Acknowledgments |
|
xxix | |
Check-In |
|
xxxi | |
1 Networking Concepts |
|
1 | (150) |
|
Objective 1.1 Explain the purposes and uses of ports and protocols |
|
|
2 | (13) |
|
|
2 | (11) |
|
|
4 | (4) |
|
|
8 | (5) |
|
Connection-Oriented vs. Connectionless |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
Objective 1.2 Explain devices, applications, protocols, and services at their appropriate OSI layers |
|
|
15 | (9) |
|
The OSI Seven-Layer Model |
|
|
15 | (7) |
|
The Layers and What They Represent |
|
|
16 | (6) |
|
Using the Seven-Layer Model |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
Objective 1.3 Explain the concepts and characteristics of routing and switching |
|
|
24 | (43) |
|
Properties of Network Traffic |
|
|
24 | (7) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (2) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
Unicast/Broadcast/Multicast |
|
|
30 | (1) |
|
Segmentation and Interface Properties |
|
|
31 | (11) |
|
|
31 | (1) |
|
|
32 | (2) |
|
|
34 | (1) |
|
|
35 | (1) |
|
Switching Loops/Spanning Tree |
|
|
36 | (1) |
|
|
36 | (1) |
|
DMZ and Firewall Placement |
|
|
37 | (2) |
|
|
39 | (1) |
|
|
40 | (2) |
|
|
42 | (7) |
|
|
43 | (1) |
|
|
44 | (2) |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
49 | (3) |
|
|
49 | (2) |
|
|
51 | (1) |
|
Neighbor Discovery/Router Advertisement |
|
|
52 | (1) |
|
|
52 | (2) |
|
|
54 | (4) |
|
|
58 | (2) |
|
|
60 | (1) |
|
|
61 | (1) |
|
Packet-Switched vs. Circuit-Switched Network |
|
|
61 | (1) |
|
Software Defined Networking |
|
|
62 | (1) |
|
|
63 | (3) |
|
|
66 | (1) |
|
|
66 | (1) |
|
Objective 1.4 Given a scenario, configure the appropriate IP addressing components |
|
|
67 | (28) |
|
IP Address/Subnet Mask Pair |
|
|
67 | (1) |
|
|
68 | (2) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (8) |
|
|
71 | (7) |
|
|
78 | (1) |
|
|
79 | (1) |
|
Default Gateway, Virtual IP |
|
|
79 | (1) |
|
|
80 | (11) |
|
|
80 | (5) |
|
|
85 | (3) |
|
|
88 | (1) |
|
|
88 | (2) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (3) |
|
|
94 | (1) |
|
|
94 | (1) |
|
Objective 1.5 Compare and contrast the characteristics of network topologies, types, and technologies |
|
|
95 | (17) |
|
|
96 | (6) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (2) |
|
|
99 | (2) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
Ad Hoc and Infrastructure |
|
|
102 | (1) |
|
|
103 | (3) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
Technologies that Facilitate the Internet of Things (loT) |
|
|
106 | (4) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
Objective 1.6 Given a scenario, implement the appropriate wireless technologies and configurations |
|
|
112 | (16) |
|
|
112 | (2) |
|
|
114 | (1) |
|
MIMO/MU-MIMO and Channel Bonding |
|
|
115 | (1) |
|
Speed and Distance Requirements |
|
|
115 | (3) |
|
Frequencies and Channel Bandwidth |
|
|
116 | (2) |
|
|
118 | (2) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
Unidirectional/Omnidirectional |
|
|
120 | (4) |
|
|
124 | (3) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
Objective 1.7 Summarize cloud concepts and their purposes |
|
|
128 | (8) |
|
|
129 | (2) |
|
|
129 | (1) |
|
|
130 | (1) |
|
Infrastructure as a Service |
|
|
131 | (1) |
|
|
131 | (2) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
Security Implications/Considerations |
|
|
133 | (1) |
|
Relationship Between Local Resources and Cloud Resources |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
Objective 1.8 Explain the functions of network services |
|
|
136 | (15) |
|
|
137 | (9) |
|
|
139 | (3) |
|
|
142 | (3) |
|
|
145 | (1) |
|
Internal vs. External DNS |
|
|
145 | (1) |
|
Third-Party/Cloud-Hosted DNS |
|
|
146 | (1) |
|
|
146 | (2) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
2 Infrastructure |
|
151 | (112) |
|
Objective 2.1 Given a scenario, deploy the appropriate cabling solution |
|
|
152 | (26) |
|
Media Types and Connector Types |
|
|
152 | (10) |
|
|
153 | (6) |
|
|
159 | (3) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
Characteristics of Fiber Transceivers |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (2) |
|
|
163 | (2) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
Copper Termination Standards |
|
|
165 | (3) |
|
TIA/EIA 568A and TIA/EIA 568B |
|
|
165 | (1) |
|
Straight-through and Crossover Cables |
|
|
166 | (2) |
|
|
168 | (2) |
|
|
168 | (1) |
|
|
169 | (1) |
|
Ethernet Deployment Standards |
|
|
170 | (7) |
|
|
171 | (2) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (3) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
Objective 2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them |
|
|
178 | (15) |
|
|
179 | (2) |
|
|
181 | (4) |
|
|
182 | (3) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
Objective 2.3 Explain the purposes and use cases for advanced networking devices |
|
|
193 | (14) |
|
|
193 | (1) |
|
|
194 | (2) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (2) |
|
|
199 | (3) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
Objective 2.4 Explain the purposes of virtualization and network storage technologies |
|
|
207 | (14) |
|
Virtual Networking Components |
|
|
207 | (11) |
|
|
207 | (8) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
Objective 2.5 Compare and contrast WAN technologies |
|
|
221 | (42) |
|
|
221 | (9) |
|
The Dawn of Long Distance |
|
|
223 | (5) |
|
|
228 | (2) |
|
|
230 | (17) |
|
|
230 | (2) |
|
|
232 | (1) |
|
|
233 | (2) |
|
|
235 | (2) |
|
|
237 | (5) |
|
|
242 | (1) |
|
|
243 | (4) |
|
|
247 | (1) |
|
Characteristics of Service |
|
|
247 | (7) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (4) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (6) |
|
|
254 | (4) |
|
|
258 | (1) |
|
|
258 | (2) |
|
|
260 | (1) |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
3 Network Operations |
|
263 | (78) |
|
Objective 3.1 Given a scenario, use appropriate documentation and diagrams to manage the network |
|
|
264 | (10) |
|
|
264 | (1) |
|
Standard Operating Procedures/Work Instructions |
|
|
264 | (1) |
|
Logical vs. Physical Diagrams |
|
|
265 | (1) |
|
Change Management Documentation |
|
|
265 | (2) |
|
|
266 | (1) |
|
Dealing with the Change Management Team |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
IDF/MDF Documentation and Rack Diagrams |
|
|
267 | (2) |
|
Wiring and Port Locations, Labeling |
|
|
269 | (2) |
|
Network Configuration and Performance Baselines |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
Objective 3.2 Compare and contrast business continuity and disaster recovery concepts |
|
|
274 | (11) |
|
|
274 | (5) |
|
|
274 | (1) |
|
|
275 | (1) |
|
Load Balancing, Clustering |
|
|
275 | (1) |
|
NIC Teaming and Port Aggregation |
|
|
276 | (1) |
|
|
277 | (2) |
|
|
279 | (3) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
Objective 3.3 Explain common scanning, monitoring and patching processes, and summarize their expected outputs |
|
|
285 | (19) |
|
|
286 | (9) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
287 | (2) |
|
|
289 | (2) |
|
|
291 | (1) |
|
|
291 | (4) |
|
|
295 | (1) |
|
SIEM, Notifications, Alerts |
|
|
295 | (1) |
|
|
296 | (4) |
|
|
300 | (3) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
301 | (2) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
Objective 3.4 Given a scenario, use remote access methods |
|
|
304 | (23) |
|
|
305 | (3) |
|
|
307 | (1) |
|
|
307 | (1) |
|
Client-to-Site and Site-to-Site |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
309 | (5) |
|
|
313 | (1) |
|
|
314 | (4) |
|
|
314 | (3) |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
318 | (5) |
|
|
318 | (4) |
|
|
322 | (1) |
|
|
323 | (2) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
Objective 3.5 Identify policies and best practices |
|
|
327 | (14) |
|
Privileged User Agreement |
|
|
327 | (1) |
|
|
327 | (1) |
|
On-boarding/Off-boarding Procedures |
|
|
328 | (1) |
|
|
328 | (1) |
|
International Export Controls |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
Incident Response Policies |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
Safety Procedures and Policies |
|
|
332 | (5) |
|
|
332 | (1) |
|
Physical/Installation Safety |
|
|
333 | (1) |
|
Rack Installation and Maintenance |
|
|
334 | (2) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (2) |
4 Network Security |
|
341 | (68) |
|
Objective 4.1 Summarize the purposes of physical security devices |
|
|
342 | (4) |
|
|
342 | (1) |
|
Video Surveillance and Motion Detection |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
343 | (2) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
Objective 4.2 Explain authentication and access controls |
|
|
346 | (18) |
|
Authentication, Authorization, and Accounting |
|
|
346 | (9) |
|
|
348 | (1) |
|
|
349 | (1) |
|
Kerberos and Single Sign-on |
|
|
350 | (2) |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (2) |
|
|
355 | (1) |
|
Multifactor Authentication |
|
|
355 | (2) |
|
|
356 | (1) |
|
|
357 | (5) |
|
|
357 | (2) |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
Objective 4.3 Given a scenario, secure a basic wireless network |
|
|
364 | (6) |
|
|
366 | (1) |
|
|
366 | (1) |
|
Authentication and Authorization |
|
|
367 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
Objective 4.4 Summarize common networking attacks |
|
|
370 | (15) |
|
Exploits vs. Vulnerabilities |
|
|
370 | (1) |
|
|
371 | (2) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
Trusted and Untrusted Users |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
Rogue Access Point and Evil Twin |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
378 | (2) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (2) |
|
|
384 | (1) |
|
|
384 | (1) |
|
Objective 4.5 Given a scenario, implement network device hardening |
|
|
385 | (9) |
|
Changing Default Credentials |
|
|
385 | (1) |
|
Avoiding Common Passwords |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
Disabling Unnecessary Services, Disabling Unused Ports |
|
|
388 | (2) |
|
|
390 | (1) |
|
|
390 | (3) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
394 | (1) |
|
Objective 4.6 Explain common mitigation techniques and their purposes |
|
|
394 | (15) |
|
|
394 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
396 | (6) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
399 | (3) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
403 | (1) |
|
File Integrity Monitoring |
|
|
403 | (1) |
|
Restricting Access via ACLs |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
407 | (2) |
5 Network Operations |
|
409 | (52) |
|
Objective 5.1 Explain the network troubleshooting methodology |
|
|
410 | (10) |
|
|
411 | (2) |
|
Gather Information, Duplicate the Problem, Question Users, and Identify Symptoms |
|
|
411 | (1) |
|
Determine If Anything Has Changed |
|
|
412 | (1) |
|
Approach Multiple Problems Individually |
|
|
413 | (1) |
|
Establish a Theory of Probable Cause |
|
|
413 | (2) |
|
Test the Theory to Determine Cause |
|
|
415 | (1) |
|
Establish a Plan of Action and Identify Potential Effects |
|
|
416 | (1) |
|
Implement the Solution or Escalate as Necessary |
|
|
416 | (1) |
|
Verify Full System Functionality and Implement Preventative Measures |
|
|
417 | (1) |
|
Document Findings, Actions, and Outcomes |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
420 | (1) |
|
Objective 5.2 Given a scenario, use the appropriate tool |
|
|
420 | (18) |
|
|
421 | (6) |
|
|
421 | (1) |
|
|
422 | (2) |
|
|
424 | (1) |
|
|
424 | (2) |
|
|
426 | (1) |
|
|
426 | (1) |
|
|
427 | (1) |
|
|
427 | (1) |
|
|
427 | (9) |
|
|
428 | (1) |
|
|
428 | (1) |
|
|
428 | (1) |
|
|
429 | (1) |
|
|
429 | (7) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
Objective 5.3 Given a scenario, troubleshoot common wired connectivity and performance issues |
|
|
438 | (8) |
|
|
438 | (1) |
|
|
438 | (2) |
|
|
440 | (1) |
|
|
440 | (1) |
|
|
441 | (1) |
|
|
441 | (1) |
|
|
441 | (1) |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
444 | (1) |
|
Network Connection LED Status Indicators |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
445 | (1) |
|
|
445 | (1) |
|
Objective 5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues |
|
|
446 | (7) |
|
|
446 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
Latency, Jitter, and Attenuation |
|
|
447 | (1) |
|
|
447 | (1) |
|
Interference and Signal-to-Noise Ratio |
|
|
447 | (2) |
|
Incorrect Antenna Placement |
|
|
449 | (1) |
|
Channel Overlap and Frequency Mismatch |
|
|
449 | (1) |
|
|
449 | (1) |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
452 | (1) |
|
|
452 | (1) |
|
|
453 | (1) |
|
Objective 5.5 Given a scenario, troubleshoot common network service issues |
|
|
453 | (8) |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
454 | (1) |
|
|
454 | (1) |
|
|
454 | (1) |
|
|
455 | (1) |
|
|
455 | (1) |
|
Untrusted SSL Certificate |
|
|
455 | (1) |
|
|
455 | (1) |
|
|
456 | (1) |
|
Incorrect ACL Settings and Blocked TCP/UDP Ports |
|
|
456 | (1) |
|
Incorrect Host-Based Firewall Settings |
|
|
457 | (1) |
|
|
457 | (1) |
|
|
457 | (1) |
|
|
458 | (1) |
|
|
458 | (1) |
|
|
459 | (2) |
A Career Flight Path |
|
461 | (2) |
|
|
461 | (1) |
|
|
461 | (1) |
|
|
462 | (1) |
B About the Online Content |
|
463 | (6) |
|
|
463 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
463 | (1) |
|
Single User License Terms and Conditions |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
466 | (1) |
|
|
466 | (1) |
|
Playing the Mike Meyers Introduction Video |
|
|
467 | (1) |
|
|
467 | (1) |
|
|
467 | (2) |
Index |
|
469 | |