32,99 €
To complement the CompTIA Network+ Study Guide: Exam N10-007, 4e, and the CompTIA Network+ Deluxe Study Guide: Exam N10-007, 4e, look at CompTIA Network+ Practice Tests: Exam N10-007 (9781119432128). Todd Lammle's bestselling CompTIA Network+ Study Guide for the N10-007 exam! CompTIA's Network+ certification tells the world you have the skills to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols. First, however, you have to pass the exam! This detailed CompTIA Authorized study guide by networking guru Todd Lammle has everything you need to prepare for the CompTIA Network+ Exam N10-007. Todd covers all exam objectives, explains key topics, offers plenty of practical examples, and draws upon his own invaluable 30 years of networking experience to help you learn. The Study Guide prepares you for Exam N10-007, the new CompTIA Network+ Exam: * Covers all exam objectives including network technologies, network installation and configuration, network media and topologies, security, and much more * Includes practical examples review questions, as well as access to practice exams and flashcards to reinforce learning * Networking guru and expert author Todd Lammle offers valuable insights and tips drawn from real-world experience Plus, receive one year of FREE access to a robust set of online interactive learning tools, including hundreds of sample practice questions, a pre-assessment test, bonus practice exams, and over 100 electronic flashcards. Prepare for the exam and enhance your career--starting now!
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 1582
Veröffentlichungsjahr: 2018
Introduction
Assessment Test
Chapter 1: Introduction to Networks
First Things First: What’s a Network?
Physical Network Topologies
Topology Selection, Backbones, and Segments
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 2: The Open Systems Interconnection Specifications
Internetworking Models
The OSI Reference Model
Introduction to Encapsulation
Modulation Techniques
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 3: Networking Topologies, Connectors, and Wiring Standards
Physical Media
Cable Properties
Wiring Standards
Installing Wiring Distributions
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 4: The Current Ethernet Specifications
Network Basics
Ethernet Basics
Ethernet at the Data Link Layer
Ethernet at the Physical Layer
Ethernet over Other Standards (IEEE 1905.1-2013)
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 5: Networking Devices
Common Network Connectivity Devices
Other Specialized Devices
Planning and Implementing a Basic SOHO Network Using Network Segmentation
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 6: Introduction to the Internet Protocol
Introducing TCP/IP
Data Encapsulation
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 7: IP Addressing
IP Terminology
The Hierarchical IP Addressing Scheme
IPv4 Address Types
Internet Protocol Version 6 (IPv6)
Summary
Exam Essentials
Written Labs
Written Lab 7.1
Written Lab 7.2
Written Lab 7.3
Review Questions
Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT
Subnetting Basics
Troubleshooting IP Addressing
Introduction to Network Address Translation (NAT)
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 9: Introduction to IP Routing
Routing Basics
The IP Routing Process
Testing Your IP Routing Understanding
Static and Dynamic Routing
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 10: Routing Protocols
Routing Protocol Basics
Distance Vector Routing Protocols
Link State Routing Protocols
High Availability
Advanced IPv6 Concepts
IPv6 Routing Protocols
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 11: Switching and Virtual LANs
Networking Before Layer 2 Switching
Switching Services
Spanning Tree Protocol
Virtual LANs
VLAN Trunking Protocol
Two Additional Advanced Features of Switches
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 12: Wireless Networking
Introduction to Wireless Technology
Cellular
The 802.11 Standards
Comparing 802.11 Standards
Wireless Network Components
Installing a Wireless Network
Site Survey
Wireless Security
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 13: Authentication and Access Control
Security Filtering
Managing User Account and Password Security
User-Authentication Methods
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 14: Network Threats and Mitigation
Recognizing Security Threats
Vulnerabilities
Understanding Mitigation Techniques
Policies and Procedures
Anti-malware Software
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 15: Physical Security and Risk
Using Hardware and Software Security Devices
Defining Firewalls
Firewall Technologies
Firewalls at the Application Layer vs. the Network Layer
Scanning Services and Other Firewall Features
Intrusion Detection and Prevention Systems
VPN Concentrators
Understanding Problems Affecting Device Security
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 16: Wide Area Networks
What’s a WAN?
T-Series Connections
Transmission Media
Broadband Services
Wireless WAN Technologies
WAN Protocols
WAN Troubleshooting
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 17: Troubleshooting Tools
Protocol Analyzers
Throughput Testers
Connectivity Software
Using
traceroute
Using the
ping
Utility
Using the Address Resolution Protocol
Using the
nslookup
Utility
Resolving Names with the Hosts Table
Using the
Mtr
Command
(pathping)
Using the
route
Command
Using the
nbtstat
Utility
Using the
netstat
Utility
Using tcpdump
Using the File Transfer Protocol
Using the Telnet Utility
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 18: Software and Hardware Tools
Understanding Network Scanners
Baseline
Network Monitoring and Logging
Identifying Hardware Tools
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 19: Network Troubleshooting
Narrowing Down the Problem
Troubleshooting Steps
Troubleshooting Tips
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 20: Management, Monitoring, and Optimization
Managing Network Documentation
Network Monitoring
Network Optimization
Summary
Exam Essentials
Written Lab
20.6
Review Questions
Appendix A: Answers to Written Labs
Appendix B: Answers to Review Questions
Appendix C: Subnetting Class A
Index
Advert
EULA
Chapter 3
Table 3.1
Chapter 4
Table 4.1
Table 4.2
Table 4.3
Table 4.4
Chapter 5
Table 5.1
Chapter 6
Table 6.1
Table 6.2
Chapter 7
Table 7.1
Table 7.2
Table 7.3
Chapter 8
Table 8.1
Table 8.2
Table 8.3
Table 8.4
Chapter 10
Table 10.1
Table 10.2
Table 10.3
Chapter 12
Table 12.1
Table 12.2
Table 12.3
Chapter 15
Table 15.1
Chapter 16
Table 16.1
Table 16.2
Chapter 17
Table 17.1
Table 17.2
Table 17.3
Table 17.4
Table 17.5
Table 17.6
Table 17.7
Table 17.8
Chapter 18
Table 18.1
Chapter 20
Table 20.1
Table 20.2
Chapter 1
Figure 1.1
A basic network
Figure 1.2
Two separate LANs (workgroups)
Figure 1.3
A router connects LANs.
Figure 1.4
A network populated with servers and workstations
Figure 1.5
An internetwork
Figure 1.6
Multiprotocol Label Switching layout
Figure 1.7
A peer-to-peer network
Figure 1.8
A client-server network
Figure 1.9
A typical bus network’s physical topology
Figure 1.10
Typical star topology with a hub
Figure 1.11
A typical ring topology
Figure 1.12
A typical mesh topology
Figure 1.13
Three point-to-point connections
Figure 1.14
A point-to-multipoint network, example 1
Figure 1.15
A point-to-multipoint network, example 2
Figure 1.16
A simple hybrid network
Figure 1.17
Backbone and segments on a network
Chapter 2
Figure 2.1
Layer functions
Figure 2.2
The upper layers
Figure 2.3
The lower layers
Figure 2.4
Establishing a connection-oriented session
Figure 2.5
Transmitting segments with flow control
Figure 2.6
Windowing
Figure 2.7
Transport layer reliable delivery
Figure 2.8
Routing table used in a router
Figure 2.9
A router in an internetwork
Figure 2.10
Data Link layer
Figure 2.11
Data encapsulation
Chapter 3
Figure 3.1
A stripped-back thinnet cable
Figure 3.2
Male and female BNC connectors
Figure 3.3
Cat 5e UTP cable
Figure 3.4
RJ-11 and RJ-45 connectors
Figure 3.5
The pin-outs in an RJ-45 Connector, T568B standard
Figure 3.6
UPC and APC connectors
Figure 3.7
An example of an ST connector
Figure 3.8
A sample SC connector
Figure 3.9
Bidirectional communication
Figure 3.10
A sample MT-RJ fiber-optic connector
Figure 3.11
A sample LC fiber-optic connector
Figure 3.12
Single-mode fiber to Ethernet
Figure 3.13
Multimode fiber to Ethernet
Figure 3.14
Fiber to coaxial
Figure 3.15
Single-mode to multimode fiber
Figure 3.16
RS-232 cable ends
Figure 3.17
A USB port
Figure 3.18
A USB plug
Figure 3.19
T568A wired standard
Figure 3.20
T568B wired standard
Figure 3.21
Straight-through Ethernet cable
Figure 3.22
Crossover Ethernet cable
Figure 3.23
An inexpensive cable tester
Figure 3.24
UTP gigabit crossover Ethernet cable
Figure 3.25
Rolled Ethernet cable
Figure 3.26
A T1 crossover cable
Figure 3.27
A 110 block
Chapter 4
Figure 4.1
The basic network
Figure 4.2
CSMA/CD
Figure 4.3
Shorter and longer wavelengths
Figure 4.4
Ethernet addressing using MAC addresses
Figure 4.5
802.3 and Ethernet frame formats in bytes
Figure 4.6
Ethernet Physical layer specifications
Figure 4.7
Powerline adapter sets
Figure 4.8
Basic BPL installation
Figure 4.9
Ethernet over HDMI
Chapter 5
Figure 5.1
Network interface card
Figure 5.2
A typical hub
Figure 5.3
Bridges break up collision domains.
Figure 5.4
Typical Ethernet switch
Figure 5.5
Router connected to the Internet, providing access for hosts
Figure 5.6
Example of firewalls with a DMZ
Figure 5.7
Example of an AP in a network
Figure 5.8
DHCP client sends broadcasts looking for a DHCP server.
Figure 5.9
A Windows DHCP server's scope options
Figure 5.10
DHCP client request to a DHCP server
Figure 5.11
DHCP client parameter request list
Figure 5.12
DHCP server response
Figure 5.13
Configuring a DHCP relay
Figure 5.14
DNS resolution example
Figure 5.15
A Windows DNS server
Figure 5.16
A DNS query to www.lammle.com
Figure 5.17
The DNS answer to our query
Figure 5.18
Internal and external DNS
Figure 5.19
A proxy server
Figure 5.20
Encryption appliances
Figure 5.21
Content filtering appliance
Figure 5.22
Analog modem
Figure 5.23
Packet shaper
Figure 5.24
VPN concentrator
Figure 5.25
Media converter
Figure 5.26
A switch can replace the hub, breaking up collision domains.
Figure 5.27
Routers create an internetwork.
Figure 5.28
Internetworking devices
Figure 5.29
Switched networks creating an internetwork
Figure 5.30
A router in an internetwork
Figure 5.31
A switch in an internetwork
Figure 5.32
A hub in a network
Chapter 6
Figure 6.1
The DoD and OSI models
Figure 6.2
The TCP/IP protocol suite
Figure 6.3
DHCP client four-step process
Figure 6.4
TCP segment format
Figure 6.5
UDP segment
Figure 6.6
Port numbers for TCP and UDP
Figure 6.7
IPv4 header
Figure 6.8
ICMP error message is sent to the sending host from the remote router.
Figure 6.9
Local ARP broadcast
Figure 6.10
RARP broadcast example
Figure 6.11
Data encapsulation
Figure 6.12
PDU and layer addressing
Figure 6.13
Port numbers at the Transport layer
Chapter 7
Figure 7.1
Summary of the three classes of networks
Figure 7.2
IPv6 address example
Figure 7.3
EUI-64 interface ID assignment
Figure 7.4
A 6to4 tunnel
Chapter 8
Figure 8.1
Implementing a Class C /25 logical network
Figure 8.2
Implementing a Class C /26 logical network
Figure 8.3
Basic IP troubleshooting
Figure 8.4
IP address problem 1
Figure 8.5
IP address problem 2
Figure 8.6
Find the valid host.
Figure 8.7
Find the valid host #2.
Figure 8.8
Find the valid host address #3.
Figure 8.9
Find the valid subnet mask.
Figure 8.10
Where to configure NAT
Figure 8.11
Basic NAT translation
Figure 8.12
NAT overloading example (PAT)
Chapter 9
Figure 9.1
A simple routing example
Figure 9.2
IP routing example using two hosts and one router
Figure 9.3
Frame used from Host_A to the Lab_A router when Host_B is pinged
Figure 9.4
IP routing example 1
Figure 9.5
IP routing example 2
Figure 9.6
Routing options
Figure 9.7
Dynamic routing options
Figure 9.8
DV and LS routing protocols
Figure 9.9
Hybrid routing
Chapter 10
Figure 10.1
Routing flow tree
Figure 10.2
The internetwork with distance vector routing
Figure 10.3
Converged routing tables
Figure 10.4
Typical classful network
Figure 10.5
Classless network design
Figure 10.6
A discontiguous network
Figure 10.7
EIGRP tables
Figure 10.8
Border Gateway Protocol (BGP)
Figure 10.9
OSPF design example
Figure 10.10
IS-IS network terminology
Figure 10.11
FHRPs use a virtual router with a virtual IP address and virtual MAC address.
Figure 10.12
HSRP active and standby routers
Figure 10.13
Example of HSRP active and standby routers swapping interfaces
Figure 10.14
HSRP Hellos
Figure 10.15
First two steps to IPv6 auto-configuration
Figure 10.16
IPv6 auto-configuration example
Figure 10.17
IPv6 neighbor discovery: neighbor solicitation message
Chapter 11
Figure 11.1
A network before switching
Figure 11.2
The first switched LAN
Figure 11.3
The typical switched network design
Figure 11.4
Switches create private domains.
Figure 11.5
Empty forward/filter table on a switch
Figure 11.6
How switches learn hosts’ locations
Figure 11.7
Forward/filter table
Figure 11.8
Broadcast storm
Figure 11.9
Multiple frame copies
Figure 11.10
Distributed switching
Figure 11.11
A switched network with switching loops
Figure 11.12
An optimal hierarchical switch design
Figure 11.13
Flat network structure
Figure 11.14
The benefit of a switched network
Figure 11.15
Physical LANs connected to a router
Figure 11.16
Switches removing the physical boundary
Figure 11.17
Access and trunk links in a switched network
Figure 11.18
IEEE 802.1Q encapsulation with and without the 802.1Q tag
Figure 11.19
VTP modes
Figure 11.20
Port security on a switch port restricts port access by MAC address.
Figure 11.21
MAC flooding attack
Figure 11.22
Before and after port channels
Figure 11.23
Switched Ethernet ports can provide power to devices.
Figure 11.24
An external power injector used for PoE
Figure 11.25
Wireless bridge power injector
Figure 11.26
Switches send frames out the destination port only.
Figure 11.27
Place a hub between two hosts to troubleshoot.
Figure 11.28
Port spanning/mirroring
Chapter 12
Figure 12.1
Unlicensed frequencies
Figure 12.2
Wireless LAN history
Figure 12.3
802.11b CSMA/CA
Figure 12.4
ISM 2.4 GHz channels
Figure 12.5
U-NII 5 GHz band has 12 non-overlapping channels (US)
Figure 12.6
Standards for spectrums and speeds
Figure 12.7
Range comparisons of 802.11 standards
Figure 12.8
A wireless access point
Figure 12.9
A wireless NIC
Figure 12.10
A wireless network in ad hoc mode
Figure 12.11
A wireless network in infrastructure mode
Figure 12.12
Extended service set (ESS)
Figure 12.13
Stand-alone and controller-based wireless networks
Figure 12.14
LWAPP
Figure 12.15
Mobile hot spot
Figure 12.16
iPhone hot spot
Figure 12.17
Basic coverage
Figure 12.18
Enterprise design
Figure 12.19
A multifloor installation
Figure 12.20
A heat map of a building
Figure 12.21
RADIUS authentication server
Chapter 13
Figure 13.1
Two networks with an ACL-enabled router
Figure 13.2
A tunnel through the Internet
Figure 13.3
Example of using a VPN network
Figure 13.4
The SSL connection process
Figure 13.5
GRE encapsulation
Figure 13.6
TCP/IP packet in IPSec transport mode with AH
Figure 13.7
TCP/IP packet in IPSec tunnel mode with ESP
Figure 13.8
Public-key encryption
Figure 13.9
The PGP encryption system
Figure 13.10
A typical remote-access connection between a remote user and a server
Figure 13.11
ILO port
Figure 13.12
The certificate authority process
Figure 13.13
PKI in action
Figure 13.14
The Kerberos authentication process
Figure 13.15
TACACS+ login and logout sequence
Figure 13.16
CHAP authentication process
Chapter 14
Figure 14.1
Unreachable gateway
Figure 14.2
Botnet
Figure 14.3
Smurf attack in progress
Figure 14.4
A simple DoS/SYN flood attack
Figure 14.5
DNS amplification attack
Figure 14.6
IP4 packets tunneled in DNS
Figure 14.7
VLAN hopping
Figure 14.8
An email virus spreading rapidly
Figure 14.9
Multipartite virus
Figure 14.10
Wireshark
Figure 14.11
Man-in-the-middle attack
Figure 14.12
A common DMZ configuration
Figure 14.13
Automating Windows Update
Figure 14.14
Open case warning in the BIOS
Chapter 15
Figure 15.1
A typical secured network
Figure 15.2
Two networks with an ACL-enabled router
Figure 15.3
A firewall with a DMZ
Figure 15.4
Protocol switching with and without a dead zone
Figure 15.5
A hacker denied by a dynamic state list
Figure 15.6
A packet going to a proxy
Figure 15.7
Virtual wire
Figure 15.8
Internet Options Security tab
Figure 15.9
Adding a trusted site
Figure 15.10
Custom security settings
Figure 15.11
An MD-IDS system in action
Figure 15.12
An IDS connected to the network
Figure 15.13
Shutting down port 80 for 60 seconds to stop an attack
Figure 15.14
Deceiving an attacker with a honeypot
Figure 15.15
VPN concentrator in a network
Figure 15.16
A three-layer security model
Figure 15.17
Mantrap
Figure 15.18
Network perimeter defense
Figure 15.19
Network divided into security zones
Figure 15.20
Using routers to divide a network into security zones
Figure 15.21
RAID-0
Figure 15.22
RAID-1
Figure 15.23
RAID-5
Figure 15.24
Nessus
Chapter 16
Figure 16.1
A typical wide area network
Figure 16.2
WAN connection types
Figure 16.3
An example of a satellite point-to-multipoint
Figure 16.4
Broadband access using cable or DSL
Figure 16.5
Cable network
Figure 16.6
Before Frame Relay
Figure 16.7
After Frame Relay
Figure 16.8
Point-to-Point Protocol stack
Figure 16.9
PPP session establishment
Figure 16.10
DMVPN
Figure 16.11
SIP trunk
Figure 16.12
WAN troubleshooting spots
Chapter 17
Figure 17.1
DHCP capture
Figure 17.2
Throughput
Figure 17.3
LogMeIn
Figure 17.4
Elevating your command prompt
Figure 17.5
TCP flags
Figure 17.6
route print
output
Figure 17.7
Sample output of the
nbtstat –a
command
Figure 17.8
Sample output of the
nbtstat –c
command
Figure 17.9
Sample output of the
nbtstat –n
command
Figure 17.10
Sample output of the
nbtstat –r
command
Figure 17.11
Sample output of the
nbtstat –S
command
Figure 17.12
Sample output of the
nbtstat –s
command
Figure 17.13
Sample output of the
netstat –a
command
Figure 17.14
The Telnet utility
Chapter 18
Figure 18.1
Output from a packet sniffer
Figure 18.2
A Cisco ASA
Figure 18.3
IDS/IPS placement in an internetwork
Figure 18.4
Nmap in action
Figure 18.5
Angry IP port scanning
Figure 18.6
Wireless analyzer
Figure 18.7
Wireless survey tool
Figure 18.8
SNMP GET and TRAP messages
Figure 18.9
Syslog server and client
Figure 18.10
Speakeasy Speed Test
Figure 18.11
Looking Glass site output
Figure 18.12
Windows Event Viewer system log
Figure 18.13
Mac Activity Monitor
Figure 18.14
Wireless channel utilization
Figure 18.15
An inexpensive cable tester
Figure 18.16
Ethernet loopback plug
Figure 18.17
Fiber loopback plug
Figure 18.18
Sample OTDR output
Figure 18.19
A multimeter
Figure 18.20
Spectrum analyzer output
Figure 18.21
A toner probe
Figure 18.22
A butt set
Figure 18.23
An example of a punch-down tool
Figure 18.24
Using a punch-down tool on a small keystone connector
Figure 18.25
A combination cable stripper, crimper, and snippers
Chapter 19
Figure 19.1
Cannot connect
Figure 19.2
Host could not be found.
Figure 19.3
Successful ping
Figure 19.4
Rogue DHCP
Figure 19.5
Certificate error
Figure 19.6
Netstat -a
Figure 19.7
Service dependencies
Figure 19.8
ipconfig/all
Figure 19.9
Manage Network Connections
Figure 19.10
Interface properties
Figure 19.11
IP properties
Figure 19.12
Obtain DNS Server Address Automatically
Figure 19.13
ipconfig /all
Chapter 20
Figure 20.1
RJ-45 connector
Figure 20.2
Two ends of a crossover cable
Figure 20.3
Rack-mounted switches
Figure 20.4
Simple network physical diagram
Figure 20.5
Network diagram with firewalls from SmartDraw
Figure 20.6
Hardware-rack diagram from SmartDraw
Figure 20.7
Logical network diagram
Figure 20.8
Grounding methods
Figure 20.9
Hot and cold aisles
Figure 20.10
Backup types
Figure 20.11
Guests and hosts
Figure 20.12
Hypervisors
Figure 20.13
Virtualization
Figure 20.14
Classic SAN vs. iSCSI
Figure 20.15
NAS and SAN
Figure 20.16
MDF and IDFs
Figure 20.17
Cable trays
Figure 20.18
Two-post racks
Figure 20.19
Four-post rack
Figure 20.20
Freestanding rack
Cover
Table of Contents
Acknowledgments
C1
i
v
vi
vii
ix
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
xxxix
xl
xli
xlii
xliii
xliv
xlv
xlvi
xlvii
xlviii
xlix
l
li
lii
liii
liv
lv
lvi
lvii
lviii
lix
lx
lxi
lxii
lxiii
lxiv
lxv
lxvi
lxvii
lxviii
lxix
lxx
lxxi
lxxii
lxxiii
lxxiv
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
111
112
113
114
115
116
117
118
119
120
121
122
123
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
e1
Todd Lammle
Senior Acquisitions Editor: Kenyon Brown Development Editor: Kim Wimpsett Technical Editors: Wynn D. Smith and Jon Buhagiar Senior Production Editor: Christine O’Connor Copy Editor: Judy Flynn Editorial Manager: Mary Beth Wakefield Production Manager: Kathleen Wisor Executive Editor: Jim Minatel Book Designers: Judy Fung and Bill Gibson Proofreader: Amy Schneider Indexer: Ted Laux Project Coordinator, Cover: Brent Savage Cover Designer: Wiley Cover Image: Getty Images Inc./Jeremy Woodhouse
Copyright © 2018 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-43225-8 ISBN: 978-1-119-43222-7 (ebk.) ISBN: 978-1-119-43226-5 (ebk.)
Manufactured in the United States of America
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.
Library of Congress Control Number: 2018937836
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA and Network+ are trademarks or registered trademarks of CompTIA Properties, LLC. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
Kim Wimpsett was the development editor of this Sybex CompTIA series. Thank you, Kim, for your patience and kindness, and working so hard on this book with me.
Kenyon Brown was acquisitions editor for this book. Thank you, Kenyon, for making this book a reality!
In addition, Christine O’Connor was an excellent production editor, and she worked really hard to get the book done as quickly as possible, without missing the small mistakes that are so easy to overlook. I am always very pleased when I hear that she will be working with me on a new project.
Wynn D. Smith reviewed each topic in this guide, scrutinizing the material until we both agreed it was verifiably solid. Thank you, Wynn!
Troy McMillan literally hashed and rehashed each topic in this guide with me at all hours of the day and night. Thank you, Troy, yet again!
Todd Lammle, CompTIA Network+, CCSI, CCNA/CCNP, is the authority on network certification and internetworking. He is a world-renowned author, speaker, trainer, and consultant with more than 100 study guides in print. Todd has more than 30 years of experience working with LANs, WANs, and large licensed and unlicensed wireless networks and currently is working on a Cisco Security expert certification. He’s president and CEO of Todd Lammle, LLC, a network-integration and training firm based in Colorado, Texas, and San Francisco, California. You can reach Todd through his website at www.lammle.com/network±.
If you’re like most of us in the networking community, you probably have one or more network certifications. If that’s you, you’re very wise in choosing a CompTIA Network+ (N10-007) certification to proudly add to your repertoire because that achievement will make you all the more valuable as an employee. In these challenging economic times, keeping ahead of the competition—even standing out among your present colleagues—could make a big difference in whether you gain a promotion or possibly keep your job instead of being the one who gets laid off! Or maybe this is your first attempt at certification because you’ve decided to venture into a new career in information technology (IT). You’ve realized that getting into the IT sector is a good way to go because as the information age marches on, the demand for knowledgeable professionals in this dynamic field will only intensify dramatically.
Either way, certification is one of the best things you can do for your career if you are working in, or want to break into, the networking profession because it proves that you know what you’re talking about regarding the subjects in which you’re certified. It also powerfully endorses you as a professional in a way that’s very similar to a physician being board certified in a certain area of expertise.
In this book, you’ll find out what the Network+ exam is all about because each chapter covers a part of the exam. I’ve included some great review questions at the end of each chapter to help crystallize the information you learned and solidly prepare you to ace the exam.
A really cool thing about working in IT is that it’s constantly evolving, so there are always new things to learn and fresh challenges to master. Once you obtain your Network+ certification and discover that you’re interested in taking it further by getting into more complex networking (and making more money), the Cisco CCNA certification is definitely your next step; you can get the skinny on that and even more in-depth certifications on my blog at www.lammle.com.
For Network+ training with Todd Lammle, both instructor-led and online, please see www.lammle.com/network+.
Network+ is a certification developed by the Computing Technology Industry Association (CompTIA) that exists to provide resources and education for the computer and technology community. This is the same body that developed the A+ exam for PC technicians.
The Network+ exam was designed to test the skills of network technicians with 18 to 24 months of experience in the field. It tests areas of networking technologies such as the definition of a protocol, the Open Systems Interconnection (OSI) model and its layers, and the concepts of network design and implementation—the minimum knowledge required for working on a network and some integral prerequisites for network design and implementation.
Because CompTIA is a well-respected developer of vendor-neutral industry certifications, becoming Network+ certified proves you’re competent in the specific areas covered by the Network+ objectives.
Four major benefits are associated with becoming Network+ certified:
Proof of Professional Achievement Networking professionals are pretty competitive when it comes to collecting more certifications than their peers. And because the Network+ certification broadly covers the entire field of networking, technicians want this certification a lot more than just Microsoft certifications—Network+ is a lot more prestigious and valuable. Because it’s rare to gain something that’s worth a lot with little effort, I’ll be honest—preparing for the Network+ exam isn’t exactly a lazy day at the beach. (However, beaches do happen to be really high on my personal list of great places to study!) And people in IT know that it isn’t all that easy to pass the Network+ exam, so they’ll definitely respect you more and know that you’ve achieved a certain level of expertise about vendor-independent, networking-related subjects.
Opportunity for Advancement We all like to get ahead in our careers—advancement results in more responsibility and prestige, and it usually means a fatter paycheck, greater opportunities, and added options. In the IT sector, a great way to make sure all that good stuff happens is by earning a lot of technology certifications, including Network+.
Fulfillment of Training Requirements Network+, because of its wide-reaching industry support, is recognized as a baseline of networking information. Some companies actually specify the possession of a Network+ certification as a job requirement before they’ll even consider hiring you, or it may be specified as a goal to be met before your next review.
Customer Confidence As companies discover the CompTIA advantage, they will undoubtedly require qualified staff to achieve these certifications. Many companies outsource their work to consulting firms with experience working with security. Firms that have certified staff have a definite advantage over firms that don’t.
As this book goes to press, Pearson VUE is the sole Network+ exam provider. The following is the necessary contact information and exam-specific details for registering. Exam pricing might vary by country or by CompTIA membership.
Vendor
Website
Phone Number
Pearson VUE
www.pearsonvue.com/comptia
US and Canada: 877-551-PLUS (7587)
When you schedule the exam, you’ll receive instructions regarding appointment and cancellation procedures, ID requirements, and information about the testing center location. In addition, you’ll receive a registration and payment confirmation letter. Exams can be scheduled up to six weeks out or as soon as the next day (or, in some cases, even the same day).
Exam prices and codes may vary based on the country in which the exam is administered. For detailed pricing and exam registration procedures, refer to CompTIA’s website at www.comptia.org.
After you’ve successfully passed your Network+ exam, CompTIA will award you a certification. Within four to six weeks of passing the exam, you’ll receive your official CompTIA Network+ certificate and ID card. (If you don’t receive these within eight weeks of taking the test, contact CompTIA directly using the information found in your registration packet.)
Here are some general tips for taking your exam successfully:
Bring two forms of ID with you. One must be a photo ID, such as a driver’s license. The other can be a major credit card or a passport. Both forms must include a signature.
Arrive early at the exam center so you can relax and review your study materials, particularly tables and lists of exam-related information. After you are ready to enter the testing room, you will need to leave everything outside; you won’t be able to bring any materials into the testing area.
Read the questions carefully. Don’t be tempted to jump to an early conclusion. Make sure you know exactly what each question is asking.
Don’t leave any unanswered questions. Unanswered questions are scored against you. There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you to either “choose two” or “choose all that apply.” Be sure to read the messages displayed to know how many correct answers you must choose.
When answering multiple-choice questions you’re not sure about, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.
On form-based tests (nonadaptive), because the hard questions will take the most time, save them for last. You can move forward and backward through the exam.
You—if want to pass the Network+ exam, and pass it confidently! This book is chock-full of the exact information you need and directly maps to Network+ exam objectives, so if you use it to study for the exam, your odds of passing shoot way up.
And in addition to including every bit of knowledge you need to learn to pass the exam, I’ve included some really great tips and solid wisdom to equip you even further to successfully work in the real IT world.
This book covers everything you need to know to pass the CompTIA Network+ exam. But in addition to studying the book, it’s a good idea to practice on an actual network if you can.
Here’s a list of the 20 chapters in this book:
Chapter 1, “Introduction to Networks” This chapter includes an introduction to what a network is and an overview of the most common physical network topologies you’ll find in today’s networks.
Chapter 2, “The Open Systems Interconnection Specifications” This chapter covers the OSI model, what it is, what happens at each of its layers, and how each layer works.
Chapter 3, “Networking Topologies, Connectors, and Wiring Standards” This chapter covers the various networking media and topologies, plus the cable types and properties used in today’s networks.
Chapter 4, “The Current Ethernet Specifications” This chapter covers how a basic Ethernet LAN works and describes and categorizes the different Ethernet specifications.
Chapter 5, “Networking Devices” It’s important for you to understand all the various devices used in today’s networks, and this chapter will describe how hubs, routers, and switches and some other devices work within a network.
Chapter 6, “Introduction to the Internet Protocol” This is your introduction to the all-important IP protocol stack.
Chapter 7, “IP Addressing” This chapter will take up from where Chapter 6 left off and move into IP addressing. It also contains information about public versus private addressing and DHCP.
Chapter 8, “IP Subnetting, Troubleshooting IP, and Introduction to NAT” Beginning where Chapter 7 ends, we’ll be tackling IP subnetting in this one. But no worries here—I’ve worked hard to make this not-so-popular-yet-vital topic as painless as possible.
Chapter 9, “Introduction to IP Routing” This is an introduction to routing that basically covers what routers do and how they do it. This chapter, along with Chapter 10 and Chapter 11, cover routing and switching in much more detail than what is necessary to meet the CompTIA Network+ objectives because this knowledge is so critical to grasp when working with today’s networks.
Chapter 10, “Routing Protocols” This chapter goes into detail describing the protocols that run on routers and that update routing tables to create a working map of the network.
Chapter 11, “Switching and Virtual LANs” This chapter covers Layer 2 switching, the Spanning Tree Protocol (STP), and virtual LANs. I went deeper than needed for the exam with the routing chapters, and I’ll cover switching and virtual LANs (which are also vital in today’s corporate networks) more thoroughly as well.
Chapter 12, “Wireless Networking” Because wireless is so important for both home and business networks today, this chapter is loaded with all the information you need to be successful at wireless networking at home and work.
Chapter 13, “Authentication and Access Control” This is the first of three security chapters. There are tons of exam objectives about network security that are so important that I took three chapters to cover all of them. In this chapter, I’ll introduce security, security filtering, tunneling, and user authentication.
Chapter 14, “Network Threats and Mitigation” This is probably the most fun of the three security chapters because I’ll tell you all about security threats and how to stop them. The only way to get good at network security is to implement it, and this chapter shows you how.
Chapter 15, “Physical Security and Risk” This chapter’s focus is on explaining basic firewalls, security devices, and device security.
Chapter 16, “Wide Area Networks” In this chapter, you get to learn all about things like Frame Relay, E1/T1, DSL, cable modems, and more. All of the CompTIA Network+ WAN objectives are covered in this chapter.
Chapter 17, “Troubleshooting Tools” This is also a fun chapter because, again, you can follow along and run all the commands yourself. And I repeat, it’s a really good idea to run through all the commands in this chapter!
Chapter 18, “Software and Hardware Tools” This chapter introduces you to the network tools you will use to help you run your networks. Both software and hardware tools will be discussed.
Chapter 19, “Network Troubleshooting” In almost every chapter, I discuss how to verify and fix problems, but this chapter will really get into the nuts and bolts of detailed network troubleshooting and documentation.
Chapter 20, “Management, Monitoring, and Optimization” This last chapter will provide configuration-management documentation and covers wiring, logical diagrams, baselines, policies, and regulations.
I’ve included several study tools throughout the book:
Assessment Test At the end of this introduction is an assessment test that you can use to check your readiness for the exam. Take this test before you start reading the book; it will help you determine the areas you might need to brush up on. The answers to the assessment test questions appear on a separate page after the last question of the test. Each answer includes an explanation and a note telling you the chapter in which the material appears.
Objective Map and Opening List of Objectives On the inside front cover of this book is a detailed exam objective map showing you where each of the exam objectives is covered in this book. In addition, each chapter opens with a list of the exam objectives it covers. Use these to see exactly where each of the exam topics is covered.
Exam Essentials Each chapter, just after the summary, includes a number of exam essentials. These are the key topics you should take from the chapter in terms of areas to focus on when preparing for the exam.
Written Lab Each chapter includes a written lab. These are short exercises that map to the exam objectives. Answers to these can be found in Appendix A.
Chapter Review Questions To test your knowledge as you progress through the book, there are review questions at the end of each chapter. As you finish each chapter, answer the review questions and then check your answers—the correct answers and explanations are in Appendix B. You can go back to reread the section that deals with each question you got wrong to ensure that you answer correctly the next time you’re tested on the material.
The interactive online learning environment that accompanies CompTIA Network+ Study Guide: Exam N10-007 provides a test bank with study tools to help you prepare for the certification exam—and increase your chances of passing it the first time! The test bank includes the following tools:
Sample Tests All of the questions in this book are provided, including the assessment test, which you’ll find at the end of this introduction, and the chapter tests that include the review questions at the end of each chapter. In addition, there are two practice exams. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.
Flashcards Approximately 100 questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.
Other Study Tools A glossary of key terms from this book and their definitions are available as a fully searchable PDF.
Go to http://www.wiley.com/go/netplustestprep to register and gain access to this interactive online learning environment and test bank with study tools.
If you want a solid foundation for the serious effort of preparing for the Network+ exam, then look no further because I’ve spent countless hours putting together this book with the sole intention of helping you pass it!
This book is loaded with valuable information, and you will get the most out of your study time if you understand how I put the book together. Here’s a list that describes how to approach studying:
Take the assessment test immediately following this introduction. (The answers are at the end of the test, but no peeking!) It’s okay if you don’t know any of the answers—that’s what this book is for. Carefully read over the explanations for any question you get wrong, and make note of the chapters where that material is covered.
Study each chapter carefully, making sure you fully understand the information and the exam objectives listed at the beginning of each one. Again, pay extra-close attention to any chapter that includes material covered in questions you missed on the assessment test.
Complete the written lab at the end of each chapter. Do
not
skip these written exercises because they directly map to the CompTIA objectives and what you’ve got to have nailed down to meet them.
Answer all the review questions related to each chapter. Specifically note any questions that confuse you, and study the corresponding sections of the book again. And don’t just skim these questions—make sure you understand each answer completely.
Try your hand at the practice exams. Before you take your test, be sure to visit my website for questions, videos, audios, and other useful information.
Test yourself using all the electronic flashcards. This is a brand-new and updated flashcard program to help you prepare for the latest CompTIA Network+ exam, and it is a really great study tool.
I tell you no lies—learning every bit of the material in this book is going to require applying yourself with a good measure of discipline. So try to set aside the same time period every day to study, and select a comfortable and quiet place to do so. If you work hard, you will be surprised at how quickly you learn this material.
If you follow the steps listed here and study with the review questions, practice exams, electronic flashcards, and all the written labs, you would almost have to try to fail the CompTIA Network+ exam. However, studying for the Network+ exam is like training for a marathon—if you don’t go for a good run every day, you’re not likely to finish very well.
This book covers everything about CompTIA Network+. For up-to-date information about Todd Lammle CompTIA boot camps, audio training, and training videos, please see www.lammle.com/network+.
Speaking of objectives, you’re probably pretty curious about those, right? CompTIA asked groups of IT professionals to fill out a survey rating the skills they felt were important in their jobs, and the results were grouped into objectives for the exam and divided into five domains.
This table gives you the extent by percentage that each domain is represented on the actual examination.
Domain
% of Examination
1.0 Networking Concepts
23%
2.0 Infrastructure
18%
3.0 Network Operations
17%
4.0 Network Security
20%
5.0 Network Troubleshooting and Tools
22%
Total
100%
Objective
Chapter
1.0 Networking Concepts
1.1 Explain the purposes and uses of ports and protocols.
5, 6, 13
Protocols and ports
6
SSH 22
6, 13
DNS 53
5, 6
SMTP 25
6
SFTP 22
6
FTP 20, 21
6
TFTP 69
6
TELNET 23
6
DHCP 67, 68
5, 6
HTTP 80
6
HTTPS 443
6
SNMP 161
6
RDP 3389
6, 13
NTP 123
6
SIP 5060, 5061
6
SMB 445
6
POP 110
6
IMAP 143
6
LDAP 389
6
LDAPS 636
6
H.323 1720
6
Protocol types
6
ICMP
6
UDP
6
TCP
6
IP
6
Connection-oriented vs. connectionless
6
1.2 Explain devices, applications, protocols, and services at their appropriate OSI layers.
2, 5, 6
Layer 1 – Physical
2, 5, 6
Layer 2 – Data link
2, 5, 6
Layer 3 – Network
2, 5, 6
Layer 4 – Transport
2, 5, 6
Layer 5 – Session
2, 5, 6
Layer 6 – Presentation
2, 5, 6
Layer 7 – Application
2, 5, 6
1.3 Explain the concepts and characteristics of routing and switching.
4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15, 16, 20
Properties of network traffic
4, 5, 7, 11, 12
Broadcast domains
4, 5, 7, 11
CSMA/CD
4, 5
CSMA/CA
5, 12
Collision domains
4, 5, 11
Protocol data units
6
MTU
4
Broadcast
5, 6, 7
Multicast
5, 6, 7
Unicast
5, 6, 7
Segmentation and interface properties
11, 15
VLANs
11, 15
Trunking (802.1q)
11
Tagging and untagging ports
11
Port mirroring
11
Switching loops/spanning tree
11
PoE and PoE+ (802.3af, 802.3at)
11
DMZ
15
MAC address table
11
ARP table
4
Routing
9, 10
Routing protocols (IPv4 and IPv6)
9, 10
Distance-vector routing protocols
9, 10
RIP
9, 10
EIGRP
9, 10
Link-state routing protocols
9, 10
OSPF
9, 10
Hybrid
9, 10
BGP
9, 10
Routing types
9
Static
9
Dynamic
9
Default
9
IPv6 concepts
10
Addressing
7
Tunneling
10
Dual stack
10
Router advertisement
10
Neighbor discovery
10
Performance concepts
5
Traffic shaping
5
QoS
20
Diffserv
20
CoS
20
NAT/PAT
8
Port forwarding
8
Access control list
13, 15
Distributed switching
11
Packet-switched vs. circuit-switched network
16
Software-defined networking
20
1.4 Given a scenario, configure the appropriate IP addressing components.
7, 8, 20
Private vs. public
7
Loopback and reserved
7
Default gateway
7
Virtual IP
7, 20
Subnet mask
7
Subnetting
8
Default gateway
8
Classful
7, 8
Classes A, B, C, D, and E
7, 8
Classless
8
VLSM
8
CIDR notation (IPv4 vs. IPv6)
8
Address assignments
7
DHCP
7
DHCPv6
7
Static
7
APIPA
7
EUI64
7
IP reservations
5
1.5 Compare and contrast the characteristics of network topologies, types, and technologies.
1, 12, 16
Wired topologies
1
Logical vs. physical
1
Star
1
Ring
1
Mesh
1
Bus
1
Wireless topologies
12
Mesh
12
Ad hoc
12
Infrastructure
12
Types
12, 16
LAN
16
WLAN
12
MAN
16
WAN
16
CAN
1
SAN
1
PAN
12
Technologies that facilitate the Internet of Things (IoT)
12
Z-Wave
12
Ant+
12
Bluetooth
12
NFC
12
IR
12
RFID
12
802.11
12
1.6 Given a scenario, implement the appropriate wireless technologies and configurations.
12
802.11 standards
12
a
12
b
12
g
12
n
12
ac
12
Cellular
12
GSM
12
TDMA
12
CDMA
12
Frequencies
12
2.4 GHz
12
5.0 GHz
12
Speed and distance requirements
12
Channel bandwidth
12
Channel bonding
12
MIMO/MU-MIMO
12
Unidirectional/omnidirectional
12
Site surveys
12
1.7 Summarize cloud concepts and their purposes.
20
Types of services
20
SaaS
20
PaaS
20
IaaS
20
Cloud delivery models
20
Private
20
Public
20
Hybrid
20
Connectivity methods
20
Security implications/considerations
20
Relationship between local and cloud resources
20
1.8 Explain the functions of network services.
5
DNS service
5
Record types
5
A, AAA
5
TXT (SPF, DKIM)
5
SRV
5
MX
5
CNAME
5
NS
5
PTR
5
Internal vs. external DNS
5
Third-party/cloud-hosted DNS
5
Hierarchy
5
Forward vs. reverse zone
5
DHCP service
5
MAC reservations
5
Pools
5
IP exclusions
5
Scope options
5
Lease time
5
TTL
5
DHCP relay/IP helper
5
NTP
6
IPAM
5
2.0 Infrastructure
2.1 Given a scenario, deploy the appropriate cabling solution.
3, 4
Media types
3
Copper
3
UTP
3
STP
3
Coaxial
3
Fiber
3
Single-mode
3
Multimode
3
Plenum vs. PVC
3
Connector types
3
Copper
3
RJ-45
3
RJ-11
3
BNC
3
DB-9
3
DB-25
3
F-type
3
Fiber
3
LC
3
ST
3
SC
3
APC
3
UPC
3
MTRJ
3
Transceivers
3
SFP
3
GBIC
3
SFP+
3
QSFP
3
Characteristics of fiber transceivers
3
Bidirectional
3
Duplex
3
Termination points
3
66 block
3
110 block
3
Patch panel
3
Fiber distribution panel
3
Copper cable standards
3
Cat 3
3
Cat 5
3
Cat 5e
3
Cat 6
3
Cat 6a
3
Cat 7
3
RG-6
3
RG-59
3
Copper termination standards
3
TIA/EIA 568a
3
TIA/EIA 568b
3
Crossover
3
Straight-through
3
Ethernet deployment standards
4
100BaseT
4
1000BaseT
4
1000BaseLX
4
1000BaseSX
4
10GBaseT
4
2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.
5, 10, 11, 12, 15
Firewall
15
Router
10
Switch
11
Hub
5
Bridge
11
Modems
5
Wireless access point
12
Media converter
5
Wireless range extender
5
VoIP endpoint
5