CompTIA Network+®: Deluxe Study Guide

Book description

More than 220,000 network professionals have achieved the Network+ certification since its inception, second only to the Cisco Certified Network Associate certification. This hardcover edition includes Sybex CompTIA Network+ Virtual Lab network simulator plus four additional bonus exams and 100 additional flashcards and is fully updated for the first revision of the exam since 2005. The guide contains concise information on security essentials and standards, using practical examples and insights drawn from real-world experience and covers key exam topics including network technologies, media and topologies, devices, management, tools, and security.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Table of contents

  1. Copyright
  2. Preface1
  3. Dear Reader,
  4. Acknowledgments
  5. About the Author
  6. Introduction
    1. What Is the Network+ Certification?
    2. Why Become Network+ Certified?
      1. Proof of Professional Achievement
      2. Opportunity for Advancement
    3. How to Become Network+ Certified
    4. Who Should Buy This Book?
    5. What Does This Book Cover?
    6. How to Use This Book
    7. What's on the CD?
      1. The Sybex Test Engine
      2. Electronic Flashcards for PC, Pocket PC, and Palm Devices
      3. PDF of Book
    8. Exam Objectives
      1. 1.0 Network Technologies (20%)
      2. 2.0 Network Media and Topologies (20%)
      3. 3.0 Network Devices (17%)
      4. 4.0 Network Management (20%)
      5. 5.0 Network Tools (12%)
      6. 6.0 Network Security (11%)
    9. Assessment Test
    10. Answers to Assessment Test
  7. 1. Introduction to Networks
    1. 1.1. First Things First: What's a Network?
      1. 1.1.1. The Local Area Network (LAN)
    2. 1.2. Common Network Components
      1. 1.2.1.
        1. 1.2.1.1. Workstations
        2. 1.2.1.2. Servers
        3. 1.2.1.3. Hosts
      2. 1.2.2. Virtual LANs (VLANs)
      3. 1.2.3. Wide Area Network (WAN)
      4. 1.2.4. Virtual Private Networks (VPNs)
      5. 1.2.5. Network Architecture: Peer-to-Peer or Client/Server?
        1. 1.2.5.1. Peer-to-Peer Networks
        2. 1.2.5.2. Client/Server Networks
    3. 1.3. Physical Network Topologies
      1. 1.3.1. Bus Topology
      2. 1.3.2. Star Topology
      3. 1.3.3. Ring Topology
      4. 1.3.4. Mesh Topology
      5. 1.3.5. Point-to-Point Topology
      6. 1.3.6. Point-to-Multipoint Topology
      7. 1.3.7. Hybrid Topology
    4. 1.4. Topology Selection, Backbones, and Segments
      1. 1.4.1. Selecting the Right Topology
        1. 1.4.1.1. The Network Backbone
        2. 1.4.1.2. Network Segments
    5. 1.5. Summary
    6. 1.6. Exam Essentials
    7. 1.7. Written Labs
    8. 1.8. Review Questions
    9. 1.9. Answers to Review Questions
    10. 1.10. Answers to Written Labs
  8. 2. The Open Systems Interconnection Specifications
    1. 2.1. Internetworking Models
      1. 2.1.1. The Layered Approach
      2. 2.1.2. Advantages of Reference Models
    2. 2.2. The OSI Reference Model
      1. 2.2.1. The Application Layer
      2. 2.2.2. The Presentation Layer
      3. 2.2.3. The Session Layer
      4. 2.2.4. The Transport Layer
        1. 2.2.4.1. Connection-Oriented Communication
        2. 2.2.4.2. Flow Control
        3. 2.2.4.3. Windowing
        4. 2.2.4.4. Acknowledgments
      5. 2.2.5. The Network Layer
      6. 2.2.6. The Data Link Layer
      7. 2.2.7. The Physical Layer
    3. 2.3. Introduction to Encapsulation
    4. 2.4. Summary
    5. 2.5. Exam Essentials
    6. 2.6. Written Lab
    7. 2.7. Review Questions
    8. 2.8. Answers to Review Questions
    9. 2.9. Answers to Written Lab
  9. 3. Networking Topologies, Connectors, and Wiring Standards
    1. 3.1. Physical Media
      1. 3.1.1. Coaxial Cable
      2. 3.1.2. Twisted-Pair Cable
        1. 3.1.2.1. Ethernet Cable Descriptions
        2. 3.1.2.2. Connecting UTP
      3. 3.1.3. Fiber-Optic Cable
        1. 3.1.3.1. Single-Mode Fiber
        2. 3.1.3.2. Multimode Fiber
        3. 3.1.3.3. Fiber-Optic Connectors
        4. 3.1.3.4. Small Form Factor Fiber-Optic Connectors
      4. 3.1.4. Serial Cables
        1. 3.1.4.1. RS-232
        2. 3.1.4.2. Universal Serial Bus (USB)
    2. 3.2. Properties of Cables
      1. 3.2.1. Transmission Speeds
      2. 3.2.2. Distance
      3. 3.2.3. Duplex
      4. 3.2.4. Noise Immunity (Security, EMI)
      5. 3.2.5. Frequency
    3. 3.3. Wiring Standards
      1. 3.3.1. 568A vs. 568B
      2. 3.3.2. Straight-Through Cable
      3. 3.3.3. Crossover Cable
      4. 3.3.4. Rollover Cable
      5. 3.3.5. Hardware Loopback
    4. 3.4. Installing Wiring Distributions
      1. 3.4.1. Vertical and Horizontal Cross-Connects
      2. 3.4.2. Patch Panels
        1. 3.4.2.1. 66 Block
        2. 3.4.2.2. MDF/IDF
        3. 3.4.2.3. 25 Pair
        4. 3.4.2.4. 100 Pair
        5. 3.4.2.5. 110 Block
        6. 3.4.2.6. Demarc/Demarc Extension
        7. 3.4.2.7. Smart Jack
    5. 3.5. Verifying Correct Wiring Installation
    6. 3.6. Verifying Proper Wiring Termination
    7. 3.7. Summary
    8. 3.8. Exam Essentials
    9. 3.9. Written Lab
    10. 3.10. Review Questions
    11. 3.11. Answers to Review Questions
    12. 3.12. Answers to Written Lab
  10. 4. The Current Ethernet Specifications
    1. 4.1. Network Basics
    2. 4.2. Ethernet Basics
      1. 4.2.1. Collision Domain
      2. 4.2.2. Broadcast Domain
      3. 4.2.3. CSMA/CD
      4. 4.2.4. Half- and Full-Duplex Ethernet
    3. 4.3. Ethernet at the Data Link Layer
      1. 4.3.1. Binary to Decimal and Hexadecimal Conversion
      2. 4.3.2. Ethernet Addressing
      3. 4.3.3. Ethernet Frames
      4. 4.3.4. Channel Bonding
    4. 4.4. Ethernet at the Physical Layer
    5. 4.5. Summary
    6. 4.6. Exam Essentials
    7. 4.7. Written Lab
    8. 4.8. Review Questions
    9. 4.9. Answers to Review Questions
    10. 4.10. Answers to Written Lab
  11. 5. Networking Devices
    1. 5.1. Common Network Connectivity Devices
      1. 5.1.1. Hub
      2. 5.1.2. Repeater
      3. 5.1.3. Modem
        1. 5.1.3.1. Traditional (POTS)
        2. 5.1.3.2. DSL
        3. 5.1.3.3. Cable
      4. 5.1.4. Network Interface Card (NIC)
      5. 5.1.5. Transceiver (Media Converter)
      6. 5.1.6. Bridge
      7. 5.1.7. Switch
      8. 5.1.8. Wireless Access Point (AP)
      9. 5.1.9. Router
      10. 5.1.10. Firewall
      11. 5.1.11. Dynamic Host Configuration Protocol (DHCP) Server
    2. 5.2. Other Specialized Devices
      1. 5.2.1. Multilayer Switch
      2. 5.2.2. Content Switch
      3. 5.2.3. Intrusion Detection or Prevention System (IDS/IPS)
      4. 5.2.4. Load Balancer
      5. 5.2.5. Multifunction Network Devices
      6. 5.2.6. Domain Name Service (DNS) Server
      7. 5.2.7. Bandwidth Shaper
      8. 5.2.8. Proxy Server
      9. 5.2.9. Channel Service Unit/Data Service Unit (CSU/DSU)
    3. 5.3. Network Segmentation
      1. 5.3.1. Switches and Bridges at the Data Link Layer
      2. 5.3.2. Hubs at the Physical Layer
    4. 5.4. Summary
    5. 5.5. Exam Essentials
    6. 5.6. Written Lab
    7. 5.7. Review Questions
    8. 5.8. Answers to Review Questions
    9. 5.9. Answers to Written Lab
  12. 6. Introduction to Internet Protocol (IP)
    1. 6.1. Introducing TCP/IP
      1. 6.1.1. A Brief History of TCP/IP
      2. 6.1.2. TCP/IP and the DoD Model
      3. 6.1.3. The Process/Application Layer Protocols
        1. 6.1.3.1. Telnet
        2. 6.1.3.2. File Transfer Protocol (FTP)
        3. 6.1.3.3. Secure File Transfer Protocol (SFTP)
        4. 6.1.3.4. Trivial File Transfer Protocol (TFTP)
        5. 6.1.3.5. Network File System (NFS)
        6. 6.1.3.6. Simple Mail Transfer Protocol (SMTP)
        7. 6.1.3.7. Post Office Protocol (POP)
        8. 6.1.3.8. Internet Message Access Protocol, Version 4 (IMAP4)
        9. 6.1.3.9. Transport Layer Security (TLS)
        10. 6.1.3.10. SIP (VoIP)
        11. 6.1.3.11. RTP (VoIP)
        12. 6.1.3.12. Line Printer Daemon (LPD)
        13. 6.1.3.13. X Window
        14. 6.1.3.14. Simple Network Management Protocol (SNMP)
        15. 6.1.3.15. Secure Shell (SSH)
        16. 6.1.3.16. Hypertext Transfer Protocol (HTTP)
        17. 6.1.3.17. Hypertext Transfer Protocol Secure (HTTPS)
        18. 6.1.3.18. Network Time Protocol (NTP)
        19. 6.1.3.19. Network News Transfer Protocol (NNTP)
        20. 6.1.3.20. Secure Copy Protocol (SCP)
        21. 6.1.3.21. Lightweight Directory Access Protocol (LDAP)
        22. 6.1.3.22. Internet Group Management Protocol (IGMP)
        23. 6.1.3.23. Line Printer Remote (LPR)
        24. 6.1.3.24. Domain Name Service (DNS)
        25. 6.1.3.25. Dynamic Host Configuration Protocol (DHCP)/Bootstrap Protocol (BootP)
      4. 6.1.4. The Host-to-Host Layer Protocols
        1. 6.1.4.1. Transmission Control Protocol (TCP)
        2. 6.1.4.2. User Datagram Protocol (UDP)
        3. 6.1.4.3. Key Concepts of Host-to-Host Protocols
        4. 6.1.4.4. Port Numbers
      5. 6.1.5. The Internet Layer Protocols
        1. 6.1.5.1. Internet Protocol (IP)
        2. 6.1.5.2. Internet Control Message Protocol (ICMP)
        3. 6.1.5.3. Address Resolution Protocol (ARP)
        4. 6.1.5.4. Reverse Address Resolution Protocol (RARP)
        5. 6.1.5.5. Proxy Address Resolution Protocol (Proxy ARP)
    2. 6.2. Data Encapsulation
    3. 6.3. Summary
    4. 6.4. Exam Essentials
    5. 6.5. Written Lab
    6. 6.6. Review Questions
    7. 6.7. Answers to Review Questions
    8. 6.8. Answers to Written Lab
  13. 7. IP Addressing
    1. 7.1. IP Terminology
    2. 7.2. The Hierarchical IP Addressing Scheme
      1. 7.2.1. Network Addressing
        1. 7.2.1.1. Class A Addresses
        2. 7.2.1.2. Class B Addresses
        3. 7.2.1.3. Class C Addresses
        4. 7.2.1.4. Class D and E Addresses
        5. 7.2.1.5. Special Purposes of Network Addresses
      2. 7.2.2. Private IP Addresses
        1. 7.2.2.1. APIPA
    3. 7.3. Broadcast Addresses
    4. 7.4. Internet Protocol Version 6 (IPv6)
      1. 7.4.1. Why Do We Need IPv6?
      2. 7.4.2. The Benefits of and Uses for IPv6
      3. 7.4.3. IPv6 Addressing and Expressions
      4. 7.4.4. Shortened Expression
      5. 7.4.5. Address Types
      6. 7.4.6. Special Addresses
    5. 7.5. Summary
    6. 7.6. Exam Essentials
    7. 7.7. Written Lab
    8. 7.8. Review Questions
    9. 7.9. Answers to Review Questions
    10. 7.10. Answers to Written Lab
  14. 8. IP Subnetting, Troubleshooting IP, and Introduction to NAT
    1. 8.1. Subnetting Basics
      1. 8.1.1. How to Create Subnets
      2. 8.1.2. Subnet Masks
      3. 8.1.3. Classless Inter-Domain Routing (CIDR)
      4. 8.1.4. Subnetting Class C Addresses
        1. 8.1.4.1. Subnetting a Class C Address: The Fast Way!
        2. 8.1.4.2. Subnetting Practice Examples: Class C Addresses
          1. 8.1.4.2.1. Practice Example #1C: 255.255.255.128 (/25)
          2. 8.1.4.2.2. Practice Example #2C: 255.255.255.192 (/26)
          3. 8.1.4.2.3. Practice Example #3C: 255.255.255.224 (/27)
          4. 8.1.4.2.4. Practice Example #4C: 255.255.255.240 (/28)
          5. 8.1.4.2.5. Practice Example #5C: 255.255.255.248 (/29)
          6. 8.1.4.2.6. Practice Example #6C: 255.255.255.252 (/30)
        3. 8.1.4.3. Subnetting in Your Head: Class C Addresses
        4. 8.1.4.4. So What Do You Know Now?
          1. 8.1.4.4.1. /25
          2. 8.1.4.4.2. /26
          3. 8.1.4.4.3. /27
          4. 8.1.4.4.4. /28
          5. 8.1.4.4.5. /29
          6. 8.1.4.4.6. /30
      5. 8.1.5. Subnetting Class B Addresses
        1. 8.1.5.1. Subnetting Practice Examples: Class B Addresses
          1. 8.1.5.1.1. Practice Example #1B: 255.255.128.0 (/17)
          2. 8.1.5.1.2. Practice Example #2B: 255.255.192.0 (/18)
          3. 8.1.5.1.3. Practice Example #3B: 255.255.240.0 (/20)
          4. 8.1.5.1.4. Practice Example #4B: 255.255.254.0 (/23)
          5. 8.1.5.1.5. Practice Example #5B: 255.255.255.0 (/24)
          6. 8.1.5.1.6. Practice Example #6B: 255.255.255.128 (/25)
          7. 8.1.5.1.7. Practice Example #7B: 255.255.255.192 (/26)
          8. 8.1.5.1.8. Practice Example #8B: 255.255.255.224 (/27)
        2. 8.1.5.2. Subnetting in Your Head: Class B Addresses
    2. 8.2. Troubleshooting IP Addressing
      1. 8.2.1. Determining IP Address Problems
    3. 8.3. Introduction to Network Address Translation (NAT)
      1. 8.3.1. Types of Network Address Translation
      2. 8.3.2. NAT Names
      3. 8.3.3. How NAT Works
    4. 8.4. Summary
    5. 8.5. Exam Essentials
    6. 8.6. Written Labs
    7. 8.7. Review Questions
    8. 8.8. Answers to Review Questions
    9. 8.9. Answers to Written Labs
  15. 9. Introduction to IP Routing
    1. 9.1. Routing Basics
    2. 9.2. The IP Routing Process
    3. 9.3. Testing Your IP Routing Understanding
    4. 9.4. Static and Dynamic Routing
    5. 9.5. Summary
    6. 9.6. Exam Essentials
    7. 9.7. Written Lab
    8. 9.8. Review Questions
    9. 9.9. Answers to Review Questions
    10. 9.10. Answers to Written Lab
  16. 10. Routing Protocols
    1. 10.1. Routing Protocol Basics
      1. 10.1.1. Administrative Distances
      2. 10.1.2. Classes of Routing Protocols
    2. 10.2. Distance-Vector Routing Protocols
      1. 10.2.1. Routing Information Protocol (RIP)
      2. 10.2.2. RIP Version 2 (RIPv2)
      3. 10.2.3. VLSM and Discontiguous Networks
      4. 10.2.4. EIGRP
      5. 10.2.5. Border Gateway Protocol (BGP)
    3. 10.3. Link-State Routing Protocols
      1. 10.3.1. Open Shortest Path First (OSPF)
      2. 10.3.2. Intermediate System to Intermediate System (IS-IS)
    4. 10.4. IPv6 Routing Protocols
      1. 10.4.1. RIPng
      2. 10.4.2. EIGRPv6
      3. 10.4.3. OSPFv3
    5. 10.5. Summary
    6. 10.6. Exam Essentials
    7. 10.7. Written Lab
    8. 10.8. Review Questions
    9. 10.9. Answers to Review Questions
    10. 10.10. Answers to Written Lab
  17. 11. Switching and Virtual LANs (VLANs)
    1. 11.1. Networking Before Layer 2 Switching
    2. 11.2. Switching Services
      1. 11.2.1. Limitations of Layer 2 Switching
      2. 11.2.2. Bridging vs. LAN Switching
      3. 11.2.3. Three Switch Functions at Layer 2
        1. 11.2.3.1. Address Learning
        2. 11.2.3.2. Forward/Filter Decisions
        3. 11.2.3.3. Loop Avoidance
    3. 11.3. Spanning Tree Protocol (STP)
      1. 11.3.1. Spanning-Tree Port States
      2. 11.3.2. STP Convergence
    4. 11.4. Virtual LANs (VLANs)
      1. 11.4.1. VLAN Basics
      2. 11.4.2. VLAN Memberships
      3. 11.4.3. Static VLANs
      4. 11.4.4. Dynamic VLANs
      5. 11.4.5. Identifying VLANs
        1. 11.4.5.1. Access Ports
        2. 11.4.5.2. Trunk Ports
      6. 11.4.6. VLAN Identification Methods
        1. 11.4.6.1. Inter-Switch Link (ISL)
        2. 11.4.6.2. IEEE 802.1Q
    5. 11.5. Switching and Network Security
      1. 11.5.1. Port Security/Authentication
      2. 11.5.2. How VLANs Enhance Network Security
    6. 11.6. Two Additional Advanced Features of Switches
      1. 11.6.1. Power over Ethernet (PoE)
      2. 11.6.2. Port Mirroring/Spanning
    7. 11.7. Summary
    8. 11.8. Exam Essentials
    9. 11.9. Written Lab
    10. 11.10. Review Questions
    11. 11.11. Answers to Review Questions
    12. 11.12. Answers to Written Lab
  18. 12. Wireless Technologies
    1. 12.1. Introduction to Wireless Technology
    2. 12.2. The 802.11 Standards
      1. 12.2.1. 2.4GHz (802.11b)
      2. 12.2.2. 2.4GHz (802.11g)
      3. 12.2.3. 5GHz (802.11a)
      4. 12.2.4. 5GHz (802.11h)
      5. 12.2.5. 2.4GHz/5GHz (802.11n)
    3. 12.3. Comparing 802.11 Standards
      1. 12.3.1. Wireless LAN Modulation Techniques
        1. 12.3.1.1. Direct-Sequence Spread Spectrum (DSSS)
        2. 12.3.1.2. Frequency-Hopping Spread Spectrum (FHSS)
        3. 12.3.1.3. Orthogonal Frequency Division Multiplexing (OFDM)
      2. 12.3.2. Range Comparisons
    4. 12.4. Wireless Network Components
      1. 12.4.1. Wireless Access Points
      2. 12.4.2. Wireless Network Interface Card (NIC)
      3. 12.4.3. Wireless Antennas
    5. 12.5. Installing a Wireless Network
      1. 12.5.1. Ad hoc Mode: Independent Basic Service Set (IBSS)
      2. 12.5.2. Infrastructure Mode: Basic Service Set (BSS)
      3. 12.5.3. Design Considerations with Large Wireless Networks
        1. 12.5.3.1. Mesh and Lightweight Access Port Protocol (LWAPP)
        2. 12.5.3.2. Signal Degradation
      4. 12.5.4. Installing and Configuring Hardware
        1. 12.5.4.1. NIC Configuration
        2. 12.5.4.2. AP Configuration
    6. 12.6. Wireless Security
      1. 12.6.1. Open Access
      2. 12.6.2. Service Set Identifiers (SSIDs), Wired Equivalent Privacy (WEP), and Media Access Control (MAC) Address Authentication
      3. 12.6.3. Remote Authentication Dial In User Service (RADIUS)
      4. 12.6.4. Temporal Key Integrity Protocol (TKIP)
      5. 12.6.5. Wi-Fi Protected Access (WPA) or WPA 2 Pre-Shared Key
    7. 12.7. Summary
    8. 12.8. Exam Essentials
    9. 12.9. Written Lab
    10. 12.10. Review Questions
    11. 12.11. Answers to Review Questions
    12. 12.12. Answers to Written Lab
  19. 13. Authentication and Access Control
    1. 13.1. Security Filtering
      1. 13.1.1. Access Control Lists
      2. 13.1.2. Tunneling
        1. 13.1.2.1. Virtual Private Network (VPN)
        2. 13.1.2.2. SSL and SSL VPN
        3. 13.1.2.3. L2TP
        4. 13.1.2.4. PPTP
        5. 13.1.2.5. IPSec
      3. 13.1.3. Encryption
        1. 13.1.3.1. Private Encryption Keys
          1. 13.1.3.1.1. The Data Encryption Standard (DES)
          2. 13.1.3.1.2. Triple Data Encryption Standard (3DES)
          3. 13.1.3.1.3. The Advanced Encryption Standard (AES)
        2. 13.1.3.2. Public Key Encryption
          1. 13.1.3.2.1. RSA Data Security
          2. 13.1.3.2.2. Pretty Good Privacy (PGP)
      4. 13.1.4. Remote Access
        1. 13.1.4.1. RAS
        2. 13.1.4.2. RDP
        3. 13.1.4.3. PPP
        4. 13.1.4.4. PPPoE
        5. 13.1.4.5. VNC
        6. 13.1.4.6. ICA
    2. 13.2. Managing User Account and Password Security
      1. 13.2.1. Network Resource-Sharing Security Models
        1. 13.2.1.1. Share-Level Security
        2. 13.2.1.2. User-Level Security
      2. 13.2.2. Managing User Accounts
        1. 13.2.2.1. Disabling Accounts
        2. 13.2.2.2. Setting Up Anonymous Accounts
        3. 13.2.2.3. Limiting Connections
        4. 13.2.2.4. Renaming the Maintenance Account
      3. 13.2.3. Managing Passwords
        1. 13.2.3.1. Minimum Length
        2. 13.2.3.2. Using Characters to Make a Strong Password
        3. 13.2.3.3. Password-Management Features
          1. 13.2.3.3.1. Automatic Account Lockouts
          2. 13.2.3.3.2. Password Expiration and Password Histories
    3. 13.3. User-Authentication Methods
      1. 13.3.1. Public Key Infrastructure (PKI)
      2. 13.3.2. Kerberos
      3. 13.3.3. Authentication, Authorization, and Accounting (AAA)
        1. 13.3.3.1. RADIUS
        2. 13.3.3.2. TACACS+
      4. 13.3.4. Network Access Control (NAC)
      5. 13.3.5. Challenge Handshake Authentication Protocol (CHAP)
      6. 13.3.6. MS-CHAP
      7. 13.3.7. Extensible Authentication Protocol (EAP)
    4. 13.4. Summary
    5. 13.5. Exam Essentials
    6. 13.6. Written Lab
    7. 13.7. Review Questions
    8. 13.8. Answers to Review Questions
    9. 13.9. Answers to Written Lab
  20. 14. Network Threats and Mitigation
    1. 14.1. Recognizing Security Threats
      1. 14.1.1. Denial of Service (DoS)
        1. 14.1.1.1. The Ping of Death
        2. 14.1.1.2. Smurf
        3. 14.1.1.3. SYN Flood
        4. 14.1.1.4. Tribe Flood Network (TFN) and Tribe Flood Network 2000 (TFN2K)
        5. 14.1.1.5. Stacheldraht
      2. 14.1.2. Viruses
        1. 14.1.2.1. File Viruses
        2. 14.1.2.2. Macro Viruses
        3. 14.1.2.3. Boot-Sector Viruses
        4. 14.1.2.4. Multipartite Viruses
      3. 14.1.3. Worms
      4. 14.1.4. Attackers and Their Tools
        1. 14.1.4.1. IP Spoofing
        2. 14.1.4.2. Application-Layer Attacks
        3. 14.1.4.3. Active-X Attacks
        4. 14.1.4.4. Autorooters
        5. 14.1.4.5. Backdoors
        6. 14.1.4.6. Network Reconnaissance
        7. 14.1.4.7. Packet Sniffers
        8. 14.1.4.8. Password Attacks
        9. 14.1.4.9. Brute-Force Attacks
        10. 14.1.4.10. Port-Redirection Attacks
        11. 14.1.4.11. Trust-Exploitation Attacks
        12. 14.1.4.12. Man-in-the-Middle Attacks
      5. 14.1.5. Rogue Access Points
      6. 14.1.6. Social Engineering (Phishing)
    2. 14.2. Understanding Mitigation Techniques
      1. 14.2.1. Active Detection
      2. 14.2.2. Passive Detection
      3. 14.2.3. Proactive Defense
    3. 14.3. Policies and Procedures
      1. 14.3.1. Security Policies
        1. 14.3.1.1. Security Audit
        2. 14.3.1.2. Clean-Desk Policy
        3. 14.3.1.3. Recording Equipment
        4. 14.3.1.4. Other Common Security Policies
        5. 14.3.1.5. Breaking Policy
        6. 14.3.1.6. The Exit Interview
        7. 14.3.1.7. Security Procedures
      2. 14.3.2. Security Training
        1. 14.3.2.1. End-User Training
        2. 14.3.2.2. Administrator Training
      3. 14.3.3. Patches and Upgrades
        1. 14.3.3.1. Automatic Updates through Windows Update
        2. 14.3.3.2. Downloading Patches and Hot Fixes
      4. 14.3.4. Updating Antivirus Components
        1. 14.3.4.1. Upgrading an Antivirus Engine
        2. 14.3.4.2. Updating Definition Files
        3. 14.3.4.3. Scanning for Viruses
      5. 14.3.5. Fixing an Infected Computer
    4. 14.4. Summary
    5. 14.5. Exam Essentials
    6. 14.6. Written Lab
    7. 14.7. Review Questions
    8. 14.8. Answers to Review Questions
    9. 14.9. Answers to Written Lab
  21. 15. Physical and Hardware Security
    1. 15.1. Using Hardware and Software Security Devices
    2. 15.2. Defining Firewalls
      1. 15.2.1. Network-Based Firewalls
      2. 15.2.2. Host-Based Firewalls
    3. 15.3. Firewall Technologies
      1. 15.3.1. Access Control Lists (ACL)
      2. 15.3.2. Demilitarized Zone (DMZ)
      3. 15.3.3. Protocol Switching
      4. 15.3.4. Dynamic Packet Filtering
      5. 15.3.5. Proxy Services
    4. 15.4. Firewalls at the Application Layer vs. the Network Layer
      1. 15.4.1. Stateful vs. Stateless Network-Layer Firewalls
      2. 15.4.2. Application-layer Firewalls
    5. 15.5. Scanning Services and Other Firewall Features
      1. 15.5.1. Content Filtering
      2. 15.5.2. Signature Identification
      3. 15.5.3. Zones
    6. 15.6. Intrusion-Detection and -Prevention Systems
      1. 15.6.1. Network-Based IDS
      2. 15.6.2. Host-Based IDS
    7. 15.7. VPN Concentrators
    8. 15.8. Understanding Problems Affecting Device Security
      1. 15.8.1. Physical Security
        1. 15.8.1.1. Physical Barriers
        2. 15.8.1.2. Security Zones
      2. 15.8.2. Logical Security Configurations
      3. 15.8.3. Restricting Local and Remote Access
        1. 15.8.3.1. Access-Control Principles
        2. 15.8.3.2. Access-Control Models
      4. 15.8.4. Secure and Unsecure Application Protocols
        1. 15.8.4.1. Unsecure Protocols
          1. 15.8.4.1.1. Telnet
          2. 15.8.4.1.2. HTTP
          3. 15.8.4.1.3. FTP
          4. 15.8.4.1.4. rsh
          5. 15.8.4.1.5. rcp
          6. 15.8.4.1.6. SNMP (v1 and v2)
        2. 15.8.4.2. Secure Protocols
          1. 15.8.4.2.1. SSH
          2. 15.8.4.2.2. HTTPS
          3. 15.8.4.2.3. SFTP
          4. 15.8.4.2.4. SCP
          5. 15.8.4.2.5. SNMPv3
    9. 15.9. Summary
    10. 15.10. Exam Essentials
    11. 15.11. Written Lab
    12. 15.12. Review Questions
    13. 15.13. Answers to Review Questions
    14. 15.14. Answers to Written Lab
  22. 16. Wide Area Networks
    1. 16.1. What's a WAN?
      1. 16.1.1. Defining WAN Terms
      2. 16.1.2. The Public Switched Telephone Network (PSTN)
      3. 16.1.3. WAN Connection Types
      4. 16.1.4. Bandwidth or Speed
    2. 16.2. T-Series Connections
      1. 16.2.1. The T1 Connection
      2. 16.2.2. The T3 Connection
    3. 16.3. Transmission Media
      1. 16.3.1. Wired Connections
      2. 16.3.2. Wireless Technologies
    4. 16.4. Broadband Services
      1. 16.4.1. DSL Technology and xDSL
      2. 16.4.2. Cable Modem
    5. 16.5. WAN Protocols
      1. 16.5.1. Integrated Services Digital Network (ISDN)
        1. 16.5.1.1. ISDN Terminal Adapters
      2. 16.5.2. Frame Relay Technology
        1. 16.5.2.1. Committed Information Rate (CIR)
        2. 16.5.2.2. Virtual Circuits
        3. 16.5.2.3. Data Link Connection Identifiers (DLCIs)
      3. 16.5.3. Asynchronous Transfer Mode (ATM)
      4. 16.5.4. Multi Protocol Label Switching (MPLS)
    6. 16.6. Summary
    7. 16.7. Exam Essentials
    8. 16.8. Written Lab
    9. 16.9. Review Questions
    10. 16.10. Answers to Review Questions
    11. 16.11. Answers to Written Lab
  23. 17. Command-Line Tools
    1. 17.1. Using Traceroute
    2. 17.2. Using ipconfig and ifconfig
      1. 17.2.1. Using the ipconfig Utility
      2. 17.2.2. Using the ifconfig Utility
    3. 17.3. Using the ping Utility
    4. 17.4. Using the Address Resolution Protocol (ARP)
      1. 17.4.1. The Windows ARP Table
      2. 17.4.2. Using the arp Utility
    5. 17.5. Using the nslookup Utility
    6. 17.6. Resolving Names with the Hosts Table
    7. 17.7. Using the Mtr Command
    8. 17.8. Using the Route Command
      1. 17.8.1. Using the route Command Options
      2. 17.8.2. Some Examples of the route Command
    9. 17.9. Using the nbtstat Utility
      1. 17.9.1. The –a Switch
      2. 17.9.2. The –A Switch
      3. 17.9.3. The –c Switch
      4. 17.9.4. The –n Switch
      5. 17.9.5. The –r Switch
      6. 17.9.6. The –R Switch
      7. 17.9.7. The –S Switch
      8. 17.9.8. The –s Switch
    10. 17.10. Using the netstat Utility
      1. 17.10.1. The –a Switch
      2. 17.10.2. The –e Switch
      3. 17.10.3. The –r Switch
      4. 17.10.4. The –s Switch
      5. 17.10.5. The –p Switch
      6. 17.10.6. The –n Switch
    11. 17.11. Using the File Transfer Protocol (FTP)
      1. 17.11.1. Starting FTP and Logging In to an FTP Server
      2. 17.11.2. Downloading Files
      3. 17.11.3. Uploading Files
    12. 17.12. Using the Telephone Network (Telnet) Utility
      1. 17.12.1. How to Enable Telnet in Vista
      2. 17.12.2. Don't Use Telnet, Use Secure Shell (SSH)
    13. 17.13. Summary
    14. 17.14. Exam Essentials
    15. 17.15. Written Lab
    16. 17.16. Review Questions
    17. 17.17. Answers to Review Questions
    18. 17.18. Answers to Written Lab
  24. 18. Software and Hardware Tools
    1. 18.1. Understanding Network Scanners
      1. 18.1.1. Packet Sniffers
      2. 18.1.2. Intrusion Detection and Prevention Software (IDS/IPS)
      3. 18.1.3. Port Scanners
    2. 18.2. Identifying Hardware Tools
      1. 18.2.1. Cable Testers
        1. 18.2.1.1. Wire-Map Testers
        2. 18.2.1.2. Continuity Testers
      2. 18.2.2. Protocol Analyzer
      3. 18.2.3. Certifiers
      4. 18.2.4. Time-Domain Reflectometer (TDR)
      5. 18.2.5. Optical Time-Domain Reflectometer (OTDR)
      6. 18.2.6. Multimeter
      7. 18.2.7. Toner Probe
      8. 18.2.8. Butt Set
      9. 18.2.9. Punch-Down Tool
      10. 18.2.10. Cable Stripper/Snips
      11. 18.2.11. Voltage Event Recorder
      12. 18.2.12. Temperature Monitor
    3. 18.3. Summary
    4. 18.4. Exam Essentials
    5. 18.5. Written Lab
    6. 18.6. Review Questions
    7. 18.7. Answers to Review Questions
    8. 18.8. Answers to Written Lab
  25. 19. Network Troubleshooting
    1. 19.1. Narrowing Down the Problem
      1. 19.1.1. Are There Any Cabling Issues? Did You Check the Super Simple Stuff?
        1. 19.1.1.1. The Correct Login Procedure and Rights
        2. 19.1.1.2. The Link and Collision Lights
        3. 19.1.1.3. The Power Switch
        4. 19.1.1.4. Operator Error
      2. 19.1.2. Is Hardware or Software Causing the Problem?
      3. 19.1.3. Is It a Workstation or a Server Problem?
      4. 19.1.4. Which Segments of the Network Are Affected?
      5. 19.1.5. Is It Bad Cabling?
        1. 19.1.5.1. Other Important Cable Issues You Need to Know About
        2. 19.1.5.2. Unbounded Media Issues (Wireless)
    2. 19.2. Troubleshooting Steps
      1. 19.2.1. Step 1: Information Gathering—Identify Symptoms and Problems
      2. 19.2.2. Step 2: Identify the Affected Areas of the Network
      3. 19.2.3. Step 3: Determine if Anything Has Changed
      4. 19.2.4. Step 4: Establish the Most Probable Cause
      5. 19.2.5. Step 5: Determine if Escalation Is Necessary
      6. 19.2.6. Step 6: Create an Action Plan and Solution, Identifying Potential Effects
      7. 19.2.7. Step 7: Implement and Test the Solution
      8. 19.2.8. Step 8: Identify the Results and Effects of the Solution
      9. 19.2.9. Step 9: Document the Solution and the Entire Process
    3. 19.3. Troubleshooting Tips
      1. 19.3.1. Don't Overlook the Small Stuff
      2. 19.3.2. Prioritize Your Problems
      3. 19.3.3. Check the Software Configuration
      4. 19.3.4. Don't Overlook Physical Conditions
      5. 19.3.5. Don't Overlook Cable Problems
      6. 19.3.6. Check for Viruses
    4. 19.4. Summary
    5. 19.5. Exam Essentials
    6. 19.6. Written Lab
    7. 19.7. Review Questions
    8. 19.8. Answers to Review Questions
    9. 19.9. Answers to Written Lab
  26. 20. Management, Monitoring, and Optimization
    1. 20.1. Managing Network Documentation
      1. 20.1.1. Schematics and Diagrams
        1. 20.1.1.1. Wiring Schematics
        2. 20.1.1.2. Physical Network Diagrams
        3. 20.1.1.3. Logical Network Diagrams
      2. 20.1.2. Baselines
      3. 20.1.3. Policies, Procedures, and Regulations
    2. 20.2. Monitoring the Network and Optimizing Its Performance
      1. 20.2.1. Network Monitoring and Logging
        1. 20.2.1.1. Network Monitoring
        2. 20.2.1.2. Server Logs
      2. 20.2.2. Reasons to Optimize Your Network's Performance
        1. 20.2.2.1. Latency Sensitivity
        2. 20.2.2.2. High-Bandwidth Applications
        3. 20.2.2.3. Uptime
      3. 20.2.3. How to Optimize Performance
        1. 20.2.3.1. Quality of Service (QoS)
        2. 20.2.3.2. Traffic Shaping
        3. 20.2.3.3. Load Balancing
        4. 20.2.3.4. High Availability
        5. 20.2.3.5. Caching Engines
        6. 20.2.3.6. Fault Tolerance
    3. 20.3. Summary
    4. 20.4. Exam Essentials
    5. 20.5. Written Lab
    6. 20.6. Review Questions
    7. 20.7. Answers to Review Questions
    8. 20.8. Answers to Written Lab
  27. A. Subnetting Class A
    1. A.1. Subnetting Practice Examples: Class A Addresses
      1. A.1.1. Practice Example #1A: 255.255.0.0 (/16)
      2. A.1.2. Practice Example #2A: 255.255.240.0 (/20)
      3. A.1.3. Practice Example #3A: 255.255.255.192 (/26)
    2. A.2. Subnetting in Your Head: Class A Addresses
    3. A.3. Written Lab 1
    4. A.4. Written Lab 2
    5. A.5. Answers to Written Lab 1
    6. A.6. Answers to Written Lab 2
  28. B. About the Companion CD
    1. B.1. What You'll Find on the CD
      1. B.1.1. Sybex Test Engine
      2. B.1.2. PDF of the Book
      3. B.1.3. Adobe Reader
      4. B.1.4. Electronic Flashcards
    2. B.2. System Requirements
    3. B.3. Using the CD
    4. B.4. Troubleshooting
      1. B.4.1. Customer Care
  29. Glossary

Product information

  • Title: CompTIA Network+®: Deluxe Study Guide
  • Author(s): Todd Lammle
  • Release date: May 2009
  • Publisher(s): Sybex
  • ISBN: 9780470427484