</p> <p>Wireless Technologies 605</p> <p>Broadband Services 607</p> <p>DSL Technology and <i>x</i>DSL 608</p> <p>Cable Modem 610</p> <p>Wireless WAN Technologies 611</p> <p>Cellular WAN 612</p> <p>WAN Protocols 613</p> <p>Integrated Services Digital Network 613</p> <p>Frame Relay Technology 615</p> <p>Point-to-Point Protocol 618</p> <p>DMVPN 621</p> <p>SIP Trunks 621</p> <p>Asynchronous Transfer Mode 622</p> <p>MPLS 623</p> <p>WAN Troubleshooting 623</p> <p>Loss of Internet Connectivity 624</p> <p>Interface Errors/Monitoring 624</p> <p>Split Horizon 627</p> <p>DNS Issues 628</p> <p>Router Configurations 628</p> <p>Company Security Policy 629</p> <p>Summary 629</p> <p>Exam Essentials 630</p> <p>Written Lab 631</p> <p>Review Questions 632</p> <p><b>Chapter 17 Troubleshooting Tools 635</b></p> <p>Protocol Analyzers 637</p> <p>Throughput Testers 638</p> <p>Connectivity Software 639</p> <p>Using <i>traceroute </i>640</p> <p>Using <i>ipconfig </i>and <i>ifconfig </i>642</p> <p>Using the <i>ifconfig </i>Utility 646</p> <p>Using the <i>iptables </i>utility 646</p> <p>Using the <i>ping </i>Utility 647</p> <p>Using the Address Resolution Protocol 650</p> <p>The Windows ARP Table 651</p> <p>Using the <i>arp </i>Utility 651</p> <p>Using the <i>nslookup </i>Utility 654</p> <p>Resolving Names with the Hosts Table 656</p> <p>Using the <i>Mtr </i>Command <i>(pathping) </i>657</p> <p>Using the Nmap Utility 658</p> <p>Using the <i>route </i>Command 659</p> <p>Using the <i>route </i>Command Options 661</p> <p>Some Examples of the <i>route </i>Command 662</p> <p>Using the <i>nbtstat </i>Utility 663</p> <p>The –<i>a </i>Switch 663</p> <p>The –<i>A </i>Switch 665</p> <p>The –<i>c </i>Switch 665</p> <p>The –<i>n </i>Switch 666</p> <p>The –<i>r </i>Switch 666</p> <p>The –<i>R </i>Switch 667</p> <p>The –<i>S </i>Switch 668</p> <p>The –<i>s </i>Switch 668</p> <p>Using the <i>netstat </i>Utility 669</p> <p>The –<i>a </i>Switch 671</p> <p>The –<i>e </i>Switch 672</p> <p>The –<i>r </i>Switch 673</p> <p>The –<i>s </i>Switch 673</p> <p>The –<i>p </i>Switch 673</p> <p>The –<i>n </i>Switch 675</p> <p>Using tcpdump 676</p> <p>Examples of Using <i>tcpdump </i>676</p> <p>Using the File Transfer Protocol 677</p> <p>Starting FTP and Logging In to an FTP Server 678</p> <p>Downloading Files 679</p> <p>Uploading Files 681</p> <p>Using the Telnet Utility 682</p> <p>How to Enable Telnet in Windows 682</p> <p>Don’t Use Telnet, Use Secure Shell 683</p> <p>Summary 684</p> <p>Exam Essentials 684</p> <p>Written Lab 685</p> <p>Review Questions 686</p> <p><b>Chapter 18 Software and Hardware Tools 691</b></p> <p>Understanding Network Scanners 693</p> <p>Packet Sniffers/Network Monitors 693</p> <p>Intrusion Detection and Prevention Software 695</p> <p>Port Scanners 697</p> <p>Wi-Fi Analyzer 700</p> <p>Bandwidth Speed Tester 701</p> <p>Baseline 702</p> <p>Network Monitoring and Logging 703</p> <p>Network Monitoring 703</p> <p>SNMP 704</p> <p>Syslog 705</p> <p>SIEM 707</p> <p>Utilization 710</p> <p>Identifying Hardware Tools 712</p> <p>Cable Testers 712</p> <p>Protocol Analyzer 715</p> <p>Certifiers 716</p> <p>Time-Domain Reflectometer 717</p> <p>Optical Time-Domain Reflectometer 717</p> <p>Multimeter 718</p> <p>Spectrum Analyzer 719</p> <p>Toner Generator (Probe) 720</p> <p>Metrics 721</p> <p>Butt Set 721</p> <p>Punch-Down Tool 722</p> <p>Cable Stripper/Snips 723</p> <p>Voltage Event Recorder (Power) 723</p> <p>Environmental Monitors 724</p> <p>Summary 725</p> <p>Exam Essentials 725</p> <p>Written Lab 726</p> <p>Review Questions 727</p> <p><b>Chapter 19 Network Troubleshooting 731</b></p> <p>Narrowing Down the Problem 734</p> <p>Did You Check the Super Simple Stuff? 735</p> <p>Is Hardware or Software Causing the Problem? 738</p> <p>Is It a Workstation or a Server Problem? 739</p> <p>Which Segments of the Network Are Affected? 740</p> <p>Is It Bad Cabling? 740</p> <p>Troubleshooting Steps 749</p> <p>Step 1: Identify the Problem 750</p> <p>Step 2: Establish a Theory of Probable Cause 754</p> <p>Step 3: Test the Theory to Determine Cause 762</p> <p>Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects 764</p> <p>Step 5: Implement the Solution or Escalate as Necessary 766</p> <p>Step 6: Verify Full System Functionality, and If Applicable, Implement Preventative Measures 769</p> <p>Step 7: Document Findings, Actions, and Outcomes 769</p> <p>Troubleshooting Tips 770</p> <p>Don’t Overlook the Small Stuff 770</p> <p>Prioritize Your Problems 771</p> <p>Check the Software Configuration 771</p> <p>Don’t Overlook Physical Conditions 772</p> <p>Don’t Overlook Cable Problems 772</p> <p>Check for Viruses 773</p> <p>Summary 773</p> <p>Exam Essentials 774</p> <p>Written Lab 774</p> <p>Review Questions 776</p> <p><b>Chapter 20 Management, Monitoring, and Optimization 781</b></p> <p>Managing Network Documentation 785</p> <p>Using SNMP 785</p> <p>Schematics and Diagrams 786</p> <p>Network Monitoring 795</p> <p>Baselines 795</p> <p>Processes 796</p> <p>On-Boarding and Off-Boarding of Mobile Devices 796</p> <p>NAC 796</p> <p>Policies, Procedures, and Regulations 797</p> <p>Safety Practices 801</p> <p>Implementing Network Segmentation 805</p> <p>Network Optimization 808</p> <p>Reasons to Optimize Your Network’s Performance 808</p> <p>How to Optimize Performance 811</p> <p>Unified Communications 813</p> <p>Traffic Shaping 813</p> <p>Load Balancing 814</p> <p>High Availability 814</p> <p>Caching Engines 815</p> <p>Fault Tolerance 815</p> <p>Archives/Backups 815</p> <p>Common Address Redundancy Protocol 816</p> <p>Virtual Networking 817</p> <p>Locating and Installing Equipment 825</p> <p>Change Management Procedures 832</p> <p>Summary 834</p> <p>Exam Essentials 835</p> <p>Written Lab 836</p> <p>Review Questions 837</p> <p><b>Appendix A Answers to Written Labs 841</b></p> <p>Chapter 1: Introduction to Networks 842</p> <p>Chapter 2: The Open Systems Interconnection Specifications 842</p> <p>Chapter 3: Networking Topologies, Connectors, and Wiring Standards 843</p> <p>Chapter 4: The Current Ethernet Specifications 843</p> <p>Chapter 5: Networking Devices 845</p> <p>Chapter 6: Introduction to the Internet Protocol 846</p> <p>Chapter 7: IP Addressing 847</p> <p>Written Lab 7.1 847</p> <p>Written Lab 7.2 847</p> <p>Written Lab 7.3 848</p> <p>Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 848</p> <p>Chapter 9: Introduction to IP Routing 849</p> <p>Chapter 10: Routing Protocols 849</p> <p>Chapter 11: Switching and Virtual LANs 850</p> <p>Chapter 12: Wireless Networking 850</p> <p>Chapter 13: Authentication and Access Control 850</p> <p>Chapter 14: Network Threats and Mitigation 851</p> <p>Chapter 15: Physical Security and Risk 851</p> <p>Chapter 16: Wide Area Networks 852</p> <p>Chapter 17: Troubleshooting Tools 852</p> <p>Chapter 18: Software and Hardware Tools 853</p> <p>Chapter 19: Network Troubleshooting 853</p> <p>Chapter 20: Management, Monitoring, and Optimization 854</p> <p><b>Appendix B Answers to Review Questions 855</b></p> <p>Chapter 1: Introduction to Networks 856</p> <p>Chapter 2: The Open Systems Interconnection Specifications 857</p> <p>Chapter 3: Networking Topologies, Connectors, and Wiring Standards 859</p> <p>Chapter 4: The Current Ethernet Specifications 860</p> <p>Chapter 5: Networking Devices 861</p> <p>Chapter 6: Introduction to the Internet Protocol 863</p> <p>Chapter 7: IP Addressing 864</p> <p>Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 866</p> <p>Chapter 9: Introduction to IP Routing 868</p> <p>Chapter 10: Routing Protocols 869</p> <p>Chapter 11: Switching and Virtual LANs 871</p> <p>Chapter 12: Wireless Networking 872</p> <p>Chapter 13: Authentication and Access Control 874</p> <p>Chapter 14: Network Threats and Mitigation 875</p> <p>Chapter 15: Physical Security and Risk 877</p> <p>Chapter 16: Wide Area Networks 878</p> <p>Chapter 17: Troubleshooting Tools 880</p> <p>Chapter 18: Software and Hardware Tools 881</p> <p>Chapter 19: Network Troubleshooting 883</p> <p>Chapter 20: Management, Monitoring, and Optimization 885</p> <p><b>Appendix C Subnetting Class A 887</b></p> <p>Subnetting Practice Examples: Class A Addresses 888</p> <p>Practice Example #1A: 255.255.0.0 (/16) 888</p> <p>Practice Example #2A: 255.255.240.0 (/20) 889</p> <p>Practice Example #3A: 255.255.255.192 (/26) 889</p> <p>Subnetting in Your Head: Class A Addresses 890</p> <p>Written Lab 1 891</p> <p>Written Lab 2 892</p> <p>Answers to Written Lab 1 892</p> <p>Answers to Written Lab 2 893</p> <p>Index 895</p>
<p><b>Todd Lammle, Network+, CCSI, CCNA, CCNP, </b>is <i>the</i> networking authority. He has been involved in computers and networking with Fortune 500 companies for almost 30 years. Todd is President of GlobalNet System Solutions, Inc., a networking integration and training firm. He is the bestselling author of numerous titles, with over 900,000 copies of his books in print. He can be reached through his website at www.lammle.com.
<p><b>Comprehensive preparation for the CompTIA Network+ exam, with real-world insight and online study tools!</b> <p>The CompTIA Network+ Study Guide is your one-stop resource for the ultimate in exam preparation. Featuring 100 percent coverage of Exam N10-007 objectives, this book walks you through the essentials of network technologies, installation, configuration, media, topologies, security, and more. Networking guru Todd Lammle draws from 30 years of networking experience to explain key topics, backed by practical examples and real-world insights relevant to what you’ll face on the job. The Sybex online interactive learning environment gives you access to electronic flashcards, sample questions, a pre-assessment test, and bonus practice exams to help you prepare thoroughly and go into the exam with confidence! <p><b>Coverage of 100% of all exam objectives in this Study Guide means you’ll be ready for:</b> <ul><li>Network Architecture, Applications, and Devices</li> <li>Routing Protocols, Cloud Technologies, and Implementations</li> <li>Network Monitoring and Performance Tracking</li> <li>WAN, LAN, and Switch Configuration</li> <li>Vulnerability Identification and Threat Assessment</li> <li>Security Controls and Basic Forensics</li ><li>Wireless, Cable, Network, Security, and WAN Troubleshooting</li> <li>Standards, Safety, Ports, and Protocols</li></ul> <p><b>Interactive learning environment</b> <p>Take your exam prep to the next level with Sybex’s superior interactive online study tools. To access our learning environment, simply visit <b>http://www.wiley.com/go/netplustestprep,</b> type in your unique PIN, and instantly gain one year of FREE access to: <ul><li><b>Interactive test bank with 2 practice exams. Practice exams help you identify areas where further review is needed. Get more than 90% of the answers correct, and you’re ready to take the certification exam.</b></li> <li><b>100 electronic flashcards to reinforce learning and last-minute prep before the exam.</b></li> <li><b>Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared.</b></li></ul> <p><B>ABOUT THE COMPTIA NETWORK+ PROGRAM</B> <p>CompTIA’s Network+ is a vendor-neutral networking certification that validates the knowledge and skills to troubleshoot, configure and manage common wired and wireless networks. CompTIA Network+ is accredited by ANSI as meeting the ISO/IEC 17024 standard, and is approved by U.S. Department of Defense (DoD) to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA). Visit www.certification.comptia.org for more information.

Diese Produkte könnten Sie auch interessieren:

Google Earth For Dummies
Google Earth For Dummies
von: David A. Crowder
PDF ebook
19,99 €