- Catalog Home
- » CompTIA Network+ study guide
CompTIA Network+ study guide
Author
Publisher
Sybex, a Wiley brand
Publication Date
[2015]
Language
English
Description
Loading Description...
Table of Contents
From the Book - Third edition.
Introduction -- Assessment test -- Introduction To Networks: -- First Things First: What's a Network?: -- Local area network -- Common network components -- Wide area network -- Network architecture: peer-to-peer or client-server? -- Physical Network Topologies: -- Bus topology -- Star topology -- Ring topology -- Mesh topology -- Point-to-point topology -- Point-to-multipoint topology -- Hybrid topology -- Topology Selection, Backbones, and Segments: -- Selecting the right topology -- Network backbone -- Network segments -- Summary -- Exam Essentials -- Written Labs -- Review questions -- Open Systems Interconnection Specifications: -- Internetworking Models: -- Layered approach -- Advantages of reference models -- OSI Reference Model: -- Application layer -- Presentation layer -- Session layer -- Transport layer -- Network layer -- Data link layer -- Physical layer -- Introduction to encapsulation -- Modulation techniques -- Summary -- Exam essentials -- Written lab -- Review Questions -- Networking Topologies, Connectors, And Wiring Standards: -- Physical Media: -- Coaxial cable -- Twisted-pair cable -- Fiber-optic cable -- Media converters -- Serial cables -- Cable Properties: -- Transmission speeds -- Distance -- Duplex -- Noise immunity (Security, EMI) -- Frequency -- Wiring Standards: -- 568A versus 568B -- Straight-through cable -- Crossover cable -- Rolled/rollover cable -- T1 crossover cable -- Installing Wiring Distributions: -- Summary -- Exam essentials -- Written lab -- Review questions -- Current Ethernet Specifications: -- Network Basics -- Ethernet Basics -- Collision domain -- Broadcast domain -- CSMA/CD -- Broadband/baseband -- Bit rates versus baud rate -- Wavelength -- Sampling-size -- Half-and full-duplex Ethernet -- Ethernet At The Data Link Layer: -- Binary to decimal and hexadecimal conversion Ethernet addressing -- Ethernet frames -- Ethernet At The Physical Layer -- Ethernet Over Other Standards (IEEE 1905-1-2013): -- Ethernet over power line -- Ethernet over HDMI -- Summary -- Exam essentials -- Written lab -- Review questions -- Networking Devices: -- Common Network Connectivity Devices: -- Network interface card -- Hub -- Bridge -- Switch -- Router -- Firewall -- IDS/IPS -- HIDS -- Access point -- Dynamic host configuration protocol server -- Other Specialized Devices: -- Multilayer switch -- Load balancer -- Domain name service server -- Proxy server -- Encryption devices -- Analog modem -- Packet shaper -- VPN concentrator -- Planning And Implementing A Basic SOHO Network Using Network Segmentation: -- Determining requirements -- Switches and bridges at the data link layer -- Hubs at the physical layer -- Environmental considerations -- Summary -- Exam essentials -- Written lab -- Review questions -- Introduction To The Internet Protocol: -- Introducing TCP/IP: -- Brief history of TCP/IP -- TCP/IP and the DoD model -- Process/application layer protocols -- Host-to-host layer protocols -- Internet layer protocols -- Data Encapsulation -- Summary -- Exam essentials -- Written lab -- IP Addressing: -- IP Terminology -- Hierarchical IP Addressing Scheme: -- Network addressing -- Private IP addresses (RFC 1918) -- IPv4 Address Types: -- Layer 2 broadcasts -- Layer 3 broadcasts -- Unicast address -- Multicast address (Class D) -- Internet Protocol Version 6 (IPv6): -- Why do we need IPv6? -- Benefits of and uses for IPv6 -- IPv6 addressing and expressions -- Shortened expression -- Address types -- Special addresses -- Stateless auto-configuration (EUI-64) -- DHCPv6 (Stateful) -- Migrating to IPv6 -- Summary -- Exam essentials -- Written Lab:-- Written Lab 7-1 -- Written Lab 7-2 -- Written Lab 7-3 -- Review questions -- IP Subnetting, Troubleshooting IP, And Introduction To NAT: -- Subnetting Basics: -- How to create subnets -- Subnet masks -- Classless Inter-Domain Routing (CIDR) -- Subnetting Class C addresses -- Subnetting Class B addresses -- Troubleshooting IP Addressing: -- Determining IP address problems -- Introduction To Network Address Translation (NAT): -- Types of network address translation -- NAT names -- How NAT works -- Summary -- Exam essentials -- Written lab -- Review questions -- Introduction To IP Routing: -- Routing basics -- IP routing process -- Testing your IP routing understanding -- Static and dynamic routing -- Summary -- Exam essentials -- Written lab -- Review questions -- Routing Protocols: -- Routing Protocol Basics: -- Administrative distances -- Classes of routing protocols -- Distance Vector Routing Protocols: -- Routing Information Protocol (RIP) -- RIP version 2 (RIPv2) -- VLSM and discontinuous networks -- EIFRP -- Border Gateway Protocol (BGP) -- Link State Routing Protocols: -- Open shortest Path First (OSPF) -- Intermediate System-To-Intermediate System (IS-IS) -- High Availability: -- Hot Standby Router Protocol (HSRP) -- Virtual router redundancy protocol -- IPv6 Routing Protocols: -- RIPng -- EIGRPv6 -- OSPFv3 -- Summary -- Exam essentials -- Written lab -- Review questions -- Switching And Virtual LANs: -- Networking before layer 2 switching -- Switching Services: -- Limitations of layer 2 switching -- Bridging versus LAN switching -- Three switch functions at layer 2 -- Spanning Tree Protocol: -- Spanning tree port states -- STP convergence -- Rapid spanning tree protocol 802-1w -- Virtual LANs: -- VLAN basics -- Quality of service -- VLAN memberships -- Static VLANs -- Dynamic VLANs -- Identifying VLANs -- VLAN identification methods -- VLAN Trunking Protocol: -- VTP modes of operation -- Do we really need to put an IP address on a switch? -- Port security -- Port bonding -- Two Additional Advanced Features Of Switches: -- Power over Ethernet (802-3af, 802-3at) -- Port Mirroring/Spanning (SPAN/RSPAN) -- Summary -- Exam essentials -- Written lab -- Review questions -- Wireless Networking: -- Introduction to wireless technology -- 802-11 Standards: -- 2-4GHz (802-11b) -- 2-4GHz (802-11g) -- 5GHz (802-11a) -- 5GHz (802-11h) -- 2-4GHz/5GHz (802-11n) -- 5GHz (802-11ac) -- Comparing 802-11 Standards: -- Range comparison -- Wireless Network Components: -- Wireless access points -- Wireless network interface card -- Wireless antennas -- Installing A Wireless Network: -- Ad hoc mode: independent basic service set -- Infrastructure mode: basic service set -- Wireless controllers -- Mobile hot spots -- Signal degradation -- Other network infrastructure implementations -- Installing and configuring WLAN hardware -- Site survey -- Wireless Security: -- Wireless threats -- Open access -- Service set identifiers, wired equivalent privacy, and media access control address authentication -- Remote authentication dial-in user service (802-1x) -- Temporal key integrity protocol -- Wi-Fi protected access or WPA2 pare-shared key -- Summary -- Exam essentials -- Written lab -- Review questions -- Authentication And Access Control: -- Security Filtering: -- Access control lists -- Tunneling -- Encryption -- Remote access -- Managing User Account And Password Security: -- Managing user accounts -- Managing passwords -- Single sign-on -- Multifactor authentication -- User-authentication methods: -- Public key Infrastructure (PKI) -- Kerberos -- Authentication, Authorization, And Accounting (AAA) -- Web services -- Unified voice services -- Network controller -- Network Access Control (NAC) -- Challenge Handshake Authentication Protocol (CHAP) -- MS-CHAP -- Extensible Authentication Protocol (EAP) -- Hashes -- Network access control -- Summary -- Exam essentials -- Written lab -- Review questions --
Network Threats And Mitigation:
Recognizing Security Threats:
Denial of service
Distributed DoS (DDos)
Authentication issues
Viruses
Zero day attacks
Insider threat/malicious employee
Vulnerabilities:
Unnecessary running services
Open ports
Unpatched/legacy systems
Unencrypted channels
Clear-text credentials
TEMPEST/RF emanation
Malicious users
Buffer overflow
Wireless threats
Attackers and their tools
Misconfiguration issues
Social Engineering (Phishing)
Understanding Mitigation Techniques:
Active detection
Passive detection
Proactive defense
Basic forensic concepts
Policies And Procedures:
Security policies
Security training
Patches and upgrades
Firmware updates
Driver updates
Upgrading versus downgrading
Anti-Malware Software:
Host-based
Cloud/server-based
Configurations backups
Updating antivirus computers
Fixing an infected computer
Summary
Exam essentials
Written lab
Review questions
Physical Security And Risk:
Using hardware and software security devices
Defining Firewalls
Network-based firewalls
Host-based firewalls
Firewall Technologies:
Access control lists
Port security
Demilitarized zone
Protocol switching
Dynamic packet filtering
Proxy services
Firewalls At The Application Layer Versus The Network Layer:
Stateful versus stateless network layer firewalls
Application layer firewalls
Scanning Services And Other Firewall Features:
Content filtering
Signature identification
Context awareness
Virtual wire versus routed
Zones
Intrusion Detection And Prevention Systems:
Network-based IDS
Host-based IDS
Vulnerability scanners
VPN concentrators
Understanding Problems Affecting Device Security:
Physical security
Logical security configurations
Risk-related concepts
Summary
Exam essentials
Written lab
Review questions
Wide Area Networks:
What's a WAN?:
Defining WAN terms
Public switched telephone network
WAN connection types
Bandwidth or speed
T-Series Connections:
T1 connections
T3 connection
Transmission Media:
Wired connections
Wavelength division multiplexing
Passive optical network
Wireless technologies
Broadband Services:
DSL technology and xDSL
Cable modem
Wireless WAN Technologies:
Cellular WAN
WAN Protocols:
Integrated services digital network
Frame relay technology
Point-to-point protocol
Asynchronous transfer mode
MPLS
WAN Troubleshooting:
Loss of internet connectivity
Interface errors/monitoring
Split horizon
DNS issues
Router configurations
Company security policy
Summary
Exam essentials
Written lab
Review questions
Troubleshooting Tools:
Protocol analyzers
Throughput testers
Connectivity software
Using traceroute
Using ipconfig and ifconfig:
Using the ipconfig utility
Using the ifconfig utility
Using the ping utility
Using The Address Resolution Protocol:
Windows ARP table
Using the arp utility
Using the nslookup utility
Resolving names with the hosts table
Using the Mtr command (pathping)
Using The Route Command:
Using the route command options
Some examples of the route command
Using The nbtstat Utility:
a Switch
A switch
c Switch
n Switch
r Switch
R switch
S switch
s Switch
Using The netstat Utility:
a Switch
e Switch
r Switch
s Switch
p Switch
n Switch
Using The File Transfer Protocol:
Starting FTP and logging in to an FTP server
Downloading files
Uploading files
Using The telnet Utility:
How to enable telnet in windows
Don't use telnet, use secure shell
Summary
Exam essentials
Written lab
Review questions
Software And Hardware Tools:
Understanding Network Scanners:
Packet sniffers/network monitors
Intrusion detection and prevention software
Port scanners
Wi-Fi analyzer
Baseline
Network Monitoring And Logging:
Network monitoring
SNMP
Syslog
SIEM
Utilization
Identifying Hardware Tools:
Cable testers
Protocol analyzer
Certifiers
Time-domain reflectometer
Optical time-domain reflectometer
Multimeter
Toner probe
Butt set
Punch-down tool
Cable stripper/snips
Voltage event recorder (power)
Environmental monitors
Summary
Exam essentials
Written lab
Review questions
Network Troubleshooting:
Narrowing Down The Problem:
Did you check the super simple stuff?
Is hardware or software causing the problem?
Is it a workstation or a server problem?
Which segments of the network are affected?
Is it bad cabling?
Troubleshooting Steps:
Step 1: Identify the problem
Step 2: Establish a theory of probable cause
Step 3: Test the theory to determine cause
Step 4: Establish a plan of action to resolve the problem and identify potential effects
Step 5: Implement the solution or escalate as necessary
Step 6: Verify fill system functionality, and if applicable, implement preventative measures
Step 7: Document findings, actions, and outcomes
Troubleshooting Tips:
Don't overlook the small stuff
Prioritize your problems
Check the software configuration
Don't overlook physical conditions
Don't overlook cable problems
Check for viruses
Summary
Exam essentials
Written lab
Review questions
Management, Monitoring, And Optimization:
Managing Network Documentation:
Using SNMP
Schematics and diagrams
Network Monitoring:
Baselines
On-boarding and off-boarding of mobile devices
NAC
Policies, procedures, and regulations
Safety practices
Implementing network segmentation
Network Optimization:
Reasons to optimize your network's performance
How to optimize performance
Unified communications
Traffic shaping
Load balancing
High availability
Caching engines
Fault tolerance
Archives/backups
Common address redundancy protocol
Virtual networking
Locating and installing equipment
Change management procedures
Summary
Exam essentials
Written lab
Review questions
Appendix A: Answers To The Written Labs:
Chapters: 1-7
Written Lab: 7-1
Written Lab: 7-2
Written Lab: 7-3
Chapters: 8-20
Answers To Review Questions:
Chapters: 1-20
Appendix C: Subnetting Class A:
Subnetting Practice Examples: Class A Addresses:
Practice Example # 1A: 255-255-0-0 (/16)
Practice Example #2A: 225-255-240-0 (/20)
Practice Example #3A: 255-255-255-192 (/26)
Subnetting in your head: Class A addresses
Written Lab 1
Written Lab 2
Answers to Written Lab 1
Answers to Written Lab 2
Index.
Excerpt
Loading Excerpt...
Author Notes
Loading Author Notes...
Subjects
Subjects
Certification
Computer networks
Computer networks -- Examinations
Computer networks -- Examinations -- Study guides
Computer technicians
Computer technicians -- Certification -- Study guides
Computing Technology Industry Association -- Examinations -- Study guides
Electronic data processing personnel
Electronic data processing personnel -- Certification
Electronic data processing personnel -- Certification -- Study guides
Examinations
Study guides
TCP/IP (Computer network protocol)
Computer networks
Computer networks -- Examinations
Computer networks -- Examinations -- Study guides
Computer technicians
Computer technicians -- Certification -- Study guides
Computing Technology Industry Association -- Examinations -- Study guides
Electronic data processing personnel
Electronic data processing personnel -- Certification
Electronic data processing personnel -- Certification -- Study guides
Examinations
Study guides
TCP/IP (Computer network protocol)
More Details
ISBN
9781119021247
Reviews from GoodReads
Loading GoodReads Reviews.
Staff View
Loading Staff View.