Introduction |
|
xvii | |
Chapter 1 Domain 1.0: Networking Fundamentals |
|
1 | (168) |
|
1.1 Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts. |
|
|
11 | (17) |
|
|
12 | (9) |
|
|
21 | (1) |
|
Data Encapsulation and Decapsulation |
|
|
22 | (4) |
|
|
26 | (2) |
|
1.2 Explain the characteristics of network topologies and network types. |
|
|
28 | (23) |
|
|
28 | (5) |
|
|
33 | (6) |
|
Service-Related Entry Point |
|
|
39 | (1) |
|
|
40 | (1) |
|
Virtual Networking Components |
|
|
40 | (3) |
|
|
43 | (5) |
|
|
48 | (2) |
|
|
50 | (1) |
|
1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution. |
|
|
51 | (29) |
|
|
51 | (4) |
|
|
55 | (5) |
|
|
60 | (2) |
|
|
62 | (1) |
|
Characteristics of Fiber Transceivers |
|
|
63 | (2) |
|
|
65 | (5) |
|
|
70 | (3) |
|
Copper Termination Standards |
|
|
73 | (3) |
|
Ethernet Deployment Standards |
|
|
76 | (2) |
|
|
78 | (2) |
|
1.4 Given a scenario, configure a subnet and use appropriate IP addressing schemes. |
|
|
80 | (30) |
|
|
80 | (1) |
|
|
81 | (3) |
|
|
84 | (4) |
|
|
88 | (5) |
|
|
93 | (6) |
|
|
99 | (8) |
|
|
107 | (1) |
|
|
108 | (2) |
|
1.5 Explain common ports and protocols, their application, and encrypted alternatives. |
|
|
110 | (13) |
|
|
110 | (7) |
|
|
117 | (4) |
|
Connection-Oriented vs. Connectionless |
|
|
121 | (1) |
|
|
122 | (1) |
|
1.6 Explain the use and purpose of network services. |
|
|
123 | (16) |
|
|
123 | (9) |
|
|
132 | (5) |
|
|
137 | (1) |
|
|
137 | (2) |
|
1.7 Explain basic corporate and datacenter network architecture. |
|
|
139 | (12) |
|
|
139 | (1) |
|
Software-Defined Networking |
|
|
140 | (2) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (2) |
|
|
147 | (3) |
|
|
150 | (1) |
|
1.8 Summarize cloud concepts and connectivity options. |
|
|
151 | (18) |
|
Characteristics of a Cloud |
|
|
151 | (1) |
|
|
152 | (3) |
|
|
155 | (2) |
|
|
157 | (3) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
Security Implications/Considerations |
|
|
162 | (1) |
|
Relationship Between Local and Cloud Resources |
|
|
163 | (1) |
|
|
163 | (2) |
|
|
165 | (4) |
Chapter 2 Domain 2.0: Network Implementations |
|
169 | (92) |
|
2.1 Compare and contrast various devices, their features, and their appropriate placement on the network. |
|
|
173 | (31) |
|
|
173 | (30) |
|
|
203 | (1) |
|
2.2 Compare and contrast routing technologies and bandwidth management concepts. |
|
|
204 | (12) |
|
|
204 | (8) |
|
|
212 | (3) |
|
|
215 | (1) |
|
2.3 Given a scenario, configure and deploy common Ethernet switching features. |
|
|
216 | (19) |
|
Characteristics of Ethernet and IP Communications |
|
|
216 | (4) |
|
|
220 | (7) |
|
Segmentation and Interface Properties |
|
|
227 | (4) |
|
|
231 | (3) |
|
|
234 | (1) |
|
2.4 Given a scenario, install and configure the appropriate wireless standards and technologies. |
|
|
235 | (26) |
|
|
235 | (3) |
|
|
238 | (1) |
|
|
239 | (6) |
|
Wireless Modes of Operation |
|
|
245 | (3) |
|
|
248 | (4) |
|
|
252 | (2) |
|
|
254 | (2) |
|
|
256 | (5) |
Chapter 3 Domain 3.0: Network Operations |
|
261 | (82) |
|
3.1 Given a scenario, use the appropriate statistics and sensors to ensure network availability. |
|
|
265 | (31) |
|
|
265 | (5) |
|
|
270 | (4) |
|
|
274 | (5) |
|
Interface Statistics/Status |
|
|
279 | (7) |
|
Interface Errors or Alerts |
|
|
286 | (3) |
|
Environmental Factors and Sensors |
|
|
289 | (2) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (2) |
|
3.2 Explain the purpose of organizational documents and policies. |
|
|
296 | (22) |
|
|
296 | (7) |
|
Hardening and Security Policies |
|
|
303 | (4) |
|
|
307 | (8) |
|
|
315 | (1) |
|
|
316 | (2) |
|
3.3 Explain high availability and disaster recovery concepts and summarize which is the best solution. |
|
|
318 | (25) |
|
|
318 | (1) |
|
|
318 | (2) |
|
Network Interface Card (NIC) Teaming |
|
|
320 | (1) |
|
Redundant Hardware/Clusters |
|
|
320 | (6) |
|
Facilities and Infrastructure Support |
|
|
326 | (4) |
|
Redundancy and High Availability (HA) Concepts |
|
|
330 | (4) |
|
|
334 | (2) |
|
|
336 | (2) |
|
|
338 | (5) |
Chapter 4 Domain 4.0: Network Security |
|
343 | (78) |
|
4.1 Explain common security concepts. |
|
|
348 | (20) |
|
Confidentiality, Integrity, Availability (CIA) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (4) |
|
|
357 | (7) |
|
|
364 | (2) |
|
Security Information and Event Management (SIEM) |
|
|
366 | (1) |
|
|
366 | (2) |
|
4.2 Compare and contrast common types of attacks. |
|
|
368 | (13) |
|
|
368 | (10) |
|
|
378 | (1) |
|
|
379 | (2) |
|
4.3 Given a scenario, apply network hardening techniques. |
|
|
381 | (16) |
|
|
381 | (9) |
|
|
390 | (5) |
|
|
395 | (1) |
|
|
396 | (1) |
|
4.4 Compare and contrast remote access methods and security implications. |
|
|
397 | (9) |
|
|
397 | (3) |
|
Remote Desktop Connection |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
Virtual Network Computing (VNC) |
|
|
402 | (1) |
|
|
402 | (1) |
|
Authentication and Authorization Considerations |
|
|
403 | (1) |
|
In-Band vs. Out-of-Band Management |
|
|
403 | (2) |
|
|
405 | (1) |
|
4.5 Explain the importance of physical security. |
|
|
406 | (15) |
|
|
407 | (3) |
|
|
410 | (3) |
|
|
413 | (2) |
|
|
415 | (1) |
|
|
416 | (5) |
Chapter 5 Domain 5.0: Network Troubleshooting |
|
421 | (116) |
|
5.1 Explain the network troubleshooting methodology. |
|
|
427 | (7) |
|
|
428 | (2) |
|
Establish a Theory of Probable Cause |
|
|
430 | (1) |
|
Test the Theory to Determine the Cause |
|
|
431 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Identify Potential Effects |
|
|
432 | (1) |
|
Implement the Solution or Escalate as Necessary |
|
|
432 | (1) |
|
Verify Full System Functionality and, If Applicable, Implement Preventive Measures |
|
|
433 | (1) |
|
Document Findings, Actions, Outcomes, and Lessons Learned |
|
|
433 | (1) |
|
|
433 | (1) |
|
5.2 Given a scenario, troubleshoot common cable connectivity issues and select the appropriate tools. |
|
|
434 | (24) |
|
Specifications and Limitations |
|
|
434 | (1) |
|
|
435 | (2) |
|
|
437 | (2) |
|
|
439 | (6) |
|
|
445 | (11) |
|
|
456 | (2) |
|
5.3 Given a scenario, use the appropriate network software tools and commands. |
|
|
458 | (28) |
|
|
458 | (8) |
|
|
466 | (15) |
|
Basic Network Platform Commands |
|
|
481 | (4) |
|
|
485 | (1) |
|
5.4 Given a scenario, troubleshoot common wireless connectivity issues |
|
|
486 | (13) |
|
Specifications and Limitations |
|
|
486 | (3) |
|
|
489 | (4) |
|
|
493 | (5) |
|
|
498 | (1) |
|
5.5 Given a scenario, troubleshoot general networking issues. |
|
|
499 | (38) |
|
|
499 | (2) |
|
|
501 | (29) |
|
|
530 | (2) |
|
|
532 | (5) |
Appendix Answers to Review Questions |
|
537 | (16) |
|
Chapter 1: Domain 1.0: Networking Fundamentals |
|
|
538 | (3) |
|
Chapter 2: Domain 2.0: Network Implementations |
|
|
541 | (3) |
|
Chapter 3: Domain 3.0: Network Operations |
|
|
544 | (3) |
|
Chapter 4: Domain 4.0: Network Security |
|
|
547 | (3) |
|
Chapter 5: Domain 5.0: Network Troubleshooting |
|
|
550 | (3) |
Index |
|
553 | |