Network+ Guide to Networks 8th Edition Chapter 2 Review Questions

Network+ Guide to Networks, Eighth Edition

By Jill West, Jean Andrews and Tamara Dean

Network+ Guide to Networks 8th Edition

Tabular array of Contents:

PREFACE ………………………………………………………………………………….. xv

Affiliate ane

Introduction to Networking  ..i

Network Models ………………………………………………………………………………………2

Peer-to-Peer Network Model …………………………………………………………………..iii

Client-Server Network Model ………………………………………………………………… six

Client-Server Applications …………………………………………………………………………..eight

Network Hardware ……………………………………………………………………………………12

LANs and Their Hardware ……………………………………………………………………. 12

MANs and WANs …………………………………………………………………………………19

The Seven-Layer OSI Model ………………………………………………………………………21

Layer seven: Awarding Layer …………………………………………………………………….23

Layer 6: Presentation Layer …………………………………………………………………..23

Layer v: Session Layer …………………………………………………………………………..24

Layer 4: Transport Layer ……………………………………………………………………….24

Layer 3: Network Layer …………………………………………………………………………25

Layer two: Data Link Layer ………………………………………………………………………..25

Layer 1: Physical Layer ………………………………………………………………………….26

Protocol Information Unit or PDU …………………………………………………………………….26

Summary of How the Layers Work Together …………………………………………..27

Safe Procedures and Policies …………………………………………………………………29

Emergency Procedures …………………………………………………………………………29

Safety Precautions ……………………………………………………………………………….32

Troubleshooting Network Issues …………………………………………………………33

Affiliate Summary …………………………………………………………………………………….38

Primal Terms ………………………………………………………………………………………………….40

Review Questions ……………………………………………………………………………………..41

Hands-On Projects …………………………………………………………………………………….43

CHAPTER 2

Network Infrastructure and Documentation  53

Components of Structured Cabling …………………………………………………………..54

From the Demarc to a Workstation ………………………………………………………..55

Cabling ……………………………………………………………………………………………….64

Monitoring the Surround and Security ……………………………………………..69

Network Documentation …………………………………………………………………………. 71

Network Diagrams ………………………………………………………………………………..71

Operating Procedures ………………………………………………………………………….. 79

Inventory Management ……………………………………………………………………….. 82

Labeling and Naming Conventions ……………………………………………………….. 82

Business Documents …………………………………………………………………………… 85

Change Direction ……………………………………………………………………………….. 86

Software and Hardware Changes ………………………………………………………….. 87

Change Management Documentation ……………………………………………………xc

Chapter Summary ……………………………………………………………………………………. 92

Cardinal Terms …………………………………………………………………………………………………. 93

Review Questions …………………………………………………………………………………….. 94

Hands-On Projects ……………………………………………………………………………………. 95

Chapter 3

Addressing on Networks ……………………………………………………………..109

Addressing Overview ……………………………………………………………………………… 111

MAC Addresses ……………………………………………………………………………………….. 113

IP Addresses …………………………………………………………………………………………… 114

IPv4 Addresses …………………………………………………………………………………… 118

IPv6 Addresses ……………………………………………………………………………………126

Ports and Sockets …………………………………………………………………………………… 130

Domain Names and DNS (Domain Proper name Organisation) …………………………………. 133

Namespace Databases ………………………………………………………………………… 135

Name Servers …………………………………………………………………………………….. 135

Resources Records in a DNS Database …………………………………………………….138

DNS Server Software ……………………………………………………………………………139

Troubleshooting Address Problems ……………………………………………………….. 141

Troubleshooting Tools …………………………………………………………………………142

Common Network Problems ……………………………………………………………………. 151

Chapter Summary ………………………………………………………………………………….. 154

Fundamental Terms ……………………………………………………………………………………………….. 156

Review Questions …………………………………………………………………………………… 157

Hands-On Projects ………………………………………………………………………………….. 159

Chapter 4

Network Protocols and Routing ……………………………………………….171

TCP/IP Core Protocols …………………………………………………………………………….. 172

TCP (Transmission Command Protocol) ……………………………………………………. 174

UDP (User Datagram Protocol) ……………………………………………………………… 181

IP (Internet Protocol) ……………………………………………………………………………182

ICMP (Net Control Message Protocol) ……………………………………………..188

ARP (Address Resolution Protocol) on IPv4 Networks ……………………………. 190

Ethernet …………………………………………………………………………………………… 190

Routers and How They Work ………………………………………………………………….. 195

Multilayer Switches …………………………………………………………………………….198

Routing Tables ……………………………………………………………………………………198

Routing Path Types ……………………………………………………………………………..201

The route Command ………………………………………………………………………….201

Routing Metrics …………………………………………………………………………………..201

Routing Protocols to Make up one's mind Best Paths ………………………………………….. 202

Interior and Exterior Gateway Protocols ………………………………………………. 203

Troubleshooting Route Issues ………………………………………………………………… 206

Troubleshooting Tools ……………………………………………………………………….. 207

Solving Mutual Routing Problems …………………………………………………….. 213

Chapter Summary ………………………………………………………………………………….. 216

Key Terms ……………………………………………………………………………………………….. 217

Review Questions …………………………………………………………………………………… 218

Hands-On Projects ………………………………………………………………………………….. 219

CHAPTER 5

Network Cabling ……………………………………………………………………………..233

Manual Basics ……………………………………………………………………………….. 234

Throughput and Bandwidth …………………………………………………………………235

Transmission Flaws …………………………………………………………………………… 236

Duplex, Half-Duplex, and Simplex ……………………………………………………… 238

Multiplexing ……………………………………………………………………………………… 239

Copper Cable ………………………………………………………………………………………….. 241

Twisted-Pair Cable …………………………………………………………………………….. 244

STP (Shielded Twisted Pair) ………………………………………………………………… 247

UTP (Unshielded Twisted Pair) ……………………………………………………………. 248

Comparing STP and UTP …………………………………………………………………….. 249

Cable Pinouts ……………………………………………………………………………………. 249

PoE (Ability over Ethernet) ………………………………………………………………….. 259

Ethernet Standards for Twisted-Pair Cable …………………………………………….261

Fiber-Optic Cable ……………………………………………………………………………………. 263

SMF (Single Way Fiber) …………………………………………………………………….. 265

MMF (Multimode Cobweb) …………………………………………………………………….. 266

Fiber Connectors ……………………………………………………………………………….. 267

Media Converters ………………………………………………………………………………. 269

Cobweb Transceivers ……………………………………………………………………………… 270

Ethernet Standards for Cobweb-Optic Cable ………………………………………………274

Common Cobweb Cablevision Problems …………………………………………………………… 276

Troubleshooting Tools ……………………………………………………………………………. 276

Toner and Probe Kit …………………………………………………………………………….277

Multimeter ……………………………………………………………………………………….. 279

Cablevision Continuity Tester ………………………………………………………………………280

Cablevision Performance Tester …………………………………………………………………….281

OPM (Optical Power Meter) ………………………………………………………………… 282

Affiliate Summary ………………………………………………………………………………….. 283

Key Terms ……………………………………………………………………………………………….. 285

Review Questions …………………………………………………………………………………… 286

Hands-On Projects ………………………………………………………………………………….. 288

CHAPTER half-dozen

Wireless Networking ……………………………………………………………………..303

Characteristics of Wireless Transmissions ……………………………………………… 304

The Wireless Spectrum ………………………………………………………………………. 305

Channel Management ………………………………………………………………………..306

Antennas ………………………………………………………………………………………….. 307

Indicate Propagation ……………………………………………………………………………..309

Wireless Standards for the IoT (Cyberspace of Things) ……………………………….. 312

ZigBee ……………………………………………………………………………………………….. 313

Z-Wave ………………………………………………………………………………………………314

Bluetooth ………………………………………………………………………………………….. 315

ANT1 ………………………………………………………………………………………………..316

RFID (Radio Frequency Identification) …………………………………………………..318

NFC (Almost-Field Communication) ……………………………………………………….. 320

Wireless USB ……………………………………………………………………………………… 321

IR (Infrared) ……………………………………………………………………………………….. 321

802.eleven WLAN Standards …………………………………………………………………………. 323

Access Method ……………………………………………………………………………………325

Association ………………………………………………………………………………………..327

IEEE 802.11 Frames …………………………………………………………………………….. 330

802.11 Innovations ……………………………………………………………………………… 331

Implementing a Wi-Fi Network ………………………………………………………………. 335

Wireless Topologies …………………………………………………………………………….335

Determine the Pattern ………………………………………………………………………… 339

Configure Wi-Fi Connectivity Devices …………………………………………………. 343

Configure Wi-Fi Clients ……………………………………………………………………… 344

Wi-Fi Network Security …………………………………………………………………………… 346

WPA/WPA2 (Wi-Fi Protected Access) …………………………………………………… 348

Security Threats to Wi-Fi Networks …………………………………………………….. 348

Troubleshooting Wi-Fi Networks ……………………………………………………………. 350

Wi-Fi Network Tools …………………………………………………………………………… 351

Avoid Pitfalls …………………………………………………………………………………….. 354

Affiliate Summary ………………………………………………………………………………….. 358

Fundamental Terms ……………………………………………………………………………………………….. 360

Review Questions …………………………………………………………………………………… 361

Hands-On Projects ………………………………………………………………………………….. 362

Affiliate 7

Virtualization and Cloud Computing ………………………………………371

Virtualization ………………………………………………………………………………………….. 373

Network Connection Types ………………………………………………………………… 376

Pros and Cons of Virtualization …………………………………………………………… 383

NFV (Network Functions Virtualization) ………………………………………………. 385

SDN (Software-Defined Networking) …………………………………………………… 386

Cloud Computing ……………………………………………………………………………………. 389

Cloud Computing Categories ………………………………………………………………..391

Deployment Models ………………………………………………………………………….. 394

Cloud Connectivity and Security …………………………………………………………. 395

Encryption Protocols ………………………………………………………………………………. 396

Primal Encryption …………………………………………………………………………………. 397

IPsec (Internet Protocol Security) ………………………………………………………… 399

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) ……………… 400

Remote Access ……………………………………………………………………………………….. 403

Point-to-Indicate Remote Access Protocols ………………………………………………405

Last Emulation ……………………………………………………………………………406

VPNs (Virtual Private Networks) …………………………………………………………..412

VPN Tunneling Protocols ……………………………………………………………………. 416

Remote Access Policies ………………………………………………………………………..418

Chapter Summary ………………………………………………………………………………….. 418

Cardinal Terms ……………………………………………………………………………………………….. 421

Review Questions …………………………………………………………………………………… 422

Hands-On Projects ………………………………………………………………………………….. 423

Chapter viii

Subnets and VLANs ………………………………………………………………………..435

Network Division ………………………………………………………………………….. 436

Subnets …………………………………………………………………………………………………… 438

How Subnet Masks Work ……………………………………………………………………440

CIDR (Classless Interdomain Routing) ………………………………………………….444

IPv4 Subnet Calculations …………………………………………………………………….444

Subnet Mask Tables ……………………………………………………………………………450

Subnetting Questions on Exams …………………………………………………………. 452

Implement Subnets …………………………………………………………………………… 455

VLSM (Variable Length Subnet Mask) ………………………………………………….. 457

Subnets in IPv6 ………………………………………………………………………………….460

VLANs (Virtual Local Area Networks) ……………………………………………………… 462

Managed Switches ……………………………………………………………………………..464

Switch Ports and Trunks …………………………………………………………………….. 467

VLANs and Subnets ……………………………………………………………………………469

Types of VLANs …………………………………………………………………………………470

View Configured VLANs ………………………………………………………………………471

Troubleshoot and Secure VLANs …………………………………………………………. 473

Chapter Summary ………………………………………………………………………………….. 474

Key Terms ……………………………………………………………………………………………….. 475

Review Questions …………………………………………………………………………………… 476

Hands-On Projects ………………………………………………………………………………….. 477

Affiliate ix

Network Chance Management ………………………………………………………..497

Security Risks …………………………………………………………………………………………. 499

People Risks ……………………………………………………………………………………… 501

Technology Risks ………………………………………………………………………………. 503

Malware Risks ……………………………………………………………………………………508

Security Assessment ………………………………………………………………………………. 511

Scanning Tools …………………………………………………………………………………… 512

Honeypots and Honeynets …………………………………………………………………..514

Concrete Security …………………………………………………………………………………….. 515

Prevention Methods …………………………………………………………………………… 515

Detection Methods ……………………………………………………………………………..518

Device Hardening …………………………………………………………………………………… 520

Updates and Security Patches ………………………………………………………………521

Administrative Credentials …………………………………………………………………..523

Services and Protocols …………………………………………………………………………525

Hashing ……………………………………………………………………………………………. 526

Anti-Malware Software ……………………………………………………………………… 528

Security Policies for Users ………………………………………………………………………. 529

Security Policy Goals …………………………………………………………………………. 530

BYOD (Bring Your Ain Device) ……………………………………………………………. 531

AUP (Acceptable Use Policy) …………………………………………………………………532

NDA (Non-Disclosure Agreement) ………………………………………………………..533

Password Policy ………………………………………………………………………………… 534

Privileged User Agreement …………………………………………………………………..537

Anti-Malware Policy ………………………………………………………………………….. 538

Chapter Summary ………………………………………………………………………………….. 539

Key Terms ……………………………………………………………………………………………….. 541

Review Questions …………………………………………………………………………………… 541

Hands-On Projects ………………………………………………………………………………….. 543

Affiliate 10

Security in Network Design ………………………………………………………..553

Network Security Devices ………………………………………………………………………. 554

Proxy Servers ……………………………………………………………………………………..555

ACLs (Access Control Lists) on Network Devices …………………………………….557

Firewalls …………………………………………………………………………………………… 559

IDS (Intrusion Detection Organisation) ………………………………………………………… 566

IPS (Intrusion Prevention Arrangement) ………………………………………………………. 568

SIEM (Security Information and Event Direction) …………………………… 569

Switch Management ………………………………………………………………………………. 570

Switch Path Management …………………………………………………………………….571

Switch Port Security …………………………………………………………………………….574

AAA (Authentication, Authorization, and Bookkeeping) …………………………… 575

Authentication ………………………………………………………………………………….. 576

Potency …………………………………………………………………………………….580

Accounting ……………………………………………………………………………………….. 582

NAC (Network Admission Control) Solutions ……………………………………………… 583

Access Control Technologies ………………………………………………………………….. 584

Directory Services ……………………………………………………………………………… 584

Kerberos …………………………………………………………………………………………… 586

SSO (Unmarried Sign-On) ………………………………………………………………………….590

RADIUS (Remote Hallmark Dial-In User Service) ……………………………591

TACACS1 (Concluding Access Controller Access Control System Plus) ……….. 592

Wireless Network Security ……………………………………………………………………… 592

WPA (Wi-Fi Protected Access) …………………………………………………………….. 593

WPA2 (Wi-Fi Protected Access, Version ii) …………………………………………….. 593

Personal and Enterprise …………………………………………………………………….. 594

Chapter Summary ………………………………………………………………………………….. 599

Key Terms ……………………………………………………………………………………………….. 601

Review Questions …………………………………………………………………………………… 602

Hands-On Projects ………………………………………………………………………………….. 604

CHAPTER 11

Network Performance and Recovery ……………………………………..615

Collecting Network Data ………………………………………………………………………… 617

Monitoring Tools ………………………………………………………………………………..617

System and Outcome Logs ………………………………………………………………………. 622

SNMP Logs ……………………………………………………………………………………….. 625

Performance Baselines ………………………………………………………………………. 629

Managing Network Traffic ……………………………………………………………………… 631

Traffic Direction …………………………………………………………………………….631

QoS (Quality of Service) Assurance ……………………………………………………… 633

Network Availability ……………………………………………………………………………….. 635

Fault Tolerance …………………………………………………………………………………. 637

Data Backup and Storage ……………………………………………………………………. 645

Ability Direction …………………………………………………………………………… 653

Response and Recovery …………………………………………………………………………. 659

Incident Response Policies ………………………………………………………………….660

Disaster Recovery Planning ………………………………………………………………… 661

Disaster Recovery Contingencies ………………………………………………………… 662

Information Preservation ……………………………………………………………………………… 663

Chapter Summary ………………………………………………………………………………….. 665

Key Terms ……………………………………………………………………………………………….. 667

Review Questions …………………………………………………………………………………… 668

Hands-On Projects ………………………………………………………………………………….. 669

CHAPTER 12

Broad Area Networks ……………………………………………………………………..677

WAN Essentials ……………………………………………………………………………………….. 679

Data Transfer Methods ……………………………………………………………………….680

Troubleshooting an Net Connection ………………………………………………684

Layer 1 WAN Technologies ……………………………………………………………… 686

PSTN (Public Switched Phone Network) ………………………………………….689

DSL (Digital Subscriber Line) ……………………………………………………………….694

Cable Broadband ………………………………………………………………………………..698

Metro (Metropolitan) Ethernet ……………………………………………………………..701

T-Carriers …………………………………………………………………………………………. 702

SONET (Synchronous Optical Network) ………………………………………………..706

Layer ii WAN Technologies ……………………………………………………………………… 709

Frame Relay ……………………………………………………………………………………… 710

ATM (Asynchronous Transfer Manner) ……………………………………………………. 711

MPLS (Multiprotocol Label Switching) …………………………………………………..712

Wireless WANs ………………………………………………………………………………………… 714

Cellular ………………………………………………………………………………………………714

Satellite …………………………………………………………………………………………….. 717

Chapter Summary ………………………………………………………………………………….. 720

Key Terms ……………………………………………………………………………………………….. 722

Review Questions …………………………………………………………………………………… 723

Hands-On Projects ………………………………………………………………………………….. 724

appendix a

CompTIA Network1 N10-007 Certification Exam Objectives………………………… 735

appendix b

Visual Guide to Connectors  753

appendix c

CompTIA Network1 Practice Exam  757

GLOSSARY ………………………………………………………………………………………………781

Index ………………………………………………………………………………………………………817

This volume is United states$10. Order for this book:
(Request for free sample pages click on "Social club At present" button)

Book Order

mooredoormemas1941.blogspot.com

Source: https://www.textileebook.com/2021/09/network-guide-8th-edition.html

Belum ada Komentar untuk "Network+ Guide to Networks 8th Edition Chapter 2 Review Questions"

Posting Komentar

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel