comptia_network_study_guide_by_todd_lammle_table_of_contents

CompTIA Network+ Study Guide by Todd Lammle Table of Contents

Return to CompTIA Network+ Study Guide by Todd Lammle Index, CompTIA Network+ Study Guide by Todd Lammle, CompTIA Network+, CCNA Certification Study Guide by Todd Lammle Table of Contents, CompTIA, CCNA, Cisco, CompTIA Bibliography

Table of Contents

Cover

Title Page

Copyright

Acknowledgments

About the Author About the Technical Editor

Introduction N10-008 Exam Objectives

Objective Map

Assessment Test

Answers to Assessment Test

Chapter 1: Introduction to Networks First Things First: What's a Network?

Physical NetworkTopologies

Topology Selection, Backbones, and Segments

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 2: The Open Systems Interconnection Specifications Internetworking Models

The OSI Reference Model

Introduction to Encapsulation

Modulation Techniques

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 3: Networking Connectors and Wiring Standards Physical Media

Cable Properties

Wiring Standards

Installing Wiring Distributions

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 4: The Current Ethernet Specifications Network Basics

Ethernet Basics

Ethernet at the Data Link Layer

Ethernet at the Physical Layer

Ethernet over Other Standards (IEEE 1905.1-2013)

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 5: Networking Devices Common Network Connectivity Devices

Other Specialized Devices

Networked Devices

Planning and Implementing a Basic SOHO Network Using Network Segmentation

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 6: Introduction to the Internet Protocol Introducing TCP/IP

Data Encapsulation

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 7: IP Addressing

IP Terminology

The Hierarchical IP Addressing Scheme

IPv4 Address Types

Internet Protocol Version 6 (IPv6)

Summary

Exam Essentials

Written Labs

Review Questions

Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT Subnetting Basics

Troubleshooting IP Addressing

Introduction to Network Address Translation (NAT)

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 9: Introduction to IP Routing

Routing Basics

The IP Routing Process

Testing Your IP Routing Understanding

Static and Dynamic Routing

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 10: Routing Protocols Routing Protocol Basics

Distance-Vector Routing Protocols

Link-State Routing Protocols

High Availability

Advanced IPv6 Concepts

IPv6 Routing Protocols

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 11: Switching and Virtual LANs Networking Before Layer 2 Switching

Switching Services

Spanning Tree Protocol

Virtual LANs

VLAN Trunking Protocol

Two Additional Advanced Features of Switches

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 12: Wireless Networking

Introduction to Wireless Technology

Cellular Technologies

The 802.11 Standards (Regulatory Impacts)

Comparing 802.11 Standards

Wireless Network Components

Installing a Wireless Network

Site Survey

Wireless Security

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 13: Using Statistics and Sensors to Ensure Network Availability Performance Metrics/Sensors

SNMP

Network Device Logs

Interface Statistics/Status

Interface Errors or Alerts

Environmental Factors and Sensors

Baselines

NetFlow Data

Uptime/Downtime

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 14: Organizational Documents and Policies Plans and Procedures

Hardening and Security Policies

Common Documentation

Common Agreements

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 15: High Availability and Disaster Recovery

Load Balancing

Multipathing

Network Interface Card (NIC) Teaming

Redundant Hardware/Clusters

Facilities and Infrastructure Support

Redundancy and High Availability (HA) Concepts

Mean Time to Repair (MTTR)

Mean Time Between Failure (MTBF)

Recovery Time Objective (RTO)

Recovery Point Objective (RPO)

Network Device Backup/Restore

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 16: Common Security Concepts

Confidentiality, Integrity, and Availability (CIA)

Threats

Vulnerabilities

Least Privilege

Role-Based Access

Zero Trust

Defense in Depth

Authentication Methods

Security Risk Assessments

Security Information and Event Management (SIEM)

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 17: Common Types of Attacks Technology-Based Attacks

Human and Environmental

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 18: Network Hardening Techniques Best Practices

Wireless Security

IoT Access Considerations

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 19: Remote Access Security Site-to-Site VPN

Client-to-Site VPN

Remote Desktop Connection

Remote Desktop Gateway

SSH

Virtual Network Computing (VNC)

Virtual Desktop

Authentication and Authorization Considerations

In-Band vs. Out-of-Band Management

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 20: Physical Security Detection Methods

Prevention Methods

Asset Disposal

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 21: Data Center Architecture and Cloud Concepts Data Center Network Architectures

Software-Defined Networking

Traffic Flows

Branch Office vs. On-premises Data Center vs. Colocation

Cloud Computing and Its Effect on the Enterprise Network

Overview of Network Programmability in Enterprise Network

Application Programming Interfaces (APIs)

Managing Network Documentation

Network Monitoring

Network Optimization

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 22: Ensuring Network Availability Performance Metrics/Sensors

Network Metrics

Network Device Logs

Interface Statistics/Status

Interface Errors

Baseline

NetFlow

Uptime

Downtime

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 23: Cable Connectivity Issues and Tools Identifying Hardware Tools

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 24: Network Troubleshooting Methodology Narrowing Down the Problem

Troubleshooting Steps

Troubleshooting Tips

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 25: Network Software Tools and Commands Software Tools

Using traceroute

Using ipconfig, ifconfig, and ip

Using the iptables Utility

Using the ping Utility

Using the Address Resolution Protocol

Using the arp Utility

Using the nslookup Utility

Resolving Names with the Hosts File

Using the Mtr Command (pathping)

Using the Nmap Utility

Using the route Command

Using the nbtstat Utility

Using the netstat Utility

Using tcpdump

Using the File Transfer Protocol

Using the Telnet Utility

Summary

Exam Essentials

Written Lab

Review Questions

Appendix A: Answers to Written Labs Chapter 1: Introduction to Networks

Chapter 2: The Open Systems Interconnection Specifications

Chapter 3: Networking Connectors and Wiring Standards

Chapter 4: The Current Ethernet Specifications

Chapter 5: Networking Devices

Chapter 6: Introduction to the Internet Protocol

Chapter 7: IP Addressing

Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT

Chapter 9: Introduction to IP Routing

Chapter 10: Routing Protocols

Chapter 11: Switching and Virtual LANs

Chapter 12: Wireless Networking

Chapter 13: Using Statistics and Sensors to Ensure Network Availability

Chapter 14: Organizational Documents and Policies

Chapter 15: High Availability and Disaster Recovery

Chapter 16: Common Security Concepts

Chapter 17: Common Types of Attacks

Chapter 18: Network Hardening Techniques

Chapter 19: Remote Access Security

Chapter 20: Physical Security

Chapter 21: Data Center Architecture and Cloud Concepts

Chapter 22: Ensuring Network Availability

Chapter 23: Cable Connectivity Issues and Tools

Chapter 24: Network Troubleshooting Methodology

Chapter 25: Network Software Tools and Commands

Appendix B: Answers to Review Questions Chapter 1: Introduction to Networks

Chapter 2: The Open Systems Interconnection Specifications

Chapter 3: Networking Connectors and Wiring Standards

Chapter 4: The Current Ethernet Specifications

Chapter 5: Networking Devices

Chapter 6: Introduction to the Internet Protocol

Chapter 7: IP Addressing

Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT

Chapter 9: Introduction to IP Routing

Chapter 10: Routing Protocols

Chapter 11: Switching and Virtual LANs

Chapter 12: Wireless Networking

Chapter 13: Using Statistics and Sensors to Ensure Network Availability

Chapter 14: Organizational Documents and Policies

Chapter 15: High Availability and Disaster Recovery

Chapter 16: Common Security Concepts

Chapter 17: Common Types of Attacks

Chapter 18: Network Hardening Techniques

Chapter 19: Remote Access Security

Chapter 20: Physical Security

Chapter 21: Data Center Architecture and Cloud Concepts

Chapter 22: Ensuring Network Availability

Chapter 23: Cable Connectivity Issues and Tools

Chapter 24: Network Troubleshooting Methodology

Chapter 25: Network Software Tools and Commands

Appendix C: Subnetting Class A Subnetting Practice Examples: Class A Addresses

Subnetting in Your Head: Class A Addresses

Written Lab 1

Written Lab 2

Answers to Written Lab 1

Answers to Written Lab 2

Index

Online Test Bank Register and Access the Online Test Bank

End User License Agreement

List of Tables

Chapter 3 TABLE 3.1 Coaxial cable specifications

Chapter 4 TABLE 4.1 Binary values

TABLE 4.2 Binary-to-decimal memorization chart

TABLE 4.3 Hex-to-binary-to-decimal chart

TABLE 4.4 Common Ethernet cable types

Chapter 5 TABLE 5.1 Additional DNS record types

Chapter 6 TABLE 6.1 Severity levels

TABLE 6.2 Key features of TCP and UDP

TABLE 6.3 Key protocols that use TCP and UDP

TABLE 6.4 Possible protocols found in the Protocol field of an IP header

Chapter 7 TABLE 7.1 Reserved IP addresses

TABLE 7.2 Reserved RFC 1918 IP address space

TABLE 7.3 Special IPv6 addresses

Chapter 8 TABLE 8.1 Default subnet masks

TABLE 8.2 CIDR values

TABLE 8.3 Advantages and disadvantages of implementing NAT

TABLE 8.4 NAT terms

Chapter 10 TABLE 10.1 Default administrative distances

TABLE 10.2 RIPv1 vs. RIPv2

TABLE 10.3 OSPF and RIP comparison

Chapter 12 TABLE 12.1 Wireless agencies and standards

TABLE 12.2 Cellular comparisons

TABLE 12.3 802.11 committees and subcommittees

TABLE 12.4 Range and speed comparisons

Chapter 13 TABLE 13.1 Severity levels

Chapter 21 TABLE 21.1 Standard TIA/EIA 568B wiring

TABLE 21.2 Eight levels of QoS

Chapter 22 TABLE 22.1 Severity levels

Chapter 25 TABLE 25.1 Options for ping switches

TABLE 25.2 arp options

TABLE 25.3 pathping options

TABLE 25.4 route command options

TABLE 25.5 Last-byte identifiers for unique names

TABLE 25.6 Last-byte identifiers for group names

TABLE 25.7 netstat options

TABLE 25.8 Common FTP navigation commands

List of Illustrations

Chapter 1 FIGURE 1.1 A basic network

FIGURE 1.2 Two separate LANs (workgroups)

FIGURE 1.3 A router connects LANs.

FIGURE 1.4 A network populated with servers and workstations

FIGURE 1.5 An internetwork

FIGURE 1.6 Multiprotocol [[Label Switching layout

FIGURE 1.7 A peer-to-peer network

FIGURE 1.8 A client-server network

FIGURE 1.9 A typical bus network's physical topology

FIGURE 1.10 Typical star topology with a hub

FIGURE 1.11 A typical ring topology

FIGURE 1.12 A typical mesh topology

FIGURE 1.13 Three point-to-point connections

FIGURE 1.14 A point-to-multipoint network, example 1

FIGURE 1.15 A point-to-multipoint network, example 2

FIGURE 1.16 A simple hybrid network

FIGURE 1.17 Backbone and segments on a network

Chapter 2 FIGURE 2.1 Layer functions

FIGURE 2.2 The upper layers

FIGURE 2.3 The lower layers

FIGURE 2.4 Establishing a connection-oriented session

FIGURE 2.5 Transmitting segments with flow control

FIGURE 2.6 Windowing

FIGURE 2.7 Transport layer reliable delivery

FIGURE 2.8 Routing table used in a router

FIGURE 2.9 A router in an internetwork

FIGURE 2.10 Data Link layer

FIGURE 2.11 Data encapsulation

Chapter 3 FIGURE 3.1 A stripped-back thinnet cable

FIGURE 3.2 Male and female BNC connectors

FIGURE 3.3 Cat 5e UTP cable

FIGURE 3.4 RJ-11 and RJ-45 connectors

FIGURE 3.5 The pin-outs in an RJ-45 connector, T568B standard

FIGURE 3.6 APC and UPC connectors

FIGURE 3.7 An example of an ST connector

FIGURE 3.8 A sample SC connector

FIGURE 3.9 Bidirectional communication

FIGURE 3.10 A sample MT-RJ fiber-optic connector

FIGURE 3.11 A sample LC fiber-optic connector

FIGURE 3.12 Single-mode fiber to Ethernet

FIGURE 3.13 Multimode fiber to Ethernet

FIGURE 3.14 Fiber to coaxial

FIGURE 3.15 Single-mode to multimode fiber

FIGURE 3.16 RS-232 cable ends

FIGURE 3.17 A USB port

FIGURE 3.18 A USB plug

FIGURE 3.19 T568A wired standard

FIGURE 3.20 T568B wired standard

FIGURE 3.21 Straight-through Ethernet cable

FIGURE 3.22 Crossover Ethernet cable

FIGURE 3.23 An inexpensive cable tester

FIGURE 3.24 UTP gigabit crossover Ethernet cable

FIGURE 3.25 Rolled Ethernet cable

FIGURE 3.26 T1 crossover cable

FIGURE 3.27 A 110 block

Chapter 4 FIGURE 4.1 The basic network

FIGURE 4.2 CSMA/CD

FIGURE 4.3 Shorter and longer wavelengths

FIGURE 4.4 Manually adding the speed and duplex type

FIGURE 4.5 Ethernet addressing using MAC addresses

FIGURE 4.6 802.3 and Ethernet frame formats in bytes

FIGURE 4.7 Ethernet Physical layer specifications

FIGURE 4.8 Powerline adapter sets

FIGURE 4.9 Basic BPL installation

FIGURE 4.10 Ethernet over HDMI

Chapter 5 FIGURE 5.1 Network interface card

FIGURE 5.2 A typical hub

FIGURE 5.3 Bridges break up collision domains.

FIGURE 5.4 Typical Ethernet switch

FIGURE 5.5 Router connected to the Internet, providing access for hosts

FIGURE 5.6 Example of firewalls with a screened subnet or DMZ

FIGURE 5.7 Example of an AP in a network

FIGURE 5.8 DHCP client sends broadcasts looking for a DHCP server.

FIGURE 5.9 A Windows DHCP server's scope options

FIGURE 5.10 DHCP client request to a DHCP server

FIGURE 5.11 DHCP client parameter request list

FIGURE 5.12 DHCP server response

FIGURE 5.13 Configuring a DHCP relay

FIGURE 5.14 DNS resolution example

FIGURE 5.15 A Windows DNS server

FIGURE 5.16 A DNS query to www.lammle.com

FIGURE 5.17 The DNS answer to our query

FIGURE 5.18 Internal and external DNS

FIGURE 5.19 A proxy server

FIGURE 5.20 Encryption appliances

FIGURE 5.21 Content filtering appliance

FIGURE 5.22 Analog modem

FIGURE 5.23 Packet shaper

FIGURE 5.24 VPN headend

FIGURE 5.25 Media converter

FIGURE 5.26 A switch can replace the hub, breaking up collision domains.

FIGURE 5.27 Routers create an internetwork.

FIGURE 5.28 Internetworking devices

FIGURE 5.29 Switched networks creating an internetwork

FIGURE 5.30 A router in an internetwork

FIGURE 5.31 A switch in an internetwork

FIGURE 5.32 A hub in a network

Chapter 6 FIGURE 6.1 The DoD and OSI models

FIGURE 6.2 The TCP/IP protocol suite

FIGURE 6.3 File Transfer Protocol

FIGURE 6.4 SSH

FIGURE 6.5 Telnet

FIGURE 6.6 Domain Name Service

FIGURE 6.7 DHCP client four-step process

FIGURE 6.8 Trivial FTP

FIGURE 6.9 HTTP

FIGURE 6.10 Network Time Protocol

FIGURE 6.11 Network Management Station

FIGURE 6.12 TCP segment format

FIGURE 6.13 UDP segment

FIGURE 6.14 Port numbers for TCP and UDP

FIGURE 6.15 IPv4 header

FIGURE 6.16 The Protocol field in an IP header

FIGURE 6.17 ICMP error message is sent to the sending host from the remote r…

FIGURE 6.18 Local ARP broadcast

FIGURE 6.19 RARP broadcast example

FIGURE 6.20 Generic Routing Encapsulation (GRE) tunnel structure

FIGURE 6.21 Data encapsulation

FIGURE 6.22 PDU and layer addressing

FIGURE 6.23 Port numbers at the Transport layer

Chapter 7 FIGURE 7.1 Summary of the three classes of networks

FIGURE 7.2 IPv6 address example

FIGURE 7.3 EUI-64 interface ID assignment

FIGURE 7.4 A 6to4 tunnel

Chapter 8 FIGURE 8.1 Implementing a Class C /25 logical network

FIGURE 8.2 Implementing a Class C /26 logical network

FIGURE 8.3 Basic IP troubleshooting

FIGURE 8.4 IP address problem 1

FIGURE 8.5 IP address problem 2

FIGURE 8.6 Find the valid host.

FIGURE 8.7 Find the valid host

  1. 2.

FIGURE 8.8 Find the valid host address

  1. 3.

FIGURE 8.9 Find the valid subnet mask.

FIGURE 8.10 Where to configure NAT

FIGURE 8.11 Basic NAT translation

FIGURE 8.12 NAT overloading example (PAT)

Chapter 9 FIGURE 9.1 A simple routing example

FIGURE 9.2 IP routing example using two hosts and one router

FIGURE 9.3 Frame used from Host_A to the Lab_A router when Host_B is pinged…

FIGURE 9.4 IP routing example 1

FIGURE 9.5 IP routing example 2

FIGURE 9.6 Routing options

FIGURE 9.7 Dynamic routing options

FIGURE 9.8 DV and LS routing protocols

FIGURE 9.9 Hybrid routing

Chapter 10 FIGURE 10.1 Routing flow tree

FIGURE 10.2 The internetwork with distance-vector routing

FIGURE 10.3 Converged routing tables

FIGURE 10.4 Typical classful network

FIGURE 10.5 Classless network design

FIGURE 10.6 A discontiguous network

FIGURE 10.7 EIGRP tables

FIGURE 10.8 Border Gateway Protocol (BGP)

FIGURE 10.9 OSPF design example

FIGURE 10.10 IS-IS network terminology

FIGURE 10.11 FHRPs use a virtual router with a virtual IP address and virtua…

FIGURE 10.12 HSRP active and standby routers

FIGURE 10.13 Example of HSRP active and standby routers swapping interfaces…

FIGURE 10.14 HSRP Hellos

FIGURE 10.15 First two steps to IPv6 autoconfiguration

FIGURE 10.16 IPv6 autoconfiguration example

FIGURE 10.17 IPv6 neighbor discovery: neighbor solicitation message

Chapter 11 FIGURE 11.1 A network before switching

FIGURE 11.2 The first switched LAN

FIGURE 11.3 The typical switched network design

FIGURE 11.4 Switches create private domains.

FIGURE 11.5 Empty forward/filter table on a switch

FIGURE 11.6 How switches learn hosts' locations

FIGURE 11.7 Forward/filter table

FIGURE 11.8 Broadcast storm

FIGURE 11.9 Multiple frame copies

FIGURE 11.10 Distributed switching

FIGURE 11.11 A switched network with switching loops

FIGURE 11.12 An optimal hierarchical switch design

FIGURE 11.13 Flat network structure

FIGURE 11.14 The benefit of a switched network

FIGURE 11.15 Physical LANs connected to a router

FIGURE 11.16 Switches removing the physical boundary

FIGURE 11.17 Access and trunk links in a switched network

FIGURE 11.18 IEEE 802.1Q encapsulation with and without the 802.1Q tag

FIGURE 11.19 VTP modes

FIGURE 11.20 Port security on a switch port restricts port access by MAC add

FIGURE 11.21 Flood guard process

FIGURE 11.22 Before and after port channels

FIGURE 11.23 Switched Ethernet ports can provide power to devices.

FIGURE 11.24 An external power injector used for PoE

FIGURE 11.25 Wireless bridge power injector

FIGURE 11.26 Switches send frames out the destination port only.

FIGURE 11.27 Place a hub between two hosts to troubleshoot.

FIGURE 11.28 Port spanning/mirroring

Chapter 12 FIGURE 12.1 Unlicensed frequencies

FIGURE 12.2 Wireless LAN history

FIGURE 12.3 802.11b CSMA/CA

FIGURE 12.4 ISM 2.4 GHz channels

FIGURE 12.5 U-NII 5 GHz band has 12 non-overlapping channels (US)

FIGURE 12.6 Comparing WiFi 5 to WiFi 6

FIGURE 12.7 Current standards for spectrums and speeds

FIGURE 12.8 A wireless access point

FIGURE 12.9 A wireless NIC

FIGURE 12.10 A wireless network in ad hoc mode

FIGURE 12.11 A wireless network in infrastructure mode

FIGURE 12.12 Extended service set (ESS)

FIGURE 12.13 Stand-alone and controller-based wireless networks

FIGURE 12.14 LWAPP

FIGURE 12.15 Mobile hot spot

FIGURE 12.16 iPhone hot spot

FIGURE 12.17 Basic coverage

FIGURE 12.18 Enterprise design

FIGURE 12.19 A multifloor installation

FIGURE 12.20 A heat map of a building

FIGURE 12.21 RADIUS authentication server

Chapter 13 FIGURE 13.1 SNMP GET and TRAP messages

FIGURE 13.2 Event Viewer security log

FIGURE 13.3 Syslog server and client

FIGURE 13.4 Event log properties

FIGURE 13.5 Speed and duplex

FIGURE 13.6 Automatic shutdown

FIGURE 13.7 Checking battery level

FIGURE 13.8 Maintenance bypass

FIGURE 13.9 Multiple circuits

FIGURE 13.10 Flooding

FIGURE 13.11 NetFlow

Chapter 14 FIGURE 14.1 A common DMZ configuration

FIGURE 14.2 Simple network physical diagram

FIGURE 14.3 Network diagram with firewalls from SmartDraw

FIGURE 14.4 Hardware-rack diagram from SmartDraw

FIGURE 14.5 MDF and IDFs

FIGURE 14.6 Logical network diagram

Chapter 15 FIGURE 15.1 Multipathing

FIGURE 15.2 Static teaming

FIGURE 15.3 Switch independent setup

FIGURE 15.4 Switch stacking

FIGURE 15.5 Switch cluster

FIGURE 15.6 FHRPs use a virtual router with a virtual IP address and virtual

FIGURE 15.7 Rack-mounted PDU

FIGURE 15.8 Cloud recovery site

FIGURE 15.9 Path redundancy

FIGURE 15.10 ISP redundancy

FIGURE 15.11 Path and ISP redundancy

FIGURE 15.12 HSRP active and standby routers

FIGURE 15.13 HSRP active and standby routers

FIGURE 15.14 HSRP active and standby routers

Chapter 16 FIGURE 16.1 Screened subnet

FIGURE 16.2 TACACS+ login and logout sequence

FIGURE 16.3 Kerberos authentication

FIGURE 16.4 802.1X

FIGURE 16.5 Nessus

Chapter 17 FIGURE 17.1 Botnet

FIGURE 17.2 Smurf attack

FIGURE 17.3 SYN flood

FIGURE 17.4 DNS amplification attack

FIGURE 17.5 On-path attack

FIGURE 17.6 VLAN hopping

FIGURE 17.7 Rogue DHCP

FIGURE 17.8 An email virus spreading rapidly

FIGURE 17.9 Botnet

Chapter 18 FIGURE 18.1 RA Guard

FIGURE 18.2 Password Policy settings

FIGURE 18.3 Two networks with an ACL-enabled router

FIGURE 18.4 RBAC

FIGURE 18.5 Isolation

FIGURE 18.6 Guest network

Chapter 19 FIGURE 19.1 Site-to-site and client-to-site VPN

FIGURE 19.2 Clientless VPN

FIGURE 19.3 Split and full tunnel

FIGURE 19.4 ILO port

Chapter 20 FIGURE 20.1 Open case warning in the BIOS

FIGURE 20.2 Locking cabinet

FIGURE 20.3 Access Control Vestibule/Mantrap

Chapter 21 FIGURE 21.1 Data center three-tier architecture

FIGURE 21.2 Spine-leaf fabric architecture

FIGURE 21.3 Top-of-rack switching

FIGURE 21.4 North-South data flow

FIGURE 21.5 East-West data flow in a data center

FIGURE 21.6 Cloud computing is on demand.

FIGURE 21.7 Advantages of cloud computing

FIGURE 21.8 Cloud computing services

FIGURE 21.9 The SDN architecture

FIGURE 21.10 Southbound interfaces

FIGURE 21.11 Northbound interfaces

FIGURE 21.12 RJ-45 connector

FIGURE 21.13 Two ends of a crossover cable

FIGURE 21.14 Rack-mounted switches

FIGURE 21.15 Hot and cold aisles

FIGURE 21.16 Backup types

FIGURE 21.17 Guests and hosts

FIGURE 21.18 Hypervisors

FIGURE 21.19 Virtualization

FIGURE 21.20 Classic SAN vs. iSCSI

FIGURE 21.21 NAS and SAN

FIGURE 21.22 MDF and IDFs

FIGURE 21.23 Cable trays

FIGURE 21.24 Two-post racks

FIGURE 21.25 Four-post rack

FIGURE 21.26 Freestanding rack

Chapter 22 FIGURE 22.1 SNMP GET and TRAP messages

FIGURE 22.2 Syslog server and client

Chapter 23 FIGURE 23.1 An inexpensive cable tester

FIGURE 23.2 Ethernet loopback plug

FIGURE 23.3 Fiber loopback plug

FIGURE 23.4 Sample OTDR output

FIGURE 23.5 A multimeter

FIGURE 23.6 Spectrum analyzer output

FIGURE 23.7 A toner probe

FIGURE 23.8 A butt set

FIGURE 23.9 An example of a punch-down tool

FIGURE 23.10 Using a punch-down tool on a small keystone connector

FIGURE 23.11 A combination cable stripper, crimper, and snippers

Chapter 24 FIGURE 24.1 Cannot connect

FIGURE 24.2 Host could not be found.

FIGURE 24.3 Successful ping

FIGURE 24.4 Rogue DHCP

FIGURE 24.5 Certificate error

FIGURE 24.6 Netstat -a output

FIGURE 24.7 Service dependencies

FIGURE 24.8 Output from ipconfig /all

FIGURE 24.9 Manage Network Connections

FIGURE 24.10 Interface properties

FIGURE 24.11 IP properties

FIGURE 24.12 Obtain DNS Server Address Automatically

FIGURE 24.13 ipconfig /all output

Chapter 25 FIGURE 25.1 DHCP capture

FIGURE 25.2 Throughput

FIGURE 25.3 LogMeIn session window

FIGURE 25.4 Elevating your command prompt

FIGURE 25.5 TCP flags

FIGURE 25.6 route print output

FIGURE 25.7 Sample output of the nbtstat –a command

FIGURE 25.8 Sample output of the nbtstat –c command

FIGURE 25.9 Sample output of the nbtstat –n command

FIGURE 25.10 Sample output of the nbtstat –r command

FIGURE 25.11 Sample output of the nbtstat –S command

FIGURE 25.12 Sample output of the nbtstat –s command

FIGURE 25.13 Sample output of the netstat –a command

FIGURE 25.14 The Telnet utility

Fair Use Sources

Networking: TCP/IP, Internet protocols, K8S networking-K8S nets-K8S net, Container net,

Cloud networking-Cloud nets (AWS net, Azure net, GCP net, IBM net, Oracle net)

Oracle networking-Oracle nets-Oracle net-Oracle network-Oracle networks, Oracle Cloud networking-Oracle Cloud nets-Oracle Cloud net-Oracle Cloud network-Oracle Cloud networks,

Docker networking-Docker nets-Docker net-Docker network-Docker networks,

Podman networking-Podman nets-Podman net-Podman network-Podman networks,

OpenShift networking-OpenShift nets-OpenShift net-OpenShift network-OpenShift networks,

IBM mainframe networking-IBM mainframe nets-IBM mainframe net-IBM mainframe network-IBM mainframe networks,

IP networking-IP nets-IP net-IP network-IP networks, TCP/IP networking-TCP/IP nets-TCP/IP net-TCP/IP network-TCP/IP networks,

OS networking-OS nets-OS net-OS network-OS networks, Operating system networking-Operating system nets-Operating system net-Operating system network-Operating system networks,

Linux networking-Linux nets-Linux net-Linux network-Linux networks,

UNIX networking-UNIX nets-UNIX net-UNIX network-UNIX networks,

RHEL networking-RHEL nets-RHEL net-RHEL network-RHEL networks,

Fedora networking-Fedora nets-Fedora net-Fedora network-Fedora networks,

Rocky networking-Rocky nets-Rocky net-Rocky network-Rocky networks,

Debian networking-Debian nets-Debian net-Debian network-Debian networks, Ubuntu networking-Ubuntu nets-Ubuntu net-Ubuntu network-Ubuntu networks,

IBM networking-IBM nets-IBM net-IBM network-IBM networks, SNA networking-SNA nets-SNA net-SNA network-SNA networks,

Ansible networking-Ansible nets-Ansible net-Ansible network-Ansible networks,

macOS networking-macOS nets-macOS net-macOS network-macOS networks, Apple networking-Apple nets-Apple net-Apple network-Apple networks,

Windows networking-Windows nets-Windows net-Windows network-Windows networks,

Microsoft networking-Microsoft nets-Microsoft net-Microsoft network-Microsoft networks,

Windows Server networking-Windows Server nets-Window Server net-Windows Server network-Windows Server networks,

Cisco networking-Cisco nets-Cisco net-Cisco network-Cisco networks,

Palo Alto networking-Palo Alto nets-Palo Alto net-Palo Alto network-Palo Alto networks,

3Com networking-3Com nets-3Com net-3Com network-3Com networks, Novell networking-Novell nets-Novell net-Novell network-Novell networks, NetWare networking-NetWare nets-NetWare net-NetWare network-NetWare networks, Novell NetWare networking-Novell NetWare nets-Novell NetWare net-Novell NetWare network-Novell NetWare networks,

Networking by Programming Languages

Cisco: Cisco Networking, Cisco DevOps - Cisco SRE, Cisco Cloud Native - Cisco and Kubernetes, Cisco Cloud - Cisco Data Centers, Cisco GitHub - Cisco Open Source (), Cisco Development Tools (), Cisco Programming Languages (), Cisco APIs, Cisco and Concurrent Parallel Programming (), Cisco and Functional Programming (), Cisco and Microservices, Cisco Security - Cisco Security Breaches, Cisco Research, Cisco Data Science - Cisco DataOps - Cisco Databases, Cisco Artificial Intelligence (Cisco ML - Cisco MLOps, Cisco DL, Cisco AR - Cisco VR), Cisco IoT, Cisco Products - Cisco Services (), Cisco Operating Systems (), Cisco Software (), Cisco Hardware - Cisco Devices (), Cisco Support (), Cisco Media (), Cisco Communication (), Cisco Concepts (), Cisco acronyms (), Cisco Founders (), Cisco People (), Cisco Outline, Cisco History, Cisco Timeline, Cisco Subsidiaries (), Cisco Privacy (), Cisco Censorship (), Cisco Criticism (), Cisco Bibliography, Cisco Courses, Cisco Certification (CCNA, CCNP, CCNE), Cisco Glossary, Cisco Topics, Cisco Blog, Cisco Awesome List, Big Tech. (navbar_cisco, navbar_networking)



Cloud Monk is Retired (for now). Buddha with you. © 2005 - 2024 Losang Jinpa or Fair Use. Disclaimers

SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.


comptia_network_study_guide_by_todd_lammle_table_of_contents.txt · Last modified: 2023/08/27 20:20 by 127.0.0.1