Networking Essentials Companion Guide v3

Cisco Certified Support Technician (CCST) Networking 100-150

E-book Engels 2024 9780138321314
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-150 is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy.

Networking is at the heart of the digital transformation. The network is essential to many business functions today, including business-critical data and operations, cybersecurity, and so much more. A wide variety of career paths rely on the network, so it's important to understand what the network can do, how it operates, and how to protect it.

This is a great course for developers, data scientists, cybersecurity specialists, and other professionals looking to broaden their networking domain knowledge. It's also an excellent launching point for students pursuing a wide range of career pathways—from cybersecurity to software development to business and more.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book's features help you focus on important concepts to succeed in this course: Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter. Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. Glossary: Consult the comprehensive Glossary with more than 250 terms. Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

Specificaties

ISBN13:9780138321314
Taal:Engels
Bindwijze:e-book

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Introduction xlii<br> <strong>Chapter 1</strong> Communications in a Connected World 1<br> Objectives 1<br> Key Terms 1<br> Introduction (1.0) 2<br> Network Types (1.1) 2<br> Everything Is Online (1.1.2) 2<br> Who Owns “The Internet”? (1.1.3) 2<br> Local Networks (1.1.4) 3<br> Small Home Networks 4<br> Small Office and Home Office Networks 4<br> Medium to Large Networks 4<br> Worldwide Networks 6<br> Mobile Devices (1.1.5) 6<br> Smartphone 6<br> Tablet 7<br> Smartwatch 8<br> Smart Glasses 8<br> Connected Home Devices (1.1.6) 8<br> Security System 8<br> Appliances 9<br> Smart TV 10<br> Gaming Console 11<br> Other Connected Devices (1.1.7) 11<br> Smart Cars 11<br> RFID Tags 12<br> Sensors and Actuators 13<br> Medical Devices 13<br> Data Transmission (1.2) 14<br> The Bit (1.2.2) 14<br> Common Methods of Data Transmission (1.2.3) 15<br> Bandwidth and Throughput (1.3) 17<br> Bandwidth (1.3.1) 17<br> Throughput (1.3.2) 18<br> Communications in a Connected World Summary (1.4) 18<br> What Did I Learn in This Chapter? (1.4.1) 19<br> Reflection Questions (1.4.2) 20<br> Practice 21<br> Check Your Understanding Questions 21<br> <strong>Chapter 2</strong> Network Components, Types, and Connections 25<br> Objectives 25<br> Key Terms 25<br> Introduction (2.0) 26<br> Clients and Servers (2.1) 26<br> Client and Server Roles (2.1.2) 26<br> Peer-to-Peer Networks (2.1.3) 27<br> Peer-to-Peer Applications (2.1.4) 28<br> Multiple Roles in the Network (2.1.5) 29<br> Network Components (2.2) 30<br> Network Infrastructure (2.2.2) 30<br> End Devices (2.2.3) 32<br> ISP Connectivity Options (2.3) 33<br> ISP Services (2.3.1) 33<br> ISP Connections (2.3.2) 34<br> Cable and DSL Connections (2.3.3) 35<br> Additional Connectivity Options (2.3.4) 36<br> Network Components, Types, and Connections Summary (2.4) 37<br> What Did I Learn in This Chapter? (2.4.1) 37<br> Reflection Questions (2.4.2) 38<br> Practice 39<br> Check Your Understanding Questions 39<br> <strong>Chapter 3</strong> Wireless and Mobile Networks 41<br> Objectives 41<br> Key Terms 41<br> Introduction (3.0) 42<br> Wireless Networks (3.1) 42<br> Other Wireless Networks (3.1.3) 43<br> Global Positioning System 43<br> Wi-Fi 43<br> Bluetooth 43<br> NFC 43<br> Mobile Device Connectivity (3.2) 44<br> Mobile Devices and Wi-Fi (3.2.1) 44<br> Wi-Fi Settings (3.2.2) 44<br> Configure Mobile Wi-Fi Connectivity (3.2.3) 46<br> Configure Cellular Data Settings (3.2.4) 47<br> Android Cellular Data 47<br> iOS Cellular Data 48<br> Simple Connectivity with Bluetooth (3.2.6) 49<br> Bluetooth Pairing (3.2.7) 50<br> Explore Your Network Settings on Your Mobile Device (3.2.8) 51<br> Wireless and Mobile Networks Summary (3.3) 52<br> What Did I Learn in This Chapter? (3.3.1) 52<br> Reflection Questions (3.3.2) 53<br> Practice 54<br> Check Your Understanding Questions 54<br> <strong>Chapter 4</strong> Build a Home Network 57<br> Objectives 57<br> Key Terms 57<br> Introduction (4.0) 58<br> Home Network Basics (4.1) 58<br> Components of a Home Network (4.1.2) 58<br> Typical Home Network Routers (4.1.3) 59<br> Network Technologies in the Home (4.2) 60<br> LAN Wireless Frequencies (4.2.1) 61<br> Wired Network Technologies (4.2.2) 62<br> Category 5e Cable 62<br> Coaxial Cable 62<br> Fiber-Optic Cable 63<br> Wireless Standards (4.3) 63<br> Wi-Fi Networks (4.3.1) 64<br> Wireless Settings (4.3.2) 64<br> Network Mode 65<br> Set Up a Home Router (4.4) 66<br> First Time Setup (4.4.1) 66<br> Design Considerations (4.4.2) 67<br> Build a Home Network Summary (4.5) 69<br> What Did I Learn in This Chapter? (4.5.1) 69<br> Reflection Questions (4.5.2) 71<br> Practice 72<br> Packet Tracer Activities 72<br> Check Your Understanding Questions 72<br> <strong>Chapter 5</strong> Communication Principles 75<br> Objectives 75<br> Key Terms 75<br> Introduction (5.0) 76<br> Networking Protocols (5.1) 76<br> Communication Protocols (5.1.1) 76<br> Why Protocols Matter (5.1.2) 78<br> Communication Standards (5.2) 80<br> The Internet and Standards (5.2.2) 80<br> Network Standards Organizations (5.2.3) 80<br> Network Communication Models (5.3) 81<br> The TCP/IP Model (5.3.3) 81<br> The OSI Reference Model (5.3.4) 82<br> OSI Model and TCP/IP Model Comparison (5.3.5) 83<br> Communication Principles Summary (5.4) 85<br> What Did I Learn in This Chapter? (5.4.1) 85<br> Reflection Questions (5.4.2) 87<br> Practice 88<br> Check Your Understanding Questions 88<br> <strong>Chapter 6</strong> Network Media 91<br> Objectives 91<br> Key Terms 91<br> Introduction (6.0) 92<br> Network Media Types (6.1) 92<br> Three Media Types (6.1.2) 92<br> Common Network Cables (6.1.3) 93<br> Twisted-Pair Cable 93<br> Coaxial Cable 94<br> Fiber-Optic Cable 95<br> Network Media Summary (6.2) 95<br> What Did I Learn in This Chapter? (6.2.1) 95<br> Reflection Questions (6.2.2) 96<br> Practice 97<br> Check Your Understanding Questions 97<br> <strong>Chapter 7</strong> The Access Layer 101<br> Objectives 101<br> Key Terms 101<br> Introduction (7.0) 102<br> Encapsulation and the Ethernet Frame (7.1) 102<br> Encapsulation (7.1.2) 102<br> The Access Layer (7.2) 104<br> Ethernet Frame (7.2.1) 104<br> Access Layer Devices (7.2.2) 105<br> Ethernet Hubs (7.2.3) 106<br> Ethernet Switches (7.2.4) 107<br> The MAC Address Table (7.2.5) 109<br> The Access Layer Summary (7.3) 111<br> What Did I Learn in This Chapter? (7.3.1) 111<br> Reflection Questions (7.3.2) 113<br> Practice 114<br> Check Your Understanding Questions 114<br> <strong>Chapter 8</strong> The Internet Protocol 117<br> Objectives 117<br> Introduction (8.0) 118<br> Purpose of an IPv4 Address (8.1) 118<br> The IPv4 Address (8.1.1) 118<br> Octets and Dotted-Decimal Notation (8.1.2) 119<br> The IPv4 Address Structure (8.2) 119<br> Networks and Hosts (8.2.2) 119<br> Summary (8.3) 121<br> What Did I Learn in This Chapter? (8.3.1) 121<br> Reflection Questions (8.3.2) 121<br> Practice 122<br> Packet Tracer Activities 122<br> Check Your Understanding Questions 122<br> <strong>Chapter 9</strong> IPv4 and Network Segmentation 125<br> Objectives 125<br> Key Terms 125<br> Introduction (9.0) 126<br> IPv4 Unicast, Broadcast, and Multicast (9.1) 126<br> Unicast (9.1.2) 126<br> Broadcast (9.1.4) 127<br> Multicast (9.1.6) 129<br> Types of IPv4 Addresses (9.2) 130<br> Public and Private IPv4 Addresses (9.2.1) 130<br> Routing to the Internet (9.2.2) 131<br> Special-Use IPv4 Addresses (9.2.4) 132<br> Loopback Addresses 132<br> Link-Local addresses 133<br> Legacy Classful Addressing (9.2.5) 133<br> Assignment of IP Addresses (9.2.6) 134<br> Network Segmentation (9.3) 135<br> Broadcast Domains and Segmentation (9.3.2) 136<br> Problems with Large Broadcast Domains (9.3.3) 137<br> Reasons for Segmenting Networks (9.3.4) 138<br> IPv4 and Network Segmentation Summary (9.4) 140<br> What Did I Learn in This Chapter? (9.4.1) 140<br> Reflection Questions (9.4.2) 143<br> Practice 144<br> Check Your Understanding Questions 144<br> <strong>Chapter 10</strong> IPv6 Addressing Formats and Rules 147<br> Objectives 147<br> Key Terms 147<br> Introduction (10.0) 148<br> IPv4 Issues (10.1) 148<br> The Need for IPv6 (10.1.1) 148<br> Internet of Things 149<br> IPv4 and IPv6 Coexistence (10.1.2) 150<br> Dual Stack 150<br> Tunneling 150<br> Translation 151<br> IPv6 Addressing (10.2) 152<br> Hexadecimal Number System (10.2.1) 152<br> IPv6 Addressing Formats (10.2.2) 152<br> Preferred Format 153<br> Rule 1—Omit Leading Zeros (10.2.4) 153<br> Rule 2—Double Colon (10.2.5) 155<br> IPv6 Addressing Formats and Rules Summary (10.3) 156<br> What Did I Learn in This Chapter? (10.3.1) 157<br> Reflection Questions (10.3.2) 158<br> Practice 159<br> Check Your Understanding Questions 159<br> <strong>Chapter 11</strong> Dynamic Addressing with DHCP 163<br> Objectives 163<br> Key Term 163<br> Introduction (11.0) 164<br> Static and Dynamic Addressing (11.1) 164<br> Static IPv4 Address Assignment (11.1.1) 164<br> Dynamic IPv4 Address Assignment (11.1.2) 165<br> DHCP Servers (11.1.3) 166<br> DHCPv4 Configuration (11.2) 167<br> DHCPv4 Operation (11.2.1) 168<br> DHCP Service Configuration (11.2.3) 169<br> Dynamic Addressing with DHCP Summary (11.3) 170<br> What Did I Learn in This Chapter? (11.3.1) 170<br> Reflection Questions (11.3.2) 171<br> Practice 172<br> Packet Tracer Activities 172<br> Check Your Understanding Questions 172<br> <strong>Chapter 12</strong> Gateways to Other Networks 175<br> Objectives 175<br> Key Term 175<br> Introduction (12.0) 176<br> Network Boundaries (12.1) 176<br> Routers as Gateways (12.1.2) 176<br> Routers as Boundaries Between Networks (12.1.3) 177<br> Network Address Translation (12.2) 178<br> NAT Operation (12.2.1) 179<br> Gateways to Other Networks Summary (12.3) 180<br> What Did I Learn in This Chapter? (12.3.1) 180<br> Reflection Questions (12.3.2) 181<br> Practice 182<br> Packet Tracer Activities 182<br> Check Your Understanding Questions 182<br> <strong>Chapter 13</strong> The ARP Process 185<br> Objectives 185<br> Key Term 185<br> Introduction (13.0) 186<br> MAC and IP (13.1) 186<br> Destination on Same Network (13.1.1) 186<br> Destination on Remote Network (13.1.2) 187<br> Broadcast Containment (13.2) 189<br> Broadcast Domains (13.2.2) 190<br> Access Layer Communication (13.2.3) 191<br> ARP (13.2.5) 192<br> The ARP Process Summary (13.3) 193<br> What Did I Learn in This Chapter? (13.3.1) 193<br> Reflection Questions (13.3.2) 194<br> Practice 195<br> Packet Tracer Activities 195<br> Check Your Understanding Questions 195<br> <strong>Chapter 14</strong> Routing Between Networks 199<br> Objectives 199<br> Key Terms 199<br> Introduction (14.0) 200<br> The Need for Routing (14.1) 200<br> Now We Need Routing (14.1.2) 200<br> The Routing Table (14.2) 201<br> Routing Table Entries (14.2.4) 202<br> The Default Gateway (14.2.5) 203<br> Create a LAN (14.3) 204<br> Local Area Networks (14.3.1) 205<br> Local and Remote Network Segments (14.3.2) 205<br> All Hosts in One Local Segment 206<br> Hosts on a Remote Segment 206<br> Routing Between Networks Summary (14.4) 208<br> What Did I Learn in This Chapter? (14.4.1) 208<br> Reflection Questions (14.4.2) 210<br> Practice 211<br> Packet Tracer Activities 211<br> Check Your Understanding Questions 211<br> <strong>Chapter 15</strong> TCP and UDP 215<br> Objectives 215<br> Key Terms 215<br> Introduction (15.0) 216<br> TCP and UDP (15.1) 216<br> Protocol Operations (15.1.1) 216<br> TCP and UDP (15.1.2) 217<br> TCP Reliability (15.1.3) 218<br> UDP Best Effort Delivery (15.1.4) 218<br> Port Numbers (15.2) 219<br> TCP and UDP Port Numbers (15.2.1) 219<br> Socket Pairs (15.2.2) 222<br> The <strong>netstat</strong> Command (15.2.3) 223<br> TCP and UDP Summary (15.3) 224<br> What Did I Learn in This Chapter? (15.3.1) 224<br> Reflection Questions (15.3.2) 225<br> Practice 226<br> Check Your Understanding Questions 226<br> <strong>Chapter 16</strong> Application Layer Services 229<br> Objectives 229<br> Key Terms 229<br> Introduction (16.0) 230<br> The Client-Server Relationship (16.1) 230<br> Client and Server Interaction (16.1.1) 230<br> Client Requests a Web Page (16.1.2) 231<br> URI, URN, and URL (16.1.3) 232<br> Network Application Services (16.2) 233<br> Common Network Application Services (16.2.1) 233<br> Domain Name System (16.3) 234<br> Domain Name Translation (16.3.1) 234<br> DNS Servers (16.3.2) 235<br> A Note About Syntax Checker Activities (16.3.3) 236<br> Web Clients and Servers (16.4) 236<br> HTTP and HTML (16.4.2) 237<br> FTP Clients and Servers (16.5) 238<br> File Transfer Protocol (16.5.1) 238<br> Virtual Terminals (16.6) 239<br> Telnet (16.6.2) 240<br> Security Issues with Telnet (16.6.3) 241<br> Email and Messaging (16.7) 242<br> Email Clients and Servers (16.7.1) 242<br> Email Protocols (16.7.2) 242<br> Simple Mail Transfer Protocol (SMTP) 243<br> Post Office Protocol (POP3) 243<br> Internet Message Access Protocol (IMAP4) 243<br> Text Messaging (16.7.3) 244<br> Internet Phone Calls (16.7.4) 245<br> Application Layer Services Summary (16.8) 245<br> What Did I Learn in This Chapter? (16.8.1) 245<br> Reflection Questions (16.8.2) 248<br> Practice 249<br> Packet Tracer Activities 249<br> Check Your Understanding Questions 249<br> <strong>Chapter 17</strong> Network Testing Utilities 253<br> Objectives 253<br> Key Terms 253<br> Introduction (17.0) 254<br> Troubleshooting Commands (17.1) 254<br> Overview of Troubleshooting Commands (17.1.1) 254<br> The <strong>ipconfig</strong> Command (17.1.2) 254<br> The <strong>ping</strong> Command (17.1.4) 258<br> Ping Results (17.1.5) 259<br> Network Testing Utilities Summary (17.2) 260<br> What Did I Learn in This Chapter? (17.2.1) 260<br> Reflection Questions (17.2.2) 261<br> Practice 262<br> Packet Tracer Activities 262<br> Check Your Understanding Questions 262<br> <strong>Chapter 18</strong> Network Design 265<br> Objectives 265<br> Key Terms 265<br> Introduction (18.0) 266<br> Reliable Networks (18.1) 266<br> Network Architecture (18.1.1) 266<br> Fault Tolerance (18.1.3) 267<br> Scalability (18.1.4) 267<br> Quality of Service (18.1.5) 269<br> Network Security (18.1.6) 270<br> Hierarchical Network Design (18.2) 271<br> Physical and Logical Addresses (18.2.1) 271<br> Hierarchical Analogy (18.2.4) 272<br> Access, Distribution, and Core (18.2.6) 273<br> Access Layer 273<br> Distribution Layer 274<br> Core Layer 274<br> Network Design Summary (18.3) 275<br> What Did I Learn in This Chapter? (18.3.1) 275<br> Reflection Questions (18.3.2) 276<br> Practice 277<br> Labs 277<br> Check Your Understanding Questions 277<br> <strong>Chapter 19</strong> Cloud and Virtualization 281<br> Objectives 281<br> Key Terms 281<br> Introduction (19.0) 282<br> Cloud and Cloud Services (19.1) 282<br> Types of Clouds (19.1.2) 282<br> Cloud Services (19.1.3) 283<br> Cloud Computing and Virtualization (19.1.4) 284<br> Virtualization (19.2) 285<br> Advantages of Virtualization (19.2.1) 285<br> Hypervisors (19.2.2) 286<br> Type 1 Hypervisor—“Bare Metal” Approach 286<br> Type 2 Hypervisor—“Hosted” Approach 286<br> Cloud and Virtualization Summary (19.3) 287<br> What Did I Learn in This Chapter? (19.3.1) 287<br> Reflection Questions (19.3.2) 289<br> Practice 290<br> Labs 290<br> Check Your Understanding Questions 290<br> <strong>Chapter 20</strong> Number Systems 293<br> Objectives 293<br> Key Terms 293<br> Introduction (20.0) 294<br> Binary Number System (20.1) 294<br> Binary and IPv4 Addresses (20.1.1) 294<br> Decimal to Binary Conversion (20.1.5) 296<br> Decimal to Binary Conversion Example (20.1.6) 300<br> IPv4 Addresses (20.1.9) 307<br> Hexadecimal Number System (20.2) 308<br> Hexadecimal and IPv6 Addresses (20.2.1) 308<br> Number Systems Summary (20.3) 311<br> What Did I Learn in This Chapter? (20.3.1) 311<br> Reflection Questions (20.3.2) 311<br> Practice 312<br> Check Your Understanding Questions 312<br> <strong>Chapter 21</strong> Ethernet Switching 315<br> Objectives 315<br> Key Terms 315<br> Introduction (21.0) 316<br> Ethernet (21.1) 316<br> The Rise of Ethernet (21.1.1) 316<br> Ethernet Evolution (21.1.2) 317<br> Ethernet Frames (21.2) 318<br> Ethernet Encapsulation (21.2.1) 318<br> Data Link Sublayers (21.2.2) 319<br> MAC Sublayer (21.2.3) 320<br> Data Encapsulation 321<br> Accessing the Media 321<br> Ethernet Frame Fields (21.2.4) 322<br> Ethernet MAC Address (21.3) 324<br> MAC Address and Hexadecimal (21.3.1) 324<br> Unicast MAC Address (21.3.2) 326<br> Broadcast MAC Address (21.3.3) 327<br> Multicast MAC Address (21.3.4) 328<br> The MAC Address Table (21.4) 330<br> Switch Fundamentals (21.4.1) 330<br> Switch Learning and Forwarding (21.4.2) 331<br> Examine the Source MAC Address 331<br> Find the Destination MAC Address 332<br> Filtering Frames (21.4.3) 333<br> Ethernet Switching Summary (21.5) 336<br> What Did I Learn in This Chapter? (21.5.1) 336<br> Reflection Questions (21.5.2) 338<br> Practice 339<br> Labs 339<br> Check Your Understanding Questions 339<br> <strong>Chapter 22</strong> Network Layer 343<br> Objectives 343<br> Key Terms 343<br> Introduction (22.0) 344<br> Network Layer Characteristics (22.1) 344<br> The Network Layer (22.1.2) 344<br> IP Encapsulation (22.1.3) 346<br> Characteristics of IP (22.1.4) 347<br> Connectionless (22.1.5) 347<br> Best Effort (22.1.6) 348<br> Media Independent (22.1.7) 349<br> IPv4 Packet (22.2) 350<br> IPv4 Packet Header (22.2.1) 350<br> IPv4 Packet Header Fields (22.2.2) 350<br> IPv6 Packet (22.3) 352<br> Limitations of IPv4 (22.3.1) 352<br> IPv6 Overview (22.3.2) 353<br> IPv4 Packet Header Fields in the IPv6 Packet Header (22.3.3) 354<br> IPv6 Packet Header (22.3.4) 356<br> Network Layer Summary (22.4) 357<br> What Did I Learn in This Chapter? (22.4.1) 357<br> Reflection Questions (22.4.2) 358<br> Practice 359<br> Check Your Understanding Questions 359<br> <strong>Chapter 23</strong> IPv4 Address Structure 363<br> Objectives 363<br> Key Terms 363<br> Introduction (23.0) 364<br> IPv4 Address Structure (23.1) 364<br> Network and Host Portions (23.1.1) 364<br> The Subnet Mask (23.1.2) 365<br> The Prefix Length (23.1.3) 366<br> Determining the Network: Logical AND (23.1.4) 367<br> IPv4 Address Structure Summary (23.2) 369<br> What Did I Learn in This Chapter? (23.2.1) 369<br> Reflection Questions (23.2.2) 370<br> Practice 371<br> Check Your Understanding Questions 371<br> <strong>Chapter 24</strong> Address Resolution 375<br> Objectives 375<br> Key Terms 375<br> Introduction (24.0) 376<br> ARP (24.1) 376<br> ARP Overview (24.1.1) 376<br> ARP Functions (24.1.2) 377<br> Removing Entries from an ARP Table (24.1.6) 380<br> ARP Tables on Devices (24.1.7) 381<br> ARP Issues—ARP Broadcasts and ARP Spoofing (24.1.8) 382<br> Address Resolution Summary (24.2) 384<br> What Did I Learn in This Chapter? (24.2.1) 384<br> Reflection Questions (24.2.2) 385<br> Practice 386<br> Labs 386<br> Packet Tracer Activities 386<br> Check Your Understanding Questions 386<br> <strong>Chapter 25</strong> IP Addressing Services 391<br> Objectives 391<br> Key Terms 391<br> Introduction (25.0) 392<br> DNS Services (25.1) 392<br> Domain Name System (25.1.2) 392<br> DNS Message Format (25.1.3) 395<br> DNS Hierarchy (25.1.4) 395<br> The <strong>nslookup</strong> Command (25.1.5) 397<br> DHCP Services (25.2) 398<br> Dynamic Host Configuration Protocol (25.2.1) 398<br> DHCP Messages (25.2.3) 399<br> IP Addressing Services Summary (25.3) 401<br> What Did I Learn in This Chapter? (25.3.1) 401<br> Reflection Questions (25.3.2) 402<br> Practice 403<br> Labs 403<br> Check Your Understanding Questions 403<br> <strong>Chapter 26</strong> Transport Layer 407<br> Objectives 407<br> Key Terms 407<br> Introduction (26.0) 408<br> Transportation of Data (26.1) 408<br> Role of the Transport Layer (26.1.1) 408<br> Transport Layer Responsibilities (26.1.2) 409<br> Transport Layer Protocols (26.1.3) 413<br> Transmission Control Protocol (TCP) (26.1.4) 413<br> User Datagram Protocol (UDP) (26.1.5) 414<br> The Right Transport Layer Protocol for the Right Application (26.1.6) 415<br> TCP Overview (26.2) 417<br> TCP Features (26.2.1) 417<br> TCP Header (26.2.2) 418<br> TCP Header Fields (26.2.3) 418<br> Applications That Use TCP (26.2.4) 419<br> UDP Overview (26.3) 420<br> UDP Features (26.3.1) 420<br> UDP Header (26.3.2) 420<br> UDP Header Fields (26.3.3) 421<br> Applications That Use UDP (26.3.4) 421<br> Port Numbers (26.4) 422<br> Multiple Separate Communications (26.4.1) 422<br> Socket Pairs (26.4.2) 423<br> Port Number Groups (26.4.3) 424<br> The netstat Command (26.4.4) 426<br> TCP Communication Process (26.5) 427<br> TCP Server Processes (26.5.1) 427<br> TCP Connection Establishment (26.5.2) 430<br> Session Termination (26.5.3) 431<br> TCP Three-Way Handshake Analysis (26.5.4) 432<br> Reliability and Flow Control (26.6) 433<br> TCP Reliability—Guaranteed and Ordered Delivery (26.6.1) 433<br> TCP Reliability—Data Loss and Retransmission (26.6.3) 435<br> TCP Flow Control—Window Size and Acknowledgments (26.6.5) 437<br> TCP Flow Control—Maximum Segment Size (MSS) (26.6.6) 439<br> TCP Flow Control—Congestion Avoidance (26.6.7) 440<br> UDP Communication (26.7) 441<br> UDP Low Overhead Versus Reliability (26.7.1) 441<br> UDP Datagram Reassembly (26.7.2) 441<br> UDP Server Processes and Requests (26.7.3) 443<br> UDP Client Processes (26.7.4) 443<br> Transport Layer Summary (26.8) 447<br> What Did I Learn in This Chapter? (26.8.2) 447<br> Reflection Questions (26.8.3) 449<br> Practice 450<br> Packet Tracer Activities 450<br> Check Your Understanding Questions 450<br> <strong>Chapter 27</strong> The Cisco IOS Command Line 455<br> Objectives 455<br> Key Terms 455<br> Introduction (27.0) 456<br> Navigate the IOS (27.1) 456<br> The Cisco IOS Command-Line Interface (27.1.1) 456<br> Primary Command Modes (27.1.2) 457<br> A Note About Syntax Checker Activities (27.1.5) 458<br> The Command Structure (27.2) 458<br> Basic IOS Command Structure (27.2.1) 458<br> IOS Command Syntax (27.2.2) 459<br> Hotkeys and Shortcuts (27.2.4) 460<br> View Device Information (27.3) 462<br> <strong>show</strong> Commands (27.3.2) 463<br> The Cisco IOS Command Line Summary (27.4) 469<br> What Did I Learn in This Chapter? (27.4.1) 469<br> Reflection Questions (27.4.2) 471<br> Practice 472<br> Packet Tracer Activities 472<br> Check Your Understanding Questions 472<br> <strong>Chapter 28</strong> Build a Small Cisco Network 475<br> Objectives 475<br> Key Term 475<br> Introduction (28.0) 476<br> Basic Switch Configuration (28.1) 476<br> Basic Switch Configuration Steps (28.1.1) 476<br> Switch Virtual Interface Configuration (28.1.2) 478<br> Configure Initial Router Settings (28.2) 479<br> Basic Router Configuration Steps (28.2.1) 479<br> Basic Router Configuration Example (28.2.2) 480<br> Secure the Devices (28.3) 482<br> Password Recommendations (28.3.1) 482<br> Secure Remote Access (28.3.2) 483<br> Enable SSH (28.3.3) 485<br> Verify SSH (28.3.5) 487<br> Connecting the Switch to the Router (28.4) 488<br> Default Gateway for a Host (28.4.1) 488<br> Default Gateway on a Switch (28.4.2) 490<br> Build a Small Cisco Network Summary (28.5) 492<br> What Did I Learn in This Chapter? (28.5.1) 492<br> Reflection Questions (28.5.2) 495<br> Practice 496<br> Packet Tracer Activities 496<br> Check Your Understanding Questions 496<br> <strong>Chapter 29</strong> ICMP 499<br> Objectives 499<br> Introduction (29.0) 500<br> ICMP Messages (29.1) 500<br> ICMPv4 and ICMPv6 Messages (29.1.1) 500<br> Host Reachability (29.1.2) 500<br> Destination or Service Unreachable (29.1.3) 501<br> Time Exceeded (29.1.4) 502<br> ICMPv6 Messages (29.1.5) 502<br> Ping and Traceroute Tests (29.2) 505<br> Ping—Test Connectivity (29.2.1) 505<br> Ping the Local Loopback (29.2.2) 506<br> Ping the Default Gateway (29.2.3) 507<br> Ping a Remote Host (29.2.4) 508<br> Traceroute—Test the Path (29.2.5) 509<br> Round-Trip Time (RTT) 509<br> IPv4 TTL and IPv6 Hop Limit 509<br> ICMP Summary (29.3) 511<br> What Did I Learn in This Chapter? (29.3.2) 511<br> Reflection Questions (29.3.3) 513<br> Practice 514<br> Packet Tracer Activities 514<br> Check Your Understanding Questions 514<br> <strong>Chapter 30</strong> Physical Layer 519<br> Objectives 519<br> Key Terms 519<br> Introduction (30.0) 520<br> Purpose of the Physical Layer (30.1) 520<br> The Physical Connection (30.1.1) 520<br> The Physical Layer Process (30.1.2) 522<br> Physical Layer Characteristics (30.2) 523<br> Physical Layer Standards (30.2.1) 523<br> Physical Components (30.2.2) 525<br> Encoding (30.2.3) 525<br> Signaling (30.2.4) 525<br> Bandwidth (30.2.6) 527<br> Bandwidth Terminology (30.2.7) 528<br> Latency 528<br> Throughput 529<br> Goodput 529<br> Copper Cabling (30.3) 529<br> Characteristics of Copper Cabling (30.3.1) 529<br> Types of Copper Cabling (30.3.2) 531<br> Unshielded Twisted-Pair (UTP) (30.3.3) 531<br> Shielded Twisted-Pair (STP) (30.3.4) 533<br> Coaxial Cable (30.3.5) 533<br> UTP Cabling (30.4) 535<br> Properties of UTP Cabling (30.4.1) 535<br> UTP Cabling Standards and Connectors (30.4.2) 536<br> Straight-Through and Crossover UTP Cables (30.4.3) 539<br> Fiber-Optic Cabling (30.5) 541<br> Properties of Fiber-Optic Cabling (30.5.1) 541<br> Types of Fiber Media (30.5.2) 541<br> Single-Mode Fiber 541<br> Multimode Fiber 542<br> Fiber-Optic Cabling Usage (30.5.3) 543<br> Fiber-Optic Connectors (30.5.4) 543<br> Fiber Patch Cords (30.5.5) 545<br> Fiber Versus Copper (30.5.6) 547<br> Summary (30.6) 548<br> What Did I Learn in This Chapter? (30.6.1) 548<br> Reflection Questions (30.6.2) 550<br> Practice 551<br> Check Your Understanding Questions 551<br> <strong>Chapter 31</strong> Data Link Layer 555<br> Objectives 555<br> Key Terms 555<br> Introduction (31.0) 556<br> Topologies (31.1) 556<br> Physical and Logical Topologies (31.1.1) 556<br> WAN Topologies (31.1.2) 558<br> Point-to-Point 558<br> Hub and Spoke 558<br> Mesh 559<br> Point-to-Point WAN Topology (31.1.4) 559<br> LAN Topologies (31.1.5) 560<br> Legacy LAN Topologies 560<br> Media Access Control Methods (31.2) 561<br> Half- and Full-Duplex Communication (31.2.1) 562<br> Half-Duplex Communication 562<br> Full-Duplex Communication 562<br> Access Control Methods (31.2.2) 563<br> Contention-Based Access 563<br> Controlled Access 564<br> Contention-Based Access—CSMA/CD (31.2.3) 564<br> Contention-Based Access—CSMA/CA (31.2.4) 566<br> Summary (31.3) 568<br> What Did I Learn in This Chapter? (31.3.1) 568<br> Reflection Questions (31.3.2) 568<br> Practice 569<br> Check Your Understanding Questions 569<br> <strong>Chapter 32</strong> Routing at the Network Layer 571<br> Objectives 571<br> Key Terms 571<br> Introduction (32.0) 572<br> How a Host Routes (32.1) 572<br> Host Forwarding Decision (32.1.1) 572<br> Default Gateway (32.1.2) 574<br> A Host Routes to the Default Gateway (32.1.3) 574<br> Host Routing Tables (32.1.4) 575<br> Routing Tables (32.2) 576<br> Router Packet Forwarding Decision (32.2.1) 576<br> IP Router Routing Table (32.2.2) 577<br> Static Routing (32.2.3) 579<br> Dynamic Routing (32.2.4) 580<br> Introduction to an IPv4 Routing Table (32.2.6) 582<br> Summary (32.3) 582<br> What Did I Learn in This Chapter? (32.3.1) 582<br> Reflection Questions (32.3.2) 583<br> Practice 584<br> Check Your Understanding Questions 584<br> <strong>Chapter 33</strong> IPv6 Addressing 587<br> Objectives 587<br> Key Terms 587<br> Introduction (33.0) 588<br> IPv6 Address Types (33.1) 588<br> Unicast, Multicast, Anycast (33.1.1) 588<br> IPv6 Prefix Length (33.1.2) 588<br> Types of IPv6 Unicast Addresses (33.1.3) 589<br> A Note About the Unique Local Address (33.1.4) 590<br> IPv6 GUA (33.1.5) 591<br> IPv6 GUA Structure (33.1.6) 592<br> Global Routing Prefix 592<br> Subnet ID 592<br> Interface ID 593<br> IPv6 LLA (33.1.7) 593<br> GUA and LLA Static Configuration (33.2) 595<br> Static GUA Configuration on a Router (33.2.1) 595<br> Static GUA Configuration on a Windows Host (33.2.2) 596<br> Static Configuration of a Link-Local Unicast Address (33.2.3) 598<br> Dynamic Addressing for IPv6 GUAs (33.3) 599<br> RS and RA Messages (33.3.1) 599<br> Method 1: SLAAC (33.3.2) 601<br> Method 2: SLAAC and Stateless DHCPv6 (33.3.3) 602<br> Method 3: Stateful DHCPv6 (33.3.4) 603<br> EUI-64 Process vs. Randomly Generated (33.3.5) 604<br> EUI-64 Process (33.3.6) 605<br> Randomly Generated Interface IDs (33.3.7) 606<br> Dynamic Addressing for IPv6 LLAs (33.4) 607<br> Dynamic LLAs (33.4.1) 607<br> Dynamic LLAs on Windows (33.4.2) 608<br> Dynamic LLAs on Cisco Routers (33.4.3) 609<br> Verify IPv6 Address Configuration (33.4.4) 609<br> IPv6 Multicast Addresses (33.5) 612<br> Assigned IPv6 Multicast Addresses (33.5.1) 612<br> Well-Known IPv6 Multicast Addresses (33.5.2) 613<br> Solicited-Node IPv6 Multicast Addresses (33.5.3) 614<br> Summary (33.6) 615<br> What Did I Learn in This Chapter? (33.6.1) 615<br> Reflection Questions (33.6.2) 616<br> Practice 617<br> Packet Tracer Activities 617<br> Check Your Understanding Questions 617<br> <strong>Chapter 34</strong> IPv6 Neighbor Discovery 621<br> Objectives 621<br> Key Terms 621<br> Introduction (34.0) 622<br> Neighbor Discovery Operation (34.1) 622<br> IPv6 Neighbor Discovery Messages (34.1.2) 622<br> IPv6 Neighbor Discovery—Address Resolution (34.1.3) 623<br> Summary (34.2) 625<br> What Did I Learn in This Chapter? (34.2.1) 625<br> Practice 626<br> Packet Tracer Activities 626<br> Check Your Understanding Questions 626<br> <strong>Chapter 35</strong> Cisco Switches and Routers 629<br> Objectives 629<br> Key Terms 629<br> Introduction (35.0) 630<br> Cisco Switches (35.1) 630<br> Connect More Devices (35.1.1) 630<br> Cisco LAN Switches (35.1.2) 631<br> Type of Ports 632<br> Speed Required 632<br> Expandability 633<br> Manageability 633<br> LAN Switch Components (35.1.5) 634<br> Switch Speeds and Forwarding Methods (35.2) 635<br> Frame Forwarding Methods on Cisco Switches (35.2.1) 635<br> Cut-Through Switching (35.2.2) 636<br> Memory Buffering on Switches (35.2.3) 638<br> Duplex and Speed Settings (35.2.4) 638<br> Auto-MDIX (35.2.5) 640<br> Switch Boot Process (35.3) 641<br> Power Up the Switch (35.3.1) 642<br> In-Band and Out-of-Band Management (35.3.3) 644<br> Out-of-Band Management 644<br> In-Band Management 644<br> IOS Startup Files (35.3.4) 645<br> Cisco Routers (35.4) 646<br> Router Components (35.4.2) 646<br> Router Interface Ports (35.4.3) 647<br> Router Boot Process (35.5) 648<br> Power Up the Router (35.5.1) 648<br> Management Ports (35.5.2) 651<br> Summary (35.6) 653<br> What Did I Learn in This Chapter? (35.6.1) 653<br> Reflection Questions (35.6.2) 654<br> Practice 655<br> Check Your Understanding Questions 655<br> <strong>Chapter 36</strong> Troubleshoot Common Network Problems 659<br> Objectives 659<br> Introduction (36.0) 660<br> The Troubleshooting Process (36.1) 660<br> Network Troubleshooting Overview (36.1.2) 660<br> Gather Information (36.1.3) 660<br> Structured Troubleshooting Methods (36.1.4) 662<br> Bottom-Up 662<br> Top-Down 663<br> Divide-and-Conquer 664<br> Follow-the-Path 664<br> Substitution 665<br> Comparison 665<br> Educated Guess 665<br> Guidelines for Selecting a Troubleshooting Method (36.1.5) 665<br> Physical Layer Problems (36.2) 667<br> Common Layer 1 Problems (36.2.1) 667<br> The Sense of Sight 667<br> The Senses of Smell and Taste 668<br> The Sense of Touch 668<br> The Sense of Hearing 668<br> Wireless Router LEDs (36.2.2) 668<br> Cabling Problems (36.2.3) 670<br> Troubleshoot Wireless Issues (36.3) 671<br> Causes of Wireless Issues (36.3.1) 671<br> Authentication and Association Errors (36.3.2) 672<br> Common Internet Connectivity Issues (36.4) 674<br> DHCP Server Configuration Errors (36.4.1) 674<br> Check Internet Configuration (36.4.2) 674<br> Check Firewall Settings (36.4.3) 677<br> Divide and Conquer with ping (36.4.5) 678<br> The tracert Command (36.4.6) 678<br> The netstat Command (36.4.7) 680<br> The nslookup Command (36.4.8) 682<br> Customer Support (36.5) 683<br> Sources of Help (36.5.1) 683<br> When to Call for Help (36.5.2) 684<br> Support Desk Interaction (36.5.3) 685<br> Issue Resolution (36.5.4) 686<br> Support Desk Tickets and Work Orders (36.5.5) 686<br> Troubleshoot Common Network Problems Summary (36.6) 688<br> What Did I Learn in This Chapter? (36.6.1) 688<br> Practice 692<br> Packet Tracer Activities 692<br> Check Your Understanding Questions 692<br> <strong>Chapter 37</strong> Network Support 697<br> Objectives 697<br> Key Terms 697<br> Introduction (37.0) 698<br> Diagnostics and Troubleshooting Methodologies (37.1) 698<br> Troubleshooting Process Review (37.1.1) 698<br> Seven-Step Troubleshooting Process (37.1.2) 699<br> Define the Problem 699<br> Gather Information 700<br> Analyze Information 700<br> Eliminate Possible Causes 700<br> Propose Hypothesis 700<br> Test Hypothesis 700<br> Solve the Problem 700<br> Troubleshooting with Layered Models (37.1.3) 701<br> Structured Troubleshooting Methods (37.1.4) 701<br> Guidelines for Selecting a Troubleshooting Method (37.1.5) 702<br> Document Findings, Actions, and Outcomes (37.1.6) 703<br> Network Documentation (37.2) 704<br> Documentation Overview (37.2.1) 704<br> Network Topologies and Descriptions (37.2.2) 704<br> PAN 704<br> LAN 705<br> VLAN 706<br> WLAN 706<br> WMN 707<br> CAN 708<br> MAN 708<br> WAN 709<br> VPN 710<br> Enterprise Network Topologies (37.2.4) 710<br> Network Cloud Services and Applications (37.2.5) 713<br> SaaS (Software as a Service) 713<br> PaaS (Platform as a Service) 713<br> IaaS (Infrastructure as a Service) 714<br> XaaS (Anything/Everything as a Service) 714<br> Wireless Standards (37.2.6) 714<br> Licensed and Unlicensed Bands 716<br> Network Device Documentation (37.2.8) 717<br> Router Device Documentation 717<br> LAN Switch Device Documentation 717<br> End-System Documentation 718<br> Establish a Network Baseline (37.2.9) 718<br> Cisco Discovery Protocol (CDP) Overview (37.2.10) 719<br> Discover Devices Using CDP (37.2.11) 720<br> Help Desks (37.3) 723<br> The Security Policy (37.3.1) 723<br> Help Desks (37.3.2) 725<br> Ticketing Systems (37.3.3) 727<br> Question End Users (37.3.4) 729<br> Active Listening (37.3.6) 731<br> Gather Information for Host-Related Tickets (37.3.8) 733<br> Beep Codes 733<br> BIOS Information 733<br> Event Viewer 733<br> Device Manager 734<br> Task Manager 735<br> Diagnostic Tools 736<br> Gather Information for Cisco Device-Related Tickets (37.3.9) 736<br> Analyze the Information (37.3.10) 737<br> Troubleshoot Endpoint Connectivity (37.4) 738<br> Windows Network Setup (37.4.1) 738<br> Verify Connectivity in Windows (37.4.2) 740<br> Linux Network Setup (37.4.3) 741<br> Verify Connectivity in Linux (37.4.4) 742<br> macOS Network Setup (37.4.5) 743<br> Verify Connectivity in macOS (37.4.6) 744<br> Set Up and Verify Networking in iOS (37.4.7) 746<br> Set Up and Verify Networking in Android (37.4.8) 747<br> Troubleshoot a Network (37.5) 750<br> Network Devices as Sources of Network Information (37.5.1) 750<br> Packet Capture and Protocol Analysis (37.5.2) 752<br> Measuring Network Throughput (37.5.5) 754<br> Troubleshoot Connectivity Remotely (37.6) 755<br> Supporting Remote Users (37.6.1) 756<br> Remote Access with Telnet, SSH, and RDP (37.6.2) 757<br> Understanding VPNs (37.6.4) 760<br> Site-to-Site VPN 760<br> Remote-Access VPN 761<br> Network Management Systems (37.6.5) 763<br> Network Support Summary (37.7) 765<br> What Did I Learn in This Chapter? (37.7.1) 765<br> Reflection Questions (37.7.2) 769<br> Practice 770<br> Labs 770<br> Packet Tracer Activities 770<br> Check Your Understanding Questions 770<br> <strong>Chapter 38</strong> Cybersecurity Threats, Vulnerabilities, and Attacks 775<br> Objectives 775<br> Key Terms 775<br> Introduction (38.0) 776<br> Common Threats (38.1) 776<br> Threat Domains (38.1.1) 776<br> Types of Cyber Threats (38.1.2) 777<br> Internal vs. External Threats (38.1.3) 777<br> User Threats and Vulnerabilities (38.1.5) 778<br> Threats to Devices (38.1.6) 780<br> Threats to the Local Area Network (38.1.7) 780<br> Threats to the Private Cloud (38.1.8) 781<br> Threats to the Public Cloud (38.1.9) 781<br> Threats to Applications (38.1.10) 781<br> Threat Complexity (38.1.12) 782<br> Backdoors and Rootkits (38.1.13) 782<br> Backdoors 782<br> Rootkits 783<br> Threat Intelligence and Research Sources (38.1.14) 783<br> The Dark Web 783<br> Indicator of Compromise (IOC) 783<br> Automated Indicator Sharing (AIS) 783<br> Deception (38.2) 784<br> Social Engineering (38.2.1) 784<br> Pretexting 784<br> Something for Something (Quid Pro Quo) 784<br> Identity Fraud 784<br> Social Engineering Tactics (38.2.2) 785<br> Shoulder Surfing and Dumpster Diving (38.2.4) 786<br> Impersonation and Hoaxes (38.2.5) 786<br> Impersonation 786<br> Hoaxes 786<br> Piggybacking and Tailgating (38.2.6) 787<br> Other Methods of Deception (38.2.7) 787<br> Defending Against Deception (38.2.9) 788<br> Cyber Attacks (38.3) 788<br> Malware (38.3.1) 788<br> Viruses 789<br> Worms 789<br> Trojan Horse 789<br> Logic Bombs (38.3.2) 789<br> Ransomware (38.3.3) 790<br> Denial of Service Attacks (38.3.4) 790<br> Overwhelming Quantity of Traffic 790<br> Maliciously Formatted Packets 791<br> Domain Name System (38.3.5) 791<br> Domain Reputation 791<br> DNS Spoofing 791<br> Domain Hijacking 791<br> Uniform Resource Locator (URL) Redirection 792<br> Layer 2 Attacks (38.3.6) 792<br> Spoofing 792<br> MAC Flooding 792<br> Man-in-the-Middle and Man-in-the-Mobile Attacks (38.3.8) 793<br> Man-in-the-Middle (MitM) 793<br> Man-in-the-Mobile (MitMo) 793<br> Zero-Day Attacks (38.3.9) 793<br> Keyboard Logging (38.3.10) 793<br> Defending Against Attacks (38.3.12) 794<br> Wireless and Mobile Device Attacks (38.4) 794<br> Grayware and SMiShing (38.4.1) 794<br> Rogue Access Points (38.4.2) 795<br> Radio Frequency Jamming (38.4.3) 795<br> Bluejacking and Bluesnarfing (38.4.4) 796<br> Bluejacking 796<br> Bluesnarfing 796<br> Attacks Against Wi-Fi Protocols (38.4.5) 796<br> Wi-Fi and Mobile Defense (38.4.6) 797<br> Application Attacks (38.5) 797<br> Cross-Site Scripting (38.5.1) 797<br> Code Injection (38.5.2) 798<br> XML Injection Attack 798<br> SQL Injection Attack 798<br> DLL Injection Attack 798<br> LDAP Injection Attack 798<br> Buffer Overflow (38.5.3) 799<br> Remote Code Executions (38.5.4) 799<br> Other Application Attacks (38.5.5) 799<br> Defending Against Application Attacks (38.5.7) 801<br> Spam (38.5.8) 801<br> Phishing (38.5.9) 802<br> Phishing 802<br> Spear Phishing 802<br> Vishing, Pharming, and Whaling (38.5.10) 802<br> Vishing 802<br> Pharming 803<br> Whaling 803<br> Defending Against Email and Browser Attacks (38.5.12) 803<br> Physical Attacks 804<br> Adversarial Artificial Intelligence Attacks 804<br> Supply Chain Attacks 804<br> Cloud-Based Attacks 804<br> Cybersecurity Threats, Vulnerabilities, and Attacks<br> Summary (38.6) 805<br> What Did I Learn in This Chapter? (38.6.1) 805<br> Reflection Questions (38.6.2) 810<br> Practice 811<br> Labs 811<br> Check Your Understanding Questions 811<br> <strong>Chapter 39</strong> Network Security 813<br> Objectives 813<br> Key Terms 813<br> Introduction (39.0) 814<br> Security Foundations (39.1) 814<br> The Cybersecurity Cube (39.1.1) 814<br> Confidentiality, Integrity, and Availability (39.1.2) 816<br> CIA Triad—The Principle of Confidentiality (39.1.3) 816<br> Data Integrity (39.1.5) 817<br> Ensuring Availability (39.1.7) 819<br> Access Control (39.2) 820<br> Physical Access Controls (39.2.1) 820<br> Logical Access Controls (39.2.2) 821<br> Administrative Access Controls (39.2.3) 821<br> Authentication, Authorization, and Accounting (AAA) (39.2.4) 822<br> Authentication 822<br> Authorization 822<br> Accounting 823<br> What Is Identification? (39.2.5) 823<br> Federated Identity Management (39.2.6) 823<br> Authentication Methods (39.2.7) 824<br> What You Know 824<br> What You Have 824<br> Who You Are 825<br> Passwords (39.2.8) 825<br> Password Managers 826<br> Multi-Factor Authentication 827<br> Multi-Factor Authentication (39.2.9) 827<br> Authorization (39.2.10) 827<br> When to Implement Authorization 827<br> How to Implement Authorization 828<br> Accounting (39.2.11) 828<br> Defending Systems and Devices (39.3) 829<br> Operating System Security (39.3.1) 829<br> A Good Administrator 829<br> A Systematic Approach 829<br> A Baseline 830<br> Types of Antimalware (39.3.3) 830<br> Watch Out for Rogue Antivirus Products 830<br> Fileless Attacks Are Difficult to Detect and Remove 830<br> Scripts Can also Be Malware 830<br> Always Remove Unapproved Software 830<br> Patch Management (39.3.4) 831<br> What Are Patches? 831<br> What Do You Need to Do? 831<br> A Proactive Approach 831<br> Endpoint Security (39.3.5) 832<br> Host-Based Firewalls 832<br> Host Intrusion Detection Systems (HIDSs) 832<br> Host Intrusion Prevention Systems (HIPSs) 832<br> Endpoint Detection and Response (EDR) 832<br> Data Loss Prevention (DLP) 833<br> Next-Generation Firewall (NGFW) 833<br> Host Encryption (39.3.6) 833<br> Boot Integrity (39.3.7) 834<br> What Is Boot Integrity? 834<br> How Does Secure Boot Work? 834<br> What Is Measured Boot? 834<br> Apple System Security Features (39.3.8) 835<br> Physical Protection of Devices (39.3.9) 836<br> Computer Equipment 836<br> Door Locks 836<br> Radio Frequency Identification (RFID) Systems 836<br> Antimalware Protection (39.4) 836<br> Endpoint Threats (39.4.1) 837<br> Endpoint Security (39.4.2) 837<br> Host-Based Malware Protection (39.4.3) 839<br> Antivirus/Antimalware Software 839<br> Host-Based Firewall 840<br> Host-Based Security Suites 840<br> Network-Based Malware Protection (39.4.4) 841<br> Firewalls and Host-Based Intrusion Prevention (39.5) 842<br> Firewalls (39.5.1) 842<br> Common Firewall Properties 843<br> Firewall Benefits 843<br> Firewall Limitations 843<br> Types of Firewalls (39.5.2) 843<br> Packet Filtering (Stateless) Firewall 843<br> Stateful Firewall 844<br> Application Gateway Firewall 844<br> Next-Generation Firewall 846<br> Packet Filtering Firewall Benefits and Limitations (39.5.4) 847<br> Stateful Firewall Benefits and Limitations (39.5.5) 848<br> Host-Based Firewalls (39.5.6) 849<br> Windows Defender Firewall 850<br> iptables 850<br> nftables 850<br> TCP Wrappers 850<br> Antimalware Programs (39.5.7) 850<br> Windows Defender Firewall (39.5.8) 851<br> Secure Wireless Access (39.6) 854<br> Wireless Security Overview (39.6.2) 854<br> DoS Attacks (39.6.3) 854<br> Rogue Access Points (39.6.4) 855<br> Man-in-the-Middle Attack (39.6.5) 856<br> SSID Cloaking and MAC Address Filtering (39.6.8) 858<br> SSID Cloaking 859<br> MAC Addresses Filtering 859<br> 802.11 Original Authentication Methods (39.6.9) 860<br> Shared Key Authentication Methods (39.6.10) 860<br> Authenticating a Home User (39.6.11) 861<br> Encryption Methods (39.6.12) 862<br> Authentication in the Enterprise (39.6.13) 863<br> WPA3 (39.6.14) 864<br> WPA3-Personal 864<br> WPA3-Enterprise 864<br> Open Networks 865<br> IoT Onboarding 865<br> Network Security Summary (39.7) 865<br> What Did I Learn in This Chapter? (39.7.1) 865<br> Reflection Questions (39.7.2) 870<br> Practice 871<br> Packet Tracer Activities 871<br> Check Your Understanding Questions 871<br> <strong>Appendix A</strong> Answers to the “Check Your Understanding” Questions 875<br> <strong>Online Element<br> </strong>Glossary<br> <br> <br> <br> 9780138321338 TOC 1/8/2024</p>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Networking Essentials Companion Guide v3