Cargando…

CompTIA Network+ Lab Manual.

Gain street-smart skills in network administrationThink of the most common and challenging tasks that network administrators face, then read this book and find out how to perform those tasks, step by step. CompTIA Network + Lab Manual provides an inside look into the field of network administration...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Skandier, Toby
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : John Wiley & Sons, 2012.
Edición:3rd ed.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • CompTIA Network+ Lab Manual; Introduction; What Is Network+ Certification?; Is This Book for You?; How This Book Is Organized; The Network+ Exam Objectives; Phase 1: Designing an Internetwork; Task 1.1: Drawing an Internetwork; Task 1.2: Identifying Network Components; Task 1.3: Differentiating Ethernet Devices; Task 1.4: Identifying Collision and Broadcast Domains; Task 1.5: Discovering and Filtering MAC Addresses; Task 1.6: Applying the OSI Model; Task 1.7: Developing an IP Addressing Scheme; Task 1.8: Designing a VLAN Scheme; Task 1.9: Planning for Static and Dynamic Routing.
  • Phase 2: Implementing and Configuring the DesignTask 2.1: Assigning IP Addresses; Task 2.2: Naming Network Devices; Task 2.3: Implementing Static and Dynamic Routing; Task 2.4: Installing Wireless NICs; Task 2.5: Measuring Wireless Signal Strength; Task 2.6: Implementing Bluetooth; Task 2.7: Implementing Ad Hoc Wireless Networking; Task 2.8: Using an Analog Modem; Task 2.9: Using a DSL Modem; Task 2.10: Using a Router as a Frame Relay Switch; Task 2.11: Simulating T1 CSU/DSUs; Task 2.12: Installing a Virtual Machine; Phase 3: Maintaining and Securing the Network.
  • Task 3.1: Creating Local User AccountsTask 3.2: Creating Local User Groups; Task 3.3: Managing Access to Resources; Task 3.4: Disabling Local User Accounts; Task 3.5: Setting Password Restrictions; Task 3.6: Mitigating the Ping of Death; Task 3.7: Securing Links Between Routers; Task 3.8: Guarding against SYN Flood Attacks; Task 3.9: Implementing File-Level Encryption; Task 3.10: Establishing Data Encryption between Routers; Task 3.11: Creating Data Backups; Task 3.12: Running an Antivirus Scan; Task 3.13: Running an Antispyware Scan; Task 3.14: Searching for Operating System Updates.
  • Phase 4: Troubleshooting the NetworkTask 4.1: Using ARP Utilities; Task 4.2: Using the NETSTAT Utility; Task 4.3: Using the FTP Utility; Task 4.4: Using Ping Utilities; Task 4.5: Using the IPCONFIG Utility; Task 4.6: Using Traceroute Utilities; Task 4.7: Using Telnet; Task 4.8: Using the NSLOOKUP Utility; Task 4.9a: Using the Built-in Protocol Analyzer; Task 4.9b: Using a Third-Party Protocol Analyzer; Task 4.10: Displaying Computer Event Logs; Index.