CompTIA Network+ Lab Manual
John Wiley & Sons Inc (Verlag)
978-1-118-14863-1 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Gain street-smart skills in network administration Think of the most common and challenging tasks that network administrators face, then read this book and find out how to perform those tasks, step by step. CompTIA Network + Lab Manual provides an inside look into the field of network administration as though you were actually on the job. You'll find a variety of scenarios and potential roadblocks, as well as clearly mapped sections to help you prepare for the CompTIA Network+ Exam N10-005. Learn how to design, implement, configure, maintain, secure, and troubleshoot a network with this street-smart guide.
* Provides step-by-step instructions for many of the tasks network administrators perform on a day-to-day basis, such as configuring wireless components; placing routers and servers; configuring hubs, switches, and routers; configuring a Windows client; and troubleshooting a network * Addresses the CompTIA Network+ Exam N10-005 objectives and also includes a variety of practice labs, giving you plenty of opportunities for hands-on skill-building * Organized by the phases of network administration: designing a network, implementing and configuring it, maintenance and security, and troubleshooting Study, practice, and review for the new CompTIA Network+ N10-005 Exam, or a networking career, with this practical, thorough lab manual.
Toby Skandier, Network+, A+, i-Net+, Server+, is founder of Talskan Technologies, LLC, a technical education provider based in North Carolina. He is the author of Network Administrator Street Smarts: A Real World Guide to CompTIA Network+ Skills and has coauthored numerous books for Sybex, including the CompTIA A+ Complete Study Guide.
Introduction xix Phase 1 Designing an Internetwork 1 Task 1.1: Drawing an Internetwork 2 Scenario 3 Scope of Task 3 Procedure 4 Criteria for Completion 7 Task 1.2: Identifying Network Components 10 Scenario 11 Scope of Task 11 Procedure 11 Criteria for Completion 12 Task 1.3: Differentiating Ethernet Devices 16 Scenario 17 Scope of Task 17 Procedure 17 Criteria for Completion 20 Task 1.4: Identifying Collision and Broadcast Domains 20 Scenario 20 Scope of Task 20 Procedure 21 Criteria for Completion 22 Task 1.5: Discovering and Filtering MAC Addresses 25 Scenario 26 Scope of Task 26 Procedure 26 Criteria for Completion 39 Task 1.6: Applying the OSI Model 39 Scenario 39 Scope of Task 39 Procedure 40 Criteria for Completion 42 Task 1.7: Developing an IP Addressing Scheme 42 Scenario 42 Scope of Task 42 Procedure 43 Criteria for Completion 53 Task 1.8: Designing a VLAN Scheme 55 Scenario 56 Scope of Task 56 Procedure 57 Criteria for Completion 61 Task 1.9: Planning for Static and Dynamic Routing 62 Scenario 62 Scope of Task 62 Procedure 63 Criteria for Completion 69 Phase 2 Implementing and Configuring the Design 71 Task 2.1: Assigning IP Addresses 72 Scenario 72 Scope of Task 73 Procedure 73 Criteria for Completion 97 Task 2.2: Naming Network Devices 97 Scenario 98 Scope of Task 98 Procedure 99 Criteria for Completion 103 Task 2.3: Implementing Static and Dynamic Routing 103 Scenario 104 Scope of Task 104 Procedure 105 Criteria for Completion 112 Task 2.4: Installing Wireless NICs 112 Scenario 112 Scope of Task 112 Procedure 113 Criteria for Completion 125 Task 2.5: Measuring Wireless Signal Strength 126 Scenario 126 Scope of Task 127 Procedure 127 Criteria for Completion 129 Task 2.6: Implementing Bluetooth 129 Scenario 130 Scope of Task 131 Procedure 131 Criteria for Completion 134 Task 2.7: Implementing Ad Hoc Wireless Networking 135 Scenario 135 Scope of Task 135 Procedure 136 Criteria for Completion 146 Task 2.8: Using an Analog Modem 146 Scenario 147 Scope of Task 147 Procedure 148 Criteria for Completion 160 Task 2.9: Using a DSL Modem 160 Scenario 160 Scope of Task 160 Procedure 161 Criteria for Completion 167 Task 2.10: Using a Router as a Frame Relay Switch 167 Scenario 167 Scope of Task 167 Procedure 168 Criteria for Completion 174 Task 2.11: Simulating T1 CSU/DSUs 174 Scenario 175 Scope of Task 175 Procedure 176 Criteria for Completion 179 Task 2.12: Installing a Virtual Machine 179 Scenario 179 Scope of Task 179 Procedure 180 Criteria for Completion 192 Phase 3 Maintaining and Securing the Network 193 Task 3.1: Creating Local User Accounts 194 Scenario 195 Scope of Task 195 Procedure 196 Criteria for Completion 199 Task 3.2: Creating Local User Groups 200 Scenario 200 Scope of Task 200 Procedure 201 Criteria for Completion 205 Task 3.3: Managing Access to Resources 205 Scenario 205 Scope of Task 206 Procedure 206 Criteria for Completion 219 Task 3.4: Disabling Local User Accounts 219 Scenario 220 Scope of Task 220 Procedure 221 Criteria for Completion 224 Task 3.5: Setting Password Restrictions 224 Scenario 225 Scope of Task 225 Procedure 226 Criteria for Completion 234 Task 3.6: Mitigating the Ping of Death 234 Scenario 235 Scope of Task 235 Procedure 236 Criteria for Completion 239 Task 3.7: Securing Links Between Routers 239 Scenario 239 Scope of Task 240 Procedure 240 Criteria for Completion 245 Task 3.8: Guarding against SYN Flood Attacks 245 Scenario 246 Scope of Task 246 Procedure 246 Criteria for Completion 250 Task 3.9: Implementing File-Level Encryption 250 Scenario 251 Scope of Task 251 Procedure 252 Criteria for Completion 262 Task 3.10: Establishing Data Encryption between Routers 262 Scenario 262 Scope of Task 262 Procedure 263 Criteria for Completion 275 Task 3.11: Creating Data Backups 275 Scenario 276 Scope of Task 276 Procedure 277 Criteria for Completion 292 Task 3.12: Running an Antivirus Scan 292 Scenario 292 Scope of Task 292 Procedure 293 Criteria for Completion 299 Task 3.13: Running an Antispyware Scan 300 Scenario 300 Scope of Task 300 Procedure 301 Criteria for Completion 311 Task 3.14: Searching for Operating System Updates 311 Scenario 312 Scope of Task 312 Procedure 313 Criteria for Completion 319 Phase 4 Troubleshooting the Network 321 Task 4.1: Using ARP Utilities 322 Scenario 323 Scope of Task 323 Procedure 323 Criteria for Completion 326 Task 4.2: Using the NETSTAT Utility 326 Scenario 327 Scope of Task 327 Procedure 327 Criteria for Completion 330 Task 4.3: Using the FTP Utility 330 Scenario 330 Scope of Task 330 Procedure 331 Criteria for Completion 348 Task 4.4: Using Ping Utilities 348 Scenario 348 Scope of Task 348 Procedure 349 Criteria for Completion 352 Task 4.5: Using the IPCONFIG Utility 353 Scenario 353 Scope of Task 353 Procedure 354 Criteria for Completion 361 Task 4.6: Using Traceroute Utilities 361 Scenario 362 Scope of Task 362 Procedure 363 Criteria for Completion 366 Task 4.7: Using Telnet 367 Scenario 367 Scope of Task 367 Procedure 367 Criteria for Completion 371 Task 4.8: Using the NSLOOKUP Utility 372 Scenario 372 Scope of Task 372 Procedure 373 Criteria for Completion 378 Task 4.9a: Using the Built-in Protocol Analyzer 378 Scenario 379 Scope of Task 379 Procedure 379 Criteria for Completion 391 Task 4.9b: Using a Third-Party Protocol Analyzer 391 Scenario 392 Scope of Task 392 Procedure 392 Criteria for Completion 401 Task 4.10: Displaying Computer Event Logs 401 Scenario 401 Scope of Task 402 Procedure 402 Criteria for Completion 413 Index 415
Zusatzinfo | Illustrations |
---|---|
Verlagsort | New York |
Sprache | englisch |
Maße | 189 x 234 mm |
Gewicht | 712 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Weitere Themen ► Zertifizierung | |
ISBN-10 | 1-118-14863-0 / 1118148630 |
ISBN-13 | 978-1-118-14863-1 / 9781118148631 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich