Network+ Guide to Networks 8th Edition Chapter 2 Review Questions
Network+ Guide to Networks, Eighth Edition
By Jill West, Jean Andrews and Tamara Dean
Tabular array of Contents:
PREFACE ………………………………………………………………………………….. xv
Affiliate ane
Introduction to Networking ..i
Network Models ………………………………………………………………………………………2
Peer-to-Peer Network Model …………………………………………………………………..iii
Client-Server Network Model ………………………………………………………………… six
Client-Server Applications …………………………………………………………………………..eight
Network Hardware ……………………………………………………………………………………12
LANs and Their Hardware ……………………………………………………………………. 12
MANs and WANs …………………………………………………………………………………19
The Seven-Layer OSI Model ………………………………………………………………………21
Layer seven: Awarding Layer …………………………………………………………………….23
Layer 6: Presentation Layer …………………………………………………………………..23
Layer v: Session Layer …………………………………………………………………………..24
Layer 4: Transport Layer ……………………………………………………………………….24
Layer 3: Network Layer …………………………………………………………………………25
Layer two: Data Link Layer ………………………………………………………………………..25
Layer 1: Physical Layer ………………………………………………………………………….26
Protocol Information Unit or PDU …………………………………………………………………….26
Summary of How the Layers Work Together …………………………………………..27
Safe Procedures and Policies …………………………………………………………………29
Emergency Procedures …………………………………………………………………………29
Safety Precautions ……………………………………………………………………………….32
Troubleshooting Network Issues …………………………………………………………33
Affiliate Summary …………………………………………………………………………………….38
Primal Terms ………………………………………………………………………………………………….40
Review Questions ……………………………………………………………………………………..41
Hands-On Projects …………………………………………………………………………………….43
CHAPTER 2
Network Infrastructure and Documentation 53
Components of Structured Cabling …………………………………………………………..54
From the Demarc to a Workstation ………………………………………………………..55
Cabling ……………………………………………………………………………………………….64
Monitoring the Surround and Security ……………………………………………..69
Network Documentation …………………………………………………………………………. 71
Network Diagrams ………………………………………………………………………………..71
Operating Procedures ………………………………………………………………………….. 79
Inventory Management ……………………………………………………………………….. 82
Labeling and Naming Conventions ……………………………………………………….. 82
Business Documents …………………………………………………………………………… 85
Change Direction ……………………………………………………………………………….. 86
Software and Hardware Changes ………………………………………………………….. 87
Change Management Documentation ……………………………………………………xc
Chapter Summary ……………………………………………………………………………………. 92
Cardinal Terms …………………………………………………………………………………………………. 93
Review Questions …………………………………………………………………………………….. 94
Hands-On Projects ……………………………………………………………………………………. 95
Chapter 3
Addressing on Networks ……………………………………………………………..109
Addressing Overview ……………………………………………………………………………… 111
MAC Addresses ……………………………………………………………………………………….. 113
IP Addresses …………………………………………………………………………………………… 114
IPv4 Addresses …………………………………………………………………………………… 118
IPv6 Addresses ……………………………………………………………………………………126
Ports and Sockets …………………………………………………………………………………… 130
Domain Names and DNS (Domain Proper name Organisation) …………………………………. 133
Namespace Databases ………………………………………………………………………… 135
Name Servers …………………………………………………………………………………….. 135
Resources Records in a DNS Database …………………………………………………….138
DNS Server Software ……………………………………………………………………………139
Troubleshooting Address Problems ……………………………………………………….. 141
Troubleshooting Tools …………………………………………………………………………142
Common Network Problems ……………………………………………………………………. 151
Chapter Summary ………………………………………………………………………………….. 154
Fundamental Terms ……………………………………………………………………………………………….. 156
Review Questions …………………………………………………………………………………… 157
Hands-On Projects ………………………………………………………………………………….. 159
Chapter 4
Network Protocols and Routing ……………………………………………….171
TCP/IP Core Protocols …………………………………………………………………………….. 172
TCP (Transmission Command Protocol) ……………………………………………………. 174
UDP (User Datagram Protocol) ……………………………………………………………… 181
IP (Internet Protocol) ……………………………………………………………………………182
ICMP (Net Control Message Protocol) ……………………………………………..188
ARP (Address Resolution Protocol) on IPv4 Networks ……………………………. 190
Ethernet …………………………………………………………………………………………… 190
Routers and How They Work ………………………………………………………………….. 195
Multilayer Switches …………………………………………………………………………….198
Routing Tables ……………………………………………………………………………………198
Routing Path Types ……………………………………………………………………………..201
The route Command ………………………………………………………………………….201
Routing Metrics …………………………………………………………………………………..201
Routing Protocols to Make up one's mind Best Paths ………………………………………….. 202
Interior and Exterior Gateway Protocols ………………………………………………. 203
Troubleshooting Route Issues ………………………………………………………………… 206
Troubleshooting Tools ……………………………………………………………………….. 207
Solving Mutual Routing Problems …………………………………………………….. 213
Chapter Summary ………………………………………………………………………………….. 216
Key Terms ……………………………………………………………………………………………….. 217
Review Questions …………………………………………………………………………………… 218
Hands-On Projects ………………………………………………………………………………….. 219
CHAPTER 5
Network Cabling ……………………………………………………………………………..233
Manual Basics ……………………………………………………………………………….. 234
Throughput and Bandwidth …………………………………………………………………235
Transmission Flaws …………………………………………………………………………… 236
Duplex, Half-Duplex, and Simplex ……………………………………………………… 238
Multiplexing ……………………………………………………………………………………… 239
Copper Cable ………………………………………………………………………………………….. 241
Twisted-Pair Cable …………………………………………………………………………….. 244
STP (Shielded Twisted Pair) ………………………………………………………………… 247
UTP (Unshielded Twisted Pair) ……………………………………………………………. 248
Comparing STP and UTP …………………………………………………………………….. 249
Cable Pinouts ……………………………………………………………………………………. 249
PoE (Ability over Ethernet) ………………………………………………………………….. 259
Ethernet Standards for Twisted-Pair Cable …………………………………………….261
Fiber-Optic Cable ……………………………………………………………………………………. 263
SMF (Single Way Fiber) …………………………………………………………………….. 265
MMF (Multimode Cobweb) …………………………………………………………………….. 266
Fiber Connectors ……………………………………………………………………………….. 267
Media Converters ………………………………………………………………………………. 269
Cobweb Transceivers ……………………………………………………………………………… 270
Ethernet Standards for Cobweb-Optic Cable ………………………………………………274
Common Cobweb Cablevision Problems …………………………………………………………… 276
Troubleshooting Tools ……………………………………………………………………………. 276
Toner and Probe Kit …………………………………………………………………………….277
Multimeter ……………………………………………………………………………………….. 279
Cablevision Continuity Tester ………………………………………………………………………280
Cablevision Performance Tester …………………………………………………………………….281
OPM (Optical Power Meter) ………………………………………………………………… 282
Affiliate Summary ………………………………………………………………………………….. 283
Key Terms ……………………………………………………………………………………………….. 285
Review Questions …………………………………………………………………………………… 286
Hands-On Projects ………………………………………………………………………………….. 288
CHAPTER half-dozen
Wireless Networking ……………………………………………………………………..303
Characteristics of Wireless Transmissions ……………………………………………… 304
The Wireless Spectrum ………………………………………………………………………. 305
Channel Management ………………………………………………………………………..306
Antennas ………………………………………………………………………………………….. 307
Indicate Propagation ……………………………………………………………………………..309
Wireless Standards for the IoT (Cyberspace of Things) ……………………………….. 312
ZigBee ……………………………………………………………………………………………….. 313
Z-Wave ………………………………………………………………………………………………314
Bluetooth ………………………………………………………………………………………….. 315
ANT1 ………………………………………………………………………………………………..316
RFID (Radio Frequency Identification) …………………………………………………..318
NFC (Almost-Field Communication) ……………………………………………………….. 320
Wireless USB ……………………………………………………………………………………… 321
IR (Infrared) ……………………………………………………………………………………….. 321
802.eleven WLAN Standards …………………………………………………………………………. 323
Access Method ……………………………………………………………………………………325
Association ………………………………………………………………………………………..327
IEEE 802.11 Frames …………………………………………………………………………….. 330
802.11 Innovations ……………………………………………………………………………… 331
Implementing a Wi-Fi Network ………………………………………………………………. 335
Wireless Topologies …………………………………………………………………………….335
Determine the Pattern ………………………………………………………………………… 339
Configure Wi-Fi Connectivity Devices …………………………………………………. 343
Configure Wi-Fi Clients ……………………………………………………………………… 344
Wi-Fi Network Security …………………………………………………………………………… 346
WPA/WPA2 (Wi-Fi Protected Access) …………………………………………………… 348
Security Threats to Wi-Fi Networks …………………………………………………….. 348
Troubleshooting Wi-Fi Networks ……………………………………………………………. 350
Wi-Fi Network Tools …………………………………………………………………………… 351
Avoid Pitfalls …………………………………………………………………………………….. 354
Affiliate Summary ………………………………………………………………………………….. 358
Fundamental Terms ……………………………………………………………………………………………….. 360
Review Questions …………………………………………………………………………………… 361
Hands-On Projects ………………………………………………………………………………….. 362
Affiliate 7
Virtualization and Cloud Computing ………………………………………371
Virtualization ………………………………………………………………………………………….. 373
Network Connection Types ………………………………………………………………… 376
Pros and Cons of Virtualization …………………………………………………………… 383
NFV (Network Functions Virtualization) ………………………………………………. 385
SDN (Software-Defined Networking) …………………………………………………… 386
Cloud Computing ……………………………………………………………………………………. 389
Cloud Computing Categories ………………………………………………………………..391
Deployment Models ………………………………………………………………………….. 394
Cloud Connectivity and Security …………………………………………………………. 395
Encryption Protocols ………………………………………………………………………………. 396
Primal Encryption …………………………………………………………………………………. 397
IPsec (Internet Protocol Security) ………………………………………………………… 399
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) ……………… 400
Remote Access ……………………………………………………………………………………….. 403
Point-to-Indicate Remote Access Protocols ………………………………………………405
Last Emulation ……………………………………………………………………………406
VPNs (Virtual Private Networks) …………………………………………………………..412
VPN Tunneling Protocols ……………………………………………………………………. 416
Remote Access Policies ………………………………………………………………………..418
Chapter Summary ………………………………………………………………………………….. 418
Cardinal Terms ……………………………………………………………………………………………….. 421
Review Questions …………………………………………………………………………………… 422
Hands-On Projects ………………………………………………………………………………….. 423
Chapter viii
Subnets and VLANs ………………………………………………………………………..435
Network Division ………………………………………………………………………….. 436
Subnets …………………………………………………………………………………………………… 438
How Subnet Masks Work ……………………………………………………………………440
CIDR (Classless Interdomain Routing) ………………………………………………….444
IPv4 Subnet Calculations …………………………………………………………………….444
Subnet Mask Tables ……………………………………………………………………………450
Subnetting Questions on Exams …………………………………………………………. 452
Implement Subnets …………………………………………………………………………… 455
VLSM (Variable Length Subnet Mask) ………………………………………………….. 457
Subnets in IPv6 ………………………………………………………………………………….460
VLANs (Virtual Local Area Networks) ……………………………………………………… 462
Managed Switches ……………………………………………………………………………..464
Switch Ports and Trunks …………………………………………………………………….. 467
VLANs and Subnets ……………………………………………………………………………469
Types of VLANs …………………………………………………………………………………470
View Configured VLANs ………………………………………………………………………471
Troubleshoot and Secure VLANs …………………………………………………………. 473
Chapter Summary ………………………………………………………………………………….. 474
Key Terms ……………………………………………………………………………………………….. 475
Review Questions …………………………………………………………………………………… 476
Hands-On Projects ………………………………………………………………………………….. 477
Affiliate ix
Network Chance Management ………………………………………………………..497
Security Risks …………………………………………………………………………………………. 499
People Risks ……………………………………………………………………………………… 501
Technology Risks ………………………………………………………………………………. 503
Malware Risks ……………………………………………………………………………………508
Security Assessment ………………………………………………………………………………. 511
Scanning Tools …………………………………………………………………………………… 512
Honeypots and Honeynets …………………………………………………………………..514
Concrete Security …………………………………………………………………………………….. 515
Prevention Methods …………………………………………………………………………… 515
Detection Methods ……………………………………………………………………………..518
Device Hardening …………………………………………………………………………………… 520
Updates and Security Patches ………………………………………………………………521
Administrative Credentials …………………………………………………………………..523
Services and Protocols …………………………………………………………………………525
Hashing ……………………………………………………………………………………………. 526
Anti-Malware Software ……………………………………………………………………… 528
Security Policies for Users ………………………………………………………………………. 529
Security Policy Goals …………………………………………………………………………. 530
BYOD (Bring Your Ain Device) ……………………………………………………………. 531
AUP (Acceptable Use Policy) …………………………………………………………………532
NDA (Non-Disclosure Agreement) ………………………………………………………..533
Password Policy ………………………………………………………………………………… 534
Privileged User Agreement …………………………………………………………………..537
Anti-Malware Policy ………………………………………………………………………….. 538
Chapter Summary ………………………………………………………………………………….. 539
Key Terms ……………………………………………………………………………………………….. 541
Review Questions …………………………………………………………………………………… 541
Hands-On Projects ………………………………………………………………………………….. 543
Affiliate 10
Security in Network Design ………………………………………………………..553
Network Security Devices ………………………………………………………………………. 554
Proxy Servers ……………………………………………………………………………………..555
ACLs (Access Control Lists) on Network Devices …………………………………….557
Firewalls …………………………………………………………………………………………… 559
IDS (Intrusion Detection Organisation) ………………………………………………………… 566
IPS (Intrusion Prevention Arrangement) ………………………………………………………. 568
SIEM (Security Information and Event Direction) …………………………… 569
Switch Management ………………………………………………………………………………. 570
Switch Path Management …………………………………………………………………….571
Switch Port Security …………………………………………………………………………….574
AAA (Authentication, Authorization, and Bookkeeping) …………………………… 575
Authentication ………………………………………………………………………………….. 576
Potency …………………………………………………………………………………….580
Accounting ……………………………………………………………………………………….. 582
NAC (Network Admission Control) Solutions ……………………………………………… 583
Access Control Technologies ………………………………………………………………….. 584
Directory Services ……………………………………………………………………………… 584
Kerberos …………………………………………………………………………………………… 586
SSO (Unmarried Sign-On) ………………………………………………………………………….590
RADIUS (Remote Hallmark Dial-In User Service) ……………………………591
TACACS1 (Concluding Access Controller Access Control System Plus) ……….. 592
Wireless Network Security ……………………………………………………………………… 592
WPA (Wi-Fi Protected Access) …………………………………………………………….. 593
WPA2 (Wi-Fi Protected Access, Version ii) …………………………………………….. 593
Personal and Enterprise …………………………………………………………………….. 594
Chapter Summary ………………………………………………………………………………….. 599
Key Terms ……………………………………………………………………………………………….. 601
Review Questions …………………………………………………………………………………… 602
Hands-On Projects ………………………………………………………………………………….. 604
CHAPTER 11
Network Performance and Recovery ……………………………………..615
Collecting Network Data ………………………………………………………………………… 617
Monitoring Tools ………………………………………………………………………………..617
System and Outcome Logs ………………………………………………………………………. 622
SNMP Logs ……………………………………………………………………………………….. 625
Performance Baselines ………………………………………………………………………. 629
Managing Network Traffic ……………………………………………………………………… 631
Traffic Direction …………………………………………………………………………….631
QoS (Quality of Service) Assurance ……………………………………………………… 633
Network Availability ……………………………………………………………………………….. 635
Fault Tolerance …………………………………………………………………………………. 637
Data Backup and Storage ……………………………………………………………………. 645
Ability Direction …………………………………………………………………………… 653
Response and Recovery …………………………………………………………………………. 659
Incident Response Policies ………………………………………………………………….660
Disaster Recovery Planning ………………………………………………………………… 661
Disaster Recovery Contingencies ………………………………………………………… 662
Information Preservation ……………………………………………………………………………… 663
Chapter Summary ………………………………………………………………………………….. 665
Key Terms ……………………………………………………………………………………………….. 667
Review Questions …………………………………………………………………………………… 668
Hands-On Projects ………………………………………………………………………………….. 669
CHAPTER 12
Broad Area Networks ……………………………………………………………………..677
WAN Essentials ……………………………………………………………………………………….. 679
Data Transfer Methods ……………………………………………………………………….680
Troubleshooting an Net Connection ………………………………………………684
Layer 1 WAN Technologies ……………………………………………………………… 686
PSTN (Public Switched Phone Network) ………………………………………….689
DSL (Digital Subscriber Line) ……………………………………………………………….694
Cable Broadband ………………………………………………………………………………..698
Metro (Metropolitan) Ethernet ……………………………………………………………..701
T-Carriers …………………………………………………………………………………………. 702
SONET (Synchronous Optical Network) ………………………………………………..706
Layer ii WAN Technologies ……………………………………………………………………… 709
Frame Relay ……………………………………………………………………………………… 710
ATM (Asynchronous Transfer Manner) ……………………………………………………. 711
MPLS (Multiprotocol Label Switching) …………………………………………………..712
Wireless WANs ………………………………………………………………………………………… 714
Cellular ………………………………………………………………………………………………714
Satellite …………………………………………………………………………………………….. 717
Chapter Summary ………………………………………………………………………………….. 720
Key Terms ……………………………………………………………………………………………….. 722
Review Questions …………………………………………………………………………………… 723
Hands-On Projects ………………………………………………………………………………….. 724
appendix a
CompTIA Network1 N10-007 Certification Exam Objectives………………………… 735
appendix b
Visual Guide to Connectors 753
appendix c
CompTIA Network1 Practice Exam 757
GLOSSARY ………………………………………………………………………………………………781
Index ………………………………………………………………………………………………………817
mooredoormemas1941.blogspot.com
Source: https://www.textileebook.com/2021/09/network-guide-8th-edition.html
Belum ada Komentar untuk "Network+ Guide to Networks 8th Edition Chapter 2 Review Questions"
Posting Komentar