Details

CompTIA Network+ Study Guide


CompTIA Network+ Study Guide

Exam N10-008
Sybex Study Guide 5. Aufl.

von: Todd Lammle

36,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 20.09.2021
ISBN/EAN: 9781119811640
Sprache: englisch
Anzahl Seiten: 1040

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Prepare for the Network+ certification and a new career in network installation and administration</b></p> <p>In the newly revised Fifth Edition of<i> CompTIA Network+ Study Guide Exam N10-008</i>, bestselling author and network expert Todd Lammle delivers thorough coverage of how to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols.</p> <p>This book will prepare you to succeed on the sought-after CompTIA Network+ certification exam, impress interviewers in the network industry, and excel in your first role as a junior network administrator, support technician, or related position.</p> <p>The accomplished author draws on his 30 years of networking experience to walk you through the ins and outs of the five functional domains covered by the Network+ Exam N10-008: Networking fundamentals, implementations, operations, security, and troubleshooting. You'll also get:</p> <ul> <li>Complete, domain-specific coverage of the updated Network+ Exam N10-008</li> <li>Preparation to obtain a leading network certification enjoyed by over 350,000 networking professionals</li> <li>Access to Sybex's superior set of online study tools, including practice exams, flashcards, and glossary of key terms, all supported by Wiley's support agents who are available 24x7 via email or live chat to assist with access and login questions</li> </ul> <p>Perfect for anyone preparing for the latest version of the CompTIA Network+ Exam N10-008, the Fifth Edition of <i>CompTIA Network+ Study Guide Exam N10-008</i> is a must-have resource for network administrators seeking to enhance their skillset with foundational skills endorsed by industry and thought leaders from around the world.</p>
<p>Introduction xxxi</p> <p>Assessment Test xli</p> <p><b>Chapter 1 Introduction to Networks 1</b></p> <p>First Things First: What’s a Network? 3</p> <p>The Local Area Network 4</p> <p>Common Network Components 6</p> <p>Metropolitan Area Network 9</p> <p>Wide Area Network 9</p> <p>Personal Area Network 10</p> <p>Campus Area Network 10</p> <p>Storage Area Network 10</p> <p>Software-Defined Wide Area Network 11</p> <p>Multiprotocol Label Switching 11</p> <p>Multipoint Generic Routing Encapsulation 12</p> <p>Network Architecture: Peer-to-Peer or Client-Server? 12</p> <p>Physical Network Topologies 14</p> <p>Bus Topology 14</p> <p>Star Topology 15</p> <p>Ring Topology 17</p> <p>Mesh Topology 17</p> <p>Point-to-Point Topology 18</p> <p>Point-to-Multipoint Topology 19</p> <p>Hybrid Topology 20</p> <p>Topology Selection, Backbones, and Segments 21</p> <p>Selecting the Right Topology 22</p> <p>The Network Backbone 22</p> <p>Network Segments 23</p> <p>Service-Related Entry Points 23</p> <p>Service Provider Links 23</p> <p>Virtual Networking 24</p> <p>Summary 24</p> <p>Exam Essentials 25</p> <p>Written Lab 25</p> <p>Review Questions 26</p> <p><b>Chapter 2 The Open Systems Interconnection Specifications 31</b></p> <p>Internetworking Models 32</p> <p>The Layered Approach 33</p> <p>Advantages of Reference Models 33</p> <p>The OSI Reference Model 34</p> <p>The Application Layer 36</p> <p>The Presentation Layer 37</p> <p>The Session Layer 37</p> <p>The Transport Layer 37</p> <p>The Network Layer 43</p> <p>The Data Link Layer 46</p> <p>The Physical Layer 48</p> <p>Introduction to Encapsulation 49</p> <p>Modulation Techniques 50</p> <p>Summary 51</p> <p>Exam Essentials 51</p> <p>Written Lab 52</p> <p>Review Questions 53</p> <p><b>Chapter 3 Networking Connectors and Wiring Standards 57</b></p> <p>Physical Media 59</p> <p>Coaxial Cable 60</p> <p>Twisted-Pair Cable 62</p> <p>Twinaxial Cable 62</p> <p>Fiber-Optic Cable 66</p> <p>Transceivers 71</p> <p>Media Converters 72</p> <p>Serial Cables 74</p> <p>Cable Properties 76</p> <p>Transmission Speeds 76</p> <p>Distance 76</p> <p>Duplex 77</p> <p>Noise Immunity (Security, EMI) 77</p> <p>Frequency 77</p> <p>Wiring Standards 78</p> <p>T568A vs. T568B 78</p> <p>Straight-Through Cable 80</p> <p>Crossover Cable 81</p> <p>Rolled/Rollover Cable 83</p> <p>T1 Crossover Cable 83</p> <p>Installing Wiring Distributions 85</p> <p>MDF/IDF 85</p> <p>Summary 87</p> <p>Exam Essentials 88</p> <p>Written Lab 88</p> <p>Review Questions 89</p> <p><b>Chapter 4 The Current Ethernet Specifications 93</b></p> <p>Network Basics 94</p> <p>Ethernet Basics 96</p> <p>Collision Domain 96</p> <p>Broadcast Domain 97</p> <p>CSMA/CD 97</p> <p>Broadband/Baseband 99</p> <p>Bit Rates vs. Baud Rate 99</p> <p>Wavelength 99</p> <p>Half-and Full-Duplex Ethernet 100</p> <p>Ethernet at the Data Link Layer 102</p> <p>Binary to Decimal and Hexadecimal Conversion 102</p> <p>Ethernet Addressing 106</p> <p>Ethernet Frames 107</p> <p>Ethernet at the Physical Layer 109</p> <p>Ethernet over Other Standards (IEEE 1905.1-2013) 115</p> <p>Ethernet over Power Line 115</p> <p>Ethernet over HDMI 117</p> <p>Bidirectional Wavelength-Division Multiplexing (WDM) 117</p> <p>Course Wavelength-Division Multiplexing (CWDM) 117</p> <p>Dense Wavelength-Division Multiplexing (DWDM) 117</p> <p>Summary 118</p> <p>Exam Essentials 119</p> <p>Written Lab 119</p> <p>Review Questions 124</p> <p><b>Chapter 5 Networking Devices 129</b></p> <p>Common Network Connectivity Devices 132</p> <p>Network Interface Card 133</p> <p>Hub 135</p> <p>Bridge 135</p> <p>Switch 136</p> <p>Router 137</p> <p>Firewall 141</p> <p>IDS/IPS 142</p> <p>HIDS 142</p> <p>Access Point 142</p> <p>Wireless Range Extender 143</p> <p>Wireless LAN Controller 143</p> <p>Load Balancer 144</p> <p>Contention Methods 144</p> <p>Dynamic Host Configuration Protocol Server 147</p> <p>IPAM 152</p> <p>Other Specialized Devices 152</p> <p>Multilayer Switch 153</p> <p>Domain Name Service Server 153</p> <p>Network Time Protocol 160</p> <p>Proxy Server 160</p> <p>Encryption and Content Filtering 162</p> <p>Analog Modem 163</p> <p>Packet Shaper 164</p> <p>VPN Concentrator/Headend 164</p> <p>Media Converter 165</p> <p>VoIP PBX 165</p> <p>VoIP Endpoint 166</p> <p>NGFW/Layer 7 Firewall 166</p> <p>VoIP Gateway 166</p> <p>Cable Modem 166</p> <p>DSL Modem 166</p> <p>Networked Devices 167</p> <p>VoIP Phones 167</p> <p>Printers 167</p> <p>Physical Access Control Devices 167</p> <p>Cameras 167</p> <p>Heating Ventilation, and Air Conditioning (HVAC) Sensors 167</p> <p>Internet of Things (IoT) 168</p> <p>Industrial Control Systems 168</p> <p>Planning and Implementing a Basic SOHO Network Using Network Segmentation 168</p> <p>Determining Requirements 169</p> <p>Switches and Bridges at the Data Link Layer 175</p> <p>Hubs at the Physical Layer 177</p> <p>Environmental Considerations 178</p> <p>Summary 178</p> <p>Exam Essentials 179</p> <p>Written Lab 180</p> <p>Review Questions 181</p> <p><b>Chapter 6 Introduction to the Internet Protocol 185</b></p> <p>Introducing TCP/IP 188</p> <p>A Brief History of TCP/IP 188</p> <p>TCP/IP and the DoD Model 189</p> <p>The Process/Application Layer Protocols 191</p> <p>The Host-to-Host Layer Protocols 204</p> <p>The Internet Layer Protocols 210</p> <p>Data Encapsulation 220</p> <p>Summary 224</p> <p>Exam Essentials 224</p> <p>Written Lab 225</p> <p>Review Questions 226</p> <p><b>Chapter 7 IP Addressing 231</b></p> <p>IP Terminology 233</p> <p>The Hierarchical IP Addressing Scheme 234</p> <p>Network Addressing 235</p> <p>Private IP Addresses (RFC 1918) 239</p> <p>IPv4 Address Types 241</p> <p>Layer 2 Broadcasts 242</p> <p>Layer 3 Broadcasts 242</p> <p>Unicast Address 243</p> <p>Multicast Address (Class D) 243</p> <p>Internet Protocol Version 6 (IPv6) 243</p> <p>Why Do We Need IPv6? 244</p> <p>The Benefits of and Uses for IPv6 244</p> <p>IPv6 Addressing and Expressions 246</p> <p>Shortened Expression 246</p> <p>Address Types 247</p> <p>Special Addresses 248</p> <p>Stateless Address Autoconfiguration (SLAAC) 249</p> <p>DHCPv6 (Stateful) 251</p> <p>Migrating to IPv6 251</p> <p>Summary 253</p> <p>Exam Essentials 254</p> <p>Written Labs 255</p> <p>Written Lab 7.1 255</p> <p>Written Lab 7.2 255</p> <p>Review Questions 257</p> <p><b>Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT 261</b></p> <p>Subnetting Basics 263</p> <p>How to Create Subnets 264</p> <p>Subnet Masks 265</p> <p>Classless Inter-Domain Routing (CIDR) 266</p> <p>Subnetting Class C Addresses 268</p> <p>Subnetting Class B Addresses 278</p> <p>Troubleshooting IP Addressing 286</p> <p>Determining IP Address Problems 289</p> <p>Introduction to Network Address Translation (NAT) 294</p> <p>Types of Network Address Translation 295</p> <p>NAT Names 295</p> <p>How NAT Works 296</p> <p>Summary 298</p> <p>Exam Essentials 298</p> <p>Written Lab 299</p> <p>Review Questions 300</p> <p><b>Chapter 9 Introduction to IP Routing 305</b></p> <p>Routing Basics 306</p> <p>The IP Routing Process 309</p> <p>Testing Your IP Routing Understanding 315</p> <p>Static and Dynamic Routing 316</p> <p>Summary 319</p> <p>Exam Essentials 319</p> <p>Written Lab 320</p> <p>Review Questions 321</p> <p><b>Chapter 10 Routing Protocols 325</b></p> <p>Routing Protocol Basics 326</p> <p>Administrative Distances 327</p> <p>Classes of Routing Protocols 329</p> <p>Distance-Vector Routing Protocols 330</p> <p>Routing Information Protocol (RIP) 332</p> <p>RIP Version 2 (RIPv2) 332</p> <p>VLSMs and Discontiguous Networks 333</p> <p>EIGRP 336</p> <p>Border Gateway Protocol (BGP) 338</p> <p>Link-State Routing Protocols 340</p> <p>Open Shortest Path First (OSPF) 340</p> <p>Intermediate System-to-Intermediate System (IS-IS) 343</p> <p>High Availability 344</p> <p>Hot Standby Router Protocol (HSRP) 346</p> <p>Virtual Router Redundancy Protocol 350</p> <p>Advanced IPv6 Concepts 351</p> <p>Router Advertisement 351</p> <p>Neighbor Discovery Protocol 353</p> <p>Tunneling 354</p> <p>Dual Stack 357</p> <p>IPv6 Routing Protocols 357</p> <p>RIPng 358</p> <p>EIGRPv6 358</p> <p>OSPFv3 359</p> <p>Summary 359</p> <p>Exam Essentials 359</p> <p>Written Lab 360</p> <p>Review Questions 361</p> <p><b>Chapter 11 Switching and Virtual LANs 365</b></p> <p>Networking Before Layer 2 Switching 367</p> <p>Switching Services 370</p> <p>Limitations of Layer 2 Switching 371</p> <p>Bridging vs. LAN Switching 372</p> <p>Three Switch Functions at Layer 2 372</p> <p>Distributed Switching 378</p> <p>Spanning Tree Protocol 378</p> <p>Spanning Tree Port States 379</p> <p>STP Convergence 380</p> <p>Rapid Spanning Tree Protocol 802.1w 381</p> <p>Virtual LANs 382</p> <p>VLAN Basics 383</p> <p>Quality of Service 386</p> <p>VLAN Memberships 387</p> <p>Static VLANs 387</p> <p>Dynamic VLANs 388</p> <p>Identifying VLANs 388</p> <p>VLAN Identification Methods 390</p> <p>VLAN Trunking Protocol 392</p> <p>VTP Modes of Operation 393</p> <p>Do We Really Need to Put an IP Address on a Switch? 394</p> <p>Switch Port Protection 396</p> <p>Port Bonding 399</p> <p>Device Hardening 401</p> <p>Two Additional Advanced Features of Switches 401</p> <p>Power over Ethernet (802.3af, 802.3at) 401</p> <p>Port Mirroring/Spanning (SPAN/RSPAN) 404</p> <p>Summary 405</p> <p>Exam Essentials 406</p> <p>Written Lab 406</p> <p>Review Questions 408</p> <p><b>Chapter 12 Wireless Networking 413</b></p> <p>Introduction to Wireless Technology 415</p> <p>Cellular Technologies 418</p> <p>The 802.11 Standards (Regulatory Impacts) 419</p> <p>2.4 GHz (802.11b) 421</p> <p>2.4 GHz (802.11g) 422</p> <p>5 GHz (802.11a) 423</p> <p>5 GHz (802.11h) 424</p> <p>2.4 GHz/5 GHz (802.11n) 425</p> <p>5 GHz (802.11ac) 426</p> <p>WiFi 6 (802.11ax) 426</p> <p>Comparing 802.11 Standards 427</p> <p>Range and Speed Comparisons 428</p> <p>Wireless Network Components 428</p> <p>Wireless Access Points 429</p> <p>Wireless Network Interface Card 430</p> <p>Wireless Antennas 431</p> <p>Installing a Wireless Network 432</p> <p>Ad Hoc Mode: Independent Basic Service Set 432</p> <p>Infrastructure Mode: Basic Service Set 433</p> <p>Wireless Controllers 434</p> <p>Mobile Hot Spots 436</p> <p>Signal Degradation 438</p> <p>Other Network Infrastructure Implementations 438</p> <p>Technologies That Facilitate the Internet of Things (IoT) 440</p> <p>Installing and Configuring WLAN Hardware 441</p> <p>Site Survey 447</p> <p>Providing Capacity 448</p> <p>Multiple Floors 449</p> <p>Location-Based WLAN 450</p> <p>Site Survey Tools 450</p> <p>Wireless Security 451</p> <p>Wireless Threats 451</p> <p>Open Access 455</p> <p>Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication 455</p> <p>Remote Authentication Dial-In User Service (802.1X) 457</p> <p>Temporal Key Integrity Protocol 458</p> <p>Wi-Fi Protected Access or WPA2 Pre-Shared Key 459</p> <p>Summary 462</p> <p>Exam Essentials 462</p> <p>Written Lab 464</p> <p>Review Questions 465</p> <p><b>Chapter 13 Using Statistics and Sensors to Ensure Network Availability 469</b></p> <p>Performance Metrics/Sensors 471</p> <p>Device/Chassis 471</p> <p>Network Metrics 473</p> <p>SNMP 474</p> <p>Traps 475</p> <p>Object Identifiers (OIDs) 476</p> <p>Management Information Bases (MIBs) 476</p> <p>Network Device Logs 476</p> <p>Log Reviews 476</p> <p>Logging Levels/Severity Levels 480</p> <p>Interface Statistics/Status 482</p> <p>Link State (Up/Down) 482</p> <p>Speed/Duplex 483</p> <p>Send/Receive Traffic 484</p> <p>Cyclic Redundancy Checks (CRCs) 485</p> <p>Protocol Packet and Byte Counts 486</p> <p>Interface Errors or Alerts 486</p> <p>CRC Errors 487</p> <p>Giants and Runts 488</p> <p>Encapsulation Errors 488</p> <p>Environmental Factors and Sensors 489</p> <p>Temperature 489</p> <p>Humidity 489</p> <p>Electrical 490</p> <p>Flooding 495</p> <p>Baselines 495</p> <p>NetFlow Data 496</p> <p>NetFlow Overview and Flows 496</p> <p>Uptime/Downtime 498</p> <p>Summary 498</p> <p>Exam Essentials 498</p> <p>Written Lab 499</p> <p>Review Questions 501</p> <p><b>Chapter 14 Organizational Documents and Policies 505</b></p> <p>Plans and Procedures 507</p> <p>Change Management 508</p> <p>Incident Response Plan 510</p> <p>Disaster Recovery Plan 510</p> <p>Business Continuity Plan 510</p> <p>System Life Cycle 511</p> <p>Standard Operating Procedures 511</p> <p>Hardening and Security Policies 511</p> <p>Acceptable Use Policy 512</p> <p>Password Policy 512</p> <p>Bring Your Own Device (BYOD) Policy 513</p> <p>Remote Access Policy 513</p> <p>Onboarding and Offboarding Policy 513</p> <p>Security Policy 514</p> <p>Data Loss Prevention 519</p> <p>Common Documentation 519</p> <p>Physical Network Diagram 520</p> <p>Logical Network Diagram 524</p> <p>Wiring Diagram 525</p> <p>Site Survey Report 526</p> <p>Audit and Assessment Report 526</p> <p>Baseline Configurations 527</p> <p>Common Agreements 528</p> <p>Nondisclosure Agreement (NDA) 528</p> <p>Service-Level Agreement (SLA) 529</p> <p>Memorandum of Understanding (MOU) 529</p> <p>Summary 529</p> <p>Exam Essentials 529</p> <p>Written Lab 530</p> <p>Review Questions 531</p> <p><b>Chapter 15 High Availability and Disaster Recovery 533</b></p> <p>Load Balancing 535</p> <p>Multipathing 536</p> <p>Network Interface Card (NIC) Teaming 537</p> <p>Redundant Hardware/Clusters 538</p> <p>Switches 538</p> <p>Routers 540</p> <p>Firewalls 542</p> <p>Facilities and Infrastructure Support 542</p> <p>Uninterruptible Power Supply (UPS) 542</p> <p>Power Distribution Units (PDUs) 543</p> <p>Generator 543</p> <p>HVAC 544</p> <p>Fire Suppression 544</p> <p>Redundancy and High Availability (HA) Concepts 545</p> <p>Recovery Sites 545</p> <p>Cold Site 545</p> <p>Warm Site 545</p> <p>Hot Site 546</p> <p>Cloud Site 546</p> <p>Active/Active vs. Active/Passive 546</p> <p>Mean Time to Repair (MTTR) 553</p> <p>Mean Time Between Failure (MTBF) 554</p> <p>Recovery Time Objective (RTO) 554</p> <p>Recovery Point Objective (RPO) 554</p> <p>Network Device Backup/Restore 554</p> <p>State/Configuration 554</p> <p>Summary 555</p> <p>Exam Essentials 555</p> <p>Written Lab 556</p> <p>Review Questions 557</p> <p><b>Chapter 16 Common Security Concepts 559</b></p> <p>Confidentiality, Integrity, and Availability (CIA) 561</p> <p>Confidentiality 561</p> <p>Integrity 561</p> <p>Availability 562</p> <p>Threats 562</p> <p>Internal 562</p> <p>External 562</p> <p>Vulnerabilities 562</p> <p>Common Vulnerabilities and Exposures (CVE) 563</p> <p>Zero-Day 563</p> <p>Exploits 563</p> <p>Least Privilege 563</p> <p>Role-Based                               </p> <p>Access 564</p> <p>Zero Trust 564</p> <p>Defense in Depth 564</p> <p>Network Segmentation Enforcement 564</p> <p>Screened Subnet (aka Demilitarized Zone) 565</p> <p>Separation of Duties 565</p> <p>Network Access Control 566</p> <p>Honeypot 567</p> <p>Authentication Methods 567</p> <p>Multifactor 567</p> <p>Authentication, Authorization, and Accounting (AAA) 568</p> <p>Remote Authentication Dial-In User Service (RADIUS) 568</p> <p>Terminal Access Controller Access Control System Plus (TACACS+) 568</p> <p>Single Sign-On (SSO) 570</p> <p>LDAP 570</p> <p>Kerberos 570</p> <p>Local Authentication 571</p> <p>802.1X 571</p> <p>Extensible Authentication Protocol (EAP) 572</p> <p>Security Risk Assessments 573</p> <p>Threat Assessment 573</p> <p>Vulnerability Assessment 574</p> <p>Penetration Testing 575</p> <p>Business Risk Assessments 575</p> <p>Security Information and Event Management (SIEM) 576</p> <p>Notifications 576</p> <p>Summary 576</p> <p>Exam Essentials 577</p> <p>Written Lab 577</p> <p>Review Questions 578</p> <p><b>Chapter 17 Common Types of Attacks 581</b></p> <p>Technology-Based Attacks 582</p> <p>Denial of Service (DoS)/Distributed Denial of Service (DDoS) 583</p> <p>On-Path Attack (Previously Known as Man-in-the-Middle Attack) 588</p> <p>DNS Poisoning 589</p> <p>VLAN Hopping 589</p> <p>ARP Spoofing 590</p> <p>Rogue DHCP 590</p> <p>Rogue Access Point (AP) 591</p> <p>Evil Twin 592</p> <p>Ransomware 593</p> <p>Password Attacks 593</p> <p>MAC Spoofing 594</p> <p>IP Spoofing 594</p> <p>Deauthentication 594</p> <p>Malware 594</p> <p>Human and Environmental 598</p> <p>Social Engineering 598</p> <p>Phishing 599</p> <p>Environmental 599</p> <p>Summary 600</p> <p>Exam Essentials 600</p> <p>Written Lab 601</p> <p>Review Questions 602</p> <p><b>Chapter 18 Network Hardening Techniques 605</b></p> <p>Best Practices 607</p> <p>Secure SNMP 608</p> <p>Router Advertisement (RA) Guard 608</p> <p>Port Security 608</p> <p>Dynamic ARP Inspection 609</p> <p>Control Plane Policing 609</p> <p>Private VLANs 609</p> <p>Disable Unneeded Switchports 610</p> <p>Disable Unneeded Network Services 610</p> <p>Change Default Passwords 610</p> <p>Password Complexity/Length 610</p> <p>Enable DHCP Snooping 613</p> <p>Change Default VLAN 613</p> <p>Patch and Firmware Management 614</p> <p>Access Control List 615</p> <p>Role-Based Access 616</p> <p>Firewall Rules 617</p> <p>Wireless Security 618</p> <p>MAC Filtering 618</p> <p>Antenna Placement 618</p> <p>Power Levels 619</p> <p>Wireless Client Isolation 619</p> <p>Guest Network Isolation 620</p> <p>Preshared Keys (PSKs) 620</p> <p>EAP 620</p> <p>Geofencing 620</p> <p>Captive Portal 621</p> <p>IoT Access Considerations 621</p> <p>Summary 621</p> <p>Exam Essentials 621</p> <p>Written Lab 622</p> <p>Review Questions 623</p> <p><b>Chapter 19 Remote Access Security 625</b></p> <p>Site-to-Site VPN 626</p> <p>Client-to-Site VPN 626</p> <p>Clientless VPN 627</p> <p>Split Tunnel vs. Full Tunnel 628</p> <p>Remote Desktop Connection 628</p> <p>Remote Desktop Gateway 629</p> <p>SSH 630</p> <p>Virtual Network Computing (VNC) 630</p> <p>Virtual Desktop 631</p> <p>Authentication and Authorization Considerations 631</p> <p>In-Band vs. Out-of-Band Management 631</p> <p>Summary 632</p> <p>Exam Essentials 632</p> <p>Written Lab 632</p> <p>Review Questions 634</p> <p>Chapter 20 Physical Security 637</p> <p>Detection Methods 639</p> <p>Cameras 639</p> <p>Motion Detection 640</p> <p>Asset Tags 641</p> <p>Tamper Detection 641</p> <p>Prevention Methods 642</p> <p>Employee Training 642</p> <p>Access Control Hardware 643</p> <p>Locking Racks 643</p> <p>Locking Cabinets 644</p> <p>Access Control Vestibule (Previously Known as a Mantrap) 644</p> <p>Smart Lockers 645</p> <p>Asset Disposal 646</p> <p>Factory Reset/Wipe Configuration 646</p> <p>Sanitize Devices for Disposal 646</p> <p>Summary 647</p> <p>Exam Essentials 647</p> <p>Written Lab 648</p> <p>Review Questions 649</p> <p><b>Chapter 21 Data Center Architecture and Cloud Concepts 651</b></p> <p>Data Center Network Architectures 654</p> <p>Access/Edge Layer 654</p> <p>Distribution Layer 655</p> <p>Core Layer 655</p> <p>Software-Defined Networking 655</p> <p>Application Layer 656</p> <p>Control Layer 656</p> <p>Infrastructure Layer 656</p> <p>Management Plane 656</p> <p>Spine-Leaf–Based Two-Tier Networks 657</p> <p>Top-of-Rack Switching 658</p> <p>Backbone 658</p> <p>Traffic Flows 658</p> <p>North-South 659</p> <p>East-West 659</p> <p>Branch Office vs. On-premises Data Center vs. Colocation 660</p> <p>Cloud Computing and Its Effect on the Enterprise Network 661</p> <p>Service Models 663</p> <p>Overview of Network Programmability in Enterprise Network 665</p> <p>Software-Defined Networking 666</p> <p>Application Programming Interfaces (APIs) 666</p> <p>Southbound APIs 667</p> <p>Northbound APIs 669</p> <p>Managing Network Documentation 670</p> <p>Using SNMP 670</p> <p>Schematics and Diagrams 671</p> <p>Network Monitoring 676</p> <p>Baselines 676</p> <p>Processes 676</p> <p>Onboarding and Offboarding of Mobile Devices 677</p> <p>NAC 677</p> <p>Policies, Procedures, and Regulations 677</p> <p>Safety Practices 681</p> <p>Implementing Network Segmentation 686</p> <p>Network Optimization 689</p> <p>Reasons to Optimize Your Network’s Performance 689</p> <p>How to Optimize Performance 691</p> <p>Unified Communications 694</p> <p>Traffic Shaping 694</p> <p>Load Balancing 695</p> <p>High Availability 695</p> <p>Caching Engines 695</p> <p>Fault Tolerance 696</p> <p>Archives/Backups 696</p> <p>Common Address Redundancy Protocol 697</p> <p>Virtual Networking 697</p> <p>Locating and Installing Equipment 708</p> <p>Change Management Procedures 715</p> <p>Summary 717</p> <p>Exam Essentials 719</p> <p>Written Lab 720</p> <p>Review Questions 721</p> <p><b>Chapter 22 Ensuring Network Availability 725</b></p> <p>Performance Metrics/Sensors 727</p> <p>Network Metrics 728</p> <p>SNMP 729</p> <p>Network Device Logs 731</p> <p>Interface Statistics/Status 733</p> <p>Interface Errors 734</p> <p>Environmental Factors and Sensors 735</p> <p>Baseline 736</p> <p>NetFlow 737</p> <p>Uptime 738</p> <p>Downtime 738</p> <p>Summary 739</p> <p>Exam Essentials 739</p> <p>Written Lab 740</p> <p>Review Questions 741</p> <p><b>Chapter 23 Cable Connectivity Issues and Tools 745</b></p> <p>Specifications and Limitations 747</p> <p>Cable Considerations 747</p> <p>Cable Applications 748</p> <p>Common Issues 749</p> <p>Identifying Hardware Tools 751</p> <p>Cable Testers 752</p> <p>Protocol Analyzer 755</p> <p>Certifiers 755</p> <p>Time-Domain Reflectometer 756</p> <p>Optical Time-Domain Reflectometer 756</p> <p>Multimeter 757</p> <p>Spectrum Analyzer 758</p> <p>Toner Generator (Probe) 759</p> <p>Tap 760</p> <p>Metrics 760</p> <p>Butt Set 761</p> <p>Punch-Down Tool 761</p> <p>Cable Snips/Cutters 763</p> <p>Voltage Event Recorder (Power) 763</p> <p>Fiber Light Meter 764</p> <p>Fiber Fusion Splicer 764</p> <p>Summary 765</p> <p>Exam Essentials 765</p> <p>Written Lab 766</p> <p>Review Questions 767</p> <p><b>Chapter 24 Network Troubleshooting Methodology 771</b></p> <p>Narrowing Down the Problem 775</p> <p>Did You Check the Super Simple Stuff? 776</p> <p>Is Hardware or Software Causing the Problem? 780</p> <p>Is It a Workstation or a Server Problem? 781</p> <p>Which Segments of the Network Are Affected? 781</p> <p>Is It Bad Cabling? 782</p> <p>Troubleshooting Steps 791</p> <p>Step 1: Identify the Problem 792</p> <p>Step 2: Establish a Theory of Probable Cause 796</p> <p>Step 3: Test the Theory to Determine Cause 806</p> <p>Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects 809</p> <p>Step 5: Implement the Solution or Escalate as Necessary 810</p> <p>Step 6: Verify Full System Functionality, and If Applicable, Implement Preventative Measures 813</p> <p>Step 7: Document Findings, Actions, Outcomes, and Lessons Learned 814</p> <p>Troubleshooting Tips 815</p> <p>Don’t Overlook the Small Stuff 815</p> <p>Prioritize Your Problems 815</p> <p>Check the Software Configuration 816</p> <p>Don’t Overlook Physical Conditions 817</p> <p>Don’t Overlook Cable Problems 817</p> <p>Check for Viruses 818</p> <p>Summary 818</p> <p>Exam Essentials 818</p> <p>Written Lab 819</p> <p>Review Questions 821</p> <p><b>Chapter 25 Network Software Tools and Commands 825</b></p> <p>Software Tools 827</p> <p>Wi-Fi Analyzers 827</p> <p>Protocol Analyzer/Packet Capture 828</p> <p>Bandwidth Speed Testers 829</p> <p>Port Scanners 830</p> <p>NetFlow Analyzers 830</p> <p>Trivial File Transfer Protocol (TFTP) Server 831</p> <p>Connectivity Software 831</p> <p>IP Scanner 832</p> <p>Using <i>traceroute </i>833</p> <p>Using ipconfig, ifconfig, and ip 836</p> <p>Using the <i>ipconfig </i>Utility 836</p> <p>Using the <i>ifconfig </i>Utility 840</p> <p>Using the <i>ip </i>Utility 840</p> <p>Using the <i>iptables </i>Utility 841</p> <p>Examples of <i>iptables </i>841</p> <p>Using the <i>ping </i>Utility 841</p> <p>Using the Address Resolution Protocol 845</p> <p>The Windows ARP Table 845</p> <p>Using the <i>arp </i>Utility 846</p> <p>Using the <i>nslookup </i>Utility 849</p> <p>Resolving Names with the Hosts File 850</p> <p>Using the <i>Mtr </i>Command <i>(pathping) </i>852</p> <p>Using the Nmap Utility 853</p> <p>Using the <i>route </i>Command 854</p> <p>Using the <i>route </i>Command Options 854</p> <p>Some Examples of the <i>route </i>Command 857</p> <p>Using the <i>nbtstat </i>Utility 857</p> <p>The –<i>a </i>Switch 858</p> <p>The –<i>A </i>Switch 860</p> <p>The –<i>c </i>Switch 860</p> <p>The –<i>n </i>Switch 860</p> <p>The –<i>r </i>Switch 861</p> <p>The –<i>R </i>Switch 862</p> <p>The –<i>S </i>Switch 862</p> <p>The –<i>s </i>Switch 863</p> <p>Using the <i>netstat </i>Utility 863</p> <p>The –<i>a </i>Switch 866</p> <p>The –<i>e </i>Switch 866</p> <p>The –<i>r </i>Switch 867</p> <p>The –<i>s </i>Switch 867</p> <p>The –<i>p </i>Switch 868</p> <p>The –<i>n </i>Switch 869</p> <p>Using <i>tcpdump </i>871</p> <p>Examples of Using <i>tcpdump </i>871</p> <p>Using the File Transfer Protocol 871</p> <p>Starting FTP and Logging In to an FTP Server 872</p> <p>Downloading Files 874</p> <p>Uploading Files 876</p> <p>Using the Telnet Utility 876</p> <p>How to Enable Telnet in Windows 877</p> <p>Don’t Use Telnet, Use Secure Shell 878</p> <p>Summary 878</p> <p>Exam Essentials 879</p> <p>Written Lab 880</p> <p>Review Questions 881</p> <p><b>Appendix A Answers to Written Labs 887</b></p> <p>Chapter 1: Introduction to Networks 888</p> <p>Chapter 2: The Open Systems Interconnection Specifications 888</p> <p>Chapter 3: Networking Connectors and Wiring Standards 889</p> <p>Chapter 4: The Current Ethernet Specifications 889</p> <p>Chapter 5: Networking Devices 891</p> <p>Chapter 6: Introduction to the Internet Protocol 892</p> <p>Chapter 7: IP Addressing 893</p> <p>Written Lab 7.1 893</p> <p>Written Lab 7.2 893</p> <p>Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 894</p> <p>Chapter 9: Introduction to IP Routing 895</p> <p>Chapter 10: Routing Protocols 895</p> <p>Chapter 11: Switching and Virtual LANs 895</p> <p>Chapter 12: Wireless Networking 896</p> <p>Chapter 13: Using Statistics and Sensors to Ensure Network Availability 896</p> <p>Chapter 14: Organizational Documents and Policies 897</p> <p>Chapter 15: High Availability and Disaster Recovery 898</p> <p>Chapter 16: Common Security Concepts 898</p> <p>Chapter 17: Common Types of Attacks 899</p> <p>Chapter 18: Network Hardening Techniques 899</p> <p>Chapter 19: Remote Access Security 900</p> <p>Chapter 20: Physical Security 900</p> <p>Chapter 21: Data Center Architecture and Cloud Concepts 901</p> <p>Chapter 22: Ensuring Network Availability 901</p> <p>Chapter 23: Cable Connectivity Issues and Tools 902</p> <p>Chapter 24: Network Troubleshooting Methodology 902</p> <p>Chapter 25: Network Software Tools and Commands 903</p> <p><b>Appendix B Answers to Review Questions 905</b></p> <p>Chapter 1: Introduction to Networks 906</p> <p>Chapter 2: The Open Systems Interconnection Specifications 907</p> <p>Chapter 3: Networking Connectors and Wiring Standards 909</p> <p>Chapter 4: The Current Ethernet Specifications 910</p> <p>Chapter 5: Networking Devices 911</p> <p>Chapter 6: Introduction to the Internet Protocol 913</p> <p>Chapter 7: IP Addressing 914</p> <p>Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 916</p> <p>Chapter 9: Introduction to IP Routing 918</p> <p>Chapter 10: Routing Protocols 919</p> <p>Chapter 11: Switching and Virtual LANs 921</p> <p>Chapter 12: Wireless Networking 922</p> <p>Chapter 13: Using Statistics and Sensors to Ensure Network Availability 924</p> <p>Chapter 14: Organizational Documents and Policies 925</p> <p>Chapter 15: High Availability and Disaster Recovery 926</p> <p>Chapter 16: Common Security Concepts 927</p> <p>Chapter 17: Common Types of Attacks 927</p> <p>Chapter 18: Network Hardening Techniques 928</p> <p>Chapter 19: Remote Access Security 929</p> <p>Chapter 20: Physical Security 930</p> <p>Chapter 21: Data Center Architecture and Cloud Concepts 931</p> <p>Chapter 22: Ensuring Network Availability 933</p> <p>Chapter 23: Cable Connectivity Issues and Tools 934</p> <p>Chapter 24: Network Troubleshooting Methodology 935</p> <p>Chapter 25: Network Software Tools and Commands 937</p> <p><b>Appendix C Subnetting Class A 939</b></p> <p>Subnetting Practice Examples: Class A Addresses 940</p> <p>Practice Example #1A: 255.255.0.0 (/16) 941</p> <p>Practice Example #2A: 255.255.240.0 (/20) 941</p> <p>Practice Example #3A: 255.255.255.192 (/26) 942</p> <p>Subnetting in Your Head: Class A Addresses 942</p> <p>Written Lab 1 943</p> <p>Written Lab 2 944</p> <p>Answers to Written Lab 1 944</p> <p>Answers to Written Lab 2 945</p> <p>Index 947</p>
<p><b>Todd Lammle, Network+, CCSI, CCNA, CCNP,</b> is <i>the</i> networking authority. He has been involved in computers and networking with Fortune 500 companies for over 30 years. Todd is President of GlobalNet System Solutions, Inc., a networking integration and training firm. He is the bestselling author of numerous titles, with over 900,000 copies of his books in print. He can be reached through his website at www.lammle.com.</p>
<p><b>The only resource you need to prepare for the CompTIA Network+ exam</b> <p><i>CompTIA<sup>®</sup> Network+<sup>®</sup> Study Guide Fifth Edition,</i> is your one-stop resource for the ultimate in exam preparation. Featuring 100 percent coverage of Exam N10-008 objectives, this book walks you through the essentials of network technologies, installation, configuration, media, topologies, security, and more. Networking guru Todd Lammle draws from over 30 years of networking experience to explain key topics, backed by practical examples and real-world insights relevant to what you’ll face on the job. Thanks to Sybex, you can study smarter, with well organized content, practice questions, and test-taking tips. Examples and hands-on exercises bring Network+ topics to life, so you’re confident and ready on test day! <p><b>Coverage of 100% of all exam objectives in this Study Guide means you’ll be ready for:</B> <ul><li>Establishing network connectivity by deploying wired and wireless devices</li> <li>Understanding and maintaining network documentation</li> <li>Understanding the purpose of network services</li> <li>Understanding basic datacenter, cloud, and virtual networking concepts</li> <li>Monitoring network activity, and identifying performance and availability issues</li> <li>Implementing network hardening techniques</li> <li>Managing, configuring, and troubleshooting network infrastructure</li></ul> <p><b>ABOUT THE CompTIA NETWORK+ CERTIFICATION</B> <p>CompTIA’s Network+ is a vendor-neutral networking certification that validates the knowledge and skills to troubleshoot, configure and manage common wired and wireless networks. CompTIA Network+ is accredited by ANSI as meeting the ISO/IEC 17024 standard, and is approved by U.S. Department of Defense (DoD) to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA). Visit www.certification.comptia.org for more information. <p><b>Interactive learning environment</b> <p>Take your exam prep to the next level with Sybex???s superior interactive online study tools. To access our learning environment, simply visit <b>www.wiley.com/go/sybextestprep</b>, register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to: <ul><li><b>Interactive test bank</b> with 6 practice exams help you to identify areas where further review is needed. Get more than 90% of the answers correct, and you???re ready to take the certification exam.</li> <li><b>Over 300 electronic flashcards</b> reinforce learning and last-minute prep before the exam</li> <li><b>Comprehensive glossary</b> in PDF format gives you instant access to the key terms so you are fully prepared</li> <li><b>Over 2 hours of recorded audio instruction</b> from the author helps you study for the certification exam with confidence</b></li></ul>

Diese Produkte könnten Sie auch interessieren:

Google Earth For Dummies
Google Earth For Dummies
von: David A. Crowder
PDF ebook
19,99 €