Muutke küpsiste eelistusi

E-raamat: CompTIA Network+ Study Guide: Exam N10-007

  • Formaat: PDF+DRM
  • Ilmumisaeg: 10-Apr-2018
  • Kirjastus: Sybex Inc.,U.S.
  • Keel: eng
  • ISBN-13: 9781119432227
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 37,04 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
  • Formaat: PDF+DRM
  • Ilmumisaeg: 10-Apr-2018
  • Kirjastus: Sybex Inc.,U.S.
  • Keel: eng
  • ISBN-13: 9781119432227
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

To complement the CompTIA Network+ Study Guide: Exam N10-007, 4e, and the CompTIA Network+ Deluxe Study Guide: Exam N10-007, 4e, look at CompTIA Network+ Practice Tests: Exam N10-007 (9781119432128).

Todd Lammle's bestselling CompTIA Network+ Study Guide for the N10-007 exam!

CompTIA's Network+ certification tells the world you have the skills to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols. First, however, you have to pass the exam! This detailed CompTIA Authorized study guide by networking guru Todd Lammle has everything you need to prepare for the CompTIA Network+ Exam N10-007.

Todd covers all exam objectives, explains key topics, offers plenty of practical examples, and draws upon his own invaluable 30 years of networking experience to help you learn. The Study Guide prepares you for Exam N10-007, the new CompTIA Network+ Exam:





Covers all exam objectives including network technologies, network installation and configuration, network media and topologies, security, and much more Includes practical examples review questions, as well as access to practice exams and flashcards to reinforce learning Networking guru and expert author Todd Lammle offers valuable insights and tips drawn from real-world experience

Plus, receive one year of FREE access to a robust set of online interactive learning tools, including hundreds of sample practice questions, a pre-assessment test, bonus practice exams, and over 100 electronic flashcards. Prepare for the exam and enhance your careerstarting now!
Introduction xxx
Assessment Test lxvi
Chapter 1 Introduction to Networks 1(26)
First Things First: What's a Network?
2(9)
The Local Area Network
3(2)
Common Network Components
5(2)
Wide Area Network
7(2)
Network Architecture: Peer-to-Peer or Client-Server?
9(2)
Physical Network Topologies
11(8)
Bus Topology
12(1)
Star Topology
13(1)
Ring Topology
14(1)
Mesh Topology
15(1)
Point-to-Point Topology
16(1)
Point-to-Multipoint Topology
17(1)
Hybrid Topology
18(1)
Topology Selection, Backbones, and Segments
19(2)
Selecting the Right Topology
19(1)
The Network Backbone
20(1)
Network Segments
21(1)
CAN
21(1)
SAN
21(1)
Summary
21(1)
Exam Essentials
22(1)
Written Lab
22(1)
Review Questions
23(4)
Chapter 2 The Open Systems Interconnection Specifications 27(28)
Internetworking Models
28(2)
The Layered Approach
29(1)
Advantages of Reference Models
29(1)
The OSI Reference Model
30(15)
The Application Layer
32(1)
The Presentation Layer
33(1)
The Session Layer
33(1)
The Transport Layer
33(7)
The Network Layer
40(2)
The Data Link Layer
42(3)
The Physical Layer
45(1)
Introduction to Encapsulation
45(1)
Modulation Techniques
46(1)
Summary
47(1)
Exam Essentials
48(1)
Written Lab
48(2)
Review Questions
50(5)
Chapter 3 Networking Topologies, Connectors, and Wiring Standards 55(36)
Physical Media
57(16)
Coaxial Cable
58(2)
Twisted-Pair Cable
60(4)
Fiber-Optic Cable
64(5)
Transceivers
69(1)
Media Converters
69(2)
Serial Cables
71(2)
Cable Properties
73(2)
Transmission Speeds
73(1)
Distance
74(1)
Duplex
74(1)
Noise Immunity (Security, EMI)
74(1)
Frequency
75(1)
Wiring Standards
75(7)
T568A vs. T568B
75(2)
Straight-Through Cable
77(1)
Crossover Cable
78(2)
Rolled/Rollover Cable
80(1)
T1 Crossover Cable
80(2)
Installing Wiring Distributions
82(2)
MDF/IDF
82(2)
Summary
84(1)
Exam Essentials
85(1)
Written Lab
85(2)
Review Questions
87(4)
Chapter 4 The Current Ethernet Specifications 91(34)
Network Basics
92(2)
Ethernet Basics
94(5)
Collision Domain
94(1)
Broadcast Domain
94(1)
CSMA/CD
95(1)
Broadband/Baseband
96(1)
Bit Rates vs. Baud Rate
97(1)
Wavelength
97(1)
Half-and Full-Duplex Ethernet
98(1)
Ethernet at the Data Link Layer
99(7)
Binary to Decimal and Hexadecimal Conversion
100(3)
Ethernet Addressing
103(1)
Ethernet Frames
104(2)
Ethernet at the Physical Layer
106(5)
Ethernet over Other Standards (IEEE 1905.1-2013)
111(3)
Ethernet over Power Line
112(1)
Ethernet over HDMI
113(1)
Summary
114(1)
Exam Essentials
115(1)
Written Lab
115(5)
Review Questions
120(5)
Chapter 5 Networking Devices 125(50)
Common Network Connectivity Devices
128(18)
Network Interface Card
129(1)
Hub
130(1)
Bridge
131(1)
Switch
131(1)
Router
132(4)
Firewall
136(1)
IDS/IPS
137(1)
HIDS
137(1)
Access Point
138(1)
Wireless Range Extender
138(1)
Contention Methods
139(2)
Dynamic Host Configuration Protocol Server
141(5)
IPAM
146(1)
Other Specialized Devices
146(13)
Multilayer Switch
147(1)
Load Balancer
147(1)
Domain Name Service Server
148(6)
Proxy Server
154(1)
Encryption Devices
155(1)
Analog Modem
156(1)
Packet Shaper
157(1)
VPN Concentrator
157(1)
Media Converter
158(1)
VoIP PBX
158(1)
VoIP Endpoint
158(1)
NGFW/Layer 7 Firewall
159(1)
VoIP Gateway
159(1)
Planning and Implementing a Basic SOHO Network Using Network Segmentation
159(10)
Determining Requirements
159(7)
Switches and Bridges at the Data Link Layer
166(1)
Hubs at the Physical Layer
167(1)
Environmental Considerations
168(1)
Summary
169(1)
Exam Essentials
169(1)
Written Lab
170(1)
Review Questions
171(4)
Chapter 6 Introduction to the Internet Protocol 175(34)
Introducing TCP/IP
177(21)
A Brief History of TCP/IP
177(1)
TCP/IP and the DoD Model
178(2)
The Process/Application Layer Protocols
180(8)
The Host-to-Host Layer Protocols
188(4)
The Internet Layer Protocols
192(6)
Data Encapsulation
198(4)
Summary
202(1)
Exam Essentials
202(1)
Written Lab
203(1)
Review Questions
204(5)
Chapter 7 IP Addressing 209(28)
IP Terminology
210(1)
The Hierarchical IP Addressing Scheme
211(7)
Network Addressing
212(4)
Private IP Addresses (RFC 1918)
216(2)
IPv4 Address Types
218(2)
Layer 2 Broadcasts
219(1)
Layer 3 Broadcasts
219(1)
Unicast Address
219(1)
Multicast Address (Class D)
219(1)
Internet Protocol Version 6 (IPv6)
220(10)
Why Do We Need IPv6?
220(1)
The Benefits of and Uses for IPv6
221(1)
IPv6 Addressing and Expressions
222(1)
Shortened Expression
223(1)
Address Types
224(1)
Special Addresses
225(1)
Stateless Autoconfiguration (EUI-64)
226(1)
DHCPv6 (Stateful)
227(1)
Migrating to IPv6
227(3)
Summary
230(1)
Exam Essentials
230(1)
Written Labs
231(2)
Written Lab 7.1
231(1)
Written Lab 7.2
232(1)
Written Lab 7.3
232(1)
Review Questions
233(4)
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT 237(42)
Subnetting Basics
238(22)
How to Create Subnets
239(1)
Subnet Masks
240(1)
Classless Inter-Domain Routing (CIDR)
241(2)
Subnetting Class C Addresses
243(10)
Subnetting Class B Addresses
253(7)
Troubleshooting IP Addressing
260(8)
Determining IP Address Problems
263(5)
Introduction to Network Address Translation (NAT)
268(4)
Types of Network Address Translation
269(1)
NAT Names
269(1)
How NAT Works
270(2)
Summary
272(1)
Exam Essentials
272(1)
Written Lab
273(1)
Review Questions
274(5)
Chapter 9 Introduction to IP Routing 279(22)
Routing Basics
280(3)
The IP Routing Process
283(6)
Testing Your IP Routing Understanding
289(2)
Static and Dynamic Routing
291(3)
Summary
294(1)
Exam Essentials
294(1)
Written Lab
294(2)
Review Questions
296(5)
Chapter 10 Routing Protocols 301(40)
Routing Protocol Basics
302(4)
Administrative Distances
303(2)
Classes of Routing Protocols
305(1)
Distance Vector Routing Protocols
306(9)
Routing Information Protocol (RIP)
308(1)
RIP Version 2 (RIPv2)
308(1)
VLSM and Discontiguous Networks
309(3)
EIGRP
312(2)
Border Gateway Protocol (BGP)
314(1)
Link State Routing Protocols
315(4)
Open Shortest Path First (OSPF)
316(2)
Intermediate System-to-Intermediate System (IS-IS)
318(1)
High Availability
319(7)
Hot Standby Router Protocol (HSRP)
321(4)
Virtual Router Redundancy Protocol
325(1)
Advanced IPv6 Concepts
326(6)
Router Advertisement
326(2)
Neighbor Discovery
328(1)
Tunneling
329(3)
Dual Stack
332(1)
IPv6 Routing Protocols
332(2)
RIPng
333(1)
EIGRPv6
333(1)
OSPFv3
333(1)
Summary
334(1)
Exam Essentials
334(1)
Written Lab
335(1)
Review Questions
336(5)
Chapter 11 Switching and Virtual LANs 341(46)
Networking Before Layer 2 Switching
343(3)
Switching Services
346(8)
Limitations of Layer 2 Switching
347(1)
Bridging vs. LAN Switching
348(1)
Three Switch Functions at Layer 2
348(6)
Distributed Switching
354(1)
Spanning Tree Protocol
354(4)
Spanning Tree Port States
355(1)
STP Convergence
356(1)
Rapid Spanning Tree Protocol 802.1w
357(1)
Virtual LANs
358(9)
VLAN Basics
359(3)
Quality of Service
362(1)
VLAN Memberships
363(1)
Static VLANs
363(1)
Dynamic VLANs
364(1)
Identifying VLANs
364(2)
VLAN Identification Methods
366(1)
VLAN Trunking Protocol
367(9)
VTP Modes of Operation
368(1)
Do We Really Need to Put an IP Address on a Switch?
369(3)
Switch Port Protection
372(3)
Port Bonding
375(1)
Device Hardening
376(1)
Two Additional Advanced Features of Switches
376(4)
Power over Ethernet (802.3af, 802.3at)
376(3)
Port Mirroring/Spanning (SPAN/RSPAN)
379(1)
Summary
380(1)
Exam Essentials
381(1)
Written Lab
381(2)
Review Questions
383(4)
Chapter 12 Wireless Networking 387(52)
Introduction to Wireless Technology
390(3)
Cellular
393(1)
The 802.11 Standards
393(6)
2.4 GHz (802.11b)
395(1)
2.4 GHz (802.11g)
396(1)
5 GHz (802.11a)
397(1)
5 GHz (802.11h)
397(1)
2.4 GHz/5 GHz (802.11n)
398(1)
5 GHz (802.11ac)
399(1)
Comparing 802.11 Standards
399(2)
Range Comparisons
400(1)
Wireless Network Components
401(4)
Wireless Access Points
401(1)
Wireless Network Interface Card
402(1)
Wireless Antennas
403(2)
Installing a Wireless Network
405(13)
Ad Hoc Mode: Independent Basic Service Set
405(1)
Infrastructure Mode: Basic Service Set
406(1)
Wireless Controllers
407(2)
Mobile Hot Spots
409(1)
Signal Degradation
410(1)
Other Network Infrastructure Implementations
410(2)
Technologies that facilitate the Internet of Things (IoT)
412(1)
Installing and Configuring WLAN Hardware
412(6)
Site Survey
418(4)
Providing Capacity
418(2)
Multiple Floors
420(1)
Location-Based WLAN
421(1)
Site Survey Tools
421(1)
Wireless Security
422(11)
Wireless Threats
422(4)
Open Access
426(1)
Service Set Identifiers, Wired Equivalent Privacy,
and Media Access Control Address Authentication
426(1)
Remote Authentication Dial-In User Service (802.1X)
427(1)
Temporal Key Integrity Protocol
428(2)
Wi-Fi Protected Access or WPA2 Pre-Shared Key
430(3)
Summary
433(1)
Exam Essentials
433(1)
Written Lab
434(1)
Review Questions
435(4)
Chapter 13 Authentication and Access Control 439(44)
Security Filtering
441(17)
Access Control Lists
442(1)
Tunneling
443(8)
Encryption
451(4)
Remote Access
455(3)
Managing User Account and Password Security
458(10)
Managing User Accounts
459(2)
Managing Passwords
461(4)
Single Sign-On
465(1)
Local Authentication
466(1)
LDAP
466(1)
Certificates
466(1)
Multifactor Authentication
467(1)
User-Authentication Methods
468(8)
Public Key Infrastructure (PKI)
468(1)
Kerberos
469(1)
Authentication, Authorization, and Accounting (AAA)
470(2)
Web Services
472(1)
Unified Voice Services
472(1)
Network Controllers
472(1)
Network Access Control (NAC)
472(1)
Challenge Handshake Authentication Protocol (CHAP)
473(1)
MS-CHAP
474(1)
Extensible Authentication Protocol (EAP)
474(1)
Hashes
474(1)
Network Access Control
475(1)
Summary
476(1)
Exam Essentials
477(1)
Written Lab
477(2)
Review Questions
479(4)
Chapter 14 Network Threats and Mitigation 483(60)
Recognizing Security Threats
485(15)
Denial of Service
486(1)
Distributed DoS (DDoS)
487(8)
Authentication Issues
495(1)
Viruses
496(3)
Zero-Day Attacks
499(1)
Insider Threat/Malicious Employee
500(1)
Vulnerabilities
500(12)
Exploits vs. Vulnerabilities
500(1)
Unnecessary Running Services
500(1)
Open Ports
500(1)
Unpatched/Legacy Systems
501(1)
Unencrypted Channels
501(1)
TEMPEST/RF Emanation
501(1)
Malicious Users
501(2)
Buffer Overflow
503(1)
DNS Poisoning
503(1)
Wireless Threats
503(3)
Attackers and Their Tools
506(4)
Misconfiguration Issues
510(1)
Social Engineering (Phishing)
511(1)
Understanding Mitigation Techniques
512(4)
Active Detection
513(1)
Passive Detection
513(1)
Proactive Defense
513(1)
Basic Forensic Concepts
514(2)
Policies and Procedures
516(16)
Security Policies
517(7)
Security Training
524(1)
Patches and Upgrades
525(2)
Firmware Updates
527(1)
Driver Updates
527(1)
File Hashing
528(1)
Generating New Keys
528(1)
Upgrading vs. Downgrading
528(2)
Asset Disposal
530(1)
Detection
531(1)
Anti-malware Software
532(5)
Host Based
533(1)
Cloud/Server Based
533(1)
Configuration Backups
534(1)
Updating Antivirus Components
534(2)
Fixing an Infected Computer
536(1)
Summary
537(1)
Exam Essentials
537(1)
Written Lab
537(2)
Review Questions
539(4)
Chapter 15 Physical Security and Risk 543(50)
Using Hardware and Software Security Devices
545(2)
Defining Firewalls
547(1)
Network-Based Firewalls
548(1)
Host-Based Firewalls
548(1)
Firewall Technologies
548(10)
Access Control Lists
549(2)
Port Security
551(1)
Demilitarized Zone
552(1)
Protocol Switching
553(2)
Dynamic Packet Filtering
555(1)
Proxy Services
556(2)
Firewalls at the Application Layer vs. the Network Layer
558(3)
Stateful vs. Stateless Network Layer Firewalls
559(1)
NGFW/Layer7 Firewall
560(1)
Scanning Services and Other Firewall Features
561(5)
Content Filtering
562(1)
Signature Identification
563(1)
Context Awareness
563(1)
Virtual Wire vs. Routed
563(1)
Zones
564(2)
Intrusion Detection and Prevention Systems
566(5)
Network-Based IDS
567(2)
Host-Based IDS
569(1)
Vulnerability Scanners
570(1)
VPN Concentrators
571(1)
Understanding Problems Affecting Device Security
572(14)
Physical Security
572(5)
Logical Security Configurations
577(2)
Risk-Related Concepts
579(7)
Summary
586(1)
Exam Essentials
587(1)
Written Lab
588(1)
Review Questions
589(4)
Chapter 16 Wide Area Networks 593(42)
What's a WAN?
596(5)
Defining WAN Terms
596(2)
The Public Switched Telephone Network
598(1)
WAN Connection Types
599(1)
Bandwidth or Speed
600(1)
T-Series Connections
601(2)
The T1 Connection
602(1)
The T3 Connection
603(1)
Transmission Media
603(4)
Wired Connections
603(1)
Wavelength Division Multiplexing
604(1)
Passive Optical Network
605(1)
Wireless Technologies
605(2)
Broadband Services
607(4)
DSL Technology and xDSL
608(2)
Cable Modem
610(1)
Wireless WAN Technologies
611(2)
Cellular WAN
612(1)
WAN Protocols
613(10)
Integrated Services Digital Network
613(2)
Frame Relay Technology
615(3)
Point-to-Point Protocol
618(3)
DMVPN
621(1)
SIP Trunks
621(1)
Asynchronous Transfer Mode
622(1)
MPLS
623(1)
WAN Troubleshooting
623(6)
Loss of Internet Connectivity
624(1)
Interface Errors/Monitoring
624(3)
Split Horizon
627(1)
DNS Issues
628(1)
Router Configurations
628(1)
Company Security Policy
629(1)
Summary
629(1)
Exam Essentials
630(1)
Written Lab
631(1)
Review Questions
632(3)
Chapter 17 Troubleshooting Tools 635(56)
Protocol Analyzers
637(1)
Throughput Testers
638(1)
Connectivity Software
639(1)
Using traceroute
640(7)
Using ipconfig and ifconfig
642(4)
Using the ifconfig Utility
646(1)
Using the iptables utility
646(1)
Using the ping Utility
647(3)
Using the Address Resolution Protocol
650(4)
The Windows ARP Table
651(1)
Using the arp Utility
651(3)
Using the nslookup Utility
654(2)
Resolving Names with the Hosts Table
656(1)
Using the Mtr Command (pathping)
657(2)
Using the Nmap Utility
658(1)
Using the route Command
659(4)
Using the route Command Options
661(1)
Some Examples of the route Command
662(1)
Using the nbtstat Utility
663(6)
The-a Switch
663(2)
The-A Switch
665(1)
The-c Switch
665(1)
The-n Switch
666(1)
The-r Switch
666(1)
The-R Switch
667(1)
The-S Switch
668(1)
The-s Switch
668(1)
Using the netstat Utility
669(7)
The-a Switch
671(1)
The-e Switch
672(1)
The-r Switch
673(1)
The-s Switch
673(1)
The-p Switch
673(2)
The-n Switch
675(1)
Using tcpdump
676(1)
Examples of Using tcpdump
676(1)
Using the File Transfer Protocol
677(5)
Starting FTP and Logging In to an FTP Server
678(1)
Downloading Files
679(2)
Uploading Files
681(1)
Using the Telnet Utility
682(2)
How to Enable Telnet in Windows
682(1)
Don't Use Telnet, Use Secure Shell
683(1)
Summary
684(1)
Exam Essentials
684(1)
Written Lab
685(1)
Review Questions
686(5)
Chapter 18 Software and Hardware Tools 691(40)
Understanding Network Scanners
693(9)
Packet Sniffers/Network Monitors
693(2)
Intrusion Detection and Prevention Software
695(2)
Port Scanners
697(3)
Wi-Fi Analyzer
700(1)
Bandwidth Speed Tester
701(1)
Baseline
702(1)
Network Monitoring and Logging
703(9)
Network Monitoring
703(1)
SNMP
704(1)
Syslog
705(2)
SIEM
707(3)
Utilization
710(2)
Identifying Hardware Tools
712(13)
Cable Testers
712(3)
Protocol Analyzer
715(1)
Certifiers
716(1)
Time-Domain Reflectometer
717(1)
Optical Time-Domain Reflectometer
717(1)
Multimeter
718(1)
Spectrum Analyzer
719(1)
Toner Generator (Probe)
720(1)
Metrics
721(1)
Butt Set
721(1)
Punch-Down Tool
722(1)
Cable Stripper/Snips
723(1)
Voltage Event Recorder (Power)
723(1)
Environmental Monitors
724(1)
Summary
725(1)
Exam Essentials
725(1)
Written Lab
726(1)
Review Questions
727(4)
Chapter 19 Network Troubleshooting 731(50)
Narrowing Down the Problem
734(15)
Did You Check the Super Simple Stuff?
735(3)
Is Hardware or Software Causing the Problem?
738(1)
Is It a Workstation or a Server Problem?
739(1)
Which Segments of the Network Are Affected?
740(1)
Is It Bad Cabling?
740(9)
Troubleshooting Steps
749(21)
Step 1: Identify the Problem
750(4)
Step 2: Establish a Theory of Probable Cause
754(8)
Step 3: Test the Theory to Determine Cause
762(2)
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
764(2)
Step 5: Implement the Solution or Escalate as Necessary
766(3)
Step 6: Verify Full System Functionality, and If Applicable, Implement Preventative Measures
769(1)
Step 7: Document Findings, Actions, and Outcomes
769(1)
Troubleshooting Tips
770(3)
Don't Overlook the Small Stuff
770(1)
Prioritize Your Problems
771(1)
Check the Software Configuration
771(1)
Don't Overlook Physical Conditions
772(1)
Don't Overlook Cable Problems
772(1)
Check for Viruses
773(1)
Summary
773(1)
Exam Essentials
774(1)
Written Lab
774(2)
Review Questions
776(5)
Chapter 20 Management, Monitoring, and Optimization 781(60)
Managing Network Documentation
785(10)
Using SNMP
785(1)
Schematics and Diagrams
786(9)
Network Monitoring
795(13)
Baselines
795(1)
Processes
796(1)
On-Boarding and Off-Boarding of Mobile Devices
796(1)
NAC
796(1)
Policies, Procedures, and Regulations
797(4)
Safety Practices
801(4)
Implementing Network Segmentation
805(3)
Network Optimization
808(26)
Reasons to Optimize Your Network's Performance
808(3)
How to Optimize Performance
811(2)
Unified Communications
813(1)
Traffic Shaping
813(1)
Load Balancing
814(1)
High Availability
814(1)
Caching Engines
815(1)
Fault Tolerance
815(1)
Archives/Backups
815(1)
Common Address Redundancy Protocol
816(1)
Virtual Networking
817(8)
Locating and Installing Equipment
825(7)
Change Management Procedures
832(2)
Summary
834(1)
Exam Essentials
835(1)
Written Lab
836(1)
Review Questions
837(4)
Appendix A: Answers to Written Labs 841(14)
Chapter 1 Introduction to Networks
842(1)
Chapter 2 The Open Systems Interconnection Specifications
842(1)
Chapter 3 Networking Topologies, Connectors, and Wiring Standards
843(1)
Chapter 4 The Current Ethernet Specifications
843(2)
Chapter 5 Networking Devices
845(1)
Chapter 6 Introduction to the Internet Protocol
846(1)
Chapter 7 IP Addressing
847(1)
Written Lab 7.1
847(1)
Written Lab 7.2
847(1)
Written Lab 7.3
848(1)
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT
848(1)
Chapter 9 Introduction to IP Routing
849(1)
Chapter 10 Routing Protocols
849(1)
Chapter 11 Switching and Virtual LANs
850(1)
Chapter 12 Wireless Networking
850(1)
Chapter 13 Authentication and Access Control
850(1)
Chapter 14 Network Threats and Mitigation
851(1)
Chapter 15 Physical Security and Risk
851(1)
Chapter 16 Wide Area Networks
852(1)
Chapter 17 Troubleshooting Tools
852(1)
Chapter 18 Software and Hardware Tools
853(1)
Chapter 19 Network Troubleshooting
853(1)
Chapter 20 Management, Monitoring, and Optimization
854(1)
Appendix B: Answers to Review Questions 855(32)
Chapter 1 Introduction to Networks
856(1)
Chapter 2 The Open Systems Interconnection Specifications
857(2)
Chapter 3 Networking Topologies, Connectors, and Wiring Standards
859(1)
Chapter 4 The Current Ethernet Specifications
860(1)
Chapter 5 Networking Devices
861(2)
Chapter 6 Introduction to the Internet Protocol
863(1)
Chapter 7 IP Addressing
864(2)
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT
866(2)
Chapter 9 Introduction to IP Routing
868(1)
Chapter 10 Routing Protocols
869(2)
Chapter 11 Switching and Virtual LANs
871(1)
Chapter 12 Wireless Networking
872(2)
Chapter 13 Authentication and Access Control
874(1)
Chapter 14 Network Threats and Mitigation
875(2)
Chapter 15 Physical Security and Risk
877(1)
Chapter 16 Wide Area Networks
878(2)
Chapter 17 Troubleshooting Tools
880(1)
Chapter 18 Software and Hardware Tools
881(2)
Chapter 19 Network Troubleshooting
883(2)
Chapter 20 Management, Monitoring, and Optimization
885(2)
Appendix C: Subnetting Class A 887(8)
Subnetting Practice Examples: Class A Addresses
888(2)
Practice Example #1A: 255.255.0.0 (/16)
888(1)
Practice Example #2A: 255.255.240.0 (/20)
889(1)
Practice Example #3A: 255.255.255.192 (/26)
889(1)
Subnetting in Your Head: Class A Addresses
890(1)
Written Lab 1
891(1)
Written Lab 2
892(1)
Answers to Written Lab 1
892(1)
Answers to Written Lab 2
893(2)
Index 895
Todd Lammle, Network+, CCSI, CCNA, CCNP, is the networking authority. He has been involved in computers and networking with Fortune 500 companies for almost 30 years. Todd is President of GlobalNet System Solutions, Inc., a networking integration and training firm. He is the bestselling author of numerous titles, with over 900,000 copies of his books in print. He can be reached through his website at www.lammle.com.