| Introduction |
|
xxx | |
| Assessment Test |
|
lxvi | |
| Chapter 1 Introduction to Networks |
|
1 | (26) |
|
First Things First: What's a Network? |
|
|
2 | (9) |
|
|
|
3 | (2) |
|
Common Network Components |
|
|
5 | (2) |
|
|
|
7 | (2) |
|
Network Architecture: Peer-to-Peer or Client-Server? |
|
|
9 | (2) |
|
Physical Network Topologies |
|
|
11 | (8) |
|
|
|
12 | (1) |
|
|
|
13 | (1) |
|
|
|
14 | (1) |
|
|
|
15 | (1) |
|
|
|
16 | (1) |
|
Point-to-Multipoint Topology |
|
|
17 | (1) |
|
|
|
18 | (1) |
|
Topology Selection, Backbones, and Segments |
|
|
19 | (2) |
|
Selecting the Right Topology |
|
|
19 | (1) |
|
|
|
20 | (1) |
|
|
|
21 | (1) |
|
|
|
21 | (1) |
|
|
|
21 | (1) |
|
|
|
21 | (1) |
|
|
|
22 | (1) |
|
|
|
22 | (1) |
|
|
|
23 | (4) |
| Chapter 2 The Open Systems Interconnection Specifications |
|
27 | (28) |
|
|
|
28 | (2) |
|
|
|
29 | (1) |
|
Advantages of Reference Models |
|
|
29 | (1) |
|
|
|
30 | (15) |
|
|
|
32 | (1) |
|
|
|
33 | (1) |
|
|
|
33 | (1) |
|
|
|
33 | (7) |
|
|
|
40 | (2) |
|
|
|
42 | (3) |
|
|
|
45 | (1) |
|
Introduction to Encapsulation |
|
|
45 | (1) |
|
|
|
46 | (1) |
|
|
|
47 | (1) |
|
|
|
48 | (1) |
|
|
|
48 | (2) |
|
|
|
50 | (5) |
| Chapter 3 Networking Topologies, Connectors, and Wiring Standards |
|
55 | (36) |
|
|
|
57 | (16) |
|
|
|
58 | (2) |
|
|
|
60 | (4) |
|
|
|
64 | (5) |
|
|
|
69 | (1) |
|
|
|
69 | (2) |
|
|
|
71 | (2) |
|
|
|
73 | (2) |
|
|
|
73 | (1) |
|
|
|
74 | (1) |
|
|
|
74 | (1) |
|
Noise Immunity (Security, EMI) |
|
|
74 | (1) |
|
|
|
75 | (1) |
|
|
|
75 | (7) |
|
|
|
75 | (2) |
|
|
|
77 | (1) |
|
|
|
78 | (2) |
|
|
|
80 | (1) |
|
|
|
80 | (2) |
|
Installing Wiring Distributions |
|
|
82 | (2) |
|
|
|
82 | (2) |
|
|
|
84 | (1) |
|
|
|
85 | (1) |
|
|
|
85 | (2) |
|
|
|
87 | (4) |
| Chapter 4 The Current Ethernet Specifications |
|
91 | (34) |
|
|
|
92 | (2) |
|
|
|
94 | (5) |
|
|
|
94 | (1) |
|
|
|
94 | (1) |
|
|
|
95 | (1) |
|
|
|
96 | (1) |
|
|
|
97 | (1) |
|
|
|
97 | (1) |
|
Half-and Full-Duplex Ethernet |
|
|
98 | (1) |
|
Ethernet at the Data Link Layer |
|
|
99 | (7) |
|
Binary to Decimal and Hexadecimal Conversion |
|
|
100 | (3) |
|
|
|
103 | (1) |
|
|
|
104 | (2) |
|
Ethernet at the Physical Layer |
|
|
106 | (5) |
|
Ethernet over Other Standards (IEEE 1905.1-2013) |
|
|
111 | (3) |
|
|
|
112 | (1) |
|
|
|
113 | (1) |
|
|
|
114 | (1) |
|
|
|
115 | (1) |
|
|
|
115 | (5) |
|
|
|
120 | (5) |
| Chapter 5 Networking Devices |
|
125 | (50) |
|
Common Network Connectivity Devices |
|
|
128 | (18) |
|
|
|
129 | (1) |
|
|
|
130 | (1) |
|
|
|
131 | (1) |
|
|
|
131 | (1) |
|
|
|
132 | (4) |
|
|
|
136 | (1) |
|
|
|
137 | (1) |
|
|
|
137 | (1) |
|
|
|
138 | (1) |
|
|
|
138 | (1) |
|
|
|
139 | (2) |
|
Dynamic Host Configuration Protocol Server |
|
|
141 | (5) |
|
|
|
146 | (1) |
|
Other Specialized Devices |
|
|
146 | (13) |
|
|
|
147 | (1) |
|
|
|
147 | (1) |
|
Domain Name Service Server |
|
|
148 | (6) |
|
|
|
154 | (1) |
|
|
|
155 | (1) |
|
|
|
156 | (1) |
|
|
|
157 | (1) |
|
|
|
157 | (1) |
|
|
|
158 | (1) |
|
|
|
158 | (1) |
|
|
|
158 | (1) |
|
|
|
159 | (1) |
|
|
|
159 | (1) |
|
Planning and Implementing a Basic SOHO Network Using Network Segmentation |
|
|
159 | (10) |
|
|
|
159 | (7) |
|
Switches and Bridges at the Data Link Layer |
|
|
166 | (1) |
|
Hubs at the Physical Layer |
|
|
167 | (1) |
|
Environmental Considerations |
|
|
168 | (1) |
|
|
|
169 | (1) |
|
|
|
169 | (1) |
|
|
|
170 | (1) |
|
|
|
171 | (4) |
| Chapter 6 Introduction to the Internet Protocol |
|
175 | (34) |
|
|
|
177 | (21) |
|
A Brief History of TCP/IP |
|
|
177 | (1) |
|
|
|
178 | (2) |
|
The Process/Application Layer Protocols |
|
|
180 | (8) |
|
The Host-to-Host Layer Protocols |
|
|
188 | (4) |
|
The Internet Layer Protocols |
|
|
192 | (6) |
|
|
|
198 | (4) |
|
|
|
202 | (1) |
|
|
|
202 | (1) |
|
|
|
203 | (1) |
|
|
|
204 | (5) |
| Chapter 7 IP Addressing |
|
209 | (28) |
|
|
|
210 | (1) |
|
The Hierarchical IP Addressing Scheme |
|
|
211 | (7) |
|
|
|
212 | (4) |
|
Private IP Addresses (RFC 1918) |
|
|
216 | (2) |
|
|
|
218 | (2) |
|
|
|
219 | (1) |
|
|
|
219 | (1) |
|
|
|
219 | (1) |
|
Multicast Address (Class D) |
|
|
219 | (1) |
|
Internet Protocol Version 6 (IPv6) |
|
|
220 | (10) |
|
|
|
220 | (1) |
|
The Benefits of and Uses for IPv6 |
|
|
221 | (1) |
|
IPv6 Addressing and Expressions |
|
|
222 | (1) |
|
|
|
223 | (1) |
|
|
|
224 | (1) |
|
|
|
225 | (1) |
|
Stateless Autoconfiguration (EUI-64) |
|
|
226 | (1) |
|
|
|
227 | (1) |
|
|
|
227 | (3) |
|
|
|
230 | (1) |
|
|
|
230 | (1) |
|
|
|
231 | (2) |
|
|
|
231 | (1) |
|
|
|
232 | (1) |
|
|
|
232 | (1) |
|
|
|
233 | (4) |
| Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT |
|
237 | (42) |
|
|
|
238 | (22) |
|
|
|
239 | (1) |
|
|
|
240 | (1) |
|
Classless Inter-Domain Routing (CIDR) |
|
|
241 | (2) |
|
Subnetting Class C Addresses |
|
|
243 | (10) |
|
Subnetting Class B Addresses |
|
|
253 | (7) |
|
Troubleshooting IP Addressing |
|
|
260 | (8) |
|
Determining IP Address Problems |
|
|
263 | (5) |
|
Introduction to Network Address Translation (NAT) |
|
|
268 | (4) |
|
Types of Network Address Translation |
|
|
269 | (1) |
|
|
|
269 | (1) |
|
|
|
270 | (2) |
|
|
|
272 | (1) |
|
|
|
272 | (1) |
|
|
|
273 | (1) |
|
|
|
274 | (5) |
| Chapter 9 Introduction to IP Routing |
|
279 | (22) |
|
|
|
280 | (3) |
|
|
|
283 | (6) |
|
Testing Your IP Routing Understanding |
|
|
289 | (2) |
|
Static and Dynamic Routing |
|
|
291 | (3) |
|
|
|
294 | (1) |
|
|
|
294 | (1) |
|
|
|
294 | (2) |
|
|
|
296 | (5) |
| Chapter 10 Routing Protocols |
|
301 | (40) |
|
|
|
302 | (4) |
|
|
|
303 | (2) |
|
Classes of Routing Protocols |
|
|
305 | (1) |
|
Distance Vector Routing Protocols |
|
|
306 | (9) |
|
Routing Information Protocol (RIP) |
|
|
308 | (1) |
|
|
|
308 | (1) |
|
VLSM and Discontiguous Networks |
|
|
309 | (3) |
|
|
|
312 | (2) |
|
Border Gateway Protocol (BGP) |
|
|
314 | (1) |
|
Link State Routing Protocols |
|
|
315 | (4) |
|
Open Shortest Path First (OSPF) |
|
|
316 | (2) |
|
Intermediate System-to-Intermediate System (IS-IS) |
|
|
318 | (1) |
|
|
|
319 | (7) |
|
Hot Standby Router Protocol (HSRP) |
|
|
321 | (4) |
|
Virtual Router Redundancy Protocol |
|
|
325 | (1) |
|
|
|
326 | (6) |
|
|
|
326 | (2) |
|
|
|
328 | (1) |
|
|
|
329 | (3) |
|
|
|
332 | (1) |
|
|
|
332 | (2) |
|
|
|
333 | (1) |
|
|
|
333 | (1) |
|
|
|
333 | (1) |
|
|
|
334 | (1) |
|
|
|
334 | (1) |
|
|
|
335 | (1) |
|
|
|
336 | (5) |
| Chapter 11 Switching and Virtual LANs |
|
341 | (46) |
|
Networking Before Layer 2 Switching |
|
|
343 | (3) |
|
|
|
346 | (8) |
|
Limitations of Layer 2 Switching |
|
|
347 | (1) |
|
Bridging vs. LAN Switching |
|
|
348 | (1) |
|
Three Switch Functions at Layer 2 |
|
|
348 | (6) |
|
|
|
354 | (1) |
|
|
|
354 | (4) |
|
Spanning Tree Port States |
|
|
355 | (1) |
|
|
|
356 | (1) |
|
Rapid Spanning Tree Protocol 802.1w |
|
|
357 | (1) |
|
|
|
358 | (9) |
|
|
|
359 | (3) |
|
|
|
362 | (1) |
|
|
|
363 | (1) |
|
|
|
363 | (1) |
|
|
|
364 | (1) |
|
|
|
364 | (2) |
|
VLAN Identification Methods |
|
|
366 | (1) |
|
|
|
367 | (9) |
|
|
|
368 | (1) |
|
Do We Really Need to Put an IP Address on a Switch? |
|
|
369 | (3) |
|
|
|
372 | (3) |
|
|
|
375 | (1) |
|
|
|
376 | (1) |
|
Two Additional Advanced Features of Switches |
|
|
376 | (4) |
|
Power over Ethernet (802.3af, 802.3at) |
|
|
376 | (3) |
|
Port Mirroring/Spanning (SPAN/RSPAN) |
|
|
379 | (1) |
|
|
|
380 | (1) |
|
|
|
381 | (1) |
|
|
|
381 | (2) |
|
|
|
383 | (4) |
| Chapter 12 Wireless Networking |
|
387 | (52) |
|
Introduction to Wireless Technology |
|
|
390 | (3) |
|
|
|
393 | (1) |
|
|
|
393 | (6) |
|
|
|
395 | (1) |
|
|
|
396 | (1) |
|
|
|
397 | (1) |
|
|
|
397 | (1) |
|
|
|
398 | (1) |
|
|
|
399 | (1) |
|
Comparing 802.11 Standards |
|
|
399 | (2) |
|
|
|
400 | (1) |
|
Wireless Network Components |
|
|
401 | (4) |
|
|
|
401 | (1) |
|
Wireless Network Interface Card |
|
|
402 | (1) |
|
|
|
403 | (2) |
|
Installing a Wireless Network |
|
|
405 | (13) |
|
Ad Hoc Mode: Independent Basic Service Set |
|
|
405 | (1) |
|
Infrastructure Mode: Basic Service Set |
|
|
406 | (1) |
|
|
|
407 | (2) |
|
|
|
409 | (1) |
|
|
|
410 | (1) |
|
Other Network Infrastructure Implementations |
|
|
410 | (2) |
|
Technologies that facilitate the Internet of Things (IoT) |
|
|
412 | (1) |
|
Installing and Configuring WLAN Hardware |
|
|
412 | (6) |
|
|
|
418 | (4) |
|
|
|
418 | (2) |
|
|
|
420 | (1) |
|
|
|
421 | (1) |
|
|
|
421 | (1) |
|
|
|
422 | (11) |
|
|
|
422 | (4) |
|
|
|
426 | (1) |
|
Service Set Identifiers, Wired Equivalent Privacy, |
|
|
|
and Media Access Control Address Authentication |
|
|
426 | (1) |
|
Remote Authentication Dial-In User Service (802.1X) |
|
|
427 | (1) |
|
Temporal Key Integrity Protocol |
|
|
428 | (2) |
|
Wi-Fi Protected Access or WPA2 Pre-Shared Key |
|
|
430 | (3) |
|
|
|
433 | (1) |
|
|
|
433 | (1) |
|
|
|
434 | (1) |
|
|
|
435 | (4) |
| Chapter 13 Authentication and Access Control |
|
439 | (44) |
|
|
|
441 | (17) |
|
|
|
442 | (1) |
|
|
|
443 | (8) |
|
|
|
451 | (4) |
|
|
|
455 | (3) |
|
Managing User Account and Password Security |
|
|
458 | (10) |
|
|
|
459 | (2) |
|
|
|
461 | (4) |
|
|
|
465 | (1) |
|
|
|
466 | (1) |
|
|
|
466 | (1) |
|
|
|
466 | (1) |
|
Multifactor Authentication |
|
|
467 | (1) |
|
User-Authentication Methods |
|
|
468 | (8) |
|
Public Key Infrastructure (PKI) |
|
|
468 | (1) |
|
|
|
469 | (1) |
|
Authentication, Authorization, and Accounting (AAA) |
|
|
470 | (2) |
|
|
|
472 | (1) |
|
|
|
472 | (1) |
|
|
|
472 | (1) |
|
Network Access Control (NAC) |
|
|
472 | (1) |
|
Challenge Handshake Authentication Protocol (CHAP) |
|
|
473 | (1) |
|
|
|
474 | (1) |
|
Extensible Authentication Protocol (EAP) |
|
|
474 | (1) |
|
|
|
474 | (1) |
|
|
|
475 | (1) |
|
|
|
476 | (1) |
|
|
|
477 | (1) |
|
|
|
477 | (2) |
|
|
|
479 | (4) |
| Chapter 14 Network Threats and Mitigation |
|
483 | (60) |
|
Recognizing Security Threats |
|
|
485 | (15) |
|
|
|
486 | (1) |
|
|
|
487 | (8) |
|
|
|
495 | (1) |
|
|
|
496 | (3) |
|
|
|
499 | (1) |
|
Insider Threat/Malicious Employee |
|
|
500 | (1) |
|
|
|
500 | (12) |
|
Exploits vs. Vulnerabilities |
|
|
500 | (1) |
|
Unnecessary Running Services |
|
|
500 | (1) |
|
|
|
500 | (1) |
|
|
|
501 | (1) |
|
|
|
501 | (1) |
|
|
|
501 | (1) |
|
|
|
501 | (2) |
|
|
|
503 | (1) |
|
|
|
503 | (1) |
|
|
|
503 | (3) |
|
Attackers and Their Tools |
|
|
506 | (4) |
|
|
|
510 | (1) |
|
Social Engineering (Phishing) |
|
|
511 | (1) |
|
Understanding Mitigation Techniques |
|
|
512 | (4) |
|
|
|
513 | (1) |
|
|
|
513 | (1) |
|
|
|
513 | (1) |
|
|
|
514 | (2) |
|
|
|
516 | (16) |
|
|
|
517 | (7) |
|
|
|
524 | (1) |
|
|
|
525 | (2) |
|
|
|
527 | (1) |
|
|
|
527 | (1) |
|
|
|
528 | (1) |
|
|
|
528 | (1) |
|
Upgrading vs. Downgrading |
|
|
528 | (2) |
|
|
|
530 | (1) |
|
|
|
531 | (1) |
|
|
|
532 | (5) |
|
|
|
533 | (1) |
|
|
|
533 | (1) |
|
|
|
534 | (1) |
|
Updating Antivirus Components |
|
|
534 | (2) |
|
Fixing an Infected Computer |
|
|
536 | (1) |
|
|
|
537 | (1) |
|
|
|
537 | (1) |
|
|
|
537 | (2) |
|
|
|
539 | (4) |
| Chapter 15 Physical Security and Risk |
|
543 | (50) |
|
Using Hardware and Software Security Devices |
|
|
545 | (2) |
|
|
|
547 | (1) |
|
|
|
548 | (1) |
|
|
|
548 | (1) |
|
|
|
548 | (10) |
|
|
|
549 | (2) |
|
|
|
551 | (1) |
|
|
|
552 | (1) |
|
|
|
553 | (2) |
|
|
|
555 | (1) |
|
|
|
556 | (2) |
|
Firewalls at the Application Layer vs. the Network Layer |
|
|
558 | (3) |
|
Stateful vs. Stateless Network Layer Firewalls |
|
|
559 | (1) |
|
|
|
560 | (1) |
|
Scanning Services and Other Firewall Features |
|
|
561 | (5) |
|
|
|
562 | (1) |
|
|
|
563 | (1) |
|
|
|
563 | (1) |
|
|
|
563 | (1) |
|
|
|
564 | (2) |
|
Intrusion Detection and Prevention Systems |
|
|
566 | (5) |
|
|
|
567 | (2) |
|
|
|
569 | (1) |
|
|
|
570 | (1) |
|
|
|
571 | (1) |
|
Understanding Problems Affecting Device Security |
|
|
572 | (14) |
|
|
|
572 | (5) |
|
Logical Security Configurations |
|
|
577 | (2) |
|
|
|
579 | (7) |
|
|
|
586 | (1) |
|
|
|
587 | (1) |
|
|
|
588 | (1) |
|
|
|
589 | (4) |
| Chapter 16 Wide Area Networks |
|
593 | (42) |
|
|
|
596 | (5) |
|
|
|
596 | (2) |
|
The Public Switched Telephone Network |
|
|
598 | (1) |
|
|
|
599 | (1) |
|
|
|
600 | (1) |
|
|
|
601 | (2) |
|
|
|
602 | (1) |
|
|
|
603 | (1) |
|
|
|
603 | (4) |
|
|
|
603 | (1) |
|
Wavelength Division Multiplexing |
|
|
604 | (1) |
|
|
|
605 | (1) |
|
|
|
605 | (2) |
|
|
|
607 | (4) |
|
|
|
608 | (2) |
|
|
|
610 | (1) |
|
Wireless WAN Technologies |
|
|
611 | (2) |
|
|
|
612 | (1) |
|
|
|
613 | (10) |
|
Integrated Services Digital Network |
|
|
613 | (2) |
|
|
|
615 | (3) |
|
|
|
618 | (3) |
|
|
|
621 | (1) |
|
|
|
621 | (1) |
|
Asynchronous Transfer Mode |
|
|
622 | (1) |
|
|
|
623 | (1) |
|
|
|
623 | (6) |
|
Loss of Internet Connectivity |
|
|
624 | (1) |
|
Interface Errors/Monitoring |
|
|
624 | (3) |
|
|
|
627 | (1) |
|
|
|
628 | (1) |
|
|
|
628 | (1) |
|
|
|
629 | (1) |
|
|
|
629 | (1) |
|
|
|
630 | (1) |
|
|
|
631 | (1) |
|
|
|
632 | (3) |
| Chapter 17 Troubleshooting Tools |
|
635 | (56) |
|
|
|
637 | (1) |
|
|
|
638 | (1) |
|
|
|
639 | (1) |
|
|
|
640 | (7) |
|
Using ipconfig and ifconfig |
|
|
642 | (4) |
|
Using the ifconfig Utility |
|
|
646 | (1) |
|
Using the iptables utility |
|
|
646 | (1) |
|
|
|
647 | (3) |
|
Using the Address Resolution Protocol |
|
|
650 | (4) |
|
|
|
651 | (1) |
|
|
|
651 | (3) |
|
Using the nslookup Utility |
|
|
654 | (2) |
|
Resolving Names with the Hosts Table |
|
|
656 | (1) |
|
Using the Mtr Command (pathping) |
|
|
657 | (2) |
|
|
|
658 | (1) |
|
|
|
659 | (4) |
|
Using the route Command Options |
|
|
661 | (1) |
|
Some Examples of the route Command |
|
|
662 | (1) |
|
Using the nbtstat Utility |
|
|
663 | (6) |
|
|
|
663 | (2) |
|
|
|
665 | (1) |
|
|
|
665 | (1) |
|
|
|
666 | (1) |
|
|
|
666 | (1) |
|
|
|
667 | (1) |
|
|
|
668 | (1) |
|
|
|
668 | (1) |
|
Using the netstat Utility |
|
|
669 | (7) |
|
|
|
671 | (1) |
|
|
|
672 | (1) |
|
|
|
673 | (1) |
|
|
|
673 | (1) |
|
|
|
673 | (2) |
|
|
|
675 | (1) |
|
|
|
676 | (1) |
|
Examples of Using tcpdump |
|
|
676 | (1) |
|
Using the File Transfer Protocol |
|
|
677 | (5) |
|
Starting FTP and Logging In to an FTP Server |
|
|
678 | (1) |
|
|
|
679 | (2) |
|
|
|
681 | (1) |
|
|
|
682 | (2) |
|
How to Enable Telnet in Windows |
|
|
682 | (1) |
|
Don't Use Telnet, Use Secure Shell |
|
|
683 | (1) |
|
|
|
684 | (1) |
|
|
|
684 | (1) |
|
|
|
685 | (1) |
|
|
|
686 | (5) |
| Chapter 18 Software and Hardware Tools |
|
691 | (40) |
|
Understanding Network Scanners |
|
|
693 | (9) |
|
Packet Sniffers/Network Monitors |
|
|
693 | (2) |
|
Intrusion Detection and Prevention Software |
|
|
695 | (2) |
|
|
|
697 | (3) |
|
|
|
700 | (1) |
|
|
|
701 | (1) |
|
|
|
702 | (1) |
|
Network Monitoring and Logging |
|
|
703 | (9) |
|
|
|
703 | (1) |
|
|
|
704 | (1) |
|
|
|
705 | (2) |
|
|
|
707 | (3) |
|
|
|
710 | (2) |
|
Identifying Hardware Tools |
|
|
712 | (13) |
|
|
|
712 | (3) |
|
|
|
715 | (1) |
|
|
|
716 | (1) |
|
Time-Domain Reflectometer |
|
|
717 | (1) |
|
Optical Time-Domain Reflectometer |
|
|
717 | (1) |
|
|
|
718 | (1) |
|
|
|
719 | (1) |
|
|
|
720 | (1) |
|
|
|
721 | (1) |
|
|
|
721 | (1) |
|
|
|
722 | (1) |
|
|
|
723 | (1) |
|
Voltage Event Recorder (Power) |
|
|
723 | (1) |
|
|
|
724 | (1) |
|
|
|
725 | (1) |
|
|
|
725 | (1) |
|
|
|
726 | (1) |
|
|
|
727 | (4) |
| Chapter 19 Network Troubleshooting |
|
731 | (50) |
|
Narrowing Down the Problem |
|
|
734 | (15) |
|
Did You Check the Super Simple Stuff? |
|
|
735 | (3) |
|
Is Hardware or Software Causing the Problem? |
|
|
738 | (1) |
|
Is It a Workstation or a Server Problem? |
|
|
739 | (1) |
|
Which Segments of the Network Are Affected? |
|
|
740 | (1) |
|
|
|
740 | (9) |
|
|
|
749 | (21) |
|
Step 1: Identify the Problem |
|
|
750 | (4) |
|
Step 2: Establish a Theory of Probable Cause |
|
|
754 | (8) |
|
Step 3: Test the Theory to Determine Cause |
|
|
762 | (2) |
|
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects |
|
|
764 | (2) |
|
Step 5: Implement the Solution or Escalate as Necessary |
|
|
766 | (3) |
|
Step 6: Verify Full System Functionality, and If Applicable, Implement Preventative Measures |
|
|
769 | (1) |
|
Step 7: Document Findings, Actions, and Outcomes |
|
|
769 | (1) |
|
|
|
770 | (3) |
|
Don't Overlook the Small Stuff |
|
|
770 | (1) |
|
|
|
771 | (1) |
|
Check the Software Configuration |
|
|
771 | (1) |
|
Don't Overlook Physical Conditions |
|
|
772 | (1) |
|
Don't Overlook Cable Problems |
|
|
772 | (1) |
|
|
|
773 | (1) |
|
|
|
773 | (1) |
|
|
|
774 | (1) |
|
|
|
774 | (2) |
|
|
|
776 | (5) |
| Chapter 20 Management, Monitoring, and Optimization |
|
781 | (60) |
|
Managing Network Documentation |
|
|
785 | (10) |
|
|
|
785 | (1) |
|
|
|
786 | (9) |
|
|
|
795 | (13) |
|
|
|
795 | (1) |
|
|
|
796 | (1) |
|
On-Boarding and Off-Boarding of Mobile Devices |
|
|
796 | (1) |
|
|
|
796 | (1) |
|
Policies, Procedures, and Regulations |
|
|
797 | (4) |
|
|
|
801 | (4) |
|
Implementing Network Segmentation |
|
|
805 | (3) |
|
|
|
808 | (26) |
|
Reasons to Optimize Your Network's Performance |
|
|
808 | (3) |
|
How to Optimize Performance |
|
|
811 | (2) |
|
|
|
813 | (1) |
|
|
|
813 | (1) |
|
|
|
814 | (1) |
|
|
|
814 | (1) |
|
|
|
815 | (1) |
|
|
|
815 | (1) |
|
|
|
815 | (1) |
|
Common Address Redundancy Protocol |
|
|
816 | (1) |
|
|
|
817 | (8) |
|
Locating and Installing Equipment |
|
|
825 | (7) |
|
Change Management Procedures |
|
|
832 | (2) |
|
|
|
834 | (1) |
|
|
|
835 | (1) |
|
|
|
836 | (1) |
|
|
|
837 | (4) |
| Appendix A: Answers to Written Labs |
|
841 | (14) |
|
Chapter 1 Introduction to Networks |
|
|
842 | (1) |
|
Chapter 2 The Open Systems Interconnection Specifications |
|
|
842 | (1) |
|
Chapter 3 Networking Topologies, Connectors, and Wiring Standards |
|
|
843 | (1) |
|
Chapter 4 The Current Ethernet Specifications |
|
|
843 | (2) |
|
Chapter 5 Networking Devices |
|
|
845 | (1) |
|
Chapter 6 Introduction to the Internet Protocol |
|
|
846 | (1) |
|
|
|
847 | (1) |
|
|
|
847 | (1) |
|
|
|
847 | (1) |
|
|
|
848 | (1) |
|
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT |
|
|
848 | (1) |
|
Chapter 9 Introduction to IP Routing |
|
|
849 | (1) |
|
Chapter 10 Routing Protocols |
|
|
849 | (1) |
|
Chapter 11 Switching and Virtual LANs |
|
|
850 | (1) |
|
Chapter 12 Wireless Networking |
|
|
850 | (1) |
|
Chapter 13 Authentication and Access Control |
|
|
850 | (1) |
|
Chapter 14 Network Threats and Mitigation |
|
|
851 | (1) |
|
Chapter 15 Physical Security and Risk |
|
|
851 | (1) |
|
Chapter 16 Wide Area Networks |
|
|
852 | (1) |
|
Chapter 17 Troubleshooting Tools |
|
|
852 | (1) |
|
Chapter 18 Software and Hardware Tools |
|
|
853 | (1) |
|
Chapter 19 Network Troubleshooting |
|
|
853 | (1) |
|
Chapter 20 Management, Monitoring, and Optimization |
|
|
854 | (1) |
| Appendix B: Answers to Review Questions |
|
855 | (32) |
|
Chapter 1 Introduction to Networks |
|
|
856 | (1) |
|
Chapter 2 The Open Systems Interconnection Specifications |
|
|
857 | (2) |
|
Chapter 3 Networking Topologies, Connectors, and Wiring Standards |
|
|
859 | (1) |
|
Chapter 4 The Current Ethernet Specifications |
|
|
860 | (1) |
|
Chapter 5 Networking Devices |
|
|
861 | (2) |
|
Chapter 6 Introduction to the Internet Protocol |
|
|
863 | (1) |
|
|
|
864 | (2) |
|
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT |
|
|
866 | (2) |
|
Chapter 9 Introduction to IP Routing |
|
|
868 | (1) |
|
Chapter 10 Routing Protocols |
|
|
869 | (2) |
|
Chapter 11 Switching and Virtual LANs |
|
|
871 | (1) |
|
Chapter 12 Wireless Networking |
|
|
872 | (2) |
|
Chapter 13 Authentication and Access Control |
|
|
874 | (1) |
|
Chapter 14 Network Threats and Mitigation |
|
|
875 | (2) |
|
Chapter 15 Physical Security and Risk |
|
|
877 | (1) |
|
Chapter 16 Wide Area Networks |
|
|
878 | (2) |
|
Chapter 17 Troubleshooting Tools |
|
|
880 | (1) |
|
Chapter 18 Software and Hardware Tools |
|
|
881 | (2) |
|
Chapter 19 Network Troubleshooting |
|
|
883 | (2) |
|
Chapter 20 Management, Monitoring, and Optimization |
|
|
885 | (2) |
| Appendix C: Subnetting Class A |
|
887 | (8) |
|
Subnetting Practice Examples: Class A Addresses |
|
|
888 | (2) |
|
Practice Example #1A: 255.255.0.0 (/16) |
|
|
888 | (1) |
|
Practice Example #2A: 255.255.240.0 (/20) |
|
|
889 | (1) |
|
Practice Example #3A: 255.255.255.192 (/26) |
|
|
889 | (1) |
|
Subnetting in Your Head: Class A Addresses |
|
|
890 | (1) |
|
|
|
891 | (1) |
|
|
|
892 | (1) |
|
|
|
892 | (1) |
|
|
|
893 | (2) |
| Index |
|
895 | |