Muutke küpsiste eelistusi

CompTIA Complete Study Guide 3 Book Set, Updated for New Aplus Exams [Pehme köide]

  • Formaat: Paperback / softback, 2904 pages, kõrgus x laius x paksus: 261x173x102 mm, kaal: 4471 g
  • Ilmumisaeg: 12-Jul-2016
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119303109
  • ISBN-13: 9781119303107
Teised raamatud teemal:
  • Formaat: Paperback / softback, 2904 pages, kõrgus x laius x paksus: 261x173x102 mm, kaal: 4471 g
  • Ilmumisaeg: 12-Jul-2016
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119303109
  • ISBN-13: 9781119303107
Teised raamatud teemal:

Get ready for the CompTIA A+, Network+ and Security+ certifications

If you're an IT professional hoping to progress in your career, then you know how important the CompTIA certifications are. Sybex Study Guides cover 100% of all exam objectives with real-world scenarios that give you hands-on experience. You will study smarter with the Sybex interactive learning environment that provides, flashcards for last minute exam prep, practice tests to help you narrow in on areas where you need further review, and a searchable glossary of all key terms. CompTIA authorized and endorsed, this Sybex Kit offers full test prep for the CompTIA A+, Network+, and Security+ latest exams so you can jumpstart your career.

  • Includes updates covering the latest changes to the exams
  • Covers key topics like network security, compliance and operational security, threats and vulnerabilities, access control and identity management, and cryptography
  • Reviews the components of personal computers, laptops, and portable devices
  • Covers operating systems, networks, and security
  • Provides latest on safety and environmental issues
  • Demonstrates communication and the "soft skills" of professionalism
  • Employs practical examples and insights to provide real-world context from leading certification experts
CompTIA Security+™ Study Guide: Exam SYO-401
Foreword
xxi
Introduction
xxiii
Chapter 1 Measuring and Weighing Risk
1(44)
Risk Assessment
3(16)
Computing Risk Assessment
4(5)
Acting on Your Risk Assessment
9(8)
Risks Associated with Cloud Computing
17(2)
Risks Associated with Virtualization
19(1)
Developing Policies, Standards, and Guidelines
19(20)
Implementing Policies
20(6)
Understanding Control Types and False Positives/Negatives
26(2)
Risk Management Best Practices
28(8)
Disaster Recovery
36(3)
Tabletop Exercise
39(1)
Summary
39(1)
Exam Essentials
39(2)
Review Questions
41(4)
Chapter 2 Monitoring and Diagnosing Networks
45(26)
Monitoring Networks
46(6)
Network Monitors
46(6)
Understanding Hardening
52(8)
Working with Services
52(4)
Patches
56(1)
User Account Control
57(1)
Filesystems
58(2)
Securing the Network
60(1)
Security Posture
61(2)
Continuous Security Monitoring
61(1)
Setting a Remediation Policy
62(1)
Reporting Security Issues
63(1)
Alarms
63(1)
Alerts
63(1)
Trends
63(1)
Differentiating between Detection Controls and Prevention Controls
64(1)
Summary
65(1)
Exam Essentials
66(1)
Review Questions
67(4)
Chapter 3 Understanding Devices and Infrastructure
71(58)
Mastering TCP/IP
73(14)
OSI Relevance
74(1)
Working with the TCP/IP Suite
74(4)
IPv4 and IPv6
78(1)
Understanding Encapsulation
79(1)
Working with Protocols and Services
80(7)
Designing a Secure Network
87(8)
Demilitarized Zones
87(2)
Subnetting
89(1)
Virtual Local Area Networks
89(3)
Remote Access
92(1)
Network Address Translation
93(1)
Telephony
94(1)
Network Access Control
95(1)
Understanding the Various Network Infrastructure Devices
95(27)
Firewalls
96(4)
Routers
100(2)
Switches
102(1)
Load Balancers
103(1)
Proxies
103(1)
Web Security Gateway
103(1)
VPNs and VPN Concentrators
103(2)
Intrusion Detection Systems
105(1)
Understanding Intrusion Detection Systems
106(4)
IDS vs. IPS
110(1)
Working with a Network-Based IDS
111(5)
Working with a Host-Based IDS
116(1)
Working with NIPSs
117(1)
Protocol Analyzers
118(1)
Spam Filters
118(1)
UTM Security Appliances
119(3)
Summary
122(1)
Exam Essentials
123(1)
Review Questions
124(5)
Chapter 4 Access Control, Authentication, and Authorization
129(38)
Understanding Access Control Basics
131(11)
Identification vs. Authentication
131(1)
Authentication (Single Factor) and Authorization
132(1)
Multifactor Authentication
133(1)
Layered Security and Defense in Depth
133(1)
Network Access Control
134(1)
Tokens
135(1)
Federations
135(1)
Potential Authentication and Access Problems
136(1)
Authentication Issues to Consider
137(2)
Authentication Protocols
139(1)
Account Policy Enforcement
139(2)
Users with Multiple Accounts/Roles
141(1)
Generic Account Prohibition
142(1)
Group-based and User-assigned Privileges
142(1)
Understanding Remote Access Connectivity
142(5)
Using the Point-to-Point Protocol
143(1)
Working with Tunneling Protocols
144(1)
Working with RADIUS
145(1)
TACACS/TACACS+/XTACACS
146(1)
VLAN Management
146(1)
SAML
147(1)
Understanding Authentication Services
147(3)
LDAP
147(1)
Kerberos
148(1)
Single Sign-On Initiatives
149(1)
Understanding Access Control
150(2)
Mandatory Access Control
151(1)
Discretionary Access Control
151(1)
Role-Based Access Control
152(1)
Rule-Based Access Control
152(1)
Implementing Access Controlling Best Practices
152(9)
Least Privileges
153(1)
Separation of Duties
153(1)
Time of Day Restrictions
153(1)
User Access Review
154(1)
Smart Cards
154(2)
Access Control Lists
156(1)
Port Security
157(1)
Working with 802.1X
158(1)
Flood Guards and Loop Protection
158(1)
Preventing Network Bridging
158(1)
Log Analysis
159(1)
Trusted OS
159(1)
Secure Router Configuration
160(1)
Summary
161(1)
Exam Essentials
161(2)
Review Questions
163(4)
Chapter 5 Protecting Wireless Networks
167(28)
Working with Wireless Systems
169(5)
IEEE 802.11x Wireless Protocols
169(2)
WEP/WAP/WPA/WPA2
171(2)
Wireless Transport Layer Security
173(1)
Understanding Wireless Devices
174(9)
Wireless Access Points
175(6)
Extensible Authentication Protocol
181(1)
Lightweight Extensible Authentication Protocol
182(1)
Protected Extensible Authentication Protocol
182(1)
Wireless Vulnerabilities to Know
183(5)
Wireless Attack Analogy
187(1)
Summary
188(1)
Exam Essentials
189(1)
Review Questions
190(5)
Chapter 6 Securing the Cloud
195(18)
Working with Cloud Computing
196(5)
Software as a Service (SaaS)
197(1)
Platform as a Service (PaaS)
198(1)
Infrastructure as a Service (IaaS)
199(1)
Private Cloud
200(1)
Public Cloud
200(1)
Community Cloud
200(1)
Hybrid Cloud
201(1)
Working with Virtualization
201(3)
Snapshots
203(1)
Patch Compatibility
203(1)
Host Availability/Elasticity
204(1)
Security Control Testing
204(3)
Sandboxing
204(1)
Security and the Cloud
205(1)
Cloud Storage
206(1)
Summary
207(1)
Exam Essentials
207(1)
Review Questions
208(5)
Chapter 7 Host, Data, and Application Security
213(30)
Application Hardening
215(5)
Databases and Technologies
215(3)
Fuzzing
218(1)
Secure Coding
218(1)
Application Configuration Baselining
219(1)
Operating System Patch Management
220(1)
Application Patch Management
220(1)
Host Security
220(13)
Permissions
220(1)
Access Control Lists
221(1)
Antimalware
221(5)
Host Software Baselining
226(1)
Hardening Web Servers
227(1)
Hardening Email Servers
228(1)
Hardening FTP Servers
229(1)
Hardening DNS Servers
230(1)
Hardening DHCP Services
231(2)
Protecting Data Through Fault Tolerance
233(2)
Backups
233(1)
RAID
234(1)
Clustering and Load Balancing
235(1)
Application Security
235(1)
Best Practices for Security
236(2)
Data Loss Prevention
236(1)
Hardware-Based Encryption Devices
237(1)
Summary
238(1)
Exam Essentials
238(1)
Review Questions
239(4)
Chapter 8 Cryptography
243(54)
An Overview of Cryptography
245(4)
Historical Cryptography
245(4)
Modern Cryptography
249(9)
Working with Symmetric Algorithms
249(2)
Working with Asymmetric Algorithms
251(3)
What Cryptography Should You Use?
254(1)
Hashing Algorithms
255(1)
Rainbow Tables and Salt
256(1)
Key Stretching
256(1)
Understanding Quantum Cryptography
257(1)
Cryptanalysis Methods
257(1)
Wi-Fi Encryption
258(1)
Using Cryptographic Systems
258(5)
Confidentiality and Strength
259(1)
Integrity
259(2)
Digital Signatures
261(1)
Authentication
261(1)
Nonrepudiation
262(1)
Key Features
262(1)
Understanding Cryptography Standards and Protocols
263(15)
The Origins of Encryption Standards
263(3)
Public-Key Infrastructure X.509/Public-Key Cryptography Standards
266(1)
X.509
267(1)
SSL and TLS
268(2)
Certificate Management Protocols
270(1)
Secure Multipurpose Internet Mail Extensions
270(1)
Secure Electronic Transaction
270(1)
Secure Shell
271(1)
Pretty Good Privacy
272(2)
HTTP Secure
274(1)
Secure HTTP
274(1)
IP Security
274(3)
Tunneling Protocols
277(1)
Federal Information Processing Standard
278(1)
Using Public-Key Infrastructure
278(13)
Using a Certificate Authority
279(1)
Working with Registration Authorities and Local Registration Authorities
280(1)
Implementing Certificates
281(4)
Understanding Certificate Revocation
285(1)
Implementing Trust Models
285(5)
Hardware-Based Encryption Devices
290(1)
Data Encryption
290(1)
Summary
291(1)
Exam Essentials
291(2)
Review Questions
293(4)
Chapter 9 Malware, Vulnerabilities, and Threats
297(56)
Understanding Malware
300(10)
Surviving Viruses
310(8)
Symptoms of a Virus Infection
311(1)
How Viruses Work
311(1)
Types of Viruses
312(4)
Managing Spam to Avoid Viruses
316(1)
Antivirus Software
317(1)
Understanding Various Types of Attacks
318(16)
Identifying Denial-of-Service and Distributed Denial-of-Service Attacks
319(2)
Spoofing Attacks
321(1)
Pharming Attacks
322(1)
Phishing, Spear Phishing, and Vishing
323(1)
Xmas Attack
324(1)
Man-in-the-Middle Attacks
324(1)
Replay Attacks
325(1)
Smurf Attacks
326(1)
Password Attacks
326(2)
Privilege Escalation
328(4)
Malicious Insider Threats
332(1)
Transitive Access
332(1)
Client-Side Attacks
333(1)
Typo Squatting and URL Hijacking
333(1)
Watering Hole Attack
334(1)
Identifying Types of Application Attacks
334(7)
Cross-Site Scripting and Forgery
334(1)
SQL Injection
335(1)
LDAP Injection
336(1)
XML Injection
337(1)
Directory Traversal/Command Injection
337(1)
Buffer Overflow
338(1)
Integer Overflow
338(1)
Zero-Day Exploits
338(1)
Cookies and Attachments
338(1)
Locally Shared Objects and Flash Cookies
339(1)
Malicious Add-Ons
339(1)
Session Hijacking
340(1)
Header Manipulation
340(1)
Arbitrary Code and Remote Code Execution
341(1)
Tools for Finding Threats
341(5)
Interpreting Assessment Results
341(1)
Tools to Know
342(2)
Risk Calculations and Assessment Types
344(2)
Summary
346(1)
Exam Essentials
346(2)
Review Questions
348(5)
Chapter 10 Social Engineering and Other Foes
353(42)
Understanding Social Engineering
355(11)
Types of Social Engineering Attacks
356(5)
What Motivates an Attack?
361(1)
The Principles Behind Social Engineering
362(1)
Social Engineering Attack Examples
363(3)
Understanding Physical Security
366(11)
Hardware Locks and Security
369(2)
Mantraps
371(1)
Video Surveillance
371(1)
Fencing
372(1)
Access List
373(1)
Proper Lighting
374(1)
Signs
374(1)
Guards
374(1)
Barricades
375(1)
Biometrics
375(1)
Protected Distribution
376(1)
Alarms
376(1)
Motion Detection
376(1)
Environmental Controls
377(7)
HVAC
378(1)
Fire Suppression
378(2)
EMI Shielding
380(2)
Hot and Cold Aisles
382(1)
Environmental Monitoring
383(1)
Temperature and Humidity Controls
383(1)
Control Types
384(1)
A Control Type Analogy
385(1)
Data Policies
385(4)
Destroying a Flash Drive
386(1)
Some Considerations
387(1)
Optical Discs
388(1)
Summary
389(1)
Exam Essentials
389(2)
Review Questions
391(4)
Chapter 11 Security Administration
395(34)
Third-Party Integration
397(2)
Transitioning
397(1)
Ongoing Operations
398(1)
Understanding Security Awareness and Training
399(10)
Communicating with Users to Raise Awareness
399(1)
Providing Education and Training
399(2)
Safety Topics
401(1)
Training Topics
402(7)
Classifying Information
409(4)
Public Information
410(1)
Private Information
411(2)
Information Access Controls
413(1)
Security Concepts
413(1)
Complying with Privacy and Security Regulations
414(4)
The Health Insurance Portability and Accountability Act
415(1)
The Gramm-Leach-Bliley Act
415(1)
The Computer Fraud and Abuse Act
416(1)
The Family Educational Rights and Privacy Act
416(1)
The Computer Security Act of 1987
416(1)
The Cyberspace Electronic Security Act
417(1)
The Cyber Security Enhancement Act
417(1)
The Patriot Act
417(1)
Familiarizing Yourself with International Efforts
418(1)
Mobile Devices
418(2)
BYOD Issues
419(1)
Alternative Methods to Mitigate Security Risks
420(2)
Summary
422(1)
Exam Essentials
422(2)
Review Questions
424(5)
Chapter 12 Disaster Recovery and Incident Response
429(38)
Issues Associated with Business Continuity
431(24)
Types of Storage Mechanisms
432(1)
Crafting a Disaster-Recovery Plan
433(12)
Incident Response Policies
445(1)
Understanding Incident Response
446(8)
Succession Planning
454(1)
Tabletop Exercises
454(1)
Reinforcing Vendor Support
455(3)
Service-Level Agreements
455(2)
Code Escrow Agreements
457(1)
Penetration Testing
458(2)
What Should You Test?
458(1)
Vulnerability Scanning
459(1)
Summary
460(1)
Exam Essentials
461(1)
Review Questions
462(5)
Appendix A Answers to Review Questions
467(16)
Chapter 1: Measuring and Weighing Risk
468(1)
Chapter 2: Monitoring and Diagnosing Networks
469(1)
Chapter 3: Understanding Devices and Infrastructure
470(1)
Chapter 4: Access Control, Authentication, and Authorization
471(2)
Chapter 5: Protecting Wireless Networks
473(1)
Chapter 6: Securing the Cloud
474(1)
Chapter 7: Host, Data, and Application Security
475(1)
Chapter 8: Cryptography
476(1)
Chapter 9: Malware, Vulnerabilities, and Threats
477(1)
Chapter 10: Social Engineering and Other Foes
478(2)
Chapter 11: Security Administration
480(1)
Chapter 12: Disaster Recovery and Incident Response
481(2)
Appendix B About the Additional Study Tools
483(4)
Additional Study Tools
484(1)
Sybex Test Engine
484(1)
Electronic Flashcards
484(1)
PDF of Glossary of Terms
484(1)
Adobe Reader
484(1)
System Requirements
485(1)
Using the Study Tools
485(1)
Troubleshooting
486
Customer Care
487(1)
Index
487
CompTIA Network+® Study Guide: Exam N10-006
Introduction
xxix
Assessment Test
xli
Chapter 1 Introduction to Networks
1(26)
First Things First: What's a Network?
2(10)
The Local Area Network
3(2)
Common Network Components
5(3)
Wide Area Network
8(2)
Network Architecture: Peer-to-Peer or Client-Server?
10(2)
Physical Network Topologies
12(7)
Bus Topology
12(1)
Star Topology
13(1)
Ring Topology
14(1)
Mesh Topology
15(1)
Point-to-Point Topology
16(1)
Point-to-Multipoint Topology
17(1)
Hybrid Topology
18(1)
Topology Selection, Backbones, and Segments
19(2)
Selecting the Right Topology
19(1)
The Network Backbone
20(1)
Network Segments
20(1)
Summary
21(1)
Exam Essentials
22(1)
Written Labs
22(1)
Review Questions
23(4)
Chapter 2 The Open Systems Interconnection Specifications
27(28)
Internetworking Models
28(2)
The Layered Approach
29(1)
Advantages of Reference Models
29(1)
The OSI Reference Model
30(16)
The Application Layer
32(1)
The Presentation Layer
33(1)
The Session Layer
33(1)
The Transport Layer
33(7)
The Network Layer
40(3)
The Data Link Layer
43(2)
The Physical Layer
45(1)
Introduction to Encapsulation
46(1)
Modulation Techniques
47(1)
Summary
47(1)
Exam Essentials
48(1)
Written Lab
49(1)
Review Questions
50(5)
Chapter 3 Networking Topologies, Connectors, and Wiring Standards
55(36)
Physical Media
57(16)
Coaxial Cable
58(2)
Twisted-Pair Cable
60(4)
Fiber-Optic Cable
64(5)
Media Converters
69(2)
Serial Cables
71(2)
Cable Properties
73(2)
Transmission Speeds
74(1)
Distance
74(1)
Duplex
74(1)
Noise Immunity (Security, EMI)
74(1)
Frequency
75(1)
Wiring Standards
75(10)
568A vs 568B
76(2)
Straight-Through Cable
78(1)
Crossover Cable
78(2)
Rolled/Rollover Cable
80(1)
T1 Crossover Cable
81(1)
Installing Wiring Distributions
82(3)
Summary
85(1)
Exam Essentials
85(1)
Written Lab
86(1)
Review Questions
87(4)
Chapter 4 The Current Ethernet Specifications
91(36)
Network Basics
93(2)
Ethernet Basics
95(6)
Collision Domain
95(1)
Broadcast Domain
96(1)
CSMA/CD
96(2)
Broadband/Baseband
98(1)
Bit Rates vs Baud Rate
98(1)
Wavelength
98(1)
Sampling -Size
99(1)
Half- and Full-Duplex Ethernet
99(2)
Ethernet at the Data Link Layer
101(7)
Binary to Decimal and Hexadecimal Conversion
102(3)
Ethernet Addressing
105(1)
Ethernet Frames
106(2)
Ethernet at the Physical Layer
108(6)
Ethernet over Other Standards (IEEE 1905.1-2013)
114(3)
Ethernet over Power Line
114(2)
Ethernet over HDMI
116(1)
Summary
117(1)
Exam Essentials
117(1)
Written Lab
117(6)
Review Questions
123(4)
Chapter 5 Networking Devices
127(44)
Common Network Connectivity Devices
129(15)
Network Interface Card
130(1)
Hub
131(1)
Bridge
132(1)
Switch
132(1)
Router
133(4)
Firewall
137(1)
IDS/IPS
138(1)
HIDS
138(1)
Access Point
138(1)
Dynamic Host Configuration Protocol Server
139(5)
Other Specialized Devices
144(10)
Multilayer Switch
144(1)
Load Balancer
145(1)
Domain Name Service Server
145(5)
Proxy Server
150(1)
Encryption Devices
151(1)
Analog Modem
152(1)
Packet Shaper
153(1)
VPN Concentrator
153(1)
Planning and Implementing a Basic SOHO Network Using Network Segmentation
154(10)
Determining Requirements
154(7)
Switches and Bridges at the Data Link Layer
161(1)
Hubs at the Physical Layer
162(1)
Environmental Considerations
163(1)
Summary
164(1)
Exam Essentials
164(1)
Written Lab
165(1)
Review Questions
166(5)
Chapter 6 Introduction to the Internet Protocol
171(34)
Introducing TCP/IP
173(21)
A Brief History of TCP/IP
173(1)
TCP/IP and the DoD Model
174(2)
The Process/Application Layer Protocols
176(8)
The Host-to-Host Layer Protocols
184(5)
The Internet Layer Protocols
189(5)
Data Encapsulation
194(4)
Summary
198(1)
Exam Essentials
198(1)
Written Lab
198(2)
Review Questions
200(5)
Chapter 7 IP Addressing
205(28)
IP Terminology
206(1)
The Hierarchical IP Addressing Scheme
207(7)
Network Addressing
208(4)
Private IP Addresses (RFC 1918)
212(2)
IPv4 Address Types
214(2)
Layer 2 Broadcasts
214(1)
Layer 3 Broadcasts
215(1)
Unicast Address
215(1)
Multicast Address (Class D)
215(1)
Internet Protocol Version 6 (IPv6)
216(9)
Why Do We Need IPv6?
216(1)
The Benefits of and Uses for IPv6
217(1)
IPv6 Addressing and Expressions
218(1)
Shortened Expression
219(1)
Address Types
219(1)
Special Addresses
220(1)
Stateless Autoconfiguration (EUI-64)
221(2)
DHCPv6 (Stateful)
223(1)
Migrating to IPv6
223(2)
Summary
225(1)
Exam Essentials
226(1)
Written Lab
227(2)
Written Lab 7.1
227(1)
Written Lab 7.2
227(1)
Written Lab 7.3
228(1)
Review Questions
229(4)
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT
233(44)
Subnetting Basics
234(22)
How to Create Subnets
235(1)
Subnet Masks
236(1)
Classless Inter-Domain Routing (CIDR)
237(2)
Subnetting Class C Addresses
239(10)
Subnetting Class B Addresses
249(7)
Troubleshooting IP Addressing
256(8)
Determining IP Address Problems
259(5)
Introduction to Network Address Translation (NAT)
264(4)
Types of Network Address Translation
265(1)
NAT Names
266(1)
How NAT Works
267(1)
Summary
268(1)
Exam Essentials
269(1)
Written Labs
269(2)
Review Questions
271(6)
Chapter 9 Introduction to IP Routing
277(20)
Routing Basics
278(3)
The IP Routing Process
281(6)
Testing Your IP Routing Understanding
287(1)
Static and Dynamic Routing
288(3)
Summary
291(1)
Exam Essentials
292(1)
Written Lab
292(1)
Review Questions
293(4)
Chapter 10 Routing Protocols
297(36)
Routing Protocol Basics
299(4)
Administrative Distances
300(2)
Classes of Routing Protocols
302(1)
Distance Vector Routing Protocols
303(10)
Routing Information Protocol (RIP)
305(1)
RIP Version 2 (RIPv2)
305(1)
VLSM and Discontiguous Networks
306(3)
EIGRP
309(2)
Border Gateway Protocol (BGP)
311(2)
Link State Routing Protocols
313(4)
Open Shortest Path First (OSPF)
314(2)
Intermediate System-to-Intermediate System (IS-IS)
316(1)
High Availability
317(7)
Hot Standby Router Protocol (HSRP)
319(5)
Virtual Router Redundancy Protocol
324(1)
IPv6 Routing Protocols
324(2)
RIPng
325(1)
EIGRPv6
325(1)
OSPFv3
325(1)
Summary
326(1)
Exam Essentials
326(1)
Written Lab
327(1)
Review Questions
328(5)
Chapter 11 Switching and Virtual LANs
333(44)
Networking Before Layer 2 Switching
335(3)
Switching Services
338(8)
Limitations of Layer 2 Switching
339(1)
Bridging vs LAN Switching
340(1)
Three Switch Functions at Layer 2
340(6)
Spanning Tree Protocol
346(3)
Spanning Tree Port States
347(1)
STP Convergence
347(1)
Rapid Spanning Tree Protocol 802.1w
348(1)
Virtual LANs
349(10)
VLAN Basics
350(3)
Quality of Service
353(1)
VLAN Memberships
354(1)
Static VLANs
354(1)
Dynamic VLANs
355(1)
Identifying VLANs
355(2)
VLAN Identification Methods
357(2)
VLAN Trunking Protocol
359(7)
VTP Modes of Operation
360(1)
Do We Really Need to Put an IP Address on a Switch?
361(2)
Port Security
363(1)
Port Bonding
364(2)
Two Additional Advanced Features of Switches
366(4)
Power over Ethernet (802.3af, 802.3at)
366(2)
Port Mirroring/Spanning (SPAN/RSPAN)
368(2)
Summary
370(1)
Exam Essentials
370(1)
Written Lab
371(1)
Review Questions
372(5)
Chapter 12 Wireless Networking
377(52)
Introduction to Wireless Technology
380(3)
The 802.11 Standards
383(6)
2.4GHz (802.11b)
384(1)
2.4GHz (802.11g)
385(1)
5GHz (802.11a)
386(1)
SGHz (802.11h)
387(1)
2.4GHz/5GHz (802.11n)
388(1)
5GHz (802.11ac)
389(1)
Comparing 802.11 Standards
389(2)
Range Comparisons
390(1)
Wireless Network Components
391(4)
Wireless Access Points
391(1)
Wireless Network Interface Card
392(1)
Wireless Antennas
393(2)
Installing a Wireless Network
395(13)
Ad Hoc Mode: Independent Basic Service Set
395(1)
Infrastructure Mode: Basic Service Set
396(2)
Wireless Controllers
398(1)
Mobile Hot Spots
399(1)
Signal Degradation
400(1)
Other Network Infrastructure Implementations
401(1)
Installing and Configuring WLAN Hardware
402(6)
Site Survey
408(4)
Wireless Security
412(10)
Wireless Threats
412(4)
Open Access
416(1)
Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication
416(1)
Remote Authentication Dial-In User Service (802.1x)
417(1)
Temporal Key Integrity Protocol
418(1)
Wi-Fi Protected Access or WPA2 Pre-Shared Key
419(3)
Summary
422(1)
Exam Essentials
423(1)
Written Lab
423(2)
Review Questions
425(4)
Chapter 13 Authentication and Access Control
429(40)
Security Filtering
431(16)
Access Control Lists
432(2)
Tunneling
434(6)
Encryption
440(5)
Remote Access
445(2)
Managing User Account and Password Security
447(8)
Managing User Accounts
448(2)
Managing Passwords
450(4)
Single Sign-On
454(1)
Multifactor Authentication
455(1)
User-Authentication Methods
455(9)
Public Key Infrastructure (PKI)
455(1)
Kerberos
456(2)
Authentication, Authorization, and Accounting (AAA)
458(1)
Web Services
459(1)
Unified Voice Services
460(1)
Network Controllers
460(1)
Network Access Control (NAC)
460(1)
Challenge Handshake Authentication Protocol (CHAP)
460(1)
MS-CHAP
461(1)
Extensible Authentication Protocol (EAP)
462(1)
Hashes
462(1)
Network Access Control
462(2)
Summary
464(1)
Exam Essentials
464(1)
Written Lab
465(1)
Review Questions
466(3)
Chapter 14 Network Threats and Mitigation
469(56)
Recognizing Security Threats
473(15)
Denial of Service
474(1)
Distributed DoS (DDoS)
475(8)
Authentication Issues
483(1)
Viruses
484(3)
Zero Day Attacks
487(1)
Insider Threat/Malicious Employee
487(1)
Vulnerabilities
488(11)
Unnecessary Running Services
488(1)
Open Ports
488(1)
Unpatched/Legacy Systems
488(1)
Unencrypted Channels
488(1)
Clear-Text Credentials
488(1)
TEMPEST/RF Emanation
489(1)
Malicious Users
489(1)
Buffer Overflow
490(1)
Wireless Threats
490(3)
Attackers and Their Tools
493(4)
Misconfiguration Issues
497(1)
Social Engineering (Phishing)
498(1)
Understanding Mitigation Techniques
499(4)
Active Detection
500(1)
Passive Detection
500(1)
Proactive Defense
500(1)
Basic Forensic Concepts
501(2)
Policies and Procedures
503(11)
Security Policies
504(5)
Security Training
509(1)
Patches and Upgrades
510(2)
Firmware Updates
512(1)
Driver Updates
512(1)
Upgrading vs Downgrading
513(1)
Anti-malware software
514(4)
Host-based
514(1)
Cloud/Server-based
514(1)
Configuration Backups
515(1)
Updating Antivirus Components
515(3)
Fixing an Infected Computer
518(1)
Summary
518(1)
Exam Essentials
518(1)
Written Lab
519(1)
Review Questions
520(5)
Chapter 15 Physical Security and Risk
525(48)
Using Hardware and Software Security Devices
527(2)
Defining Firewalls
529(1)
Network-Based Firewalls
530(1)
Host-Based Firewalls
530(1)
Firewall Technologies
530(10)
Access Control Lists
531(2)
Port Security
533(1)
Demilitarized Zone
534(1)
Protocol Switching
534(3)
Dynamic Packet Filtering
537(1)
Proxy Services
538(2)
Firewalls at the Application Layer vs the Network Layer
540(2)
Stateful vs Stateless Network Layer Firewalls
541(1)
Application Layer Firewalls
542(1)
Scanning Services and Other Firewall Features
542(5)
Content Filtering
544(1)
Signature Identification
544(1)
Context Awareness
544(1)
Virtual Wire vs Routed
545(1)
Zones
545(2)
Intrusion Detection and Prevention Systems
547(5)
Network-Based IDS
549(2)
Host-Based IDS
551(1)
Vulnerability Scanners
551(1)
VPN Concentrators
552(1)
Understanding Problems Affecting Device Security
553(13)
Physical Security
554(4)
Logical Security Configurations
558(2)
Risk-Related Concepts
560(6)
Summary
566(1)
Exam Essentials
566(1)
Written Lab
567(2)
Review Questions
569(4)
Chapter 16 Wide Area Networks
573(42)
What's a WAN?
577(5)
Defining WAN Terms
577(2)
The Public Switched Telephone Network
579(1)
WAN Connection Types
580(1)
Bandwidth or Speed
581(1)
T-Series Connections
582(2)
The T1 Connection
583(1)
The T3 Connection
584(1)
Transmission Media
584(4)
Wired Connections
585(1)
Wavelength Division Multiplexing
585(1)
Passive Optical Network
586(1)
Wireless Technologies
586(2)
Broadband Services
588(5)
DSL Technology and xDSL
589(2)
Cable Modem
591(2)
Wireless WAN Technologies
593(2)
Cellular WAN
593(2)
WAN Protocols
595(8)
Integrated Services Digital Network
595(1)
Frame Relay Technology
596(3)
Point-to-Point Protocol
599(3)
Asynchronous Transfer Mode
602(1)
MPLS
603(1)
WAN Troubleshooting
603(6)
Loss of Internet Connectivity
603(1)
Interface Errors/Monitoring
604(3)
Split Horizon
607(1)
DNS Issues
608(1)
Router Configurations
608(1)
Company Security Policy
609(1)
Summary
609(1)
Exam Essentials
609(1)
Written Lab
610(1)
Review Questions
611(4)
Chapter 17 Troubleshooting Tools
615(56)
Protocol Analyzers
616(2)
Throughput Testers
618(1)
Connectivity Software
619(1)
Using Traceroute
620(2)
Using ipcon fig and ifconfig
622(5)
Using the ipcon fig Utility
622(4)
Using the ifconfig Utility
626(1)
Using the ping Utility
627(3)
Using the Address Resolution Protocol
630(4)
The Windows ARP Table
630(1)
Using the arp Utility
631(3)
Using the nslookup Utility
634(2)
Resolving Names with the Hosts Table
636(1)
Using the Mtr Command (path ping)
637(1)
Using the route Command
638(3)
Using the route Command Options
639(2)
Some Examples of the route Command
641(1)
Using the nbtstat Utility
641(6)
The -a Switch
642(2)
The -A Switch
644(1)
The -c Switch
644(1)
The -n Switch
645(1)
The -r Switch
645(1)
The -R Switch
646(1)
The -S Switch
646(1)
The -s Switch
647(1)
Using the netstat Utility
647(8)
The -a Switch
650(1)
The -e Switch
651(1)
The -r Switch
652(1)
The -s Switch
652(1)
The -p Switch
652(2)
The -n Switch
654(1)
Using the File Transfer Protocol
655(5)
Starting FTP and Logging In to an FTP Server
656(2)
Downloading Files
658(2)
Uploading Files
660(1)
Using the Telnet Utility
660(2)
How to Enable Telnet in Windows
661(1)
Don't Use Telnet, Use Secure Shell
662(1)
Summary
662(1)
Exam Essentials
663(1)
Written Lab
663(2)
Review Questions
665(6)
Chapter 18 Software and Hardware Tools
671(40)
Understanding Network Scanners
673(8)
Packet Sniffers/Network Monitors
673(2)
Intrusion Detection and Prevention Software
675(2)
Port Scanners
677(3)
Wi-Fi Analyzer
680(1)
Baseline
681(2)
Network Monitoring and Logging
683(8)
Network Monitoring
683(1)
SNMP
684(1)
Syslog
685(2)
SIEM
687(3)
Utilization
690(1)
Identifying Hardware Tools
691(13)
Cable Testers
692(3)
Protocol Analyzer
695(1)
Certifiers
696(1)
Time-Domain Reflectometer
696(1)
Optical Time-Domain Reflectometer
697(1)
Multimeter
698(1)
Toner Probe
698(2)
Butt Set
700(1)
Punch-Down Tool
701(1)
Cable Stripper/Snips
702(1)
Voltage Event Recorder (Power)
702(1)
Environmental Monitors
703(1)
Summary
704(1)
Exam Essentials
704(1)
Written Lab
705(1)
Review Questions
706(5)
Chapter 19 Network Troubleshooting
711(44)
Narrowing Down the Problem
715(14)
Did You Check the Super Simple Stuff?
716(4)
Is Hardware or Software Causing the Problem?
720(1)
Is It a Workstation or a Server Problem?
721(1)
Which Segments of the Network Are Affected?
721(1)
Is It Bad Cabling?
722(7)
Troubleshooting Steps
729(17)
Step 1: Identify the Problem
729(4)
Step 2: Establish a Theory of Probable Cause
733(4)
Step 3: Test the Theory to Determine Cause
737(3)
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
740(1)
Step 5: Implement the Solution or Escalate as Necessary
741(3)
Step 6: Verify Full System Functionality, and If Applicable, Implement Preventative Measures
744(1)
Step 7: Document Findings, Actions, and Outcomes
745(1)
Troubleshooting Tips
746(3)
Don't Overlook the Small Stuff
746(1)
Prioritize Your Problems
746(1)
Check the Software Configuration
747(1)
Don't Overlook Physical Conditions
747(1)
Don't Overlook Cable Problems
748(1)
Check for Viruses
748(1)
Summary
749(1)
Exam Essentials
749(1)
Written Lab
750(1)
Review Questions
751(4)
Chapter 20 Management, Monitoring, and Optimization
755(58)
Managing Network Documentation
761(10)
Using SNMP
761(1)
Schematics and Diagrams
762(9)
Network Monitoring
771(12)
Baselines
771(1)
On-Boarding and Off-Boarding of Mobile Devices
771(1)
NAC
772(1)
Policies, Procedures, and Regulations
772(3)
Safety Practices
775(5)
Implementing Network Segmentation
780(3)
Network Optimization
783(22)
Reasons to Optimize Your Network's Performance
783(3)
How to Optimize Performance
786(2)
Unified Communications
788(1)
Traffic Shaping
788(1)
Load Balancing
789(1)
High Availability
789(1)
Caching Engines
789(1)
Fault Tolerance
790(1)
Archives/Backups
790(1)
Common Address Redundancy Protocol
791(1)
Virtual Networking
791(6)
Locating and Installing Equipment
797(6)
Change Management Procedures
803(2)
Summary
805(1)
Exam Essentials
806(1)
Written Lab
807(1)
Review Questions
808(5)
Appendix A Answers to the Written Labs
813(14)
Chapter 1
814(1)
Chapter 2
814(1)
Chapter 3
815(1)
Chapter 4
815(3)
Chapter 5
818(1)
Chapter 6
818(1)
Chapter 7
819(1)
Written Lab 7.1
819(1)
Written Lab 7.2
820(1)
Written Lab 7.3
820(1)
Chapter 8
820(1)
Chapter 9
821(1)
Chapter 10
821(1)
Chapter 11
822(1)
Chapter 12
822(1)
Chapter 13
823(1)
Chapter 14
823(1)
Chapter 15
824(1)
Chapter 16
824(1)
Chapter 17
825(1)
Chapter 18
825(1)
Chapter 19
825(1)
Chapter 20
826(1)
Appendix B Answers to Review Questions
827(30)
Chapter 1
828(1)
Chapter 2
829(1)
Chapter 3
830(2)
Chapter 4
832(1)
Chapter 5
833(1)
Chapter 6
834(1)
Chapter 7
835(2)
Chapter 8
837(2)
Chapter 9
839(1)
Chapter 10
840(2)
Chapter 11
842(1)
Chapter 12
843(2)
Chapter 13
845(1)
Chapter 14
846(2)
Chapter 15
848(1)
Chapter 16
849(2)
Chapter 17
851(1)
Chapter 18
852(1)
Chapter 19
853(2)
Chapter 20
855(2)
Appendix C Subnetting Class A
857(8)
Subnetting Practice Examples: Class A Addresses
858(3)
Practice Example #1A: 255.255.0.0 (/16)
859(1)
Practice Example #2A: 255.255.240.0 (/20)
859(1)
Practice Example #3A: 255.255.255.192 (/26)
860(1)
Subnetting in Your Head: Class A Addresses
861(1)
Written Lab 1
861(1)
Written Lab 2
862(1)
Answers to Written Lab 1
863(1)
Answers to Written Lab 2
864(1)
Index
865
CompTIA+: Complete Study Guide: Exam 220-901, Exam 220-902
Introduction
xxix
Assessment Test
lvii
Part I 220-901
1(658)
Chapter 1 Motherboards, Processors, and Memory
3(68)
Identifying Components of Motherboards
5(27)
System Board Form Factors
6(2)
System Board Components
8(24)
Identifying Purposes and Characteristics of Processors
32(6)
Identifying Purposes and Characteristics of Memory
38(16)
Important Memory Terms
38(5)
Types of Memory
43(7)
Memory Packaging
50(4)
Identifying Purposes and Characteristics of Cooling Systems
54(9)
Fans
54(4)
Memory Cooling
58(1)
Hard Drive Cooling
58(1)
Chipset Cooling
58(1)
CPU Cooling
59(4)
Summary
63(1)
Exam Essentials
63(2)
Review Questions
65(4)
Performance-Based Question 1
69(1)
Performance-Based Question 2
69(2)
Chapter 2 Storage Devices and Power Supplies
71(42)
Identifying Purposes and Characteristics of Storage Devices
72(26)
Hard Disk Drive Systems
72(5)
Solid-State Drives
77(2)
Optical Storage Drives
79(6)
Drive Interfaces and RAID
85(4)
Removable Storage and Media
89(6)
Installing, Removing, and Configuring Storage Devices
95(3)
Identifying Purposes and Characteristics of Power Supplies
98(10)
Dual-Rail Architecture
99(1)
Power and Voltage Ratings
99(1)
Power Connectors
100(6)
Replacing Power Supplies
106(1)
AC Adapters as Power Supplies
107(1)
Summary
108(1)
Exam Essentials
108(1)
Review Questions
109(3)
Performance-Based Question
112(1)
Chapter 3 Peripherals and Expansion
113(70)
Installing and Configuring Expansion Cards
117(9)
Video
118(1)
Multimedia
119(1)
I/O
120(1)
Communications
120(6)
Adapter Configuration
126(1)
Identifying Characteristics of Connectors and Cables
126(31)
Device Connector Types
127(7)
Common Peripheral Cables and Their Interfaces
134(12)
Video Display Cables and Connectors
146(11)
Input Devices
157(16)
Mouse
158(1)
Touchpad
159(2)
Keyboard
161(2)
Scanner
163(2)
Barcode Reader
165(1)
Digitizer
166(1)
Biometric Devices
167(1)
Gamepads and Joysticks
168(1)
Motion Sensor
168(1)
Smart Card Reader
169(1)
Multimedia Input Devices
170(3)
Output Devices
173(1)
Printers
174(1)
Speakers
174(1)
Display Devices
174(1)
Input and Output Devices
174(3)
Touchscreens
175(1)
KVM Switch
175(1)
Smart TV
176(1)
Set-Top Box
177(1)
Summary
177(1)
Exam Essentials
178(1)
Review Questions
179(3)
Performance-Based Questions
182(1)
Chapter 4 Display Devices
183(36)
Understanding Display Types and Settings
184(21)
Video Display Types
184(11)
Adjusting Display Settings
195(10)
Understanding Video Standards and Technologies
205(7)
Video Standards
205(2)
Advanced Video Resolutions and Concepts
207(5)
Summary
212(1)
Exam Essentials
213(1)
Review Questions
214(3)
Performance-Based Question
217(2)
Chapter 5 Custom Configurations
219(28)
Standard Thick Clients
222(1)
Graphic and CAD/CAM Design Workstations
223(2)
CPU Enhancements
223(1)
Video Enhancements
224(1)
Maximized RAM
224(1)
Audio/Video Editing Workstations
225(2)
Video Enhancements
225(1)
Specialized Audio
226(1)
Specialized Hard Drives
226(1)
Virtualization Workstations
227(3)
CPU Enhancements
228(1)
Maximized RAM
228(2)
Gaming PCs
230(2)
CPU Enhancements
230(1)
Video Enhancements
231(1)
Specialized Audio
231(1)
Enhanced Cooling
232(1)
Home Theater PCs
232(3)
Video Enhancements
234(1)
Specialized Audio
234(1)
Special Chassis and TV Tuner
234(1)
Thin Clients
235(1)
Home Server PCs
236(5)
Media Streaming Capabilities
237(3)
File and Print Sharing Services
240(1)
Gigabit NIC
240(1)
RAID Array
241(1)
Summary
241(1)
Exam Essentials
241(2)
Review Questions
243(3)
Performance-Based Question
246(1)
Chapter 6 Networking Fundamentals
247(50)
Understanding Networking Principles
249(21)
Understanding Networking Fundamentals
250(20)
Identifying Common Network Hardware
270(19)
Network Interface Cards (NICs)
270(2)
Cables and Connectors
272(12)
Networking Components
284(5)
Summary
289(1)
Exam Essentials
290(2)
Review Questions
292(3)
Performance-Based Question
295(2)
Chapter 7 Introduction to TCP/IP
297(32)
Understanding TCP/IP
299(23)
TCP/IP Structure
300(8)
Understanding IP Addressing
308(14)
Summary
322(1)
Exam Essentials
323(1)
Review Questions
324(3)
Performance-Based Question
327(2)
Chapter 8 Installing Wireless and SOHO Networks
329(64)
Understanding Wireless Networking
331(10)
802.11 Networking Standards
332(6)
802.11 Devices
338(1)
Wireless Encryption Methods
339(2)
Installing and Configuring SOHO Networks
341(45)
Choosing Connection Types
341(22)
Installing the Network
363(10)
Configuring a Wireless Router
373(13)
Summary
386(1)
Exam Essentials
387(1)
Review Questions
388(3)
Performance-Based Question
391(2)
Chapter 9 Understanding Laptops
393(62)
Understanding Laptop Architecture
396(36)
Laptops vs. Desktops
396(2)
Laptop Case
398(1)
Motherboards and Processors
399(3)
Memory
402(1)
Storage
403(3)
Input Devices
406(8)
Expansion Buses and Ports
414(8)
Docking Stations
422(2)
Power Systems
424(3)
Laptop Displays
427(4)
Cable Locks
431(1)
Disassembling and Reassembling Laptops
432(16)
Using the Right Tools
432(2)
Replacing Laptop Components
434(14)
Summary
448(1)
Exam Essentials
448(2)
Review Questions
450(3)
Performance-Based Question
453(2)
Chapter 10 Understanding Mobile Devices
455(44)
Understanding Mobile Devices
457(35)
Characteristics of Mobile Devices
458(3)
Tablets
461(2)
Smartphones
463(6)
Phablets
469(2)
e-Readers
471(2)
GPS
473(3)
Smart Cameras
476(1)
Wearable Technology Devices
477(7)
Connection Types
484(6)
Mobile Device Accessories
490(2)
Summary
492(1)
Exam Essentials
492(2)
Review Questions
494(3)
Performance-Based Question
497(2)
Chapter 11 Installing and Configuring Printers
499(68)
Understanding Print Technologies and Imaging Processes
502(25)
Impact Printers
503(2)
Inkjet
505(8)
Laser Printers
513(11)
Thermal Printers
524(1)
Virtual Printers
525(2)
Installing and Configuring Printers
527(23)
Printer Interface Components
527(5)
Installing and Sharing Local Printers
532(10)
Installing and Sharing Networked Printers
542(8)
Performing Printer Maintenance and Upgrades
550(9)
Performing Printer Maintenance
551(5)
Installing Printer Upgrades
556(3)
Summary
559(1)
Exam Essentials
560(2)
Review Questions
562(3)
Performance-Based Question
565(2)
Chapter 12 Hardware and Network Troubleshooting
567(92)
Troubleshooting Core Hardware Issues
574(21)
Troubleshooting Motherboards, CPUs, RAM, and Power Problems
575(13)
Troubleshooting Storage Device Problems
588(5)
Troubleshooting Video Issues
593(2)
Troubleshooting Mobile Devices, Printers, and Networking
595(57)
Troubleshooting Common Mobile Device Issues
595(12)
Troubleshooting Printer Problems
607(23)
Troubleshooting Networking Problems
630(22)
Summary
652(1)
Exam Essentials
653(2)
Review Questions
655(3)
Performance-Based Question
658(1)
Part II 220-902
659(552)
Chapter 13 Operating System Basics
661(46)
Understanding Operating Systems
662(36)
Operating System Terms and Concepts
664(1)
Minimum System Requirements
665(4)
The Windows Interface
669(16)
What's in a Window?
685(4)
Updating Windows
689(1)
Creating Restore Points
690(1)
File Management
691(7)
Going Virtual
698(1)
Preparing for the Exam
699(3)
Summary
702(1)
Exam Essentials
702(1)
Review Questions
703(3)
Performance-Based Question
706(1)
Chapter 14 Operating System Administration
707(56)
Interacting with Operating Systems
709(25)
Control Panel
709(12)
The Command Prompt
721(12)
Virtual Memory
733(1)
Administrative Tools
734(15)
Task Manager
734(5)
MMC
739(1)
Computer Management
739(1)
Services
740(1)
Performance Monitor
740(1)
Task Scheduler
741(1)
Windows System Configuration Tools
742(6)
Power Management
748(1)
Disk Management
749(6)
Getting Disks Ready to Store Files and Programs
749(4)
Backing Up the Data on Your Drives
753(1)
Checking the Health of Hard Disks and Optimizing Their Performance
753(1)
User Authentication
754(1)
Summary
755(1)
Exam Essentials
755(2)
Review Questions
757(4)
Performance-Based Question
761(2)
Chapter 15 Working with Windows 8/8.1
763(20)
Windows Editions
764(5)
Installing Windows 8
769(7)
Unattended Installation/Image Deployment
773(1)
Remote Network Installation
773(1)
Multiboot Installation
774(1)
Repair Installation/Refresh/Restore
774(1)
Recovery Partition
774(2)
Windows 8 Boot Methods
776(1)
Internal Hard Drive (Partition)
776(1)
External/Hot Swappable Drive
776(1)
Flash Drives
777(1)
Solid-State Drives
777(1)
Netboot
777(1)
Summary
777(1)
Exam Essentials
778(1)
Review Questions
779(3)
Performance-Based Question
782(1)
Chapter 16 Working with Windows 7
783(44)
Windows 7 Editions
785(6)
Installing Windows 7
791(6)
Upgrading to Windows 7
792(4)
Upgrading Editions of Windows 7
796(1)
Installation/Upgrade Boot Options
797(1)
The Windows 7 Boot Sequences
797(1)
Key Boot Files
797(1)
Windows 7 Features
798(6)
Tools in Windows 7
798(6)
Windows 7 Administrative Tools
804(6)
Local Users and Groups
804(1)
Local Security Policy
805(2)
System Configuration
807(1)
Component Services
808(1)
Data Sources
808(1)
Print Management
809(1)
Windows Memory Diagnostics
810(1)
Unique Control Panel Utilities
810(3)
HomeGroup
810(1)
RemoteApp and Desktop Connections
810(1)
Troubleshooting
811(2)
Networking and Windows 7
813(4)
Configuring an Alternative IP Address in Windows
814(1)
Network Card Properties
815(1)
Configuring Windows Networking
816(1)
Windows 7 System Performance and Optimization
817(2)
Summary
819(1)
Exam Essentials
819(2)
Review Questions
821(5)
Performance-Based Question
826(1)
Chapter 17 Working with Windows Vista
827(40)
Windows Vista Editions
829(3)
Installing Windows Vista
832(3)
Clean Install
832(1)
Upgrading to Windows Vista
833(2)
Transferring to Windows Vista
835(1)
The Windows Vista Boot Sequences
835(1)
Key Boot Files
835(1)
Windows Vista Features
836(4)
Tools in Windows Vista
836(4)
Windows Vista Administrative Tools
840(7)
Users and Groups
840(1)
Local Security Policy
841(2)
System Configuration
843(2)
Component Services
845(1)
Data Sources
845(1)
Print Management
845(1)
Windows Memory Diagnostics
846(1)
Distinctive Utilities
847(5)
Tablet PC Settings
847(1)
Pen and Input Devices
848(1)
Offline Files
849(1)
Problem Reports and Solutions
850(2)
Printers
852(1)
Networking and Windows Vista
852(3)
Vista System Performance and Optimization
855(5)
Aero
856(1)
User Account Control
857(1)
Indexing
858(1)
Sidebar
859(1)
Summary
860(1)
Exam Essentials
860(1)
Review Questions
861(4)
Performance-Based Question
865(2)
Chapter 18 Working with Mac OS and Linux
867(26)
Best Practices
868(5)
Scheduled Backups
868(3)
Scheduled Disk Maintenance
871(1)
System Updates/App Store
871(1)
Patch Management
871(2)
Driver/Firmware Updates
873(1)
Antivirus/Antimalware Updates
873(1)
Tools
873(1)
Features
874(3)
Basic Linux Commands
877(11)
Understanding the Syntax of Shell Commands
878(1)
Discovering and Using Linux Commands
879(2)
Becoming root (Superuser)
881(1)
Managing Processes
881(2)
Directory Navigation
883(1)
Directory Listings
884(1)
Changing Permissions and Ownership
885(1)
Working with Files
886(1)
Working with Directories
887(1)
Networking Utilities
887(1)
Summary
888(1)
Exam Essentials
888(1)
Review Questions
889(3)
Performance-Based Question
892(1)
Chapter 19 Security
893(60)
Common Prevention Methods
896(11)
Physical Security
897(2)
Digital Security
899(6)
User Education/AUP
905(1)
Principle of Least Privilege
906(1)
Email Filtering
906(1)
Virtual Private Networks
906(1)
Common Security Threats
907(13)
Social Engineering
907(1)
Password Attacks
908(1)
Malware
909(1)
Man-in-the-Middle Attacks
909(1)
Rootkits
910(1)
Phishing
910(1)
Shoulder Surfing
911(1)
Spyware
911(1)
Viruses
912(5)
Worms
917(1)
Trojans
918(1)
Ransomware
918(1)
Spoofing
918(1)
Zero-Day Attack
919(1)
Zombie/Botnet
919(1)
Non-Complaint Systems
920(1)
Workstation Security Best Practices
920(3)
Setting Strong Passwords
920(1)
Requiring Passwords and Expiration
921(1)
Account Management
921(1)
Restricting User Permissions
921(1)
Add Login Time Restrictions
921(1)
Act on Failed Login Attempts
922(1)
Changing Default Usernames
922(1)
Disabling the Guest Account
922(1)
Screensaver Required Password
922(1)
Disable Autorun
922(1)
Data Loss Prevention
923(1)
Working with Windows OS Security Settings
923(6)
Users and Groups
923(2)
NTFS vs. Share Permissions
925(2)
Shared Files and Folders
927(1)
System Files and Folders
928(1)
User Authentication
928(1)
BitLocker and BitLocker To Go
929(1)
EFS
929(1)
Mobile Device Security
929(6)
Screen Locks
930(1)
Remote Wipes and Locator Applications
931(3)
Remote Backup
934(1)
Operating System Updates
934(1)
Destruction and Disposal Methods
935(4)
Recycling or Repurposing Best Practices
936(1)
Low-Level Format vs. Standard Format
936(1)
Hard Drive Sanitation and Sanitation Methods
936(1)
Physical Destruction
937(2)
Securing a SOHO Network (Wireless)
939(3)
Change Default Usernames and Passwords
940(1)
Changing the SSID
940(1)
Setting Encryption
940(1)
Disabling SSID Broadcast
940(1)
Enable MAC Filtering
940(1)
Antenna and Access Point Placement
941(1)
Radio Power Levels
941(1)
Assign Static IP Addresses
941(1)
WPS
942(1)
Securing a SOHO Network (Wired)
942(3)
Change Default Usernames and Passwords
942(1)
Assign Static IP Addresses
943(1)
Disabling Ports
943(1)
Physical Security
943(2)
Summary
945(1)
Exam Essentials
945(2)
Review Questions
947(4)
Performance-Based Question
951(2)
Chapter 20 Network Services, Cloud Computing, and Virtualization
953(50)
Understanding Network Services
955(20)
Server Roles
956(15)
Internet Appliances
971(2)
Legacy and Embedded Systems
973(2)
Understanding Cloud Computing and Virtualization
975(21)
Concepts of Cloud Computing
975(9)
Understanding Virtualization
984(12)
Summary
996(1)
Exam Essentials
996(2)
Review Questions
998(3)
Performance-Based Question
1001(2)
Chapter 21 Mobile Operating Systems and Connectivity
1003(94)
Understanding Mobile Operating Systems
1006(30)
Comparing Mobile Operating Systems
1007(15)
Understanding Sensors and Calibration
1022(7)
Using Additional Mobile Operating System Features
1029(7)
Network Connectivity and Email
1036(46)
Understanding Cellular Data Connections
1037(8)
Establishing Wi-Fi Connectivity
1045(11)
Establishing Bluetooth Connectivity
1056(13)
Configuring Email Accounts
1069(13)
Mobile Device Synchronization
1082(10)
Syncing Apple iOS Devices
1083(5)
Syncing Android Devices
1088(1)
Software Installation Requirements
1089(3)
Summary
1092(1)
Exam Essentials
1092(1)
Review Questions
1093(3)
Performance-Based Question
1096(1)
Chapter 22 Troubleshooting Theory, OSs, and Security
1097(50)
Understanding Troubleshooting Theory
1100(10)
Identifying the Problem
1101(4)
Establishing a Theory
1105(1)
Testing Solutions
1106(1)
Establishing a Plan of Action
1107(2)
Verifying Functionality
1109(1)
Documenting the Work
1109(1)
Troubleshooting Operating Systems
1110(16)
Common Symptoms
1110(8)
Operating System Tools
1118(8)
Troubleshooting Security Issues
1126(11)
Common Symptoms
1128(4)
Security Tools
1132(4)
Best Practices for Malware Removal
1136(1)
Troubleshooting Mobile Issues
1137(2)
Troubleshooting Mobile Security Issues
1139(3)
Summary
1142(1)
Exam Essentials
1142(1)
Review Questions
1143(3)
Performance-Based Question
1146(1)
Chapter 23 Understanding Operational Procedures
1147(64)
Understanding Safety Procedures
1150(20)
Identifying Potential Safety Hazards
1151(10)
Creating a Safe Workplace
1161(9)
Understanding Environmental Controls
1170(16)
Managing the Physical Environment
1171(6)
Handling and Disposing of Computer Equipment
1177(9)
Understanding Policies, Licensing, and Privacy
1186(5)
Managing Software Licenses
1186(3)
Managing Sensitive Information
1189(2)
Demonstrating Professionalism
1191(13)
Communicating with Customers
1192(4)
Using Appropriate Behavior
1196(6)
Putting It All in Perspective
1202(2)
Summary
1204(1)
Exam Essentials
1204(2)
Review Questions
1206(3)
Performance-Based Question
1209(2)
Appendix A Answers to Review Questions
1211(36)
Chapter 1: Motherboards, Processors, and Memory
1212(2)
Chapter 2: Storage Devices and Power Supplies
1214(1)
Chapter 3: Peripherals and Expansion
1215(2)
Chapter 4: Display Devices
1217(2)
Chapter 5: Custom Configurations
1219(2)
Chapter 6: Network Fundamentals
1221(1)
Chapter 7: Introduction to TCP/IP
1222(2)
Chapter 8: Installing Wireless and SOHO Networks
1224(2)
Chapter 9: Understanding Laptops
1226(1)
Chapter 10: Understanding Mobile Devices
1227(2)
Chapter 11: Installing and Configuring Printers
1229(1)
Chapter 12: Hardware and Network Troubleshooting
1230(2)
Chapter 13: Operating System Basics
1232(1)
Chapter 14: Operating System Administration
1233(1)
Chapter 15: Working with Windows 8/8.1
1234(1)
Chapter 16: Working with Windows 7
1235(1)
Chapter 17: Working with Windows Vista
1236(2)
Chapter 18: Working with Mac OS and Linux
1238(1)
Chapter 19: Security
1239(1)
Chapter 20: Network Services, Cloud Computing, and Virtualization
1240(1)
Chapter 21: Mobile Operating Systems and Connectivity
1241(2)
Chapter 22: Troubleshooting Theory, OSs, and Security
1243(1)
Chapter 23: Understanding Operational Procedures
1244(3)
Appendix B Answers to Performance-Based Questions
1247
Chapter 1: Motherboards, Processors, and Memory
1248(1)
Chapter 2: Storage Devices and Power Supplies
1249(1)
Chapter 3: Peripherals and Expansion
1249(1)
Chapter 4: Display Devices
1249(3)
Chapter 5: Custom Configurations
1252(1)
Chapter 6: Network Fundamentals
1252(2)
Chapter 7: Introduction to TCP/IP
1254(1)
Chapter 8: Installing Wireless and SOHO Networks
1254(1)
Chapter 9: Understanding Laptops
1254(2)
Chapter 10: Understanding Mobile Devices
1256(1)
Chapter 11: Installing and Configuring Printers
1256(1)
Chapter 12: Hardware and Network Troubleshooting
1257(1)
Chapter 13: Operating System Basics
1257(2)
Chapter 14: Operating System Administration
1259(1)
Chapter 15: Working with Windows 8/8.1
1259(1)
Chapter 16: Working with Windows 7
1259(3)
Chapter 17: Working with Windows Vista
1262(2)
Chapter 18: Working with Mac OS and Linux
1264(1)
Chapter 19: Security
1264(2)
Chapter 20: Network Services, Cloud Computing, land Virtualization
1266(1)
Chapter 21: Mobile Operating Systems and Connectivity
1266(1)
Chapter 22: Troubleshooting Theory, OSs, and Security
1267(1)
Chapter 23: Understanding Operational Procedures
1267(2)
Index
1269