CompTIA Network+ Study Guide - Todd Lammle - E-Book

CompTIA Network+ Study Guide E-Book

Todd Lammle

0,0
32,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

To complement the CompTIA Network+ Study Guide: Exam N10-007, 4e, and the CompTIA Network+ Deluxe Study Guide: Exam N10-007, 4e, look at CompTIA Network+ Practice Tests: Exam N10-007 (9781119432128). Todd Lammle's bestselling CompTIA Network+ Study Guide for the N10-007 exam! CompTIA's Network+ certification tells the world you have the skills to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols. First, however, you have to pass the exam! This detailed CompTIA Authorized study guide by networking guru Todd Lammle has everything you need to prepare for the CompTIA Network+ Exam N10-007. Todd covers all exam objectives, explains key topics, offers plenty of practical examples, and draws upon his own invaluable 30 years of networking experience to help you learn. The Study Guide prepares you for Exam N10-007, the new CompTIA Network+ Exam: * Covers all exam objectives including network technologies, network installation and configuration, network media and topologies, security, and much more * Includes practical examples review questions, as well as access to practice exams and flashcards to reinforce learning * Networking guru and expert author Todd Lammle offers valuable insights and tips drawn from real-world experience Plus, receive one year of FREE access to a robust set of online interactive learning tools, including hundreds of sample practice questions, a pre-assessment test, bonus practice exams, and over 100 electronic flashcards. Prepare for the exam and enhance your career--starting now!

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 1582

Veröffentlichungsjahr: 2018

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Contents

Introduction

Assessment Test

Chapter 1: Introduction to Networks

First Things First: What’s a Network?

Physical Network Topologies

Topology Selection, Backbones, and Segments

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 2: The Open Systems Interconnection Specifications

Internetworking Models

The OSI Reference Model

Introduction to Encapsulation

Modulation Techniques

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 3: Networking Topologies, Connectors, and Wiring Standards

Physical Media

Cable Properties

Wiring Standards

Installing Wiring Distributions

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 4: The Current Ethernet Specifications

Network Basics

Ethernet Basics

Ethernet at the Data Link Layer

Ethernet at the Physical Layer

Ethernet over Other Standards (IEEE 1905.1-2013)

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 5: Networking Devices

Common Network Connectivity Devices

Other Specialized Devices

Planning and Implementing a Basic SOHO Network Using Network Segmentation

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 6: Introduction to the Internet Protocol

Introducing TCP/IP

Data Encapsulation

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 7: IP Addressing

IP Terminology

The Hierarchical IP Addressing Scheme

IPv4 Address Types

Internet Protocol Version 6 (IPv6)

Summary

Exam Essentials

Written Labs

Written Lab 7.1

Written Lab 7.2

Written Lab 7.3

Review Questions

Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT

Subnetting Basics

Troubleshooting IP Addressing

Introduction to Network Address Translation (NAT)

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 9: Introduction to IP Routing

Routing Basics

The IP Routing Process

Testing Your IP Routing Understanding

Static and Dynamic Routing

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 10: Routing Protocols

Routing Protocol Basics

Distance Vector Routing Protocols

Link State Routing Protocols

High Availability

Advanced IPv6 Concepts

IPv6 Routing Protocols

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 11: Switching and Virtual LANs

Networking Before Layer 2 Switching

Switching Services

Spanning Tree Protocol

Virtual LANs

VLAN Trunking Protocol

Two Additional Advanced Features of Switches

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 12: Wireless Networking

Introduction to Wireless Technology

Cellular

The 802.11 Standards

Comparing 802.11 Standards

Wireless Network Components

Installing a Wireless Network

Site Survey

Wireless Security

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 13: Authentication and Access Control

Security Filtering

Managing User Account and Password Security

User-Authentication Methods

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 14: Network Threats and Mitigation

Recognizing Security Threats

Vulnerabilities

Understanding Mitigation Techniques

Policies and Procedures

Anti-malware Software

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 15: Physical Security and Risk

Using Hardware and Software Security Devices

Defining Firewalls

Firewall Technologies

Firewalls at the Application Layer vs. the Network Layer

Scanning Services and Other Firewall Features

Intrusion Detection and Prevention Systems

VPN Concentrators

Understanding Problems Affecting Device Security

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 16: Wide Area Networks

What’s a WAN?

T-Series Connections

Transmission Media

Broadband Services

Wireless WAN Technologies

WAN Protocols

WAN Troubleshooting

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 17: Troubleshooting Tools

Protocol Analyzers

Throughput Testers

Connectivity Software

Using

traceroute

Using the

ping

Utility

Using the Address Resolution Protocol

Using the

nslookup

Utility

Resolving Names with the Hosts Table

Using the

Mtr

Command

(pathping)

Using the

route

Command

Using the

nbtstat

Utility

Using the

netstat

Utility

Using tcpdump

Using the File Transfer Protocol

Using the Telnet Utility

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 18: Software and Hardware Tools

Understanding Network Scanners

Baseline

Network Monitoring and Logging

Identifying Hardware Tools

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 19: Network Troubleshooting

Narrowing Down the Problem

Troubleshooting Steps

Troubleshooting Tips

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 20: Management, Monitoring, and Optimization

Managing Network Documentation

Network Monitoring

Network Optimization

Summary

Exam Essentials

Written Lab

20.6

Review Questions

Appendix A: Answers to Written Labs

Appendix B: Answers to Review Questions

Appendix C: Subnetting Class A

Index

Advert

EULA

List of Tables

Chapter 3

Table 3.1

Chapter 4

Table 4.1

Table 4.2

Table 4.3

Table 4.4

Chapter 5

Table 5.1

Chapter 6

Table 6.1

Table 6.2

Chapter 7

Table 7.1

Table 7.2

Table 7.3

Chapter 8

Table 8.1

Table 8.2

Table 8.3

Table 8.4

Chapter 10

Table 10.1

Table 10.2

Table 10.3

Chapter 12

Table 12.1

Table 12.2

Table 12.3

Chapter 15

Table 15.1

Chapter 16

Table 16.1

Table 16.2

Chapter 17

Table 17.1

Table 17.2

Table 17.3

Table 17.4

Table 17.5

Table 17.6

Table 17.7

Table 17.8

Chapter 18

Table 18.1

Chapter 20

Table 20.1

Table 20.2

List of Illustrations

Chapter 1

Figure 1.1

A basic network

Figure 1.2

Two separate LANs (workgroups)

Figure 1.3

A router connects LANs.

Figure 1.4

A network populated with servers and workstations

Figure 1.5

An internetwork

Figure 1.6

Multiprotocol Label Switching layout

Figure 1.7

A peer-to-peer network

Figure 1.8

A client-server network

Figure 1.9

A typical bus network’s physical topology

Figure 1.10

Typical star topology with a hub

Figure 1.11

A typical ring topology

Figure 1.12

A typical mesh topology

Figure 1.13

Three point-to-point connections

Figure 1.14

A point-to-multipoint network, example 1

Figure 1.15

A point-to-multipoint network, example 2

Figure 1.16

A simple hybrid network

Figure 1.17

Backbone and segments on a network

Chapter 2

Figure 2.1

Layer functions

Figure 2.2

The upper layers

Figure 2.3

The lower layers

Figure 2.4

Establishing a connection-oriented session

Figure 2.5

Transmitting segments with flow control

Figure 2.6

Windowing

Figure 2.7

Transport layer reliable delivery

Figure 2.8

Routing table used in a router

Figure 2.9

A router in an internetwork

Figure 2.10

Data Link layer

Figure 2.11

Data encapsulation

Chapter 3

Figure 3.1

A stripped-back thinnet cable

Figure 3.2

Male and female BNC connectors

Figure 3.3

Cat 5e UTP cable

Figure 3.4

RJ-11 and RJ-45 connectors

Figure 3.5

The pin-outs in an RJ-45 Connector, T568B standard

Figure 3.6

UPC and APC connectors

Figure 3.7

An example of an ST connector

Figure 3.8

A sample SC connector

Figure 3.9

Bidirectional communication

Figure 3.10

A sample MT-RJ fiber-optic connector

Figure 3.11

A sample LC fiber-optic connector

Figure 3.12

Single-mode fiber to Ethernet

Figure 3.13

Multimode fiber to Ethernet

Figure 3.14

Fiber to coaxial

Figure 3.15

Single-mode to multimode fiber

Figure 3.16

RS-232 cable ends

Figure 3.17

A USB port

Figure 3.18

A USB plug

Figure 3.19

T568A wired standard

Figure 3.20

T568B wired standard

Figure 3.21

Straight-through Ethernet cable

Figure 3.22

Crossover Ethernet cable

Figure 3.23

An inexpensive cable tester

Figure 3.24

UTP gigabit crossover Ethernet cable

Figure 3.25

Rolled Ethernet cable

Figure 3.26

A T1 crossover cable

Figure 3.27

A 110 block

Chapter 4

Figure 4.1

The basic network

Figure 4.2

CSMA/CD

Figure 4.3

Shorter and longer wavelengths

Figure 4.4

Ethernet addressing using MAC addresses

Figure 4.5

802.3 and Ethernet frame formats in bytes

Figure 4.6

Ethernet Physical layer specifications

Figure 4.7

Powerline adapter sets

Figure 4.8

Basic BPL installation

Figure 4.9

Ethernet over HDMI

Chapter 5

Figure 5.1

Network interface card

Figure 5.2

A typical hub

Figure 5.3

Bridges break up collision domains.

Figure 5.4

Typical Ethernet switch

Figure 5.5

Router connected to the Internet, providing access for hosts

Figure 5.6

Example of firewalls with a DMZ

Figure 5.7

Example of an AP in a network

Figure 5.8

DHCP client sends broadcasts looking for a DHCP server.

Figure 5.9

A Windows DHCP server's scope options

Figure 5.10

DHCP client request to a DHCP server

Figure 5.11

DHCP client parameter request list

Figure 5.12

DHCP server response

Figure 5.13

Configuring a DHCP relay

Figure 5.14

DNS resolution example

Figure 5.15

A Windows DNS server

Figure 5.16

A DNS query to www.lammle.com

Figure 5.17

The DNS answer to our query

Figure 5.18

Internal and external DNS

Figure 5.19

A proxy server

Figure 5.20

Encryption appliances

Figure 5.21

Content filtering appliance

Figure 5.22

Analog modem

Figure 5.23

Packet shaper

Figure 5.24

VPN concentrator

Figure 5.25

Media converter

Figure 5.26

A switch can replace the hub, breaking up collision domains.

Figure 5.27

Routers create an internetwork.

Figure 5.28

Internetworking devices

Figure 5.29

Switched networks creating an internetwork

Figure 5.30

A router in an internetwork

Figure 5.31

A switch in an internetwork

Figure 5.32

A hub in a network

Chapter 6

Figure 6.1

The DoD and OSI models

Figure 6.2

The TCP/IP protocol suite

Figure 6.3

DHCP client four-step process

Figure 6.4

TCP segment format

Figure 6.5

UDP segment

Figure 6.6

Port numbers for TCP and UDP

Figure 6.7

IPv4 header

Figure 6.8

ICMP error message is sent to the sending host from the remote router.

Figure 6.9

Local ARP broadcast

Figure 6.10

RARP broadcast example

Figure 6.11

Data encapsulation

Figure 6.12

PDU and layer addressing

Figure 6.13

Port numbers at the Transport layer

Chapter 7

Figure 7.1

Summary of the three classes of networks

Figure 7.2

IPv6 address example

Figure 7.3

EUI-64 interface ID assignment

Figure 7.4

A 6to4 tunnel

Chapter 8

Figure 8.1

Implementing a Class C /25 logical network

Figure 8.2

Implementing a Class C /26 logical network

Figure 8.3

Basic IP troubleshooting

Figure 8.4

IP address problem 1

Figure 8.5

IP address problem 2

Figure 8.6

Find the valid host.

Figure 8.7

Find the valid host #2.

Figure 8.8

Find the valid host address #3.

Figure 8.9

Find the valid subnet mask.

Figure 8.10

Where to configure NAT

Figure 8.11

Basic NAT translation

Figure 8.12

NAT overloading example (PAT)

Chapter 9

Figure 9.1

A simple routing example

Figure 9.2

IP routing example using two hosts and one router

Figure 9.3

Frame used from Host_A to the Lab_A router when Host_B is pinged

Figure 9.4

IP routing example 1

Figure 9.5

IP routing example 2

Figure 9.6

Routing options

Figure 9.7

Dynamic routing options

Figure 9.8

DV and LS routing protocols

Figure 9.9

Hybrid routing

Chapter 10

Figure 10.1

Routing flow tree

Figure 10.2

The internetwork with distance vector routing

Figure 10.3

Converged routing tables

Figure 10.4

Typical classful network

Figure 10.5

Classless network design

Figure 10.6

A discontiguous network

Figure 10.7

EIGRP tables

Figure 10.8

Border Gateway Protocol (BGP)

Figure 10.9

OSPF design example

Figure 10.10

IS-IS network terminology

Figure 10.11

FHRPs use a virtual router with a virtual IP address and virtual MAC address.

Figure 10.12

HSRP active and standby routers

Figure 10.13

Example of HSRP active and standby routers swapping interfaces

Figure 10.14

HSRP Hellos

Figure 10.15

First two steps to IPv6 auto-configuration

Figure 10.16

IPv6 auto-configuration example

Figure 10.17

IPv6 neighbor discovery: neighbor solicitation message

Chapter 11

Figure 11.1

A network before switching

Figure 11.2

The first switched LAN

Figure 11.3

The typical switched network design

Figure 11.4

Switches create private domains.

Figure 11.5

Empty forward/filter table on a switch

Figure 11.6

How switches learn hosts’ locations

Figure 11.7

Forward/filter table

Figure 11.8

Broadcast storm

Figure 11.9

Multiple frame copies

Figure 11.10

Distributed switching

Figure 11.11

A switched network with switching loops

Figure 11.12

An optimal hierarchical switch design

Figure 11.13

Flat network structure

Figure 11.14

The benefit of a switched network

Figure 11.15

Physical LANs connected to a router

Figure 11.16

Switches removing the physical boundary

Figure 11.17

Access and trunk links in a switched network

Figure 11.18

IEEE 802.1Q encapsulation with and without the 802.1Q tag

Figure 11.19

VTP modes

Figure 11.20

Port security on a switch port restricts port access by MAC address.

Figure 11.21

MAC flooding attack

Figure 11.22

Before and after port channels

Figure 11.23

Switched Ethernet ports can provide power to devices.

Figure 11.24

An external power injector used for PoE

Figure 11.25

Wireless bridge power injector

Figure 11.26

Switches send frames out the destination port only.

Figure 11.27

Place a hub between two hosts to troubleshoot.

Figure 11.28

Port spanning/mirroring

Chapter 12

Figure 12.1

Unlicensed frequencies

Figure 12.2

Wireless LAN history

Figure 12.3

802.11b CSMA/CA

Figure 12.4

ISM 2.4 GHz channels

Figure 12.5

U-NII 5 GHz band has 12 non-overlapping channels (US)

Figure 12.6

Standards for spectrums and speeds

Figure 12.7

Range comparisons of 802.11 standards

Figure 12.8

A wireless access point

Figure 12.9

A wireless NIC

Figure 12.10

A wireless network in ad hoc mode

Figure 12.11

A wireless network in infrastructure mode

Figure 12.12

Extended service set (ESS)

Figure 12.13

Stand-alone and controller-based wireless networks

Figure 12.14

LWAPP

Figure 12.15

Mobile hot spot

Figure 12.16

iPhone hot spot

Figure 12.17

Basic coverage

Figure 12.18

Enterprise design

Figure 12.19

A multifloor installation

Figure 12.20

A heat map of a building

Figure 12.21

RADIUS authentication server

Chapter 13

Figure 13.1

Two networks with an ACL-enabled router

Figure 13.2

A tunnel through the Internet

Figure 13.3

Example of using a VPN network

Figure 13.4

The SSL connection process

Figure 13.5

GRE encapsulation

Figure 13.6

TCP/IP packet in IPSec transport mode with AH

Figure 13.7

TCP/IP packet in IPSec tunnel mode with ESP

Figure 13.8

Public-key encryption

Figure 13.9

The PGP encryption system

Figure 13.10

A typical remote-access connection between a remote user and a server

Figure 13.11

ILO port

Figure 13.12

The certificate authority process

Figure 13.13

PKI in action

Figure 13.14

The Kerberos authentication process

Figure 13.15

TACACS+ login and logout sequence

Figure 13.16

CHAP authentication process

Chapter 14

Figure 14.1

Unreachable gateway

Figure 14.2

Botnet

Figure 14.3

Smurf attack in progress

Figure 14.4

A simple DoS/SYN flood attack

Figure 14.5

DNS amplification attack

Figure 14.6

IP4 packets tunneled in DNS

Figure 14.7

VLAN hopping

Figure 14.8

An email virus spreading rapidly

Figure 14.9

Multipartite virus

Figure 14.10

Wireshark

Figure 14.11

Man-in-the-middle attack

Figure 14.12

A common DMZ configuration

Figure 14.13

Automating Windows Update

Figure 14.14

Open case warning in the BIOS

Chapter 15

Figure 15.1

A typical secured network

Figure 15.2

Two networks with an ACL-enabled router

Figure 15.3

A firewall with a DMZ

Figure 15.4

Protocol switching with and without a dead zone

Figure 15.5

A hacker denied by a dynamic state list

Figure 15.6

A packet going to a proxy

Figure 15.7

Virtual wire

Figure 15.8

Internet Options Security tab

Figure 15.9

Adding a trusted site

Figure 15.10

Custom security settings

Figure 15.11

An MD-IDS system in action

Figure 15.12

An IDS connected to the network

Figure 15.13

Shutting down port 80 for 60 seconds to stop an attack

Figure 15.14

Deceiving an attacker with a honeypot

Figure 15.15

VPN concentrator in a network

Figure 15.16

A three-layer security model

Figure 15.17

Mantrap

Figure 15.18

Network perimeter defense

Figure 15.19

Network divided into security zones

Figure 15.20

Using routers to divide a network into security zones

Figure 15.21

RAID-0

Figure 15.22

RAID-1

Figure 15.23

RAID-5

Figure 15.24

Nessus

Chapter 16

Figure 16.1

A typical wide area network

Figure 16.2

WAN connection types

Figure 16.3

An example of a satellite point-to-multipoint

Figure 16.4

Broadband access using cable or DSL

Figure 16.5

Cable network

Figure 16.6

Before Frame Relay

Figure 16.7

After Frame Relay

Figure 16.8

Point-to-Point Protocol stack

Figure 16.9

PPP session establishment

Figure 16.10

DMVPN

Figure 16.11

SIP trunk

Figure 16.12

WAN troubleshooting spots

Chapter 17

Figure 17.1

DHCP capture

Figure 17.2

Throughput

Figure 17.3

LogMeIn

Figure 17.4

Elevating your command prompt

Figure 17.5

TCP flags

Figure 17.6

route print

output

Figure 17.7

Sample output of the

nbtstat –a

command

Figure 17.8

Sample output of the

nbtstat –c

command

Figure 17.9

Sample output of the

nbtstat –n

command

Figure 17.10

Sample output of the

nbtstat –r

command

Figure 17.11

Sample output of the

nbtstat –S

command

Figure 17.12

Sample output of the

nbtstat –s

command

Figure 17.13

Sample output of the

netstat –a

command

Figure 17.14

The Telnet utility

Chapter 18

Figure 18.1

Output from a packet sniffer

Figure 18.2

A Cisco ASA

Figure 18.3

IDS/IPS placement in an internetwork

Figure 18.4

Nmap in action

Figure 18.5

Angry IP port scanning

Figure 18.6

Wireless analyzer

Figure 18.7

Wireless survey tool

Figure 18.8

SNMP GET and TRAP messages

Figure 18.9

Syslog server and client

Figure 18.10

Speakeasy Speed Test

Figure 18.11

Looking Glass site output

Figure 18.12

Windows Event Viewer system log

Figure 18.13

Mac Activity Monitor

Figure 18.14

Wireless channel utilization

Figure 18.15

An inexpensive cable tester

Figure 18.16

Ethernet loopback plug

Figure 18.17

Fiber loopback plug

Figure 18.18

Sample OTDR output

Figure 18.19

A multimeter

Figure 18.20

Spectrum analyzer output

Figure 18.21

A toner probe

Figure 18.22

A butt set

Figure 18.23

An example of a punch-down tool

Figure 18.24

Using a punch-down tool on a small keystone connector

Figure 18.25

A combination cable stripper, crimper, and snippers

Chapter 19

Figure 19.1

Cannot connect

Figure 19.2

Host could not be found.

Figure 19.3

Successful ping

Figure 19.4

Rogue DHCP

Figure 19.5

Certificate error

Figure 19.6

Netstat -a

Figure 19.7

Service dependencies

Figure 19.8

ipconfig/all

Figure 19.9

Manage Network Connections

Figure 19.10

Interface properties

Figure 19.11

IP properties

Figure 19.12

Obtain DNS Server Address Automatically

Figure 19.13

ipconfig /all

Chapter 20

Figure 20.1

RJ-45 connector

Figure 20.2

Two ends of a crossover cable

Figure 20.3

Rack-mounted switches

Figure 20.4

Simple network physical diagram

Figure 20.5

Network diagram with firewalls from SmartDraw

Figure 20.6

Hardware-rack diagram from SmartDraw

Figure 20.7

Logical network diagram

Figure 20.8

Grounding methods

Figure 20.9

Hot and cold aisles

Figure 20.10

Backup types

Figure 20.11

Guests and hosts

Figure 20.12

Hypervisors

Figure 20.13

Virtualization

Figure 20.14

Classic SAN vs. iSCSI

Figure 20.15

NAS and SAN

Figure 20.16

MDF and IDFs

Figure 20.17

Cable trays

Figure 20.18

Two-post racks

Figure 20.19

Four-post rack

Figure 20.20

Freestanding rack

Guide

Cover

Table of Contents

Acknowledgments

Pages

C1

i

v

vi

vii

ix

xxix

xxx

xxxi

xxxii

xxxiii

xxxiv

xxxv

xxxvi

xxxvii

xxxviii

xxxix

xl

xli

xlii

xliii

xliv

xlv

xlvi

xlvii

xlviii

xlix

l

li

lii

liii

liv

lv

lvi

lvii

lviii

lix

lx

lxi

lxii

lxiii

lxiv

lxv

lxvi

lxvii

lxviii

lxix

lxx

lxxi

lxxii

lxxiii

lxxiv

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

111

112

113

114

115

116

117

118

119

120

121

122

123

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

512

513

514

515

516

517

518

519

520

521

522

523

524

525

526

527

528

529

530

531

532

533

534

535

536

537

538

539

540

541

542

543

544

545

546

547

548

549

550

551

552

553

554

555

556

557

558

559

560

561

562

563

564

565

566

567

568

569

570

571

572

573

574

575

576

577

578

579

580

581

582

583

584

585

586

587

588

589

590

591

592

593

594

595

596

597

598

599

600

601

602

603

604

605

606

607

608

609

610

611

612

613

614

615

616

617

618

619

620

621

622

623

624

625

626

627

628

629

630

631

632

633

634

635

636

637

638

639

640

641

642

643

644

645

646

647

648

649

650

651

652

653

654

655

656

657

658

659

660

661

662

663

664

665

666

667

668

669

670

671

672

673

674

675

676

677

678

679

680

681

682

683

684

685

686

687

688

689

691

692

693

694

695

696

697

698

699

700

701

702

703

704

705

706

707

708

709

710

711

712

713

714

715

716

717

718

719

720

721

722

723

724

725

726

727

728

729

730

731

732

733

734

735

736

737

738

739

740

741

742

743

744

745

746

747

748

749

750

751

752

753

754

755

756

757

758

759

760

761

762

763

764

765

766

767

768

769

770

771

772

773

774

775

776

777

778

779

781

782

783

784

785

786

787

788

789

790

791

792

793

794

795

796

797

798

799

800

801

802

803

804

805

806

807

808

809

810

811

812

813

814

815

816

817

818

819

820

821

822

823

824

825

826

827

828

829

830

831

832

833

834

835

836

837

838

839

840

841

842

843

844

845

846

847

848

849

850

851

852

853

854

855

856

857

858

859

860

861

862

863

864

865

866

867

868

869

870

871

872

873

874

875

876

877

878

879

880

881

882

883

884

885

886

887

888

889

890

891

892

893

895

896

897

898

899

900

901

902

903

904

905

906

907

908

909

910

911

912

913

914

915

916

917

918

919

920

921

922

923

924

925

926

927

928

929

930

931

932

e1

CompTIA®Network+®

Study Guide Exam N10-007Fourth Edition

Todd Lammle

Senior Acquisitions Editor: Kenyon Brown Development Editor: Kim Wimpsett Technical Editors: Wynn D. Smith and Jon Buhagiar Senior Production Editor: Christine O’Connor Copy Editor: Judy Flynn Editorial Manager: Mary Beth Wakefield Production Manager: Kathleen Wisor Executive Editor: Jim Minatel Book Designers: Judy Fung and Bill Gibson Proofreader: Amy Schneider Indexer: Ted Laux Project Coordinator, Cover: Brent Savage Cover Designer: Wiley Cover Image: Getty Images Inc./Jeremy Woodhouse

Copyright © 2018 by John Wiley & Sons, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN: 978-1-119-43225-8 ISBN: 978-1-119-43222-7 (ebk.) ISBN: 978-1-119-43226-5 (ebk.)

Manufactured in the United States of America

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Control Number: 2018937836

TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA and Network+ are trademarks or registered trademarks of CompTIA Properties, LLC. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

Acknowledgments

Kim Wimpsett was the development editor of this Sybex CompTIA series. Thank you, Kim, for your patience and kindness, and working so hard on this book with me.

Kenyon Brown was acquisitions editor for this book. Thank you, Kenyon, for making this book a reality!

In addition, Christine O’Connor was an excellent production editor, and she worked really hard to get the book done as quickly as possible, without missing the small mistakes that are so easy to overlook. I am always very pleased when I hear that she will be working with me on a new project.

Wynn D. Smith reviewed each topic in this guide, scrutinizing the material until we both agreed it was verifiably solid. Thank you, Wynn!

Troy McMillan literally hashed and rehashed each topic in this guide with me at all hours of the day and night. Thank you, Troy, yet again!

About the Author

Todd Lammle, CompTIA Network+, CCSI, CCNA/CCNP, is the authority on network certification and internetworking. He is a world-renowned author, speaker, trainer, and consultant with more than 100 study guides in print. Todd has more than 30 years of experience working with LANs, WANs, and large licensed and unlicensed wireless networks and currently is working on a Cisco Security expert certification. He’s president and CEO of Todd Lammle, LLC, a network-integration and training firm based in Colorado, Texas, and San Francisco, California. You can reach Todd through his website at www.lammle.com/network±.

Introduction

If you’re like most of us in the networking community, you probably have one or more network certifications. If that’s you, you’re very wise in choosing a CompTIA Network+ (N10-007) certification to proudly add to your repertoire because that achievement will make you all the more valuable as an employee. In these challenging economic times, keeping ahead of the competition—even standing out among your present colleagues—could make a big difference in whether you gain a promotion or possibly keep your job instead of being the one who gets laid off! Or maybe this is your first attempt at certification because you’ve decided to venture into a new career in information technology (IT). You’ve realized that getting into the IT sector is a good way to go because as the information age marches on, the demand for knowledgeable professionals in this dynamic field will only intensify dramatically.

Either way, certification is one of the best things you can do for your career if you are working in, or want to break into, the networking profession because it proves that you know what you’re talking about regarding the subjects in which you’re certified. It also powerfully endorses you as a professional in a way that’s very similar to a physician being board certified in a certain area of expertise.

In this book, you’ll find out what the Network+ exam is all about because each chapter covers a part of the exam. I’ve included some great review questions at the end of each chapter to help crystallize the information you learned and solidly prepare you to ace the exam.

A really cool thing about working in IT is that it’s constantly evolving, so there are always new things to learn and fresh challenges to master. Once you obtain your Network+ certification and discover that you’re interested in taking it further by getting into more complex networking (and making more money), the Cisco CCNA certification is definitely your next step; you can get the skinny on that and even more in-depth certifications on my blog at www.lammle.com.

For Network+ training with Todd Lammle, both instructor-led and online, please see www.lammle.com/network+.

What Is the Network+ Certification?

Network+ is a certification developed by the Computing Technology Industry Association (CompTIA) that exists to provide resources and education for the computer and technology community. This is the same body that developed the A+ exam for PC technicians.

The Network+ exam was designed to test the skills of network technicians with 18 to 24 months of experience in the field. It tests areas of networking technologies such as the definition of a protocol, the Open Systems Interconnection (OSI) model and its layers, and the concepts of network design and implementation—the minimum knowledge required for working on a network and some integral prerequisites for network design and implementation.

Why Become Network+ Certified?

Because CompTIA is a well-respected developer of vendor-neutral industry certifications, becoming Network+ certified proves you’re competent in the specific areas covered by the Network+ objectives.

Four major benefits are associated with becoming Network+ certified:

Proof of Professional Achievement Networking professionals are pretty competitive when it comes to collecting more certifications than their peers. And because the Network+ certification broadly covers the entire field of networking, technicians want this certification a lot more than just Microsoft certifications—Network+ is a lot more prestigious and valuable. Because it’s rare to gain something that’s worth a lot with little effort, I’ll be honest—preparing for the Network+ exam isn’t exactly a lazy day at the beach. (However, beaches do happen to be really high on my personal list of great places to study!) And people in IT know that it isn’t all that easy to pass the Network+ exam, so they’ll definitely respect you more and know that you’ve achieved a certain level of expertise about vendor-independent, networking-related subjects.

Opportunity for Advancement We all like to get ahead in our careers—advancement results in more responsibility and prestige, and it usually means a fatter paycheck, greater opportunities, and added options. In the IT sector, a great way to make sure all that good stuff happens is by earning a lot of technology certifications, including Network+.

Fulfillment of Training Requirements Network+, because of its wide-reaching industry support, is recognized as a baseline of networking information. Some companies actually specify the possession of a Network+ certification as a job requirement before they’ll even consider hiring you, or it may be specified as a goal to be met before your next review.

Customer Confidence As companies discover the CompTIA advantage, they will undoubtedly require qualified staff to achieve these certifications. Many companies outsource their work to consulting firms with experience working with security. Firms that have certified staff have a definite advantage over firms that don’t.

How to Become Network+ Certified

As this book goes to press, Pearson VUE is the sole Network+ exam provider. The following is the necessary contact information and exam-specific details for registering. Exam pricing might vary by country or by CompTIA membership.

Vendor

Website

Phone Number

Pearson VUE

www.pearsonvue.com/comptia

US and Canada: 877-551-PLUS (7587)

When you schedule the exam, you’ll receive instructions regarding appointment and cancellation procedures, ID requirements, and information about the testing center location. In addition, you’ll receive a registration and payment confirmation letter. Exams can be scheduled up to six weeks out or as soon as the next day (or, in some cases, even the same day).

Exam prices and codes may vary based on the country in which the exam is administered. For detailed pricing and exam registration procedures, refer to CompTIA’s website at www.comptia.org.

After you’ve successfully passed your Network+ exam, CompTIA will award you a certification. Within four to six weeks of passing the exam, you’ll receive your official CompTIA Network+ certificate and ID card. (If you don’t receive these within eight weeks of taking the test, contact CompTIA directly using the information found in your registration packet.)

Tips for Taking the Network+ Exam

Here are some general tips for taking your exam successfully:

Bring two forms of ID with you. One must be a photo ID, such as a driver’s license. The other can be a major credit card or a passport. Both forms must include a signature.

Arrive early at the exam center so you can relax and review your study materials, particularly tables and lists of exam-related information. After you are ready to enter the testing room, you will need to leave everything outside; you won’t be able to bring any materials into the testing area.

Read the questions carefully. Don’t be tempted to jump to an early conclusion. Make sure you know exactly what each question is asking.

Don’t leave any unanswered questions. Unanswered questions are scored against you. There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you to either “choose two” or “choose all that apply.” Be sure to read the messages displayed to know how many correct answers you must choose.

When answering multiple-choice questions you’re not sure about, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.

On form-based tests (nonadaptive), because the hard questions will take the most time, save them for last. You can move forward and backward through the exam.

Who Should Read This Book?

You—if want to pass the Network+ exam, and pass it confidently! This book is chock-full of the exact information you need and directly maps to Network+ exam objectives, so if you use it to study for the exam, your odds of passing shoot way up.

And in addition to including every bit of knowledge you need to learn to pass the exam, I’ve included some really great tips and solid wisdom to equip you even further to successfully work in the real IT world.

What Does This Book Cover?

This book covers everything you need to know to pass the CompTIA Network+ exam. But in addition to studying the book, it’s a good idea to practice on an actual network if you can.

Here’s a list of the 20 chapters in this book:

Chapter 1, “Introduction to Networks” This chapter includes an introduction to what a network is and an overview of the most common physical network topologies you’ll find in today’s networks.

Chapter 2, “The Open Systems Interconnection Specifications” This chapter covers the OSI model, what it is, what happens at each of its layers, and how each layer works.

Chapter 3, “Networking Topologies, Connectors, and Wiring Standards” This chapter covers the various networking media and topologies, plus the cable types and properties used in today’s networks.

Chapter 4, “The Current Ethernet Specifications” This chapter covers how a basic Ethernet LAN works and describes and categorizes the different Ethernet specifications.

Chapter 5, “Networking Devices” It’s important for you to understand all the various devices used in today’s networks, and this chapter will describe how hubs, routers, and switches and some other devices work within a network.

Chapter 6, “Introduction to the Internet Protocol” This is your introduction to the all-important IP protocol stack.

Chapter 7, “IP Addressing” This chapter will take up from where Chapter 6 left off and move into IP addressing. It also contains information about public versus private addressing and DHCP.

Chapter 8, “IP Subnetting, Troubleshooting IP, and Introduction to NAT” Beginning where Chapter 7 ends, we’ll be tackling IP subnetting in this one. But no worries here—I’ve worked hard to make this not-so-popular-yet-vital topic as painless as possible.

Chapter 9, “Introduction to IP Routing” This is an introduction to routing that basically covers what routers do and how they do it. This chapter, along with Chapter 10 and Chapter 11, cover routing and switching in much more detail than what is necessary to meet the CompTIA Network+ objectives because this knowledge is so critical to grasp when working with today’s networks.

Chapter 10, “Routing Protocols” This chapter goes into detail describing the protocols that run on routers and that update routing tables to create a working map of the network.

Chapter 11, “Switching and Virtual LANs” This chapter covers Layer 2 switching, the Spanning Tree Protocol (STP), and virtual LANs. I went deeper than needed for the exam with the routing chapters, and I’ll cover switching and virtual LANs (which are also vital in today’s corporate networks) more thoroughly as well.

Chapter 12, “Wireless Networking” Because wireless is so important for both home and business networks today, this chapter is loaded with all the information you need to be successful at wireless networking at home and work.

Chapter 13, “Authentication and Access Control” This is the first of three security chapters. There are tons of exam objectives about network security that are so important that I took three chapters to cover all of them. In this chapter, I’ll introduce security, security filtering, tunneling, and user authentication.

Chapter 14, “Network Threats and Mitigation” This is probably the most fun of the three security chapters because I’ll tell you all about security threats and how to stop them. The only way to get good at network security is to implement it, and this chapter shows you how.

Chapter 15, “Physical Security and Risk” This chapter’s focus is on explaining basic firewalls, security devices, and device security.

Chapter 16, “Wide Area Networks” In this chapter, you get to learn all about things like Frame Relay, E1/T1, DSL, cable modems, and more. All of the CompTIA Network+ WAN objectives are covered in this chapter.

Chapter 17, “Troubleshooting Tools” This is also a fun chapter because, again, you can follow along and run all the commands yourself. And I repeat, it’s a really good idea to run through all the commands in this chapter!

Chapter 18, “Software and Hardware Tools” This chapter introduces you to the network tools you will use to help you run your networks. Both software and hardware tools will be discussed.

Chapter 19, “Network Troubleshooting” In almost every chapter, I discuss how to verify and fix problems, but this chapter will really get into the nuts and bolts of detailed network troubleshooting and documentation.

Chapter 20, “Management, Monitoring, and Optimization” This last chapter will provide configuration-management documentation and covers wiring, logical diagrams, baselines, policies, and regulations.

What’s Included in the Book

I’ve included several study tools throughout the book:

Assessment Test At the end of this introduction is an assessment test that you can use to check your readiness for the exam. Take this test before you start reading the book; it will help you determine the areas you might need to brush up on. The answers to the assessment test questions appear on a separate page after the last question of the test. Each answer includes an explanation and a note telling you the chapter in which the material appears.

Objective Map and Opening List of Objectives On the inside front cover of this book is a detailed exam objective map showing you where each of the exam objectives is covered in this book. In addition, each chapter opens with a list of the exam objectives it covers. Use these to see exactly where each of the exam topics is covered.

Exam Essentials Each chapter, just after the summary, includes a number of exam essentials. These are the key topics you should take from the chapter in terms of areas to focus on when preparing for the exam.

Written Lab Each chapter includes a written lab. These are short exercises that map to the exam objectives. Answers to these can be found in Appendix A.

Chapter Review Questions To test your knowledge as you progress through the book, there are review questions at the end of each chapter. As you finish each chapter, answer the review questions and then check your answers—the correct answers and explanations are in Appendix B. You can go back to reread the section that deals with each question you got wrong to ensure that you answer correctly the next time you’re tested on the material.

Interactive Online Learning Environment and Test Bank

The interactive online learning environment that accompanies CompTIA Network+ Study Guide: Exam N10-007 provides a test bank with study tools to help you prepare for the certification exam—and increase your chances of passing it the first time! The test bank includes the following tools:

Sample Tests All of the questions in this book are provided, including the assessment test, which you’ll find at the end of this introduction, and the chapter tests that include the review questions at the end of each chapter. In addition, there are two practice exams. Use these questions to test your knowledge of the study guide material. The online test bank runs on multiple devices.

Flashcards Approximately 100 questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and provide last-minute test prep before the exam.

Other Study Tools A glossary of key terms from this book and their definitions are available as a fully searchable PDF.

Go to http://www.wiley.com/go/netplustestprep to register and gain access to this interactive online learning environment and test bank with study tools.

How to Use This Book

If you want a solid foundation for the serious effort of preparing for the Network+ exam, then look no further because I’ve spent countless hours putting together this book with the sole intention of helping you pass it!

This book is loaded with valuable information, and you will get the most out of your study time if you understand how I put the book together. Here’s a list that describes how to approach studying:

Take the assessment test immediately following this introduction. (The answers are at the end of the test, but no peeking!) It’s okay if you don’t know any of the answers—that’s what this book is for. Carefully read over the explanations for any question you get wrong, and make note of the chapters where that material is covered.

Study each chapter carefully, making sure you fully understand the information and the exam objectives listed at the beginning of each one. Again, pay extra-close attention to any chapter that includes material covered in questions you missed on the assessment test.

Complete the written lab at the end of each chapter. Do

not

skip these written exercises because they directly map to the CompTIA objectives and what you’ve got to have nailed down to meet them.

Answer all the review questions related to each chapter. Specifically note any questions that confuse you, and study the corresponding sections of the book again. And don’t just skim these questions—make sure you understand each answer completely.

Try your hand at the practice exams. Before you take your test, be sure to visit my website for questions, videos, audios, and other useful information.

Test yourself using all the electronic flashcards. This is a brand-new and updated flashcard program to help you prepare for the latest CompTIA Network+ exam, and it is a really great study tool.

I tell you no lies—learning every bit of the material in this book is going to require applying yourself with a good measure of discipline. So try to set aside the same time period every day to study, and select a comfortable and quiet place to do so. If you work hard, you will be surprised at how quickly you learn this material.

If you follow the steps listed here and study with the review questions, practice exams, electronic flashcards, and all the written labs, you would almost have to try to fail the CompTIA Network+ exam. However, studying for the Network+ exam is like training for a marathon—if you don’t go for a good run every day, you’re not likely to finish very well.

This book covers everything about CompTIA Network+. For up-to-date information about Todd Lammle CompTIA boot camps, audio training, and training videos, please see www.lammle.com/network+.

Exam Objectives

Speaking of objectives, you’re probably pretty curious about those, right? CompTIA asked groups of IT professionals to fill out a survey rating the skills they felt were important in their jobs, and the results were grouped into objectives for the exam and divided into five domains.

This table gives you the extent by percentage that each domain is represented on the actual examination.

Domain

% of Examination

1.0 Networking Concepts

23%

2.0 Infrastructure

18%

3.0 Network Operations

17%

4.0 Network Security

20%

5.0 Network Troubleshooting and Tools

22%

Total

100%

N10-007 Exam Objectives

Objective

Chapter

1.0 Networking Concepts

 

1.1 Explain the purposes and uses of ports and protocols.

5, 6, 13

Protocols and ports

6

 SSH 22

6, 13

 DNS 53

5, 6

 SMTP 25

6

 SFTP 22

6

 FTP 20, 21

6

 TFTP 69

6

 TELNET 23

6

 DHCP 67, 68

5, 6

 HTTP 80

6

 HTTPS 443

6

 SNMP 161

6

 RDP 3389

6, 13

 NTP 123

6

 SIP 5060, 5061

6

 SMB 445

6

 POP 110

6

 IMAP 143

6

 LDAP 389

6

 LDAPS 636

6

 H.323 1720

6

Protocol types

6

 ICMP

6

 UDP

6

 TCP

6

 IP

6

Connection-oriented vs. connectionless

6

1.2 Explain devices, applications, protocols, and services at their appropriate OSI layers.

2, 5, 6

Layer 1 – Physical

2, 5, 6

Layer 2 – Data link

2, 5, 6

Layer 3 – Network

2, 5, 6

Layer 4 – Transport

2, 5, 6

Layer 5 – Session

2, 5, 6

Layer 6 – Presentation

2, 5, 6

Layer 7 – Application

2, 5, 6

1.3 Explain the concepts and characteristics of routing and switching.

4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15, 16, 20

Properties of network traffic

4, 5, 7, 11, 12

 Broadcast domains

4, 5, 7, 11

 CSMA/CD

4, 5

 CSMA/CA

5, 12

 Collision domains

4, 5, 11

 Protocol data units

6

 MTU

4

 Broadcast

5, 6, 7

 Multicast

5, 6, 7

 Unicast

5, 6, 7

Segmentation and interface properties

11, 15

 VLANs

11, 15

 Trunking (802.1q)

11

 Tagging and untagging ports

11

 Port mirroring

11

 Switching loops/spanning tree

11

 PoE and PoE+ (802.3af, 802.3at)

11

 DMZ

15

MAC address table

11

ARP table

4

Routing

9, 10

 Routing protocols (IPv4 and IPv6)

9, 10

 Distance-vector routing protocols

9, 10

 RIP

9, 10

 EIGRP

9, 10

 Link-state routing protocols

9, 10

 OSPF

9, 10

 Hybrid

9, 10

 BGP

9, 10

Routing types

9

 Static

9

 Dynamic

9

 Default

9

IPv6 concepts

10

 Addressing

7

 Tunneling

10

Dual stack

10

Router advertisement

10

Neighbor discovery

10

Performance concepts

5

 Traffic shaping

5

 QoS

20

 Diffserv

20

 CoS

20

NAT/PAT

8

Port forwarding

8

Access control list

13, 15

Distributed switching

11

Packet-switched vs. circuit-switched network

16

Software-defined networking

20

1.4 Given a scenario, configure the appropriate IP addressing components.

7, 8, 20

Private vs. public

7

Loopback and reserved

7

Default gateway

7

Virtual IP

7, 20

Subnet mask

7

Subnetting

8

 Default gateway

8

 Classful

7, 8

 Classes A, B, C, D, and E

7, 8

 Classless

8

 VLSM

8

 CIDR notation (IPv4 vs. IPv6)

8

Address assignments

7

 DHCP

7

 DHCPv6

7

 Static

7

 APIPA

7

 EUI64

7

 IP reservations

5

1.5 Compare and contrast the characteristics of network topologies, types, and technologies.

1, 12, 16

Wired topologies

1

 Logical vs. physical

1

 Star

1

 Ring

1

 Mesh

1

 Bus

1

Wireless topologies

12

 Mesh

12

 Ad hoc

12

 Infrastructure

12

Types

12, 16

 LAN

16

 WLAN

12

 MAN

16

 WAN

16

 CAN

1

 SAN

1

 PAN

12

Technologies that facilitate the Internet of Things (IoT)

12

 Z-Wave

12

 Ant+

12

 Bluetooth

12

 NFC

12

 IR

12

 RFID

12

802.11

12

1.6 Given a scenario, implement the appropriate wireless technologies and configurations.

12

802.11 standards

12

 a

12

 b

12

 g

12

 n

12

 ac

12

Cellular

12

 GSM

12

 TDMA

12

 CDMA

12

Frequencies

12

 2.4 GHz

12

 5.0 GHz

12

Speed and distance requirements

12

Channel bandwidth

12

Channel bonding

12

MIMO/MU-MIMO

12

Unidirectional/omnidirectional

12

Site surveys

12

1.7 Summarize cloud concepts and their purposes.

20

Types of services

20

 SaaS

20

 PaaS

20

 IaaS

20

Cloud delivery models

20

 Private

20

 Public

20

 Hybrid

20

Connectivity methods

20

Security implications/considerations

20

Relationship between local and cloud resources

20

1.8 Explain the functions of network services.

5

DNS service

5

 Record types

5

 A, AAA

5

 TXT (SPF, DKIM)

5

 SRV

5

 MX

5

 CNAME

5

 NS

5

 PTR

5

 Internal vs. external DNS

5

 Third-party/cloud-hosted DNS

5

 Hierarchy

5

 Forward vs. reverse zone

5

DHCP service

5

 MAC reservations

5

 Pools

5

 IP exclusions

5

 Scope options

5

 Lease time

5

 TTL

5

 DHCP relay/IP helper

5

NTP

6

IPAM

5

2.0 Infrastructure

 

2.1 Given a scenario, deploy the appropriate cabling solution.

3, 4

Media types

3

 Copper

3

 UTP

3

 STP

3

 Coaxial

3

 Fiber

3

 Single-mode

3

 Multimode

3

Plenum vs. PVC

3

Connector types

3

 Copper

3

 RJ-45

3

 RJ-11

3

 BNC

3

 DB-9

3

 DB-25

3

 F-type

3

Fiber

3

 LC

3

 ST

3

 SC

3

 APC

3

 UPC

3

 MTRJ

3

Transceivers

3

 SFP

3

 GBIC

3

 SFP+

3

 QSFP

3

Characteristics of fiber transceivers

3

 Bidirectional

3

 Duplex

3

Termination points

3

 66 block

3

 110 block

3

 Patch panel

3

 Fiber distribution panel

3

Copper cable standards

3

 Cat 3

3

 Cat 5

3

 Cat 5e

3

 Cat 6

3

 Cat 6a

3

 Cat 7

3

 RG-6

3

 RG-59

3

Copper termination standards

3

 TIA/EIA 568a

3

 TIA/EIA 568b

3

 Crossover

3

 Straight-through

3

Ethernet deployment standards

4

 100BaseT

4

 1000BaseT

4

 1000BaseLX

4

 1000BaseSX

4

 10GBaseT

4

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

5, 10, 11, 12, 15

Firewall

15

Router

10

Switch

11

Hub

5

Bridge

11

Modems

5

Wireless access point

12

Media converter

5

Wireless range extender

5

VoIP endpoint

5