CompTIA Network+ Review Guide. Ferguson Bill

Чтение книги онлайн.

Читать онлайн книгу CompTIA Network+ Review Guide - Ferguson Bill страница 8

CompTIA Network+ Review Guide - Ferguson Bill

Скачать книгу

readers/key fob

      ■ Biometrics

      ■ Keypad/cypher locks

      ■ Security guard

      ✓ 3.5 Given a scenario, install and configure a basic firewall

      ■ Types of firewalls

      ■ Host-based

      ■ Network-based

      ■ Software vs. Hardware

      ■ Application aware/context aware

      ■ Small office/Home office firewall

      ■ Stateful vs. stateless inspection

      ■ UTM

      ■ Settings/techniques

      ■ ACL

      ■ Virtual wire vs. routed

      ■ DMZ

      ■ Implicit deny

      ■ Block/allow

      ■ Outbound traffic

      ■ Inbound traffic

      ■ Firewall placement

      ■ Internal/external

      ✓ 3.6 Explain the purpose of various network access control methods

      ■ 802.1x

      ■ Posture assessment

      ■ Guest network

      ■ Persistent vs. non-persistent agents

      ■ Quarantine network

      ■ Edge vs. Access control

      ✓ 3.7 Summarize basic forensic concepts

      ■ First responder

      ■ Secure the area

      ■ Escalate when necessary

      ■ Document the scene

      ■ eDiscovery

      ■ Evidence/Data Collection

      ■ Chain of custody

      ■ Data transport

      ■ Forensics report

      ■ Legal hold

      Chapter 4: Domain 4 Troubleshooting

      ✓ 4.1 Given a scenario, implement the following network troubleshooting methodology:

      ■ Identify the problem

      ■ Gather information

      ■ Duplicate the problem

      ■ Question Users

      ■ Identify symptoms

      ■ Determine if anything has changed

      ■ Approach multiple problems individually

      ■ Establish theory of probable cause

      ■ Question the obvious

      ■ Consider multiple approaches

      ■ Top-to-bottom/bottom to top of OSI Model

      ■ Divide and conquer

      ■ Test the theory to determine cause

      ■ Once theory is confirmed, determine the next steps to resolve the problem

      ■ If theory is not confirmed, re-establish new theory or escalate

      ■ Establish a plan of action to resolve the problem and identify potential effects

      ■ Implement the solution or escalate as necessary

      ■ Verify full system functionality and if applicable implement preventative measures

      ■ Document findings, actions, and outcomes

      ✓ 4.2 Given a scenario, analyze and interpret the output of troubleshooting tools

      ■ Command line tools

      ■ ipconfig

      ■ netstat

      ■ ifconfig

      ■ ping/ping6/ping-6

      ■ tracert/tracert-6/traceroute6/traceroute-6

      ■ nbtstat

      ■ nslookup

      ■ arp

      ■ mac address lookup table

      ■ pathping

      ■ Line testers

      ■ Certifiers

      ■ Multimeter

      ■ Cable tester

      ■ Light meter

      ■ Toner probe

      ■ Speed test sites

      ■ Looking glass sites

      ■ WiFi analyzer

      ■ Protocol analyzer

      ✓ 4.3 Given a scenario, troubleshoot and resolve common wireless issues

      ■ Signal loss

      ■ Interference

      ■ Overlapping channels

      ■ Mismatched channels

      ■ Signal-to-noise ratio

      ■ Device saturation

      ■ Bandwidth saturation

      ■ Untested updates

      ■ Wrong SSID

      ■ Power levels

      ■ Open networks

      ■ Rogue access point

      ■ Wrong antenna type

      ■ Incompatibilities

      ■ Wrong encryption

      ■ Bounce

      ■ MIMO

      ■

Скачать книгу