Network+ Guide to Networks 8th Edition Chapter 6 Review Questions
Network+ Guide to Networks, Eighth Edition
By Jill West, Jean Andrews and Tamara Dean
Table of Contents:
PREFACE ………………………………………………………………………………….. fifteen
Affiliate ane
Introduction to Networking ..i
Network Models ………………………………………………………………………………………2
Peer-to-Peer Network Model …………………………………………………………………..iii
Client-Server Network Model ………………………………………………………………… 6
Client-Server Applications …………………………………………………………………………..eight
Network Hardware ……………………………………………………………………………………12
LANs and Their Hardware ……………………………………………………………………. 12
MANs and WANs …………………………………………………………………………………nineteen
The Vii-Layer OSI Model ………………………………………………………………………21
Layer 7: Application Layer …………………………………………………………………….23
Layer 6: Presentation Layer …………………………………………………………………..23
Layer 5: Session Layer …………………………………………………………………………..24
Layer 4: Transport Layer ……………………………………………………………………….24
Layer 3: Network Layer …………………………………………………………………………25
Layer 2: Data Link Layer ………………………………………………………………………..25
Layer i: Physical Layer ………………………………………………………………………….26
Protocol Data Unit or PDU …………………………………………………………………….26
Summary of How the Layers Work Together …………………………………………..27
Rubber Procedures and Policies …………………………………………………………………29
Emergency Procedures …………………………………………………………………………29
Condom Precautions ……………………………………………………………………………….32
Troubleshooting Network Problems …………………………………………………………33
Chapter Summary …………………………………………………………………………………….38
Central Terms ………………………………………………………………………………………………….40
Review Questions ……………………………………………………………………………………..41
Easily-On Projects …………………………………………………………………………………….43
Affiliate 2
Network Infrastructure and Documentation 53
Components of Structured Cabling …………………………………………………………..54
From the Demarc to a Workstation ………………………………………………………..55
Cabling ……………………………………………………………………………………………….64
Monitoring the Surroundings and Security ……………………………………………..69
Network Documentation …………………………………………………………………………. 71
Network Diagrams ………………………………………………………………………………..71
Operating Procedures ………………………………………………………………………….. 79
Inventory Management ……………………………………………………………………….. 82
Labeling and Naming Conventions ……………………………………………………….. 82
Business organization Documents …………………………………………………………………………… 85
Change Management ……………………………………………………………………………….. 86
Software and Hardware Changes ………………………………………………………….. 87
Change Management Documentation ……………………………………………………90
Chapter Summary ……………………………………………………………………………………. 92
Primal Terms …………………………………………………………………………………………………. 93
Review Questions …………………………………………………………………………………….. 94
Hands-On Projects ……………………………………………………………………………………. 95
Chapter 3
Addressing on Networks ……………………………………………………………..109
Addressing Overview ……………………………………………………………………………… 111
MAC Addresses ……………………………………………………………………………………….. 113
IP Addresses …………………………………………………………………………………………… 114
IPv4 Addresses …………………………………………………………………………………… 118
IPv6 Addresses ……………………………………………………………………………………126
Ports and Sockets …………………………………………………………………………………… 130
Domain Names and DNS (Domain Name System) …………………………………. 133
Namespace Databases ………………………………………………………………………… 135
Name Servers …………………………………………………………………………………….. 135
Resource Records in a DNS Database …………………………………………………….138
DNS Server Software ……………………………………………………………………………139
Troubleshooting Address Issues ……………………………………………………….. 141
Troubleshooting Tools …………………………………………………………………………142
Common Network Problems ……………………………………………………………………. 151
Chapter Summary ………………………………………………………………………………….. 154
Fundamental Terms ……………………………………………………………………………………………….. 156
Review Questions …………………………………………………………………………………… 157
Hands-On Projects ………………………………………………………………………………….. 159
CHAPTER four
Network Protocols and Routing ……………………………………………….171
TCP/IP Cadre Protocols …………………………………………………………………………….. 172
TCP (Manual Command Protocol) ……………………………………………………. 174
UDP (User Datagram Protocol) ……………………………………………………………… 181
IP (Internet Protocol) ……………………………………………………………………………182
ICMP (Net Command Message Protocol) ……………………………………………..188
ARP (Address Resolution Protocol) on IPv4 Networks ……………………………. 190
Ethernet …………………………………………………………………………………………… 190
Routers and How They Work ………………………………………………………………….. 195
Multilayer Switches …………………………………………………………………………….198
Routing Tables ……………………………………………………………………………………198
Routing Path Types ……………………………………………………………………………..201
The road Command ………………………………………………………………………….201
Routing Metrics …………………………………………………………………………………..201
Routing Protocols to Make up one's mind All-time Paths ………………………………………….. 202
Interior and Exterior Gateway Protocols ………………………………………………. 203
Troubleshooting Route Issues ………………………………………………………………… 206
Troubleshooting Tools ……………………………………………………………………….. 207
Solving Common Routing Problems …………………………………………………….. 213
Affiliate Summary ………………………………………………………………………………….. 216
Primal Terms ……………………………………………………………………………………………….. 217
Review Questions …………………………………………………………………………………… 218
Hands-On Projects ………………………………………………………………………………….. 219
Affiliate five
Network Cabling ……………………………………………………………………………..233
Manual Basics ……………………………………………………………………………….. 234
Throughput and Bandwidth …………………………………………………………………235
Manual Flaws …………………………………………………………………………… 236
Duplex, One-half-Duplex, and Simplex ……………………………………………………… 238
Multiplexing ……………………………………………………………………………………… 239
Copper Cable ………………………………………………………………………………………….. 241
Twisted-Pair Cable …………………………………………………………………………….. 244
STP (Shielded Twisted Pair) ………………………………………………………………… 247
UTP (Unshielded Twisted Pair) ……………………………………………………………. 248
Comparison STP and UTP …………………………………………………………………….. 249
Cable Pinouts ……………………………………………………………………………………. 249
PoE (Power over Ethernet) ………………………………………………………………….. 259
Ethernet Standards for Twisted-Pair Cable …………………………………………….261
Cobweb-Optic Cablevision ……………………………………………………………………………………. 263
SMF (Unmarried Mode Fiber) …………………………………………………………………….. 265
MMF (Multimode Cobweb) …………………………………………………………………….. 266
Fiber Connectors ……………………………………………………………………………….. 267
Media Converters ………………………………………………………………………………. 269
Fiber Transceivers ……………………………………………………………………………… 270
Ethernet Standards for Fiber-Optic Cable ………………………………………………274
Mutual Cobweb Cable Problems …………………………………………………………… 276
Troubleshooting Tools ……………………………………………………………………………. 276
Toner and Probe Kit …………………………………………………………………………….277
Multimeter ……………………………………………………………………………………….. 279
Cable Continuity Tester ………………………………………………………………………280
Cable Performance Tester …………………………………………………………………….281
OPM (Optical Power Meter) ………………………………………………………………… 282
Chapter Summary ………………………………………………………………………………….. 283
Central Terms ……………………………………………………………………………………………….. 285
Review Questions …………………………………………………………………………………… 286
Easily-On Projects ………………………………………………………………………………….. 288
CHAPTER 6
Wireless Networking ……………………………………………………………………..303
Characteristics of Wireless Transmissions ……………………………………………… 304
The Wireless Spectrum ………………………………………………………………………. 305
Channel Management ………………………………………………………………………..306
Antennas ………………………………………………………………………………………….. 307
Betoken Propagation ……………………………………………………………………………..309
Wireless Standards for the IoT (Internet of Things) ……………………………….. 312
ZigBee ……………………………………………………………………………………………….. 313
Z-Wave ………………………………………………………………………………………………314
Bluetooth ………………………………………………………………………………………….. 315
ANT1 ………………………………………………………………………………………………..316
RFID (Radio Frequency Identification) …………………………………………………..318
NFC (Near-Field Communication) ……………………………………………………….. 320
Wireless USB ……………………………………………………………………………………… 321
IR (Infrared) ……………………………………………………………………………………….. 321
802.11 WLAN Standards …………………………………………………………………………. 323
Admission Method ……………………………………………………………………………………325
Association ………………………………………………………………………………………..327
IEEE 802.xi Frames …………………………………………………………………………….. 330
802.11 Innovations ……………………………………………………………………………… 331
Implementing a Wi-Fi Network ………………………………………………………………. 335
Wireless Topologies …………………………………………………………………………….335
Determine the Design ………………………………………………………………………… 339
Configure Wi-Fi Connectivity Devices …………………………………………………. 343
Configure Wi-Fi Clients ……………………………………………………………………… 344
Wi-Fi Network Security …………………………………………………………………………… 346
WPA/WPA2 (Wi-Fi Protected Access) …………………………………………………… 348
Security Threats to Wi-Fi Networks …………………………………………………….. 348
Troubleshooting Wi-Fi Networks ……………………………………………………………. 350
Wi-Fi Network Tools …………………………………………………………………………… 351
Avert Pitfalls …………………………………………………………………………………….. 354
Chapter Summary ………………………………………………………………………………….. 358
Key Terms ……………………………………………………………………………………………….. 360
Review Questions …………………………………………………………………………………… 361
Hands-On Projects ………………………………………………………………………………….. 362
Chapter 7
Virtualization and Cloud Computing ………………………………………371
Virtualization ………………………………………………………………………………………….. 373
Network Connexion Types ………………………………………………………………… 376
Pros and Cons of Virtualization …………………………………………………………… 383
NFV (Network Functions Virtualization) ………………………………………………. 385
SDN (Software-Defined Networking) …………………………………………………… 386
Cloud Computing ……………………………………………………………………………………. 389
Deject Computing Categories ………………………………………………………………..391
Deployment Models ………………………………………………………………………….. 394
Cloud Connectivity and Security …………………………………………………………. 395
Encryption Protocols ………………………………………………………………………………. 396
Key Encryption …………………………………………………………………………………. 397
IPsec (Net Protocol Security) ………………………………………………………… 399
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) ……………… 400
Remote Admission ……………………………………………………………………………………….. 403
Point-to-Betoken Remote Access Protocols ………………………………………………405
Terminal Emulation ……………………………………………………………………………406
VPNs (Virtual Individual Networks) …………………………………………………………..412
VPN Tunneling Protocols ……………………………………………………………………. 416
Remote Admission Policies ………………………………………………………………………..418
Affiliate Summary ………………………………………………………………………………….. 418
Key Terms ……………………………………………………………………………………………….. 421
Review Questions …………………………………………………………………………………… 422
Hands-On Projects ………………………………………………………………………………….. 423
CHAPTER 8
Subnets and VLANs ………………………………………………………………………..435
Network Division ………………………………………………………………………….. 436
Subnets …………………………………………………………………………………………………… 438
How Subnet Masks Work ……………………………………………………………………440
CIDR (Classless Interdomain Routing) ………………………………………………….444
IPv4 Subnet Calculations …………………………………………………………………….444
Subnet Mask Tables ……………………………………………………………………………450
Subnetting Questions on Exams …………………………………………………………. 452
Implement Subnets …………………………………………………………………………… 455
VLSM (Variable Length Subnet Mask) ………………………………………………….. 457
Subnets in IPv6 ………………………………………………………………………………….460
VLANs (Virtual Local Area Networks) ……………………………………………………… 462
Managed Switches ……………………………………………………………………………..464
Switch Ports and Trunks …………………………………………………………………….. 467
VLANs and Subnets ……………………………………………………………………………469
Types of VLANs …………………………………………………………………………………470
View Configured VLANs ………………………………………………………………………471
Troubleshoot and Secure VLANs …………………………………………………………. 473
Affiliate Summary ………………………………………………………………………………….. 474
Fundamental Terms ……………………………………………………………………………………………….. 475
Review Questions …………………………………………………………………………………… 476
Hands-On Projects ………………………………………………………………………………….. 477
CHAPTER ix
Network Risk Management ………………………………………………………..497
Security Risks …………………………………………………………………………………………. 499
People Risks ……………………………………………………………………………………… 501
Engineering Risks ………………………………………………………………………………. 503
Malware Risks ……………………………………………………………………………………508
Security Cess ………………………………………………………………………………. 511
Scanning Tools …………………………………………………………………………………… 512
Honeypots and Honeynets …………………………………………………………………..514
Physical Security …………………………………………………………………………………….. 515
Prevention Methods …………………………………………………………………………… 515
Detection Methods ……………………………………………………………………………..518
Device Hardening …………………………………………………………………………………… 520
Updates and Security Patches ………………………………………………………………521
Administrative Credentials …………………………………………………………………..523
Services and Protocols …………………………………………………………………………525
Hashing ……………………………………………………………………………………………. 526
Anti-Malware Software ……………………………………………………………………… 528
Security Policies for Users ………………………………………………………………………. 529
Security Policy Goals …………………………………………………………………………. 530
BYOD (Bring Your Own Device) ……………………………………………………………. 531
AUP (Adequate Use Policy) …………………………………………………………………532
NDA (Non-Disclosure Agreement) ………………………………………………………..533
Password Policy ………………………………………………………………………………… 534
Privileged User Agreement …………………………………………………………………..537
Anti-Malware Policy ………………………………………………………………………….. 538
Chapter Summary ………………………………………………………………………………….. 539
Key Terms ……………………………………………………………………………………………….. 541
Review Questions …………………………………………………………………………………… 541
Hands-On Projects ………………………………………………………………………………….. 543
Chapter ten
Security in Network Design ………………………………………………………..553
Network Security Devices ………………………………………………………………………. 554
Proxy Servers ……………………………………………………………………………………..555
ACLs (Admission Command Lists) on Network Devices …………………………………….557
Firewalls …………………………………………………………………………………………… 559
IDS (Intrusion Detection Organisation) ………………………………………………………… 566
IPS (Intrusion Prevention System) ………………………………………………………. 568
SIEM (Security Information and Result Management) …………………………… 569
Switch Management ………………………………………………………………………………. 570
Switch Path Management …………………………………………………………………….571
Switch Port Security …………………………………………………………………………….574
AAA (Hallmark, Dominance, and Bookkeeping) …………………………… 575
Authentication ………………………………………………………………………………….. 576
Say-so …………………………………………………………………………………….580
Accounting ……………………………………………………………………………………….. 582
NAC (Network Admission Control) Solutions ……………………………………………… 583
Access Control Technologies ………………………………………………………………….. 584
Directory Services ……………………………………………………………………………… 584
Kerberos …………………………………………………………………………………………… 586
SSO (Single Sign-On) ………………………………………………………………………….590
RADIUS (Remote Authentication Dial-In User Service) ……………………………591
TACACS1 (Concluding Access Controller Admission Control System Plus) ……….. 592
Wireless Network Security ……………………………………………………………………… 592
WPA (Wi-Fi Protected Access) …………………………………………………………….. 593
WPA2 (Wi-Fi Protected Access, Version two) …………………………………………….. 593
Personal and Enterprise …………………………………………………………………….. 594
Chapter Summary ………………………………………………………………………………….. 599
Cardinal Terms ……………………………………………………………………………………………….. 601
Review Questions …………………………………………………………………………………… 602
Easily-On Projects ………………………………………………………………………………….. 604
Chapter 11
Network Functioning and Recovery ……………………………………..615
Collecting Network Data ………………………………………………………………………… 617
Monitoring Tools ………………………………………………………………………………..617
Organisation and Upshot Logs ………………………………………………………………………. 622
SNMP Logs ……………………………………………………………………………………….. 625
Operation Baselines ………………………………………………………………………. 629
Managing Network Traffic ……………………………………………………………………… 631
Traffic Direction …………………………………………………………………………….631
QoS (Quality of Service) Assurance ……………………………………………………… 633
Network Availability ……………………………………………………………………………….. 635
Fault Tolerance …………………………………………………………………………………. 637
Data Backup and Storage ……………………………………………………………………. 645
Power Management …………………………………………………………………………… 653
Response and Recovery …………………………………………………………………………. 659
Incident Response Policies ………………………………………………………………….660
Disaster Recovery Planning ………………………………………………………………… 661
Disaster Recovery Contingencies ………………………………………………………… 662
Data Preservation ……………………………………………………………………………… 663
Chapter Summary ………………………………………………………………………………….. 665
Fundamental Terms ……………………………………………………………………………………………….. 667
Review Questions …………………………………………………………………………………… 668
Easily-On Projects ………………………………………………………………………………….. 669
CHAPTER 12
Broad Surface area Networks ……………………………………………………………………..677
WAN Essentials ……………………………………………………………………………………….. 679
Data Transfer Methods ……………………………………………………………………….680
Troubleshooting an Net Connection ………………………………………………684
Layer i WAN Technologies ……………………………………………………………… 686
PSTN (Public Switched Phone Network) ………………………………………….689
DSL (Digital Subscriber Line) ……………………………………………………………….694
Cablevision Broadband ………………………………………………………………………………..698
Metro (Metropolitan) Ethernet ……………………………………………………………..701
T-Carriers …………………………………………………………………………………………. 702
SONET (Synchronous Optical Network) ………………………………………………..706
Layer 2 WAN Technologies ……………………………………………………………………… 709
Frame Relay ……………………………………………………………………………………… 710
ATM (Asynchronous Transfer Manner) ……………………………………………………. 711
MPLS (Multiprotocol Characterization Switching) …………………………………………………..712
Wireless WANs ………………………………………………………………………………………… 714
Cellular ………………………………………………………………………………………………714
Satellite …………………………………………………………………………………………….. 717
Chapter Summary ………………………………………………………………………………….. 720
Key Terms ……………………………………………………………………………………………….. 722
Review Questions …………………………………………………………………………………… 723
Easily-On Projects ………………………………………………………………………………….. 724
appendix a
CompTIA Network1 N10-007 Certification Exam Objectives………………………… 735
appendix b
Visual Guide to Connectors 753
appendix c
CompTIA Network1 Exercise Exam 757
GLOSSARY ………………………………………………………………………………………………781
Index ………………………………………………………………………………………………………817
Source: https://www.textileebook.com/2021/09/network-guide-8th-edition.html
0 Response to "Network+ Guide to Networks 8th Edition Chapter 6 Review Questions"
Post a Comment