Network+ Guide to Networks 8th Edition Chapter 6 Review Questions

Network+ Guide to Networks, Eighth Edition

By Jill West, Jean Andrews and Tamara Dean

Network+ Guide to Networks 8th Edition

Table of Contents:

PREFACE ………………………………………………………………………………….. fifteen

Affiliate ane

Introduction to Networking  ..i

Network Models ………………………………………………………………………………………2

Peer-to-Peer Network Model …………………………………………………………………..iii

Client-Server Network Model ………………………………………………………………… 6

Client-Server Applications …………………………………………………………………………..eight

Network Hardware ……………………………………………………………………………………12

LANs and Their Hardware ……………………………………………………………………. 12

MANs and WANs …………………………………………………………………………………nineteen

The Vii-Layer OSI Model ………………………………………………………………………21

Layer 7: Application Layer …………………………………………………………………….23

Layer 6: Presentation Layer …………………………………………………………………..23

Layer 5: Session Layer …………………………………………………………………………..24

Layer 4: Transport Layer ……………………………………………………………………….24

Layer 3: Network Layer …………………………………………………………………………25

Layer 2: Data Link Layer ………………………………………………………………………..25

Layer i: Physical Layer ………………………………………………………………………….26

Protocol Data Unit or PDU …………………………………………………………………….26

Summary of How the Layers Work Together …………………………………………..27

Rubber Procedures and Policies …………………………………………………………………29

Emergency Procedures …………………………………………………………………………29

Condom Precautions ……………………………………………………………………………….32

Troubleshooting Network Problems …………………………………………………………33

Chapter Summary …………………………………………………………………………………….38

Central Terms ………………………………………………………………………………………………….40

Review Questions ……………………………………………………………………………………..41

Easily-On Projects …………………………………………………………………………………….43

Affiliate 2

Network Infrastructure and Documentation  53

Components of Structured Cabling …………………………………………………………..54

From the Demarc to a Workstation ………………………………………………………..55

Cabling ……………………………………………………………………………………………….64

Monitoring the Surroundings and Security ……………………………………………..69

Network Documentation …………………………………………………………………………. 71

Network Diagrams ………………………………………………………………………………..71

Operating Procedures ………………………………………………………………………….. 79

Inventory Management ……………………………………………………………………….. 82

Labeling and Naming Conventions ……………………………………………………….. 82

Business organization Documents …………………………………………………………………………… 85

Change Management ……………………………………………………………………………….. 86

Software and Hardware Changes ………………………………………………………….. 87

Change Management Documentation ……………………………………………………90

Chapter Summary ……………………………………………………………………………………. 92

Primal Terms …………………………………………………………………………………………………. 93

Review Questions …………………………………………………………………………………….. 94

Hands-On Projects ……………………………………………………………………………………. 95

Chapter 3

Addressing on Networks ……………………………………………………………..109

Addressing Overview ……………………………………………………………………………… 111

MAC Addresses ……………………………………………………………………………………….. 113

IP Addresses …………………………………………………………………………………………… 114

IPv4 Addresses …………………………………………………………………………………… 118

IPv6 Addresses ……………………………………………………………………………………126

Ports and Sockets …………………………………………………………………………………… 130

Domain Names and DNS (Domain Name System) …………………………………. 133

Namespace Databases ………………………………………………………………………… 135

Name Servers …………………………………………………………………………………….. 135

Resource Records in a DNS Database …………………………………………………….138

DNS Server Software ……………………………………………………………………………139

Troubleshooting Address Issues ……………………………………………………….. 141

Troubleshooting Tools …………………………………………………………………………142

Common Network Problems ……………………………………………………………………. 151

Chapter Summary ………………………………………………………………………………….. 154

Fundamental Terms ……………………………………………………………………………………………….. 156

Review Questions …………………………………………………………………………………… 157

Hands-On Projects ………………………………………………………………………………….. 159

CHAPTER four

Network Protocols and Routing ……………………………………………….171

TCP/IP Cadre Protocols …………………………………………………………………………….. 172

TCP (Manual Command Protocol) ……………………………………………………. 174

UDP (User Datagram Protocol) ……………………………………………………………… 181

IP (Internet Protocol) ……………………………………………………………………………182

ICMP (Net Command Message Protocol) ……………………………………………..188

ARP (Address Resolution Protocol) on IPv4 Networks ……………………………. 190

Ethernet …………………………………………………………………………………………… 190

Routers and How They Work ………………………………………………………………….. 195

Multilayer Switches …………………………………………………………………………….198

Routing Tables ……………………………………………………………………………………198

Routing Path Types ……………………………………………………………………………..201

The road Command ………………………………………………………………………….201

Routing Metrics …………………………………………………………………………………..201

Routing Protocols to Make up one's mind All-time Paths ………………………………………….. 202

Interior and Exterior Gateway Protocols ………………………………………………. 203

Troubleshooting Route Issues ………………………………………………………………… 206

Troubleshooting Tools ……………………………………………………………………….. 207

Solving Common Routing Problems …………………………………………………….. 213

Affiliate Summary ………………………………………………………………………………….. 216

Primal Terms ……………………………………………………………………………………………….. 217

Review Questions …………………………………………………………………………………… 218

Hands-On Projects ………………………………………………………………………………….. 219

Affiliate five

Network Cabling ……………………………………………………………………………..233

Manual Basics ……………………………………………………………………………….. 234

Throughput and Bandwidth …………………………………………………………………235

Manual Flaws …………………………………………………………………………… 236

Duplex, One-half-Duplex, and Simplex ……………………………………………………… 238

Multiplexing ……………………………………………………………………………………… 239

Copper Cable ………………………………………………………………………………………….. 241

Twisted-Pair Cable …………………………………………………………………………….. 244

STP (Shielded Twisted Pair) ………………………………………………………………… 247

UTP (Unshielded Twisted Pair) ……………………………………………………………. 248

Comparison STP and UTP …………………………………………………………………….. 249

Cable Pinouts ……………………………………………………………………………………. 249

PoE (Power over Ethernet) ………………………………………………………………….. 259

Ethernet Standards for Twisted-Pair Cable …………………………………………….261

Cobweb-Optic Cablevision ……………………………………………………………………………………. 263

SMF (Unmarried Mode Fiber) …………………………………………………………………….. 265

MMF (Multimode Cobweb) …………………………………………………………………….. 266

Fiber Connectors ……………………………………………………………………………….. 267

Media Converters ………………………………………………………………………………. 269

Fiber Transceivers ……………………………………………………………………………… 270

Ethernet Standards for Fiber-Optic Cable ………………………………………………274

Mutual Cobweb Cable Problems …………………………………………………………… 276

Troubleshooting Tools ……………………………………………………………………………. 276

Toner and Probe Kit …………………………………………………………………………….277

Multimeter ……………………………………………………………………………………….. 279

Cable Continuity Tester ………………………………………………………………………280

Cable Performance Tester …………………………………………………………………….281

OPM (Optical Power Meter) ………………………………………………………………… 282

Chapter Summary ………………………………………………………………………………….. 283

Central Terms ……………………………………………………………………………………………….. 285

Review Questions …………………………………………………………………………………… 286

Easily-On Projects ………………………………………………………………………………….. 288

CHAPTER 6

Wireless Networking ……………………………………………………………………..303

Characteristics of Wireless Transmissions ……………………………………………… 304

The Wireless Spectrum ………………………………………………………………………. 305

Channel Management ………………………………………………………………………..306

Antennas ………………………………………………………………………………………….. 307

Betoken Propagation ……………………………………………………………………………..309

Wireless Standards for the IoT (Internet of Things) ……………………………….. 312

ZigBee ……………………………………………………………………………………………….. 313

Z-Wave ………………………………………………………………………………………………314

Bluetooth ………………………………………………………………………………………….. 315

ANT1 ………………………………………………………………………………………………..316

RFID (Radio Frequency Identification) …………………………………………………..318

NFC (Near-Field Communication) ……………………………………………………….. 320

Wireless USB ……………………………………………………………………………………… 321

IR (Infrared) ……………………………………………………………………………………….. 321

802.11 WLAN Standards …………………………………………………………………………. 323

Admission Method ……………………………………………………………………………………325

Association ………………………………………………………………………………………..327

IEEE 802.xi Frames …………………………………………………………………………….. 330

802.11 Innovations ……………………………………………………………………………… 331

Implementing a Wi-Fi Network ………………………………………………………………. 335

Wireless Topologies …………………………………………………………………………….335

Determine the Design ………………………………………………………………………… 339

Configure Wi-Fi Connectivity Devices …………………………………………………. 343

Configure Wi-Fi Clients ……………………………………………………………………… 344

Wi-Fi Network Security …………………………………………………………………………… 346

WPA/WPA2 (Wi-Fi Protected Access) …………………………………………………… 348

Security Threats to Wi-Fi Networks …………………………………………………….. 348

Troubleshooting Wi-Fi Networks ……………………………………………………………. 350

Wi-Fi Network Tools …………………………………………………………………………… 351

Avert Pitfalls …………………………………………………………………………………….. 354

Chapter Summary ………………………………………………………………………………….. 358

Key Terms ……………………………………………………………………………………………….. 360

Review Questions …………………………………………………………………………………… 361

Hands-On Projects ………………………………………………………………………………….. 362

Chapter 7

Virtualization and Cloud Computing ………………………………………371

Virtualization ………………………………………………………………………………………….. 373

Network Connexion Types ………………………………………………………………… 376

Pros and Cons of Virtualization …………………………………………………………… 383

NFV (Network Functions Virtualization) ………………………………………………. 385

SDN (Software-Defined Networking) …………………………………………………… 386

Cloud Computing ……………………………………………………………………………………. 389

Deject Computing Categories ………………………………………………………………..391

Deployment Models ………………………………………………………………………….. 394

Cloud Connectivity and Security …………………………………………………………. 395

Encryption Protocols ………………………………………………………………………………. 396

Key Encryption …………………………………………………………………………………. 397

IPsec (Net Protocol Security) ………………………………………………………… 399

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) ……………… 400

Remote Admission ……………………………………………………………………………………….. 403

Point-to-Betoken Remote Access Protocols ………………………………………………405

Terminal Emulation ……………………………………………………………………………406

VPNs (Virtual Individual Networks) …………………………………………………………..412

VPN Tunneling Protocols ……………………………………………………………………. 416

Remote Admission Policies ………………………………………………………………………..418

Affiliate Summary ………………………………………………………………………………….. 418

Key Terms ……………………………………………………………………………………………….. 421

Review Questions …………………………………………………………………………………… 422

Hands-On Projects ………………………………………………………………………………….. 423

CHAPTER 8

Subnets and VLANs ………………………………………………………………………..435

Network Division ………………………………………………………………………….. 436

Subnets …………………………………………………………………………………………………… 438

How Subnet Masks Work ……………………………………………………………………440

CIDR (Classless Interdomain Routing) ………………………………………………….444

IPv4 Subnet Calculations …………………………………………………………………….444

Subnet Mask Tables ……………………………………………………………………………450

Subnetting Questions on Exams …………………………………………………………. 452

Implement Subnets …………………………………………………………………………… 455

VLSM (Variable Length Subnet Mask) ………………………………………………….. 457

Subnets in IPv6 ………………………………………………………………………………….460

VLANs (Virtual Local Area Networks) ……………………………………………………… 462

Managed Switches ……………………………………………………………………………..464

Switch Ports and Trunks …………………………………………………………………….. 467

VLANs and Subnets ……………………………………………………………………………469

Types of VLANs …………………………………………………………………………………470

View Configured VLANs ………………………………………………………………………471

Troubleshoot and Secure VLANs …………………………………………………………. 473

Affiliate Summary ………………………………………………………………………………….. 474

Fundamental Terms ……………………………………………………………………………………………….. 475

Review Questions …………………………………………………………………………………… 476

Hands-On Projects ………………………………………………………………………………….. 477

CHAPTER ix

Network Risk Management ………………………………………………………..497

Security Risks …………………………………………………………………………………………. 499

People Risks ……………………………………………………………………………………… 501

Engineering Risks ………………………………………………………………………………. 503

Malware Risks ……………………………………………………………………………………508

Security Cess ………………………………………………………………………………. 511

Scanning Tools …………………………………………………………………………………… 512

Honeypots and Honeynets …………………………………………………………………..514

Physical Security …………………………………………………………………………………….. 515

Prevention Methods …………………………………………………………………………… 515

Detection Methods ……………………………………………………………………………..518

Device Hardening …………………………………………………………………………………… 520

Updates and Security Patches ………………………………………………………………521

Administrative Credentials …………………………………………………………………..523

Services and Protocols …………………………………………………………………………525

Hashing ……………………………………………………………………………………………. 526

Anti-Malware Software ……………………………………………………………………… 528

Security Policies for Users ………………………………………………………………………. 529

Security Policy Goals …………………………………………………………………………. 530

BYOD (Bring Your Own Device) ……………………………………………………………. 531

AUP (Adequate Use Policy) …………………………………………………………………532

NDA (Non-Disclosure Agreement) ………………………………………………………..533

Password Policy ………………………………………………………………………………… 534

Privileged User Agreement …………………………………………………………………..537

Anti-Malware Policy ………………………………………………………………………….. 538

Chapter Summary ………………………………………………………………………………….. 539

Key Terms ……………………………………………………………………………………………….. 541

Review Questions …………………………………………………………………………………… 541

Hands-On Projects ………………………………………………………………………………….. 543

Chapter ten

Security in Network Design ………………………………………………………..553

Network Security Devices ………………………………………………………………………. 554

Proxy Servers ……………………………………………………………………………………..555

ACLs (Admission Command Lists) on Network Devices …………………………………….557

Firewalls …………………………………………………………………………………………… 559

IDS (Intrusion Detection Organisation) ………………………………………………………… 566

IPS (Intrusion Prevention System) ………………………………………………………. 568

SIEM (Security Information and Result Management) …………………………… 569

Switch Management ………………………………………………………………………………. 570

Switch Path Management …………………………………………………………………….571

Switch Port Security …………………………………………………………………………….574

AAA (Hallmark, Dominance, and Bookkeeping) …………………………… 575

Authentication ………………………………………………………………………………….. 576

Say-so …………………………………………………………………………………….580

Accounting ……………………………………………………………………………………….. 582

NAC (Network Admission Control) Solutions ……………………………………………… 583

Access Control Technologies ………………………………………………………………….. 584

Directory Services ……………………………………………………………………………… 584

Kerberos …………………………………………………………………………………………… 586

SSO (Single Sign-On) ………………………………………………………………………….590

RADIUS (Remote Authentication Dial-In User Service) ……………………………591

TACACS1 (Concluding Access Controller Admission Control System Plus) ……….. 592

Wireless Network Security ……………………………………………………………………… 592

WPA (Wi-Fi Protected Access) …………………………………………………………….. 593

WPA2 (Wi-Fi Protected Access, Version two) …………………………………………….. 593

Personal and Enterprise …………………………………………………………………….. 594

Chapter Summary ………………………………………………………………………………….. 599

Cardinal Terms ……………………………………………………………………………………………….. 601

Review Questions …………………………………………………………………………………… 602

Easily-On Projects ………………………………………………………………………………….. 604

Chapter 11

Network Functioning and Recovery ……………………………………..615

Collecting Network Data ………………………………………………………………………… 617

Monitoring Tools ………………………………………………………………………………..617

Organisation and Upshot Logs ………………………………………………………………………. 622

SNMP Logs ……………………………………………………………………………………….. 625

Operation Baselines ………………………………………………………………………. 629

Managing Network Traffic ……………………………………………………………………… 631

Traffic Direction …………………………………………………………………………….631

QoS (Quality of Service) Assurance ……………………………………………………… 633

Network Availability ……………………………………………………………………………….. 635

Fault Tolerance …………………………………………………………………………………. 637

Data Backup and Storage ……………………………………………………………………. 645

Power Management …………………………………………………………………………… 653

Response and Recovery …………………………………………………………………………. 659

Incident Response Policies ………………………………………………………………….660

Disaster Recovery Planning ………………………………………………………………… 661

Disaster Recovery Contingencies ………………………………………………………… 662

Data Preservation ……………………………………………………………………………… 663

Chapter Summary ………………………………………………………………………………….. 665

Fundamental Terms ……………………………………………………………………………………………….. 667

Review Questions …………………………………………………………………………………… 668

Easily-On Projects ………………………………………………………………………………….. 669

CHAPTER 12

Broad Surface area Networks ……………………………………………………………………..677

WAN Essentials ……………………………………………………………………………………….. 679

Data Transfer Methods ……………………………………………………………………….680

Troubleshooting an Net Connection ………………………………………………684

Layer i WAN Technologies ……………………………………………………………… 686

PSTN (Public Switched Phone Network) ………………………………………….689

DSL (Digital Subscriber Line) ……………………………………………………………….694

Cablevision Broadband ………………………………………………………………………………..698

Metro (Metropolitan) Ethernet ……………………………………………………………..701

T-Carriers …………………………………………………………………………………………. 702

SONET (Synchronous Optical Network) ………………………………………………..706

Layer 2 WAN Technologies ……………………………………………………………………… 709

Frame Relay ……………………………………………………………………………………… 710

ATM (Asynchronous Transfer Manner) ……………………………………………………. 711

MPLS (Multiprotocol Characterization Switching) …………………………………………………..712

Wireless WANs ………………………………………………………………………………………… 714

Cellular ………………………………………………………………………………………………714

Satellite …………………………………………………………………………………………….. 717

Chapter Summary ………………………………………………………………………………….. 720

Key Terms ……………………………………………………………………………………………….. 722

Review Questions …………………………………………………………………………………… 723

Easily-On Projects ………………………………………………………………………………….. 724

appendix a

CompTIA Network1 N10-007 Certification Exam Objectives………………………… 735

appendix b

Visual Guide to Connectors  753

appendix c

CompTIA Network1 Exercise Exam  757

GLOSSARY ………………………………………………………………………………………………781

Index ………………………………………………………………………………………………………817

This book is US$10. Order for this book:
(Request for free sample pages click on "Order Now" button)

Book Order

keanwhernswille.blogspot.com

Source: https://www.textileebook.com/2021/09/network-guide-8th-edition.html

0 Response to "Network+ Guide to Networks 8th Edition Chapter 6 Review Questions"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel