I'm a student I'm an educator CompTIA Network+ N10-008 Exam Cram, 7th edition
BRAND: PEARSON
Publisher: | Pearson IT Certification |
Author: | Emmett Dulaney |
Edition: | (August 24, 2021) © 2022 |
eBook ISBN: | 9780137375707 |
Print ISBN: | 9780137375769 |
Type: | 1 Year Subscription. Dành cho Cá nhân |
eBook edition. 1 Year Subscription. Dành cho Cá nhân | Trường ĐH, Nhóm, Thư Viện: Gọi 0915920514 để báo giá Pearson, Vital Source eBook hoặc mua Sách In
See what in the box
Mô tả sản phẩm
CompTIA® Network+ N10-008 Exam Cram, Phiên bản thứ bảy là hướng dẫn học tập hoàn hảo giúp sinh viên vượt qua kỳ thi CompTIA's Network+ N10-008. Nó cung cấp các câu hỏi bao quát và thực hành cho mọi chủ đề thi, bao gồm cả những nội dung mới đáng kể. Cuốn sách giới thiệu cho người đọc một quy trình chuẩn bị bài kiểm tra có tổ chức thông qua việc sử dụng các yếu tố và kỹ thuật trong chuỗi đã được chứng minh. Danh sách chủ đề thi làm cho việc tham khảo dễ dàng. Cảnh báo bài kiểm tra, Thanh bên và Ghi chú xen kẽ trong suốt văn bản giúp học sinh tập trung vào những gì họ cần biết. Cram Quizzes giúp các em đánh giá kiến thức của mình và thẻ xé Cram Sheet là bài ôn tập hoàn hảo vào phút chót.
Introduction
CHAPTER 1:
Network Technologies, Topologies, and Types
Wired and Wireless Network Topologies
Bus Topology
Ring Topology
Star Topology (Hub-and-Spoke)
Mesh Topology
Hybrid Topology
Bringing Wireless to a Topology
Infrastructure Wireless Topology
Ad Hoc Wireless Topology
Wireless Mesh Topology
Network Types and Characteristics
To Server or Not
LANs
WLANs
WANs
MANs
CANs
SANs
PANs
SDWANs
MPLS
mGRE
Network Links and Concepts
DSL Internet Access
Cable Broadband
The Public Switched Telephone Network
Leased Lines
T3 Lines
Metro-Optical
Satellite Internet Access
Termination Points
Demarc, Demarc Extension, and Smart Jacks
CSUs/DSUs
Verify Wiring Installation and Termination
Virtual Networking
What's Next?
CHAPTER 2:
Models, Ports, Protocols, and Network Services
The OSI Networking Model
The OSI Seven-Layer Model
Physical Layer (Layer 1)
Data Link Layer (Layer 2)
Network Layer (Layer 3)
Transport Layer (Layer 4)
Session Layer (Layer 5)
Presentation Layer (Layer 6)
Application Layer (Layer 7)
OSI Model Summary
Comparing OSI to the Four-Layer TCP/IP Model
Identifying the OSI Layers at Which Various Network Components Operate
Data Encapsulation/Decapsulation and OSI
Ports and Protocols
Connection-Oriented Protocols Versus Connectionless Protocols
Internet Protocol
Transmission Control Protocol
How TCP Works
User Datagram Protocol
Internet Control Message Protocol
IPSec
Generic Routing Encapsulation
File Transfer Protocol
Secure Shell
Secure File Transfer Protocol
Telnet
Simple Mail Transfer Protocol
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Trivial File Transfer Protocol
Hypertext Transfer Protocol
Network Time Protocol (NTP)
Post Office Protocol Version 3/Internet Message Access Protocol Version 4
Simple Network Management Protocol
Components of SNMP
SNMP Management Systems
SNMP Agents
Management Information Bases
SNMP Communities
SNMPv3
Lightweight Directory Access Protocol
Hypertext Transfer Protocol Secure
Server Message Block
Syslog
SMTP TLS
LDAPS
IMAP over SSL
POP3 over SSL
SQL, SQLnet, and MySQL
Remote Desktop Protocol
Session Initiation Protocol
Understanding Port Functions
Network Services
Domain Name Service (DNS)
The DNS Namespace
Types of DNS Entries
DNS Records
DNS in a Practical Implementation
Dynamic Host Configuration Protocol
The DHCP Process
DHCP and DNS Suffixes
DHCP Relays and IP Helpers
Network Time Protocol
What's Next?
CHAPTER 3:
Addressing, Routing, and Switching
IP Addressing
IPv4
IP Address Classes
Subnet Mask Assignment
Subnetting
Identifying the Differences Between IPv4 Public and Private Networks
Private Address Ranges
Classless Interdomain Routing
Default Gateways
Virtual IP
IPv4 Address Types
Unicast Address
Broadcast Address
Multicast
IPv6 Addressing
Where Have All the IPv4 Addresses Gone?
Identifying IPv6 Addresses
IPv6 Address Types
Global Unicast Addresses
Link-Local Addresses
Site-Local Addresses
Neighbor Discovery
Comparing IPv4 and IPv6 Addressing
Assigning IP Addresses
Static Addressing
Dynamic Addressing
BOOT Protocol (BOOTP)
Automatic Private IP Addressing
Identifying MAC Addresses
NAT and PAT
NAT
PAT
SNAT
DNAT
Managing Routing and Switching
The Default Gateway
Routing Tables
Static Routing
Default Route
Switching Methods
Packet Switching
Circuit Switching
Comparing Switching Methods
Dynamic Routing
Distance-Vector Routing
Link-State Routing
Hybrid Routing Protocols
Network Traffic
Routing Metrics
Virtual Local-Area Networks
VLAN Membership
VLAN Segmentation
The Spanning Tree Protocol
Interface Configuration and Switch Management
MDI-X
Trunking
Port Mirroring
Port Authentication
Power over Ethernet (PoE and PoE+)
MAC Address Table
Switch Management
Managed and Unmanaged
Quality of Service
Traffic Shaping
Access Control Lists
ARP and RARP
What's Next?
CHAPTER 4:
Network Implementations
Common Networking Devices
Firewall
IDS/IPS
Router
Switch
Hub and Switch Cabling
Multilayer Switch
Hub
Bridge
DSL and Cable Modems
Access Point
Media Converter
Voice Gateway
Repeater
Wireless LAN Controller
Load Balancer
Proxy Server
VPN Concentrators and Headends
Networked Devices
Networking Architecture
Three-Tiered Architecture
Core Layer
Distribution/Aggregation Layer
Access/Edge Layer
Software-Defined Networking
Application Layer
Control Layer
Infrastructure Layer
Management Plane
Spine and Leaf
Traffic Flows
Datacenter Location Types
Storage-Area Networks
iSCSI
Fibre Channel and FCoE
Network-Attached Storage
What's Next?
CHAPTER 5:
Cabling Solutions and Issues
General Media Considerations
Broadband Versus Baseband Transmissions
Simplex, Half-Duplex, and Full-Duplex Modes
Data Transmission Rates
Types of Network Media
Twisted-Pair Cabling (Copper)
Coaxial Cables
Twinaxial Cables
Fiber-Optic Cables
Plenum Versus PVC Cables
Types of Media Connectors
BNC Connectors
RJ-11 Connectors
RJ-45 Connectors
F-Type Connectors and RG-59 and RG-6 Cables
Fiber Connectors
Transceivers
Media Couplers/Converters
TIA/EIA 568A and 568B Wiring Standards
Straight-Through Versus Crossover Cables
Rollover and Loopback Cables
Components of Wiring Distribution
Network Cross-Connects
Horizontal Cabling
Vertical Cables
Patch Panels
Fiber Distribution Panels
66 and 110 Blocks (T568A, T568B)
MDF and IDF Wiring Closets
Ethernet Copper and Fiber Standards
10BASE-T
100BASE-TX
1000BASE-T
10GBASE-T
40GBASE-T
1000BASE-LX and 1000BASE-SX
10GBASE-LR and 10GBASE-SR
Multiplexing Options
Troubleshooting Common Cable Connectivity Issues
Limitations, Considerations, and Issues
Throughput, Speed, and Distance
Cabling Specifications/Limitations
Cabling Considerations
Cabling Applications
Attenuation and dB Loss
Interference
Incorrect Pinout
Bad Ports
Open/Short
LED Status Indicators
Incorrect Transceivers
Duplexing Issues
TX/RX Reversed
Dirty Optical Cables
Common Tools
Cable Crimpers, Strippers, and Snips/Cutters
Punchdown Tools
Tone Generator
Loopback Adapter
OTDR
Multimeter
Cable Tester
Wire Map
Tap
Fusion Splicer
Spectrum Analyzer
Fiber Light Meter
What's Next?
CHAPTER 6:
Wireless Solutions and Issues
Understanding Wireless Basics
Wireless Channels and Frequencies
Cellular Technology Access
Speed, Distance, and Bandwidth
Channel Bonding
MIMO/MU-MIMO/Directional/Omnidirectional
Antenna Ratings
Antenna Coverage
Establishing Communications Between Wireless Devices
Configuring the Wireless Connection
Troubleshooting Wireless Issues
Site Surveys
Factors Affecting Wireless Signals
Interference
Reflection, Refraction, and Absorption
Troubleshooting AP Coverage
What's Next?
CHAPTER 7:
Cloud Computing Concepts and Options
Cloud Concepts
Service Models
Software as a Service
Platform as a Service
Infrastructure as a Service
Desktop as a Service
Deployment Models
Private Cloud
Public Cloud
Hybrid and Community Clouds
Infrastructure as Code
Connectivity Options
Multitenancy
Elasticity
Scalability
Security Implications
The Relationship Between Resources
What's Next?
CHAPTER 8:
Network Operations
Organizational Documents and Policies
Wiring and Port Locations
Troubleshooting Using Wiring Schematics
Physical and Logical Network Diagrams
Baseline Configurations
Policies, Procedures, Configurations, and Regulations
Policies
Password-Related Policies
Procedures
Change Management Documentation
Configuration Documentation
Regulations
Labeling
High Availability and Disaster Recovery
Backups
Full Backups
Differential Backups
Incremental Backups
Snapshots
Backup Best Practices
Using Uninterruptible Power Supplies
Why Use a UPS?
Power Threats
Beyond the UPS
Cold, Warm, Hot, and Cloud Sites
High Availability and Recovery Concepts
Active-Active Versus Active-Passive
Monitoring Network Performance
Common Performance Metrics
SNMP Monitors
Management Information Base (MIB)
Network Performance, Load, and Stress Testing
Performance Tests
Load Tests and Send/Receive Traffic
Stress Tests
Performance Metrics
Network Device Logs
Security Logs
Application Log
System Logs
History Logs
Log Management
Patch Management
Environmental Factors
What's Next?
CHAPTER 9:
Network Security
Common Security Concepts
Access Control
Mandatory Access Control
Discretionary Access Control
Rule-Based Access Control
Role-Based Access Control
Defense in Depth
Network Segmentation
Screened Subnet
Separation of Duties
Honeypots
RADIUS and TACACS+
Kerberos Authentication
Local Authentication
Lightweight Directory Access Protocol
Using Certificates
Auditing and Logging
Multifactor Authentication Factors
Additional Access Control Methods
802.1X
Extensible Authentication Protocol (EAP)
Network Access Control (NAC)
MAC Filtering
Risk Management
Penetration Testing
Security Information and Event Management
Common Networking Attacks
Denial-of-Service and Distributed Denial-of-Service Attacks
Types of DoS Attacks
Other Common Attacks
Social Engineering
Logic Bomb
Rogue DHCP
Rogue Access Points and Evil Twins
Advertising Wireless Weaknesses
Phishing
Ransomware
DNS Poisoning
ARP Cache Poisoning
Spoofing
Deauthentication
Brute Force
On-Path Attack
VLAN Hopping
ARP Spoofing
Vulnerabilities and Prevention
Network Hardening and Physical Security
Disposing of Assets
Implementing Physical Security
Lock and Key
Swipe Card and PIN Access
Biometrics
Two-Factor and Multifactor Authentication
Secured Versus Unsecured Protocols
Hardening Best Practices
Wireless Security
MAC Filtering
Antenna Placement and Power Levels
Isolation
Preshared Keys
Geofencing
Captive Portal
IoT Access Considerations
Remote-Access Methods
Remote File Access
VPNs
Components of the VPN Connection
VPN Connection Types
VPN Pros and Cons
IPSec
SSL/TLS/DTLS
Site-to-Site and Client-to-Site
Virtual Desktops
HTTPS/Management URL
Authentication and Authorization Considerations
Out-of-Band Management
What's Next?
CHAPTER 10:
Network Troubleshooting
Troubleshooting Steps and Procedures
Identify the Problem
Identify Symptoms
Determine Whether Anything Has Changed
Duplicate the Problem if Possible
Approach Multiple Problems Inpidually
Establish a Theory of Probable Cause
Test the Theory to Determine the Cause
Establish a Plan of Action
Implement the Solution or Escalate
Determine Whether Escalation Is Necessary
Verify Full System Functionality
Document Findings, Actions, Outcomes, and Lessons
Software Troubleshooting Tools
Wi-Fi Analyzer
Protocol Analyzer
Bandwidth Speed Tester
Port Scanner
iperf
NetFlow Analyzer
TFTP Server
Terminal Emulator
IP Scanner
Command-Line Tools
The Trace Route Utility (tracert/traceroute)
ping
The Destination Host Unreachable Message
The Request Timed Out Message
The Unknown Host Message
The Expired TTL Message
Troubleshooting with ping
hostname
ARP
arp ping
The netstat Command
netstat -e
netstat -a
netstat -r
netstat -s
telnet
ipconfig
ifconfig
nslookup
dig
The tcpdump Command
The route Utility
nmap
Basic Network Platform Commands
Troubleshooting General Networking Issues
Common Considerations
Common Problems to Be Aware Of
Collisions
Broadcast Storm
Multicast Flooding
Asymmetrical Routing
Switching Loops
Routing Loops
Missing Route
Low Optical Link Budget
Incorrect VLAN
DNS Issues
Incorrect Gateway
Incorrect Subnet Mask
Duplicate or Incorrect IP Address
Duplicate MAC Addresses
Expired IP Address
Rogue DHCP Server
Certificate Issues
NTP Issues/Incorrect Time
DHCP Scope Exhaustion
Blocked Ports, Services, or Addresses
Incorrect Firewall Settings
Incorrect ACL Settings
Unresponsive Service
BYOD Challenges
Licensed Feature Issues
Hardware Failure
Network Performance Issues
What's Next?
Glossary
CompTIA® Network+ N10-008 Exam Cram, Phiên bản thứ bảy là hướng dẫn học tập hoàn hảo giúp sinh viên vượt qua kỳ thi CompTIA's Network+ N10-008. Nó cung cấp các câu hỏi bao quát và thực hành cho mọi chủ đề thi, bao gồm cả những nội dung mới đáng kể. Cuốn sách giới thiệu cho người đọc một quy trình chuẩn bị bài kiểm tra có tổ chức thông qua việc sử dụng các yếu tố và kỹ thuật trong chuỗi đã được chứng minh. Danh sách chủ đề thi làm cho việc tham khảo dễ dàng. Cảnh báo bài kiểm tra, Thanh bên và Ghi chú xen kẽ trong suốt văn bản giúp học sinh tập trung vào những gì họ cần biết. Cram Quizzes giúp các em đánh giá kiến thức của mình và thẻ xé Cram Sheet là bài ôn tập hoàn hảo vào phút chót.
Introduction
CHAPTER 1:
Network Technologies, Topologies, and Types
Wired and Wireless Network Topologies
Bus Topology
Ring Topology
Star Topology (Hub-and-Spoke)
Mesh Topology
Hybrid Topology
Bringing Wireless to a Topology
Infrastructure Wireless Topology
Ad Hoc Wireless Topology
Wireless Mesh Topology
Network Types and Characteristics
To Server or Not
LANs
WLANs
WANs
MANs
CANs
SANs
PANs
SDWANs
MPLS
mGRE
Network Links and Concepts
DSL Internet Access
Cable Broadband
The Public Switched Telephone Network
Leased Lines
T3 Lines
Metro-Optical
Satellite Internet Access
Termination Points
Demarc, Demarc Extension, and Smart Jacks
CSUs/DSUs
Verify Wiring Installation and Termination
Virtual Networking
What's Next?
CHAPTER 2:
Models, Ports, Protocols, and Network Services
The OSI Networking Model
The OSI Seven-Layer Model
Physical Layer (Layer 1)
Data Link Layer (Layer 2)
Network Layer (Layer 3)
Transport Layer (Layer 4)
Session Layer (Layer 5)
Presentation Layer (Layer 6)
Application Layer (Layer 7)
OSI Model Summary
Comparing OSI to the Four-Layer TCP/IP Model
Identifying the OSI Layers at Which Various Network Components Operate
Data Encapsulation/Decapsulation and OSI
Ports and Protocols
Connection-Oriented Protocols Versus Connectionless Protocols
Internet Protocol
Transmission Control Protocol
How TCP Works
User Datagram Protocol
Internet Control Message Protocol
IPSec
Generic Routing Encapsulation
File Transfer Protocol
Secure Shell
Secure File Transfer Protocol
Telnet
Simple Mail Transfer Protocol
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Trivial File Transfer Protocol
Hypertext Transfer Protocol
Network Time Protocol (NTP)
Post Office Protocol Version 3/Internet Message Access Protocol Version 4
Simple Network Management Protocol
Components of SNMP
SNMP Management Systems
SNMP Agents
Management Information Bases
SNMP Communities
SNMPv3
Lightweight Directory Access Protocol
Hypertext Transfer Protocol Secure
Server Message Block
Syslog
SMTP TLS
LDAPS
IMAP over SSL
POP3 over SSL
SQL, SQLnet, and MySQL
Remote Desktop Protocol
Session Initiation Protocol
Understanding Port Functions
Network Services
Domain Name Service (DNS)
The DNS Namespace
Types of DNS Entries
DNS Records
DNS in a Practical Implementation
Dynamic Host Configuration Protocol
The DHCP Process
DHCP and DNS Suffixes
DHCP Relays and IP Helpers
Network Time Protocol
What's Next?
CHAPTER 3:
Addressing, Routing, and Switching
IP Addressing
IPv4
IP Address Classes
Subnet Mask Assignment
Subnetting
Identifying the Differences Between IPv4 Public and Private Networks
Private Address Ranges
Classless Interdomain Routing
Default Gateways
Virtual IP
IPv4 Address Types
Unicast Address
Broadcast Address
Multicast
IPv6 Addressing
Where Have All the IPv4 Addresses Gone?
Identifying IPv6 Addresses
IPv6 Address Types
Global Unicast Addresses
Link-Local Addresses
Site-Local Addresses
Neighbor Discovery
Comparing IPv4 and IPv6 Addressing
Assigning IP Addresses
Static Addressing
Dynamic Addressing
BOOT Protocol (BOOTP)
Automatic Private IP Addressing
Identifying MAC Addresses
NAT and PAT
NAT
PAT
SNAT
DNAT
Managing Routing and Switching
The Default Gateway
Routing Tables
Static Routing
Default Route
Switching Methods
Packet Switching
Circuit Switching
Comparing Switching Methods
Dynamic Routing
Distance-Vector Routing
Link-State Routing
Hybrid Routing Protocols
Network Traffic
Routing Metrics
Virtual Local-Area Networks
VLAN Membership
VLAN Segmentation
The Spanning Tree Protocol
Interface Configuration and Switch Management
MDI-X
Trunking
Port Mirroring
Port Authentication
Power over Ethernet (PoE and PoE+)
MAC Address Table
Switch Management
Managed and Unmanaged
Quality of Service
Traffic Shaping
Access Control Lists
ARP and RARP
What's Next?
CHAPTER 4:
Network Implementations
Common Networking Devices
Firewall
IDS/IPS
Router
Switch
Hub and Switch Cabling
Multilayer Switch
Hub
Bridge
DSL and Cable Modems
Access Point
Media Converter
Voice Gateway
Repeater
Wireless LAN Controller
Load Balancer
Proxy Server
VPN Concentrators and Headends
Networked Devices
Networking Architecture
Three-Tiered Architecture
Core Layer
Distribution/Aggregation Layer
Access/Edge Layer
Software-Defined Networking
Application Layer
Control Layer
Infrastructure Layer
Management Plane
Spine and Leaf
Traffic Flows
Datacenter Location Types
Storage-Area Networks
iSCSI
Fibre Channel and FCoE
Network-Attached Storage
What's Next?
CHAPTER 5:
Cabling Solutions and Issues
General Media Considerations
Broadband Versus Baseband Transmissions
Simplex, Half-Duplex, and Full-Duplex Modes
Data Transmission Rates
Types of Network Media
Twisted-Pair Cabling (Copper)
Coaxial Cables
Twinaxial Cables
Fiber-Optic Cables
Plenum Versus PVC Cables
Types of Media Connectors
BNC Connectors
RJ-11 Connectors
RJ-45 Connectors
F-Type Connectors and RG-59 and RG-6 Cables
Fiber Connectors
Transceivers
Media Couplers/Converters
TIA/EIA 568A and 568B Wiring Standards
Straight-Through Versus Crossover Cables
Rollover and Loopback Cables
Components of Wiring Distribution
Network Cross-Connects
Horizontal Cabling
Vertical Cables
Patch Panels
Fiber Distribution Panels
66 and 110 Blocks (T568A, T568B)
MDF and IDF Wiring Closets
Ethernet Copper and Fiber Standards
10BASE-T
100BASE-TX
1000BASE-T
10GBASE-T
40GBASE-T
1000BASE-LX and 1000BASE-SX
10GBASE-LR and 10GBASE-SR
Multiplexing Options
Troubleshooting Common Cable Connectivity Issues
Limitations, Considerations, and Issues
Throughput, Speed, and Distance
Cabling Specifications/Limitations
Cabling Considerations
Cabling Applications
Attenuation and dB Loss
Interference
Incorrect Pinout
Bad Ports
Open/Short
LED Status Indicators
Incorrect Transceivers
Duplexing Issues
TX/RX Reversed
Dirty Optical Cables
Common Tools
Cable Crimpers, Strippers, and Snips/Cutters
Punchdown Tools
Tone Generator
Loopback Adapter
OTDR
Multimeter
Cable Tester
Wire Map
Tap
Fusion Splicer
Spectrum Analyzer
Fiber Light Meter
What's Next?
CHAPTER 6:
Wireless Solutions and Issues
Understanding Wireless Basics
Wireless Channels and Frequencies
Cellular Technology Access
Speed, Distance, and Bandwidth
Channel Bonding
MIMO/MU-MIMO/Directional/Omnidirectional
Antenna Ratings
Antenna Coverage
Establishing Communications Between Wireless Devices
Configuring the Wireless Connection
Troubleshooting Wireless Issues
Site Surveys
Factors Affecting Wireless Signals
Interference
Reflection, Refraction, and Absorption
Troubleshooting AP Coverage
What's Next?
CHAPTER 7:
Cloud Computing Concepts and Options
Cloud Concepts
Service Models
Software as a Service
Platform as a Service
Infrastructure as a Service
Desktop as a Service
Deployment Models
Private Cloud
Public Cloud
Hybrid and Community Clouds
Infrastructure as Code
Connectivity Options
Multitenancy
Elasticity
Scalability
Security Implications
The Relationship Between Resources
What's Next?
CHAPTER 8:
Network Operations
Organizational Documents and Policies
Wiring and Port Locations
Troubleshooting Using Wiring Schematics
Physical and Logical Network Diagrams
Baseline Configurations
Policies, Procedures, Configurations, and Regulations
Policies
Password-Related Policies
Procedures
Change Management Documentation
Configuration Documentation
Regulations
Labeling
High Availability and Disaster Recovery
Backups
Full Backups
Differential Backups
Incremental Backups
Snapshots
Backup Best Practices
Using Uninterruptible Power Supplies
Why Use a UPS?
Power Threats
Beyond the UPS
Cold, Warm, Hot, and Cloud Sites
High Availability and Recovery Concepts
Active-Active Versus Active-Passive
Monitoring Network Performance
Common Performance Metrics
SNMP Monitors
Management Information Base (MIB)
Network Performance, Load, and Stress Testing
Performance Tests
Load Tests and Send/Receive Traffic
Stress Tests
Performance Metrics
Network Device Logs
Security Logs
Application Log
System Logs
History Logs
Log Management
Patch Management
Environmental Factors
What's Next?
CHAPTER 9:
Network Security
Common Security Concepts
Access Control
Mandatory Access Control
Discretionary Access Control
Rule-Based Access Control
Role-Based Access Control
Defense in Depth
Network Segmentation
Screened Subnet
Separation of Duties
Honeypots
RADIUS and TACACS+
Kerberos Authentication
Local Authentication
Lightweight Directory Access Protocol
Using Certificates
Auditing and Logging
Multifactor Authentication Factors
Additional Access Control Methods
802.1X
Extensible Authentication Protocol (EAP)
Network Access Control (NAC)
MAC Filtering
Risk Management
Penetration Testing
Security Information and Event Management
Common Networking Attacks
Denial-of-Service and Distributed Denial-of-Service Attacks
Types of DoS Attacks
Other Common Attacks
Social Engineering
Logic Bomb
Rogue DHCP
Rogue Access Points and Evil Twins
Advertising Wireless Weaknesses
Phishing
Ransomware
DNS Poisoning
ARP Cache Poisoning
Spoofing
Deauthentication
Brute Force
On-Path Attack
VLAN Hopping
ARP Spoofing
Vulnerabilities and Prevention
Network Hardening and Physical Security
Disposing of Assets
Implementing Physical Security
Lock and Key
Swipe Card and PIN Access
Biometrics
Two-Factor and Multifactor Authentication
Secured Versus Unsecured Protocols
Hardening Best Practices
Wireless Security
MAC Filtering
Antenna Placement and Power Levels
Isolation
Preshared Keys
Geofencing
Captive Portal
IoT Access Considerations
Remote-Access Methods
Remote File Access
VPNs
Components of the VPN Connection
VPN Connection Types
VPN Pros and Cons
IPSec
SSL/TLS/DTLS
Site-to-Site and Client-to-Site
Virtual Desktops
HTTPS/Management URL
Authentication and Authorization Considerations
Out-of-Band Management
What's Next?
CHAPTER 10:
Network Troubleshooting
Troubleshooting Steps and Procedures
Identify the Problem
Identify Symptoms
Determine Whether Anything Has Changed
Duplicate the Problem if Possible
Approach Multiple Problems Inpidually
Establish a Theory of Probable Cause
Test the Theory to Determine the Cause
Establish a Plan of Action
Implement the Solution or Escalate
Determine Whether Escalation Is Necessary
Verify Full System Functionality
Document Findings, Actions, Outcomes, and Lessons
Software Troubleshooting Tools
Wi-Fi Analyzer
Protocol Analyzer
Bandwidth Speed Tester
Port Scanner
iperf
NetFlow Analyzer
TFTP Server
Terminal Emulator
IP Scanner
Command-Line Tools
The Trace Route Utility (tracert/traceroute)
ping
The Destination Host Unreachable Message
The Request Timed Out Message
The Unknown Host Message
The Expired TTL Message
Troubleshooting with ping
hostname
ARP
arp ping
The netstat Command
netstat -e
netstat -a
netstat -r
netstat -s
telnet
ipconfig
ifconfig
nslookup
dig
The tcpdump Command
The route Utility
nmap
Basic Network Platform Commands
Troubleshooting General Networking Issues
Common Considerations
Common Problems to Be Aware Of
Collisions
Broadcast Storm
Multicast Flooding
Asymmetrical Routing
Switching Loops
Routing Loops
Missing Route
Low Optical Link Budget
Incorrect VLAN
DNS Issues
Incorrect Gateway
Incorrect Subnet Mask
Duplicate or Incorrect IP Address
Duplicate MAC Addresses
Expired IP Address
Rogue DHCP Server
Certificate Issues
NTP Issues/Incorrect Time
DHCP Scope Exhaustion
Blocked Ports, Services, or Addresses
Incorrect Firewall Settings
Incorrect ACL Settings
Unresponsive Service
BYOD Challenges
Licensed Feature Issues
Hardware Failure
Network Performance Issues
What's Next?
Glossary