Introduction |
|
xxiv | |
Chapter 1 Domain 1.0: Networking Concepts |
|
1 | (142) |
|
1.1 Explain the purposes and uses of ports and protocols. |
|
|
8 | (12) |
|
|
8 | (6) |
|
|
14 | (5) |
|
|
19 | (1) |
|
1.2 Explain devices, applications, protocols and services at their appropriate OSI layers. |
|
|
20 | (10) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (2) |
|
|
25 | (1) |
|
|
26 | (3) |
|
|
29 | (1) |
|
|
29 | (1) |
|
1.3 Explain the concepts and characteristics of routing and switching. |
|
|
30 | (42) |
|
Properties of Network Traffic |
|
|
30 | (5) |
|
Segmentation and Interface Properties |
|
|
35 | (13) |
|
|
48 | (8) |
|
|
56 | (4) |
|
|
60 | (3) |
|
|
63 | (3) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
Packet Switched vs. Circuit-Switched Networks |
|
|
69 | (1) |
|
Software-Defined Networking |
|
|
69 | (1) |
|
|
70 | (2) |
|
1.4 Given a scenario, configure the appropriate IP addressing components. |
|
|
72 | (17) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (8) |
|
|
84 | (4) |
|
|
88 | (1) |
|
1.5 Compare and contrast the characteristics of network topologies, types, and technologies. |
|
|
89 | (14) |
|
|
89 | (5) |
|
|
94 | (4) |
|
|
98 | (1) |
|
Technologies That Facilitate the Internet of Things (IoT) |
|
|
99 | (3) |
|
|
102 | (1) |
|
1.6 Given a scenario, implement the appropriate wireless technologies and configurations. |
|
|
103 | (12) |
|
|
103 | (3) |
|
|
106 | (1) |
|
|
107 | (2) |
|
Speed and Distance Requirements |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
Unidirectional/Omnidirectional |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
1.7 Summarize cloud concepts and their purposes. |
|
|
115 | (6) |
|
|
116 | (1) |
|
|
117 | (2) |
|
|
119 | (1) |
|
Security Implications/Considerations |
|
|
119 | (1) |
|
Relationship between Local and Cloud Resources |
|
|
120 | (1) |
|
|
120 | (1) |
|
1.8 Explain the functions of network services. |
|
|
121 | (22) |
|
|
121 | (8) |
|
|
129 | (5) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (2) |
|
|
137 | (6) |
Chapter 2 Domain 2.0: Infrastructure |
|
143 | (72) |
|
2.1 Given a scenario, deploy the appropriate cabling solution. |
|
|
148 | (23) |
|
|
148 | (4) |
|
|
152 | (1) |
|
|
153 | (5) |
|
|
158 | (2) |
|
Characteristics of fiber transceivers |
|
|
160 | (1) |
|
|
161 | (3) |
|
|
164 | (2) |
|
Copper termination standards |
|
|
166 | (3) |
|
Ethernet deployment standards |
|
|
169 | (1) |
|
|
170 | (1) |
|
2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them. |
|
|
171 | (5) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
2.3 Explain the purposes and use cases for advanced networking devices. |
|
|
176 | (10) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (2) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
2.4 Explain the purposes of virtualization and network storage technologies. |
|
|
186 | (8) |
|
Virtual networking components |
|
|
186 | (3) |
|
|
189 | (1) |
|
|
190 | (3) |
|
|
193 | (1) |
|
|
194 | (1) |
|
2.5 Compare and contrast WAN technologies. |
|
|
194 | (21) |
|
|
194 | (5) |
|
|
199 | (2) |
|
Characteristics of service |
|
|
201 | (4) |
|
|
205 | (2) |
|
|
207 | (2) |
|
|
209 | (6) |
Chapter 3 Domain 3.0: Network Operations |
|
215 | (66) |
|
3.1 Given a scenario, use appropriate documentation and diagrams to manage the network. |
|
|
219 | (14) |
|
|
220 | (3) |
|
Standard operating procedures/work instructions |
|
|
223 | (1) |
|
Logical vs. physical diagrams |
|
|
224 | (2) |
|
|
226 | (1) |
|
Change management documentation |
|
|
227 | (1) |
|
Wiring and port locations |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
Network configuration and performance baselines |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
3.2 Compare and contrast business continuity and disaster recovery concepts. |
|
|
233 | (14) |
|
|
234 | (8) |
|
|
242 | (4) |
|
|
246 | (1) |
|
3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs. |
|
|
247 | (10) |
|
|
247 | (5) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (2) |
|
|
256 | (1) |
|
3.4 Given a scenario, use remote access methods. |
|
|
257 | (10) |
|
|
257 | (4) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
264 | (2) |
|
|
266 | (1) |
|
3.5 Identify policies and best practices. |
|
|
267 | (14) |
|
Privileged user agreement |
|
|
268 | (1) |
|
|
268 | (1) |
|
On-boarding/off-boarding procedures |
|
|
268 | (1) |
|
|
269 | (1) |
|
International export controls |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
|
Incident response policies |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
Safety procedures and policies |
|
|
273 | (1) |
|
|
274 | (2) |
|
|
276 | (5) |
Chapter 4 Domain 4.0: Network Security |
|
281 | (50) |
|
4.1 Summarize the purposes of physical security devices. |
|
|
285 | (7) |
|
|
285 | (4) |
|
|
289 | (3) |
|
|
292 | (1) |
|
4.2 Explain authentication and access controls. |
|
|
292 | (12) |
|
Authentication, authorization, and accounting |
|
|
292 | (4) |
|
Multifactor authentication |
|
|
296 | (1) |
|
|
297 | (6) |
|
|
303 | (1) |
|
4.3 Given a scenario, secure a basic wireless network. |
|
|
304 | (4) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
Authentication and authorization |
|
|
305 | (2) |
|
|
307 | (1) |
|
|
307 | (1) |
|
4.4 Summarize common networking attacks. |
|
|
308 | (5) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
Exploits vs. vulnerabilities |
|
|
312 | (1) |
|
|
312 | (1) |
|
4.5 Given a scenario, implement network device hardening. |
|
|
313 | (5) |
|
Changing default credentials |
|
|
313 | (1) |
|
Avoiding common passwords |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
Disabling unnecessary services |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
4.6 Explain common mitigation techniques and their purposes. |
|
|
318 | (13) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
319 | (2) |
|
|
321 | (2) |
|
|
323 | (1) |
|
File integrity monitoring |
|
|
323 | (1) |
|
|
323 | (1) |
|
Restricting access via ACLs |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (2) |
|
|
327 | (4) |
Chapter 5 Domain 5.0 Network Troubleshooting and Tools |
|
331 | (80) |
|
5.1 Explain the network troubleshooting methodology. |
|
|
335 | (7) |
|
|
336 | (2) |
|
Establish a theory of probable cause |
|
|
338 | (1) |
|
Test the theory to determine the cause |
|
|
339 | (1) |
|
Establish a plan of action to resolve the problem |
|
|
|
and identify potential effects |
|
|
340 | (1) |
|
Implement the solution or escalate as necessary |
|
|
340 | (1) |
|
Verify full system functionality and, if applicable, implement preventive measures |
|
|
341 | (1) |
|
Document findings, actions, and outcomes |
|
|
341 | (1) |
|
|
341 | (1) |
|
5.2 Given a scenario, use the appropriate tool. |
|
|
342 | (30) |
|
|
342 | (10) |
|
|
352 | (19) |
|
|
371 | (1) |
|
5.3 Given a scenario, troubleshoot common wired connectivity and performance issues. |
|
|
372 | (8) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
Network connection LED status indicators |
|
|
378 | (1) |
|
|
379 | (1) |
|
5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues. |
|
|
380 | (8) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
Incorrect antenna placement |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
5.5 Given a scenario, troubleshoot common network service issues. |
|
|
388 | (23) |
|
|
388 | (5) |
|
|
393 | (1) |
|
|
394 | (2) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
397 | (2) |
|
|
399 | (1) |
|
Untrusted SSL certificate |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
Incorrect host-based firewall settings |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
406 | (5) |
Appendix Answers to Review Questions |
|
411 | (10) |
|
Chapter 1 Domain 1.0: Networking Concepts |
|
|
412 | (1) |
|
Chapter 2 Domain 2.0: Infrastructure |
|
|
413 | (2) |
|
Chapter 3 Domain 3.0: Network Operations |
|
|
415 | (2) |
|
Chapter 4 Domain 4.0: Network Security |
|
|
417 | (2) |
|
Chapter 5 Domain 5.0 Network Troubleshooting and Tools |
|
|
419 | (2) |
Index |
|
421 | |