CompTIA Security+™ Study Guide: Exam SYO-401 |
|
|
|
xxi | |
|
|
xxiii | |
|
Chapter 1 Measuring and Weighing Risk |
|
|
1 | (44) |
|
|
3 | (16) |
|
Computing Risk Assessment |
|
|
4 | (5) |
|
Acting on Your Risk Assessment |
|
|
9 | (8) |
|
Risks Associated with Cloud Computing |
|
|
17 | (2) |
|
Risks Associated with Virtualization |
|
|
19 | (1) |
|
Developing Policies, Standards, and Guidelines |
|
|
19 | (20) |
|
|
20 | (6) |
|
Understanding Control Types and False Positives/Negatives |
|
|
26 | (2) |
|
Risk Management Best Practices |
|
|
28 | (8) |
|
|
36 | (3) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (2) |
|
|
41 | (4) |
|
Chapter 2 Monitoring and Diagnosing Networks |
|
|
45 | (26) |
|
|
46 | (6) |
|
|
46 | (6) |
|
|
52 | (8) |
|
|
52 | (4) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (2) |
|
|
60 | (1) |
|
|
61 | (2) |
|
Continuous Security Monitoring |
|
|
61 | (1) |
|
Setting a Remediation Policy |
|
|
62 | (1) |
|
Reporting Security Issues |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
Differentiating between Detection Controls and Prevention Controls |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (4) |
|
Chapter 3 Understanding Devices and Infrastructure |
|
|
71 | (58) |
|
|
73 | (14) |
|
|
74 | (1) |
|
Working with the TCP/IP Suite |
|
|
74 | (4) |
|
|
78 | (1) |
|
Understanding Encapsulation |
|
|
79 | (1) |
|
Working with Protocols and Services |
|
|
80 | (7) |
|
Designing a Secure Network |
|
|
87 | (8) |
|
|
87 | (2) |
|
|
89 | (1) |
|
Virtual Local Area Networks |
|
|
89 | (3) |
|
|
92 | (1) |
|
Network Address Translation |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
Understanding the Various Network Infrastructure Devices |
|
|
95 | (27) |
|
|
96 | (4) |
|
|
100 | (2) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
VPNs and VPN Concentrators |
|
|
103 | (2) |
|
Intrusion Detection Systems |
|
|
105 | (1) |
|
Understanding Intrusion Detection Systems |
|
|
106 | (4) |
|
|
110 | (1) |
|
Working with a Network-Based IDS |
|
|
111 | (5) |
|
Working with a Host-Based IDS |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (3) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
124 | (5) |
|
Chapter 4 Access Control, Authentication, and Authorization |
|
|
129 | (38) |
|
Understanding Access Control Basics |
|
|
131 | (11) |
|
Identification vs. Authentication |
|
|
131 | (1) |
|
Authentication (Single Factor) and Authorization |
|
|
132 | (1) |
|
Multifactor Authentication |
|
|
133 | (1) |
|
Layered Security and Defense in Depth |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
Potential Authentication and Access Problems |
|
|
136 | (1) |
|
Authentication Issues to Consider |
|
|
137 | (2) |
|
|
139 | (1) |
|
Account Policy Enforcement |
|
|
139 | (2) |
|
Users with Multiple Accounts/Roles |
|
|
141 | (1) |
|
Generic Account Prohibition |
|
|
142 | (1) |
|
Group-based and User-assigned Privileges |
|
|
142 | (1) |
|
Understanding Remote Access Connectivity |
|
|
142 | (5) |
|
Using the Point-to-Point Protocol |
|
|
143 | (1) |
|
Working with Tunneling Protocols |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
Understanding Authentication Services |
|
|
147 | (3) |
|
|
147 | (1) |
|
|
148 | (1) |
|
Single Sign-On Initiatives |
|
|
149 | (1) |
|
Understanding Access Control |
|
|
150 | (2) |
|
|
151 | (1) |
|
Discretionary Access Control |
|
|
151 | (1) |
|
Role-Based Access Control |
|
|
152 | (1) |
|
Rule-Based Access Control |
|
|
152 | (1) |
|
Implementing Access Controlling Best Practices |
|
|
152 | (9) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
Flood Guards and Loop Protection |
|
|
158 | (1) |
|
Preventing Network Bridging |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
Secure Router Configuration |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (2) |
|
|
163 | (4) |
|
Chapter 5 Protecting Wireless Networks |
|
|
167 | (28) |
|
Working with Wireless Systems |
|
|
169 | (5) |
|
IEEE 802.11x Wireless Protocols |
|
|
169 | (2) |
|
|
171 | (2) |
|
Wireless Transport Layer Security |
|
|
173 | (1) |
|
Understanding Wireless Devices |
|
|
174 | (9) |
|
|
175 | (6) |
|
Extensible Authentication Protocol |
|
|
181 | (1) |
|
Lightweight Extensible Authentication Protocol |
|
|
182 | (1) |
|
Protected Extensible Authentication Protocol |
|
|
182 | (1) |
|
Wireless Vulnerabilities to Know |
|
|
183 | (5) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
190 | (5) |
|
Chapter 6 Securing the Cloud |
|
|
195 | (18) |
|
Working with Cloud Computing |
|
|
196 | (5) |
|
Software as a Service (SaaS) |
|
|
197 | (1) |
|
Platform as a Service (PaaS) |
|
|
198 | (1) |
|
Infrastructure as a Service (IaaS) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
Working with Virtualization |
|
|
201 | (3) |
|
|
203 | (1) |
|
|
203 | (1) |
|
Host Availability/Elasticity |
|
|
204 | (1) |
|
|
204 | (3) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (5) |
|
Chapter 7 Host, Data, and Application Security |
|
|
213 | (30) |
|
|
215 | (5) |
|
Databases and Technologies |
|
|
215 | (3) |
|
|
218 | (1) |
|
|
218 | (1) |
|
Application Configuration Baselining |
|
|
219 | (1) |
|
Operating System Patch Management |
|
|
220 | (1) |
|
Application Patch Management |
|
|
220 | (1) |
|
|
220 | (13) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (5) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (2) |
|
Protecting Data Through Fault Tolerance |
|
|
233 | (2) |
|
|
233 | (1) |
|
|
234 | (1) |
|
Clustering and Load Balancing |
|
|
235 | (1) |
|
|
235 | (1) |
|
Best Practices for Security |
|
|
236 | (2) |
|
|
236 | (1) |
|
Hardware-Based Encryption Devices |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (4) |
|
|
243 | (54) |
|
An Overview of Cryptography |
|
|
245 | (4) |
|
|
245 | (4) |
|
|
249 | (9) |
|
Working with Symmetric Algorithms |
|
|
249 | (2) |
|
Working with Asymmetric Algorithms |
|
|
251 | (3) |
|
What Cryptography Should You Use? |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
Understanding Quantum Cryptography |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
Using Cryptographic Systems |
|
|
258 | (5) |
|
Confidentiality and Strength |
|
|
259 | (1) |
|
|
259 | (2) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
Understanding Cryptography Standards and Protocols |
|
|
263 | (15) |
|
The Origins of Encryption Standards |
|
|
263 | (3) |
|
Public-Key Infrastructure X.509/Public-Key Cryptography Standards |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (2) |
|
Certificate Management Protocols |
|
|
270 | (1) |
|
Secure Multipurpose Internet Mail Extensions |
|
|
270 | (1) |
|
Secure Electronic Transaction |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
272 | (2) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
274 | (3) |
|
|
277 | (1) |
|
Federal Information Processing Standard |
|
|
278 | (1) |
|
Using Public-Key Infrastructure |
|
|
278 | (13) |
|
Using a Certificate Authority |
|
|
279 | (1) |
|
Working with Registration Authorities and Local Registration Authorities |
|
|
280 | (1) |
|
Implementing Certificates |
|
|
281 | (4) |
|
Understanding Certificate Revocation |
|
|
285 | (1) |
|
Implementing Trust Models |
|
|
285 | (5) |
|
Hardware-Based Encryption Devices |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
291 | (1) |
|
|
291 | (2) |
|
|
293 | (4) |
|
Chapter 9 Malware, Vulnerabilities, and Threats |
|
|
297 | (56) |
|
|
300 | (10) |
|
|
310 | (8) |
|
Symptoms of a Virus Infection |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (4) |
|
Managing Spam to Avoid Viruses |
|
|
316 | (1) |
|
|
317 | (1) |
|
Understanding Various Types of Attacks |
|
|
318 | (16) |
|
Identifying Denial-of-Service and Distributed Denial-of-Service Attacks |
|
|
319 | (2) |
|
|
321 | (1) |
|
|
322 | (1) |
|
Phishing, Spear Phishing, and Vishing |
|
|
323 | (1) |
|
|
324 | (1) |
|
Man-in-the-Middle Attacks |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (2) |
|
|
328 | (4) |
|
Malicious Insider Threats |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
Typo Squatting and URL Hijacking |
|
|
333 | (1) |
|
|
334 | (1) |
|
Identifying Types of Application Attacks |
|
|
334 | (7) |
|
Cross-Site Scripting and Forgery |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
Directory Traversal/Command Injection |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
Locally Shared Objects and Flash Cookies |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
Arbitrary Code and Remote Code Execution |
|
|
341 | (1) |
|
Tools for Finding Threats |
|
|
341 | (5) |
|
Interpreting Assessment Results |
|
|
341 | (1) |
|
|
342 | (2) |
|
Risk Calculations and Assessment Types |
|
|
344 | (2) |
|
|
346 | (1) |
|
|
346 | (2) |
|
|
348 | (5) |
|
Chapter 10 Social Engineering and Other Foes |
|
|
353 | (42) |
|
Understanding Social Engineering |
|
|
355 | (11) |
|
Types of Social Engineering Attacks |
|
|
356 | (5) |
|
What Motivates an Attack? |
|
|
361 | (1) |
|
The Principles Behind Social Engineering |
|
|
362 | (1) |
|
Social Engineering Attack Examples |
|
|
363 | (3) |
|
Understanding Physical Security |
|
|
366 | (11) |
|
Hardware Locks and Security |
|
|
369 | (2) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
377 | (7) |
|
|
378 | (1) |
|
|
378 | (2) |
|
|
380 | (2) |
|
|
382 | (1) |
|
|
383 | (1) |
|
Temperature and Humidity Controls |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (4) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (2) |
|
|
391 | (4) |
|
Chapter 11 Security Administration |
|
|
395 | (34) |
|
|
397 | (2) |
|
|
397 | (1) |
|
|
398 | (1) |
|
Understanding Security Awareness and Training |
|
|
399 | (10) |
|
Communicating with Users to Raise Awareness |
|
|
399 | (1) |
|
Providing Education and Training |
|
|
399 | (2) |
|
|
401 | (1) |
|
|
402 | (7) |
|
|
409 | (4) |
|
|
410 | (1) |
|
|
411 | (2) |
|
Information Access Controls |
|
|
413 | (1) |
|
|
413 | (1) |
|
Complying with Privacy and Security Regulations |
|
|
414 | (4) |
|
The Health Insurance Portability and Accountability Act |
|
|
415 | (1) |
|
The Gramm-Leach-Bliley Act |
|
|
415 | (1) |
|
The Computer Fraud and Abuse Act |
|
|
416 | (1) |
|
The Family Educational Rights and Privacy Act |
|
|
416 | (1) |
|
The Computer Security Act of 1987 |
|
|
416 | (1) |
|
The Cyberspace Electronic Security Act |
|
|
417 | (1) |
|
The Cyber Security Enhancement Act |
|
|
417 | (1) |
|
|
417 | (1) |
|
Familiarizing Yourself with International Efforts |
|
|
418 | (1) |
|
|
418 | (2) |
|
|
419 | (1) |
|
Alternative Methods to Mitigate Security Risks |
|
|
420 | (2) |
|
|
422 | (1) |
|
|
422 | (2) |
|
|
424 | (5) |
|
Chapter 12 Disaster Recovery and Incident Response |
|
|
429 | (38) |
|
Issues Associated with Business Continuity |
|
|
431 | (24) |
|
Types of Storage Mechanisms |
|
|
432 | (1) |
|
Crafting a Disaster-Recovery Plan |
|
|
433 | (12) |
|
Incident Response Policies |
|
|
445 | (1) |
|
Understanding Incident Response |
|
|
446 | (8) |
|
|
454 | (1) |
|
|
454 | (1) |
|
Reinforcing Vendor Support |
|
|
455 | (3) |
|
|
455 | (2) |
|
|
457 | (1) |
|
|
458 | (2) |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
462 | (5) |
|
Appendix A Answers to Review Questions |
|
|
467 | (16) |
|
Chapter 1: Measuring and Weighing Risk |
|
|
468 | (1) |
|
Chapter 2: Monitoring and Diagnosing Networks |
|
|
469 | (1) |
|
Chapter 3: Understanding Devices and Infrastructure |
|
|
470 | (1) |
|
Chapter 4: Access Control, Authentication, and Authorization |
|
|
471 | (2) |
|
Chapter 5: Protecting Wireless Networks |
|
|
473 | (1) |
|
Chapter 6: Securing the Cloud |
|
|
474 | (1) |
|
Chapter 7: Host, Data, and Application Security |
|
|
475 | (1) |
|
|
476 | (1) |
|
Chapter 9: Malware, Vulnerabilities, and Threats |
|
|
477 | (1) |
|
Chapter 10: Social Engineering and Other Foes |
|
|
478 | (2) |
|
Chapter 11: Security Administration |
|
|
480 | (1) |
|
Chapter 12: Disaster Recovery and Incident Response |
|
|
481 | (2) |
|
Appendix B About the Additional Study Tools |
|
|
483 | (4) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
485 | (1) |
|
|
486 | |
|
|
487 | (1) |
|
|
487 | |
CompTIA Network+® Study Guide: Exam N10-006 |
|
|
|
xxix | |
|
|
xli | |
|
Chapter 1 Introduction to Networks |
|
|
1 | (26) |
|
First Things First: What's a Network? |
|
|
2 | (10) |
|
|
3 | (2) |
|
Common Network Components |
|
|
5 | (3) |
|
|
8 | (2) |
|
Network Architecture: Peer-to-Peer or Client-Server? |
|
|
10 | (2) |
|
Physical Network Topologies |
|
|
12 | (7) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Point-to-Multipoint Topology |
|
|
17 | (1) |
|
|
18 | (1) |
|
Topology Selection, Backbones, and Segments |
|
|
19 | (2) |
|
Selecting the Right Topology |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (4) |
|
Chapter 2 The Open Systems Interconnection Specifications |
|
|
27 | (28) |
|
|
28 | (2) |
|
|
29 | (1) |
|
Advantages of Reference Models |
|
|
29 | (1) |
|
|
30 | (16) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (7) |
|
|
40 | (3) |
|
|
43 | (2) |
|
|
45 | (1) |
|
Introduction to Encapsulation |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (5) |
|
Chapter 3 Networking Topologies, Connectors, and Wiring Standards |
|
|
55 | (36) |
|
|
57 | (16) |
|
|
58 | (2) |
|
|
60 | (4) |
|
|
64 | (5) |
|
|
69 | (2) |
|
|
71 | (2) |
|
|
73 | (2) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
Noise Immunity (Security, EMI) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (10) |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
81 | (1) |
|
Installing Wiring Distributions |
|
|
82 | (3) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (4) |
|
Chapter 4 The Current Ethernet Specifications |
|
|
91 | (36) |
|
|
93 | (2) |
|
|
95 | (6) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (2) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
Half- and Full-Duplex Ethernet |
|
|
99 | (2) |
|
Ethernet at the Data Link Layer |
|
|
101 | (7) |
|
Binary to Decimal and Hexadecimal Conversion |
|
|
102 | (3) |
|
|
105 | (1) |
|
|
106 | (2) |
|
Ethernet at the Physical Layer |
|
|
108 | (6) |
|
Ethernet over Other Standards (IEEE 1905.1-2013) |
|
|
114 | (3) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (6) |
|
|
123 | (4) |
|
Chapter 5 Networking Devices |
|
|
127 | (44) |
|
Common Network Connectivity Devices |
|
|
129 | (15) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (4) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
Dynamic Host Configuration Protocol Server |
|
|
139 | (5) |
|
Other Specialized Devices |
|
|
144 | (10) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Domain Name Service Server |
|
|
145 | (5) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
Planning and Implementing a Basic SOHO Network Using Network Segmentation |
|
|
154 | (10) |
|
|
154 | (7) |
|
Switches and Bridges at the Data Link Layer |
|
|
161 | (1) |
|
Hubs at the Physical Layer |
|
|
162 | (1) |
|
Environmental Considerations |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
166 | (5) |
|
Chapter 6 Introduction to the Internet Protocol |
|
|
171 | (34) |
|
|
173 | (21) |
|
A Brief History of TCP/IP |
|
|
173 | (1) |
|
|
174 | (2) |
|
The Process/Application Layer Protocols |
|
|
176 | (8) |
|
The Host-to-Host Layer Protocols |
|
|
184 | (5) |
|
The Internet Layer Protocols |
|
|
189 | (5) |
|
|
194 | (4) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (2) |
|
|
200 | (5) |
|
|
205 | (28) |
|
|
206 | (1) |
|
The Hierarchical IP Addressing Scheme |
|
|
207 | (7) |
|
|
208 | (4) |
|
Private IP Addresses (RFC 1918) |
|
|
212 | (2) |
|
|
214 | (2) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
Multicast Address (Class D) |
|
|
215 | (1) |
|
Internet Protocol Version 6 (IPv6) |
|
|
216 | (9) |
|
|
216 | (1) |
|
The Benefits of and Uses for IPv6 |
|
|
217 | (1) |
|
IPv6 Addressing and Expressions |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
Stateless Autoconfiguration (EUI-64) |
|
|
221 | (2) |
|
|
223 | (1) |
|
|
223 | (2) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
227 | (2) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (4) |
|
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT |
|
|
233 | (44) |
|
|
234 | (22) |
|
|
235 | (1) |
|
|
236 | (1) |
|
Classless Inter-Domain Routing (CIDR) |
|
|
237 | (2) |
|
Subnetting Class C Addresses |
|
|
239 | (10) |
|
Subnetting Class B Addresses |
|
|
249 | (7) |
|
Troubleshooting IP Addressing |
|
|
256 | (8) |
|
Determining IP Address Problems |
|
|
259 | (5) |
|
Introduction to Network Address Translation (NAT) |
|
|
264 | (4) |
|
Types of Network Address Translation |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (2) |
|
|
271 | (6) |
|
Chapter 9 Introduction to IP Routing |
|
|
277 | (20) |
|
|
278 | (3) |
|
|
281 | (6) |
|
Testing Your IP Routing Understanding |
|
|
287 | (1) |
|
Static and Dynamic Routing |
|
|
288 | (3) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (4) |
|
Chapter 10 Routing Protocols |
|
|
297 | (36) |
|
|
299 | (4) |
|
|
300 | (2) |
|
Classes of Routing Protocols |
|
|
302 | (1) |
|
Distance Vector Routing Protocols |
|
|
303 | (10) |
|
Routing Information Protocol (RIP) |
|
|
305 | (1) |
|
|
305 | (1) |
|
VLSM and Discontiguous Networks |
|
|
306 | (3) |
|
|
309 | (2) |
|
Border Gateway Protocol (BGP) |
|
|
311 | (2) |
|
Link State Routing Protocols |
|
|
313 | (4) |
|
Open Shortest Path First (OSPF) |
|
|
314 | (2) |
|
Intermediate System-to-Intermediate System (IS-IS) |
|
|
316 | (1) |
|
|
317 | (7) |
|
Hot Standby Router Protocol (HSRP) |
|
|
319 | (5) |
|
Virtual Router Redundancy Protocol |
|
|
324 | (1) |
|
|
324 | (2) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
328 | (5) |
|
Chapter 11 Switching and Virtual LANs |
|
|
333 | (44) |
|
Networking Before Layer 2 Switching |
|
|
335 | (3) |
|
|
338 | (8) |
|
Limitations of Layer 2 Switching |
|
|
339 | (1) |
|
Bridging vs LAN Switching |
|
|
340 | (1) |
|
Three Switch Functions at Layer 2 |
|
|
340 | (6) |
|
|
346 | (3) |
|
Spanning Tree Port States |
|
|
347 | (1) |
|
|
347 | (1) |
|
Rapid Spanning Tree Protocol 802.1w |
|
|
348 | (1) |
|
|
349 | (10) |
|
|
350 | (3) |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (2) |
|
VLAN Identification Methods |
|
|
357 | (2) |
|
|
359 | (7) |
|
|
360 | (1) |
|
Do We Really Need to Put an IP Address on a Switch? |
|
|
361 | (2) |
|
|
363 | (1) |
|
|
364 | (2) |
|
Two Additional Advanced Features of Switches |
|
|
366 | (4) |
|
Power over Ethernet (802.3af, 802.3at) |
|
|
366 | (2) |
|
Port Mirroring/Spanning (SPAN/RSPAN) |
|
|
368 | (2) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
372 | (5) |
|
Chapter 12 Wireless Networking |
|
|
377 | (52) |
|
Introduction to Wireless Technology |
|
|
380 | (3) |
|
|
383 | (6) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
Comparing 802.11 Standards |
|
|
389 | (2) |
|
|
390 | (1) |
|
Wireless Network Components |
|
|
391 | (4) |
|
|
391 | (1) |
|
Wireless Network Interface Card |
|
|
392 | (1) |
|
|
393 | (2) |
|
Installing a Wireless Network |
|
|
395 | (13) |
|
Ad Hoc Mode: Independent Basic Service Set |
|
|
395 | (1) |
|
Infrastructure Mode: Basic Service Set |
|
|
396 | (2) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
Other Network Infrastructure Implementations |
|
|
401 | (1) |
|
Installing and Configuring WLAN Hardware |
|
|
402 | (6) |
|
|
408 | (4) |
|
|
412 | (10) |
|
|
412 | (4) |
|
|
416 | (1) |
|
Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication |
|
|
416 | (1) |
|
Remote Authentication Dial-In User Service (802.1x) |
|
|
417 | (1) |
|
Temporal Key Integrity Protocol |
|
|
418 | (1) |
|
Wi-Fi Protected Access or WPA2 Pre-Shared Key |
|
|
419 | (3) |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
423 | (2) |
|
|
425 | (4) |
|
Chapter 13 Authentication and Access Control |
|
|
429 | (40) |
|
|
431 | (16) |
|
|
432 | (2) |
|
|
434 | (6) |
|
|
440 | (5) |
|
|
445 | (2) |
|
Managing User Account and Password Security |
|
|
447 | (8) |
|
|
448 | (2) |
|
|
450 | (4) |
|
|
454 | (1) |
|
Multifactor Authentication |
|
|
455 | (1) |
|
User-Authentication Methods |
|
|
455 | (9) |
|
Public Key Infrastructure (PKI) |
|
|
455 | (1) |
|
|
456 | (2) |
|
Authentication, Authorization, and Accounting (AAA) |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
460 | (1) |
|
|
460 | (1) |
|
Network Access Control (NAC) |
|
|
460 | (1) |
|
Challenge Handshake Authentication Protocol (CHAP) |
|
|
460 | (1) |
|
|
461 | (1) |
|
Extensible Authentication Protocol (EAP) |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
462 | (2) |
|
|
464 | (1) |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
466 | (3) |
|
Chapter 14 Network Threats and Mitigation |
|
|
469 | (56) |
|
Recognizing Security Threats |
|
|
473 | (15) |
|
|
474 | (1) |
|
|
475 | (8) |
|
|
483 | (1) |
|
|
484 | (3) |
|
|
487 | (1) |
|
Insider Threat/Malicious Employee |
|
|
487 | (1) |
|
|
488 | (11) |
|
Unnecessary Running Services |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
490 | (3) |
|
Attackers and Their Tools |
|
|
493 | (4) |
|
|
497 | (1) |
|
Social Engineering (Phishing) |
|
|
498 | (1) |
|
Understanding Mitigation Techniques |
|
|
499 | (4) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
501 | (2) |
|
|
503 | (11) |
|
|
504 | (5) |
|
|
509 | (1) |
|
|
510 | (2) |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
513 | (1) |
|
|
514 | (4) |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
515 | (1) |
|
Updating Antivirus Components |
|
|
515 | (3) |
|
Fixing an Infected Computer |
|
|
518 | (1) |
|
|
518 | (1) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
520 | (5) |
|
Chapter 15 Physical Security and Risk |
|
|
525 | (48) |
|
Using Hardware and Software Security Devices |
|
|
527 | (2) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
530 | (10) |
|
|
531 | (2) |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
534 | (3) |
|
|
537 | (1) |
|
|
538 | (2) |
|
Firewalls at the Application Layer vs the Network Layer |
|
|
540 | (2) |
|
Stateful vs Stateless Network Layer Firewalls |
|
|
541 | (1) |
|
Application Layer Firewalls |
|
|
542 | (1) |
|
Scanning Services and Other Firewall Features |
|
|
542 | (5) |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
545 | (1) |
|
|
545 | (2) |
|
Intrusion Detection and Prevention Systems |
|
|
547 | (5) |
|
|
549 | (2) |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
552 | (1) |
|
Understanding Problems Affecting Device Security |
|
|
553 | (13) |
|
|
554 | (4) |
|
Logical Security Configurations |
|
|
558 | (2) |
|
|
560 | (6) |
|
|
566 | (1) |
|
|
566 | (1) |
|
|
567 | (2) |
|
|
569 | (4) |
|
Chapter 16 Wide Area Networks |
|
|
573 | (42) |
|
|
577 | (5) |
|
|
577 | (2) |
|
The Public Switched Telephone Network |
|
|
579 | (1) |
|
|
580 | (1) |
|
|
581 | (1) |
|
|
582 | (2) |
|
|
583 | (1) |
|
|
584 | (1) |
|
|
584 | (4) |
|
|
585 | (1) |
|
Wavelength Division Multiplexing |
|
|
585 | (1) |
|
|
586 | (1) |
|
|
586 | (2) |
|
|
588 | (5) |
|
|
589 | (2) |
|
|
591 | (2) |
|
Wireless WAN Technologies |
|
|
593 | (2) |
|
|
593 | (2) |
|
|
595 | (8) |
|
Integrated Services Digital Network |
|
|
595 | (1) |
|
|
596 | (3) |
|
|
599 | (3) |
|
Asynchronous Transfer Mode |
|
|
602 | (1) |
|
|
603 | (1) |
|
|
603 | (6) |
|
Loss of Internet Connectivity |
|
|
603 | (1) |
|
Interface Errors/Monitoring |
|
|
604 | (3) |
|
|
607 | (1) |
|
|
608 | (1) |
|
|
608 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
610 | (1) |
|
|
611 | (4) |
|
Chapter 17 Troubleshooting Tools |
|
|
615 | (56) |
|
|
616 | (2) |
|
|
618 | (1) |
|
|
619 | (1) |
|
|
620 | (2) |
|
Using ipcon fig and ifconfig |
|
|
622 | (5) |
|
Using the ipcon fig Utility |
|
|
622 | (4) |
|
Using the ifconfig Utility |
|
|
626 | (1) |
|
|
627 | (3) |
|
Using the Address Resolution Protocol |
|
|
630 | (4) |
|
|
630 | (1) |
|
|
631 | (3) |
|
Using the nslookup Utility |
|
|
634 | (2) |
|
Resolving Names with the Hosts Table |
|
|
636 | (1) |
|
Using the Mtr Command (path ping) |
|
|
637 | (1) |
|
|
638 | (3) |
|
Using the route Command Options |
|
|
639 | (2) |
|
Some Examples of the route Command |
|
|
641 | (1) |
|
Using the nbtstat Utility |
|
|
641 | (6) |
|
|
642 | (2) |
|
|
644 | (1) |
|
|
644 | (1) |
|
|
645 | (1) |
|
|
645 | (1) |
|
|
646 | (1) |
|
|
646 | (1) |
|
|
647 | (1) |
|
Using the netstat Utility |
|
|
647 | (8) |
|
|
650 | (1) |
|
|
651 | (1) |
|
|
652 | (1) |
|
|
652 | (1) |
|
|
652 | (2) |
|
|
654 | (1) |
|
Using the File Transfer Protocol |
|
|
655 | (5) |
|
Starting FTP and Logging In to an FTP Server |
|
|
656 | (2) |
|
|
658 | (2) |
|
|
660 | (1) |
|
|
660 | (2) |
|
How to Enable Telnet in Windows |
|
|
661 | (1) |
|
Don't Use Telnet, Use Secure Shell |
|
|
662 | (1) |
|
|
662 | (1) |
|
|
663 | (1) |
|
|
663 | (2) |
|
|
665 | (6) |
|
Chapter 18 Software and Hardware Tools |
|
|
671 | (40) |
|
Understanding Network Scanners |
|
|
673 | (8) |
|
Packet Sniffers/Network Monitors |
|
|
673 | (2) |
|
Intrusion Detection and Prevention Software |
|
|
675 | (2) |
|
|
677 | (3) |
|
|
680 | (1) |
|
|
681 | (2) |
|
Network Monitoring and Logging |
|
|
683 | (8) |
|
|
683 | (1) |
|
|
684 | (1) |
|
|
685 | (2) |
|
|
687 | (3) |
|
|
690 | (1) |
|
Identifying Hardware Tools |
|
|
691 | (13) |
|
|
692 | (3) |
|
|
695 | (1) |
|
|
696 | (1) |
|
Time-Domain Reflectometer |
|
|
696 | (1) |
|
Optical Time-Domain Reflectometer |
|
|
697 | (1) |
|
|
698 | (1) |
|
|
698 | (2) |
|
|
700 | (1) |
|
|
701 | (1) |
|
|
702 | (1) |
|
Voltage Event Recorder (Power) |
|
|
702 | (1) |
|
|
703 | (1) |
|
|
704 | (1) |
|
|
704 | (1) |
|
|
705 | (1) |
|
|
706 | (5) |
|
Chapter 19 Network Troubleshooting |
|
|
711 | (44) |
|
Narrowing Down the Problem |
|
|
715 | (14) |
|
Did You Check the Super Simple Stuff? |
|
|
716 | (4) |
|
Is Hardware or Software Causing the Problem? |
|
|
720 | (1) |
|
Is It a Workstation or a Server Problem? |
|
|
721 | (1) |
|
Which Segments of the Network Are Affected? |
|
|
721 | (1) |
|
|
722 | (7) |
|
|
729 | (17) |
|
Step 1: Identify the Problem |
|
|
729 | (4) |
|
Step 2: Establish a Theory of Probable Cause |
|
|
733 | (4) |
|
Step 3: Test the Theory to Determine Cause |
|
|
737 | (3) |
|
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects |
|
|
740 | (1) |
|
Step 5: Implement the Solution or Escalate as Necessary |
|
|
741 | (3) |
|
Step 6: Verify Full System Functionality, and If Applicable, Implement Preventative Measures |
|
|
744 | (1) |
|
Step 7: Document Findings, Actions, and Outcomes |
|
|
745 | (1) |
|
|
746 | (3) |
|
Don't Overlook the Small Stuff |
|
|
746 | (1) |
|
|
746 | (1) |
|
Check the Software Configuration |
|
|
747 | (1) |
|
Don't Overlook Physical Conditions |
|
|
747 | (1) |
|
Don't Overlook Cable Problems |
|
|
748 | (1) |
|
|
748 | (1) |
|
|
749 | (1) |
|
|
749 | (1) |
|
|
750 | (1) |
|
|
751 | (4) |
|
Chapter 20 Management, Monitoring, and Optimization |
|
|
755 | (58) |
|
Managing Network Documentation |
|
|
761 | (10) |
|
|
761 | (1) |
|
|
762 | (9) |
|
|
771 | (12) |
|
|
771 | (1) |
|
On-Boarding and Off-Boarding of Mobile Devices |
|
|
771 | (1) |
|
|
772 | (1) |
|
Policies, Procedures, and Regulations |
|
|
772 | (3) |
|
|
775 | (5) |
|
Implementing Network Segmentation |
|
|
780 | (3) |
|
|
783 | (22) |
|
Reasons to Optimize Your Network's Performance |
|
|
783 | (3) |
|
How to Optimize Performance |
|
|
786 | (2) |
|
|
788 | (1) |
|
|
788 | (1) |
|
|
789 | (1) |
|
|
789 | (1) |
|
|
789 | (1) |
|
|
790 | (1) |
|
|
790 | (1) |
|
Common Address Redundancy Protocol |
|
|
791 | (1) |
|
|
791 | (6) |
|
Locating and Installing Equipment |
|
|
797 | (6) |
|
Change Management Procedures |
|
|
803 | (2) |
|
|
805 | (1) |
|
|
806 | (1) |
|
|
807 | (1) |
|
|
808 | (5) |
|
Appendix A Answers to the Written Labs |
|
|
813 | (14) |
|
|
814 | (1) |
|
|
814 | (1) |
|
|
815 | (1) |
|
|
815 | (3) |
|
|
818 | (1) |
|
|
818 | (1) |
|
|
819 | (1) |
|
|
819 | (1) |
|
|
820 | (1) |
|
|
820 | (1) |
|
|
820 | (1) |
|
|
821 | (1) |
|
|
821 | (1) |
|
|
822 | (1) |
|
|
822 | (1) |
|
|
823 | (1) |
|
|
823 | (1) |
|
|
824 | (1) |
|
|
824 | (1) |
|
|
825 | (1) |
|
|
825 | (1) |
|
|
825 | (1) |
|
|
826 | (1) |
|
Appendix B Answers to Review Questions |
|
|
827 | (30) |
|
|
828 | (1) |
|
|
829 | (1) |
|
|
830 | (2) |
|
|
832 | (1) |
|
|
833 | (1) |
|
|
834 | (1) |
|
|
835 | (2) |
|
|
837 | (2) |
|
|
839 | (1) |
|
|
840 | (2) |
|
|
842 | (1) |
|
|
843 | (2) |
|
|
845 | (1) |
|
|
846 | (2) |
|
|
848 | (1) |
|
|
849 | (2) |
|
|
851 | (1) |
|
|
852 | (1) |
|
|
853 | (2) |
|
|
855 | (2) |
|
Appendix C Subnetting Class A |
|
|
857 | (8) |
|
Subnetting Practice Examples: Class A Addresses |
|
|
858 | (3) |
|
Practice Example #1A: 255.255.0.0 (/16) |
|
|
859 | (1) |
|
Practice Example #2A: 255.255.240.0 (/20) |
|
|
859 | (1) |
|
Practice Example #3A: 255.255.255.192 (/26) |
|
|
860 | (1) |
|
Subnetting in Your Head: Class A Addresses |
|
|
861 | (1) |
|
|
861 | (1) |
|
|
862 | (1) |
|
|
863 | (1) |
|
|
864 | (1) |
|
|
865 | |
CompTIA+: Complete Study Guide: Exam 220-901, Exam 220-902 |
|
|
|
xxix | |
|
|
lvii | |
|
|
1 | (658) |
|
Chapter 1 Motherboards, Processors, and Memory |
|
|
3 | (68) |
|
Identifying Components of Motherboards |
|
|
5 | (27) |
|
System Board Form Factors |
|
|
6 | (2) |
|
|
8 | (24) |
|
Identifying Purposes and Characteristics of Processors |
|
|
32 | (6) |
|
Identifying Purposes and Characteristics of Memory |
|
|
38 | (16) |
|
|
38 | (5) |
|
|
43 | (7) |
|
|
50 | (4) |
|
Identifying Purposes and Characteristics of Cooling Systems |
|
|
54 | (9) |
|
|
54 | (4) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (4) |
|
|
63 | (1) |
|
|
63 | (2) |
|
|
65 | (4) |
|
Performance-Based Question 1 |
|
|
69 | (1) |
|
Performance-Based Question 2 |
|
|
69 | (2) |
|
Chapter 2 Storage Devices and Power Supplies |
|
|
71 | (42) |
|
Identifying Purposes and Characteristics of Storage Devices |
|
|
72 | (26) |
|
|
72 | (5) |
|
|
77 | (2) |
|
|
79 | (6) |
|
Drive Interfaces and RAID |
|
|
85 | (4) |
|
Removable Storage and Media |
|
|
89 | (6) |
|
Installing, Removing, and Configuring Storage Devices |
|
|
95 | (3) |
|
Identifying Purposes and Characteristics of Power Supplies |
|
|
98 | (10) |
|
|
99 | (1) |
|
Power and Voltage Ratings |
|
|
99 | (1) |
|
|
100 | (6) |
|
|
106 | (1) |
|
AC Adapters as Power Supplies |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (3) |
|
Performance-Based Question |
|
|
112 | (1) |
|
Chapter 3 Peripherals and Expansion |
|
|
113 | (70) |
|
Installing and Configuring Expansion Cards |
|
|
117 | (9) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (6) |
|
|
126 | (1) |
|
Identifying Characteristics of Connectors and Cables |
|
|
126 | (31) |
|
|
127 | (7) |
|
Common Peripheral Cables and Their Interfaces |
|
|
134 | (12) |
|
Video Display Cables and Connectors |
|
|
146 | (11) |
|
|
157 | (16) |
|
|
158 | (1) |
|
|
159 | (2) |
|
|
161 | (2) |
|
|
163 | (2) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (3) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (3) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
179 | (3) |
|
Performance-Based Questions |
|
|
182 | (1) |
|
Chapter 4 Display Devices |
|
|
183 | (36) |
|
Understanding Display Types and Settings |
|
|
184 | (21) |
|
|
184 | (11) |
|
Adjusting Display Settings |
|
|
195 | (10) |
|
Understanding Video Standards and Technologies |
|
|
205 | (7) |
|
|
205 | (2) |
|
Advanced Video Resolutions and Concepts |
|
|
207 | (5) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
214 | (3) |
|
Performance-Based Question |
|
|
217 | (2) |
|
Chapter 5 Custom Configurations |
|
|
219 | (28) |
|
|
222 | (1) |
|
Graphic and CAD/CAM Design Workstations |
|
|
223 | (2) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
Audio/Video Editing Workstations |
|
|
225 | (2) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
Virtualization Workstations |
|
|
227 | (3) |
|
|
228 | (1) |
|
|
228 | (2) |
|
|
230 | (2) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (3) |
|
|
234 | (1) |
|
|
234 | (1) |
|
Special Chassis and TV Tuner |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (5) |
|
Media Streaming Capabilities |
|
|
237 | (3) |
|
File and Print Sharing Services |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
241 | (2) |
|
|
243 | (3) |
|
Performance-Based Question |
|
|
246 | (1) |
|
Chapter 6 Networking Fundamentals |
|
|
247 | (50) |
|
Understanding Networking Principles |
|
|
249 | (21) |
|
Understanding Networking Fundamentals |
|
|
250 | (20) |
|
Identifying Common Network Hardware |
|
|
270 | (19) |
|
Network Interface Cards (NICs) |
|
|
270 | (2) |
|
|
272 | (12) |
|
|
284 | (5) |
|
|
289 | (1) |
|
|
290 | (2) |
|
|
292 | (3) |
|
Performance-Based Question |
|
|
295 | (2) |
|
Chapter 7 Introduction to TCP/IP |
|
|
297 | (32) |
|
|
299 | (23) |
|
|
300 | (8) |
|
Understanding IP Addressing |
|
|
308 | (14) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (3) |
|
Performance-Based Question |
|
|
327 | (2) |
|
Chapter 8 Installing Wireless and SOHO Networks |
|
|
329 | (64) |
|
Understanding Wireless Networking |
|
|
331 | (10) |
|
802.11 Networking Standards |
|
|
332 | (6) |
|
|
338 | (1) |
|
Wireless Encryption Methods |
|
|
339 | (2) |
|
Installing and Configuring SOHO Networks |
|
|
341 | (45) |
|
Choosing Connection Types |
|
|
341 | (22) |
|
|
363 | (10) |
|
Configuring a Wireless Router |
|
|
373 | (13) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (3) |
|
Performance-Based Question |
|
|
391 | (2) |
|
Chapter 9 Understanding Laptops |
|
|
393 | (62) |
|
Understanding Laptop Architecture |
|
|
396 | (36) |
|
|
396 | (2) |
|
|
398 | (1) |
|
Motherboards and Processors |
|
|
399 | (3) |
|
|
402 | (1) |
|
|
403 | (3) |
|
|
406 | (8) |
|
Expansion Buses and Ports |
|
|
414 | (8) |
|
|
422 | (2) |
|
|
424 | (3) |
|
|
427 | (4) |
|
|
431 | (1) |
|
Disassembling and Reassembling Laptops |
|
|
432 | (16) |
|
|
432 | (2) |
|
Replacing Laptop Components |
|
|
434 | (14) |
|
|
448 | (1) |
|
|
448 | (2) |
|
|
450 | (3) |
|
Performance-Based Question |
|
|
453 | (2) |
|
Chapter 10 Understanding Mobile Devices |
|
|
455 | (44) |
|
Understanding Mobile Devices |
|
|
457 | (35) |
|
Characteristics of Mobile Devices |
|
|
458 | (3) |
|
|
461 | (2) |
|
|
463 | (6) |
|
|
469 | (2) |
|
|
471 | (2) |
|
|
473 | (3) |
|
|
476 | (1) |
|
Wearable Technology Devices |
|
|
477 | (7) |
|
|
484 | (6) |
|
Mobile Device Accessories |
|
|
490 | (2) |
|
|
492 | (1) |
|
|
492 | (2) |
|
|
494 | (3) |
|
Performance-Based Question |
|
|
497 | (2) |
|
Chapter 11 Installing and Configuring Printers |
|
|
499 | (68) |
|
Understanding Print Technologies and Imaging Processes |
|
|
502 | (25) |
|
|
503 | (2) |
|
|
505 | (8) |
|
|
513 | (11) |
|
|
524 | (1) |
|
|
525 | (2) |
|
Installing and Configuring Printers |
|
|
527 | (23) |
|
Printer Interface Components |
|
|
527 | (5) |
|
Installing and Sharing Local Printers |
|
|
532 | (10) |
|
Installing and Sharing Networked Printers |
|
|
542 | (8) |
|
Performing Printer Maintenance and Upgrades |
|
|
550 | (9) |
|
Performing Printer Maintenance |
|
|
551 | (5) |
|
Installing Printer Upgrades |
|
|
556 | (3) |
|
|
559 | (1) |
|
|
560 | (2) |
|
|
562 | (3) |
|
Performance-Based Question |
|
|
565 | (2) |
|
Chapter 12 Hardware and Network Troubleshooting |
|
|
567 | (92) |
|
Troubleshooting Core Hardware Issues |
|
|
574 | (21) |
|
Troubleshooting Motherboards, CPUs, RAM, and Power Problems |
|
|
575 | (13) |
|
Troubleshooting Storage Device Problems |
|
|
588 | (5) |
|
Troubleshooting Video Issues |
|
|
593 | (2) |
|
Troubleshooting Mobile Devices, Printers, and Networking |
|
|
595 | (57) |
|
Troubleshooting Common Mobile Device Issues |
|
|
595 | (12) |
|
Troubleshooting Printer Problems |
|
|
607 | (23) |
|
Troubleshooting Networking Problems |
|
|
630 | (22) |
|
|
652 | (1) |
|
|
653 | (2) |
|
|
655 | (3) |
|
Performance-Based Question |
|
|
658 | (1) |
|
|
659 | (552) |
|
Chapter 13 Operating System Basics |
|
|
661 | (46) |
|
Understanding Operating Systems |
|
|
662 | (36) |
|
Operating System Terms and Concepts |
|
|
664 | (1) |
|
Minimum System Requirements |
|
|
665 | (4) |
|
|
669 | (16) |
|
|
685 | (4) |
|
|
689 | (1) |
|
|
690 | (1) |
|
|
691 | (7) |
|
|
698 | (1) |
|
|
699 | (3) |
|
|
702 | (1) |
|
|
702 | (1) |
|
|
703 | (3) |
|
Performance-Based Question |
|
|
706 | (1) |
|
Chapter 14 Operating System Administration |
|
|
707 | (56) |
|
Interacting with Operating Systems |
|
|
709 | (25) |
|
|
709 | (12) |
|
|
721 | (12) |
|
|
733 | (1) |
|
|
734 | (15) |
|
|
734 | (5) |
|
|
739 | (1) |
|
|
739 | (1) |
|
|
740 | (1) |
|
|
740 | (1) |
|
|
741 | (1) |
|
Windows System Configuration Tools |
|
|
742 | (6) |
|
|
748 | (1) |
|
|
749 | (6) |
|
Getting Disks Ready to Store Files and Programs |
|
|
749 | (4) |
|
Backing Up the Data on Your Drives |
|
|
753 | (1) |
|
Checking the Health of Hard Disks and Optimizing Their Performance |
|
|
753 | (1) |
|
|
754 | (1) |
|
|
755 | (1) |
|
|
755 | (2) |
|
|
757 | (4) |
|
Performance-Based Question |
|
|
761 | (2) |
|
Chapter 15 Working with Windows 8/8.1 |
|
|
763 | (20) |
|
|
764 | (5) |
|
|
769 | (7) |
|
Unattended Installation/Image Deployment |
|
|
773 | (1) |
|
Remote Network Installation |
|
|
773 | (1) |
|
|
774 | (1) |
|
Repair Installation/Refresh/Restore |
|
|
774 | (1) |
|
|
774 | (2) |
|
|
776 | (1) |
|
Internal Hard Drive (Partition) |
|
|
776 | (1) |
|
External/Hot Swappable Drive |
|
|
776 | (1) |
|
|
777 | (1) |
|
|
777 | (1) |
|
|
777 | (1) |
|
|
777 | (1) |
|
|
778 | (1) |
|
|
779 | (3) |
|
Performance-Based Question |
|
|
782 | (1) |
|
Chapter 16 Working with Windows 7 |
|
|
783 | (44) |
|
|
785 | (6) |
|
|
791 | (6) |
|
|
792 | (4) |
|
Upgrading Editions of Windows 7 |
|
|
796 | (1) |
|
Installation/Upgrade Boot Options |
|
|
797 | (1) |
|
The Windows 7 Boot Sequences |
|
|
797 | (1) |
|
|
797 | (1) |
|
|
798 | (6) |
|
|
798 | (6) |
|
Windows 7 Administrative Tools |
|
|
804 | (6) |
|
|
804 | (1) |
|
|
805 | (2) |
|
|
807 | (1) |
|
|
808 | (1) |
|
|
808 | (1) |
|
|
809 | (1) |
|
Windows Memory Diagnostics |
|
|
810 | (1) |
|
Unique Control Panel Utilities |
|
|
810 | (3) |
|
|
810 | (1) |
|
RemoteApp and Desktop Connections |
|
|
810 | (1) |
|
|
811 | (2) |
|
|
813 | (4) |
|
Configuring an Alternative IP Address in Windows |
|
|
814 | (1) |
|
|
815 | (1) |
|
Configuring Windows Networking |
|
|
816 | (1) |
|
Windows 7 System Performance and Optimization |
|
|
817 | (2) |
|
|
819 | (1) |
|
|
819 | (2) |
|
|
821 | (5) |
|
Performance-Based Question |
|
|
826 | (1) |
|
Chapter 17 Working with Windows Vista |
|
|
827 | (40) |
|
|
829 | (3) |
|
|
832 | (3) |
|
|
832 | (1) |
|
Upgrading to Windows Vista |
|
|
833 | (2) |
|
Transferring to Windows Vista |
|
|
835 | (1) |
|
The Windows Vista Boot Sequences |
|
|
835 | (1) |
|
|
835 | (1) |
|
|
836 | (4) |
|
|
836 | (4) |
|
Windows Vista Administrative Tools |
|
|
840 | (7) |
|
|
840 | (1) |
|
|
841 | (2) |
|
|
843 | (2) |
|
|
845 | (1) |
|
|
845 | (1) |
|
|
845 | (1) |
|
Windows Memory Diagnostics |
|
|
846 | (1) |
|
|
847 | (5) |
|
|
847 | (1) |
|
|
848 | (1) |
|
|
849 | (1) |
|
Problem Reports and Solutions |
|
|
850 | (2) |
|
|
852 | (1) |
|
Networking and Windows Vista |
|
|
852 | (3) |
|
Vista System Performance and Optimization |
|
|
855 | (5) |
|
|
856 | (1) |
|
|
857 | (1) |
|
|
858 | (1) |
|
|
859 | (1) |
|
|
860 | (1) |
|
|
860 | (1) |
|
|
861 | (4) |
|
Performance-Based Question |
|
|
865 | (2) |
|
Chapter 18 Working with Mac OS and Linux |
|
|
867 | (26) |
|
|
868 | (5) |
|
|
868 | (3) |
|
Scheduled Disk Maintenance |
|
|
871 | (1) |
|
|
871 | (1) |
|
|
871 | (2) |
|
|
873 | (1) |
|
Antivirus/Antimalware Updates |
|
|
873 | (1) |
|
|
873 | (1) |
|
|
874 | (3) |
|
|
877 | (11) |
|
Understanding the Syntax of Shell Commands |
|
|
878 | (1) |
|
Discovering and Using Linux Commands |
|
|
879 | (2) |
|
Becoming root (Superuser) |
|
|
881 | (1) |
|
|
881 | (2) |
|
|
883 | (1) |
|
|
884 | (1) |
|
Changing Permissions and Ownership |
|
|
885 | (1) |
|
|
886 | (1) |
|
|
887 | (1) |
|
|
887 | (1) |
|
|
888 | (1) |
|
|
888 | (1) |
|
|
889 | (3) |
|
Performance-Based Question |
|
|
892 | (1) |
|
|
893 | (60) |
|
Common Prevention Methods |
|
|
896 | (11) |
|
|
897 | (2) |
|
|
899 | (6) |
|
|
905 | (1) |
|
Principle of Least Privilege |
|
|
906 | (1) |
|
|
906 | (1) |
|
|
906 | (1) |
|
|
907 | (13) |
|
|
907 | (1) |
|
|
908 | (1) |
|
|
909 | (1) |
|
Man-in-the-Middle Attacks |
|
|
909 | (1) |
|
|
910 | (1) |
|
|
910 | (1) |
|
|
911 | (1) |
|
|
911 | (1) |
|
|
912 | (5) |
|
|
917 | (1) |
|
|
918 | (1) |
|
|
918 | (1) |
|
|
918 | (1) |
|
|
919 | (1) |
|
|
919 | (1) |
|
|
920 | (1) |
|
Workstation Security Best Practices |
|
|
920 | (3) |
|
|
920 | (1) |
|
Requiring Passwords and Expiration |
|
|
921 | (1) |
|
|
921 | (1) |
|
Restricting User Permissions |
|
|
921 | (1) |
|
Add Login Time Restrictions |
|
|
921 | (1) |
|
Act on Failed Login Attempts |
|
|
922 | (1) |
|
Changing Default Usernames |
|
|
922 | (1) |
|
Disabling the Guest Account |
|
|
922 | (1) |
|
Screensaver Required Password |
|
|
922 | (1) |
|
|
922 | (1) |
|
|
923 | (1) |
|
Working with Windows OS Security Settings |
|
|
923 | (6) |
|
|
923 | (2) |
|
NTFS vs. Share Permissions |
|
|
925 | (2) |
|
|
927 | (1) |
|
|
928 | (1) |
|
|
928 | (1) |
|
BitLocker and BitLocker To Go |
|
|
929 | (1) |
|
|
929 | (1) |
|
|
929 | (6) |
|
|
930 | (1) |
|
Remote Wipes and Locator Applications |
|
|
931 | (3) |
|
|
934 | (1) |
|
|
934 | (1) |
|
Destruction and Disposal Methods |
|
|
935 | (4) |
|
Recycling or Repurposing Best Practices |
|
|
936 | (1) |
|
Low-Level Format vs. Standard Format |
|
|
936 | (1) |
|
Hard Drive Sanitation and Sanitation Methods |
|
|
936 | (1) |
|
|
937 | (2) |
|
Securing a SOHO Network (Wireless) |
|
|
939 | (3) |
|
Change Default Usernames and Passwords |
|
|
940 | (1) |
|
|
940 | (1) |
|
|
940 | (1) |
|
|
940 | (1) |
|
|
940 | (1) |
|
Antenna and Access Point Placement |
|
|
941 | (1) |
|
|
941 | (1) |
|
Assign Static IP Addresses |
|
|
941 | (1) |
|
|
942 | (1) |
|
Securing a SOHO Network (Wired) |
|
|
942 | (3) |
|
Change Default Usernames and Passwords |
|
|
942 | (1) |
|
Assign Static IP Addresses |
|
|
943 | (1) |
|
|
943 | (1) |
|
|
943 | (2) |
|
|
945 | (1) |
|
|
945 | (2) |
|
|
947 | (4) |
|
Performance-Based Question |
|
|
951 | (2) |
|
Chapter 20 Network Services, Cloud Computing, and Virtualization |
|
|
953 | (50) |
|
Understanding Network Services |
|
|
955 | (20) |
|
|
956 | (15) |
|
|
971 | (2) |
|
Legacy and Embedded Systems |
|
|
973 | (2) |
|
Understanding Cloud Computing and Virtualization |
|
|
975 | (21) |
|
Concepts of Cloud Computing |
|
|
975 | (9) |
|
Understanding Virtualization |
|
|
984 | (12) |
|
|
996 | (1) |
|
|
996 | (2) |
|
|
998 | (3) |
|
Performance-Based Question |
|
|
1001 | (2) |
|
Chapter 21 Mobile Operating Systems and Connectivity |
|
|
1003 | (94) |
|
Understanding Mobile Operating Systems |
|
|
1006 | (30) |
|
Comparing Mobile Operating Systems |
|
|
1007 | (15) |
|
Understanding Sensors and Calibration |
|
|
1022 | (7) |
|
Using Additional Mobile Operating System Features |
|
|
1029 | (7) |
|
Network Connectivity and Email |
|
|
1036 | (46) |
|
Understanding Cellular Data Connections |
|
|
1037 | (8) |
|
Establishing Wi-Fi Connectivity |
|
|
1045 | (11) |
|
Establishing Bluetooth Connectivity |
|
|
1056 | (13) |
|
Configuring Email Accounts |
|
|
1069 | (13) |
|
Mobile Device Synchronization |
|
|
1082 | (10) |
|
Syncing Apple iOS Devices |
|
|
1083 | (5) |
|
|
1088 | (1) |
|
Software Installation Requirements |
|
|
1089 | (3) |
|
|
1092 | (1) |
|
|
1092 | (1) |
|
|
1093 | (3) |
|
Performance-Based Question |
|
|
1096 | (1) |
|
Chapter 22 Troubleshooting Theory, OSs, and Security |
|
|
1097 | (50) |
|
Understanding Troubleshooting Theory |
|
|
1100 | (10) |
|
|
1101 | (4) |
|
|
1105 | (1) |
|
|
1106 | (1) |
|
Establishing a Plan of Action |
|
|
1107 | (2) |
|
|
1109 | (1) |
|
|
1109 | (1) |
|
Troubleshooting Operating Systems |
|
|
1110 | (16) |
|
|
1110 | (8) |
|
|
1118 | (8) |
|
Troubleshooting Security Issues |
|
|
1126 | (11) |
|
|
1128 | (4) |
|
|
1132 | (4) |
|
Best Practices for Malware Removal |
|
|
1136 | (1) |
|
Troubleshooting Mobile Issues |
|
|
1137 | (2) |
|
Troubleshooting Mobile Security Issues |
|
|
1139 | (3) |
|
|
1142 | (1) |
|
|
1142 | (1) |
|
|
1143 | (3) |
|
Performance-Based Question |
|
|
1146 | (1) |
|
Chapter 23 Understanding Operational Procedures |
|
|
1147 | (64) |
|
Understanding Safety Procedures |
|
|
1150 | (20) |
|
Identifying Potential Safety Hazards |
|
|
1151 | (10) |
|
Creating a Safe Workplace |
|
|
1161 | (9) |
|
Understanding Environmental Controls |
|
|
1170 | (16) |
|
Managing the Physical Environment |
|
|
1171 | (6) |
|
Handling and Disposing of Computer Equipment |
|
|
1177 | (9) |
|
Understanding Policies, Licensing, and Privacy |
|
|
1186 | (5) |
|
Managing Software Licenses |
|
|
1186 | (3) |
|
Managing Sensitive Information |
|
|
1189 | (2) |
|
Demonstrating Professionalism |
|
|
1191 | (13) |
|
Communicating with Customers |
|
|
1192 | (4) |
|
Using Appropriate Behavior |
|
|
1196 | (6) |
|
Putting It All in Perspective |
|
|
1202 | (2) |
|
|
1204 | (1) |
|
|
1204 | (2) |
|
|
1206 | (3) |
|
Performance-Based Question |
|
|
1209 | (2) |
|
Appendix A Answers to Review Questions |
|
|
1211 | (36) |
|
Chapter 1: Motherboards, Processors, and Memory |
|
|
1212 | (2) |
|
Chapter 2: Storage Devices and Power Supplies |
|
|
1214 | (1) |
|
Chapter 3: Peripherals and Expansion |
|
|
1215 | (2) |
|
Chapter 4: Display Devices |
|
|
1217 | (2) |
|
Chapter 5: Custom Configurations |
|
|
1219 | (2) |
|
Chapter 6: Network Fundamentals |
|
|
1221 | (1) |
|
Chapter 7: Introduction to TCP/IP |
|
|
1222 | (2) |
|
Chapter 8: Installing Wireless and SOHO Networks |
|
|
1224 | (2) |
|
Chapter 9: Understanding Laptops |
|
|
1226 | (1) |
|
Chapter 10: Understanding Mobile Devices |
|
|
1227 | (2) |
|
Chapter 11: Installing and Configuring Printers |
|
|
1229 | (1) |
|
Chapter 12: Hardware and Network Troubleshooting |
|
|
1230 | (2) |
|
Chapter 13: Operating System Basics |
|
|
1232 | (1) |
|
Chapter 14: Operating System Administration |
|
|
1233 | (1) |
|
Chapter 15: Working with Windows 8/8.1 |
|
|
1234 | (1) |
|
Chapter 16: Working with Windows 7 |
|
|
1235 | (1) |
|
Chapter 17: Working with Windows Vista |
|
|
1236 | (2) |
|
Chapter 18: Working with Mac OS and Linux |
|
|
1238 | (1) |
|
|
1239 | (1) |
|
Chapter 20: Network Services, Cloud Computing, and Virtualization |
|
|
1240 | (1) |
|
Chapter 21: Mobile Operating Systems and Connectivity |
|
|
1241 | (2) |
|
Chapter 22: Troubleshooting Theory, OSs, and Security |
|
|
1243 | (1) |
|
Chapter 23: Understanding Operational Procedures |
|
|
1244 | (3) |
|
Appendix B Answers to Performance-Based Questions |
|
|
1247 | |
|
Chapter 1: Motherboards, Processors, and Memory |
|
|
1248 | (1) |
|
Chapter 2: Storage Devices and Power Supplies |
|
|
1249 | (1) |
|
Chapter 3: Peripherals and Expansion |
|
|
1249 | (1) |
|
Chapter 4: Display Devices |
|
|
1249 | (3) |
|
Chapter 5: Custom Configurations |
|
|
1252 | (1) |
|
Chapter 6: Network Fundamentals |
|
|
1252 | (2) |
|
Chapter 7: Introduction to TCP/IP |
|
|
1254 | (1) |
|
Chapter 8: Installing Wireless and SOHO Networks |
|
|
1254 | (1) |
|
Chapter 9: Understanding Laptops |
|
|
1254 | (2) |
|
Chapter 10: Understanding Mobile Devices |
|
|
1256 | (1) |
|
Chapter 11: Installing and Configuring Printers |
|
|
1256 | (1) |
|
Chapter 12: Hardware and Network Troubleshooting |
|
|
1257 | (1) |
|
Chapter 13: Operating System Basics |
|
|
1257 | (2) |
|
Chapter 14: Operating System Administration |
|
|
1259 | (1) |
|
Chapter 15: Working with Windows 8/8.1 |
|
|
1259 | (1) |
|
Chapter 16: Working with Windows 7 |
|
|
1259 | (3) |
|
Chapter 17: Working with Windows Vista |
|
|
1262 | (2) |
|
Chapter 18: Working with Mac OS and Linux |
|
|
1264 | (1) |
|
|
1264 | (2) |
|
Chapter 20: Network Services, Cloud Computing, land Virtualization |
|
|
1266 | (1) |
|
Chapter 21: Mobile Operating Systems and Connectivity |
|
|
1266 | (1) |
|
Chapter 22: Troubleshooting Theory, OSs, and Security |
|
|
1267 | (1) |
|
Chapter 23: Understanding Operational Procedures |
|
|
1267 | (2) |
|
|
1269 | |