Title:
CompTIA Network+ (N10-004) cert guide
Personal Author:
Edition:
1st ed.
Publication Information:
Indianapolis, Ind. : Pearson Education, Inc., 2011
Physical Description:
xxiii, 657 p. : ill. ; 24 cm. + 1 CD-ROM ; 12 cm.
ISBN:
9780789745590
General Note:
Accompanied by CD-ROM :024754
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010262659 | TK5105.5 H376 2011 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
This is a self-study tool for CompTIA's latest Network+ exam. Perfect for the 4000 candidates who take this challenging exam every month, this book's comprehensive coverage offers all the information and insight you need to succeed.
Author Notes
Mike Harwood (MCSE, A+, Network+, Server+, Linux+) has more than 14 years experience in information technology and related fields. He has held a number of roles in the IT field including network administrator, instructor, technical writer, website designer, consultant, and online marketing strategist. Mike has been a regular on-air technology contributor for CBC radio and has coauthored numerous computer books, including the Network+ Exam Cram published by Pearson.
Table of Contents
Introduction | p. 3 |
How This Book Helps You | p. 4 |
Exam Objectives and Chapter Organization | p. 4 |
Instructional Features | p. 18 |
Network Hardware and Software Requirements | p. 19 |
Advice on Taking the Exam | p. 20 |
Chapter 1 Introduction to Computer Networking | p. 23 |
What Is a Network? | p. 24 |
LANs and WANs | p. 25 |
Peer-to-Peer Versus Client/Server Networks | p. 28 |
The Peer-to-Peer Networking Model | p. 28 |
Advantages of Peer-to-Peer Networks | p. 29 |
Disadvantages of Peer-to-Peer Networks | p. 30 |
The Client/Server Networking Model | p. 30 |
Servers | p. 31 |
Client Computers | p. 32 |
Advantages of Client/Server Networking | p. 32 |
Disadvantages of Client/Server Networking | p. 32 |
Distributed and Centralized Computing | p. 33 |
Virtual Private Networks (VPN) | p. 34 |
Components of the VPN Connection | p. 35 |
VPN Pros and Cons | p. 35 |
Virtual Local Area Network (VLAN) | p. 36 |
VLAN Membership | p. 37 |
Protocol-Based VLANs | p. 37 |
Port-Based VLANs | p. 38 |
MAC Address-Based VLANs | p. 38 |
VLAN Segmentation | p. 39 |
LAN Topologies | p. 40 |
Physical and Logical Topologies | p. 41 |
Bus Topology | p. 41 |
Star Topology | p. 42 |
Ring Topology | p. 44 |
Wired Mesh Topology | p. 45 |
Wireless Network Topologies | p. 47 |
Infrastructure Wireless Topology | p. 47 |
Ad Hoc Wireless Networking | p. 48 |
Point-to-Point, Point-to Multipoint, and Mesh-Wireless Topology | p. 48 |
Point-to-Point Networks | p. 48 |
Point-to-Multipoint | p. 50 |
Mesh Networks | p. 50 |
Hybrid Topologies | p. 51 |
Summary | p. 52 |
Chapter 2 Media and Connectors | p. 61 |
Networking Media | p. 62 |
Media Interference | p. 62 |
Data Transmission Rates | p. 63 |
Media Length | p. 63 |
Secure Transmission and Physical Media | p. 64 |
Installation and Repair | p. 65 |
Simplex, Half-Duplex, and Full-Duplex | p. 65 |
Cable Media | p. 66 |
Twisted-Pair Cable | p. 67 |
Coaxial Cable | p. 69 |
Fiber-Optic Cable | p. 70 |
Media Connectors | p. 72 |
RJ Connectors | p. 72 |
F-Type Connectors and RG-59/RG-6 Cables | p. 73 |
RS-232 Standard | p. 74 |
Fiber Connectors | p. 74 |
IEEE 1394 (FireWire) | p. 75 |
Universal Serial Bus Connectors (USB) | p. 76 |
Cable Summary | p. 76 |
Wiring Standards and Specialized Cable | p. 77 |
568A and 568B Wiring Standards | p. 77 |
Straight Versus Crossover Cable | p. 78 |
Rollover and Loopback Cables | p. 80 |
Components of Wiring Distribution | p. 80 |
Network Cross Connects | p. 81 |
Horizontal Cabling | p. 81 |
Vertical Cable | p. 82 |
Patch Panels | p. 83 |
Type 66 and Type 110 Punchdown Blocks | p. 84 |
MDF and IDF | p. 85 |
Demarcation Point | p. 86 |
Verify Wiring Installation and Termination | p. 87 |
Summary | p. 89 |
Chapter 3 Networking Components and Devices | p. 99 |
Common Network Devices | p. 100 |
Hubs | p. 100 |
Network Switches | p. 102 |
Switching Methods | p. 105 |
Advanced Switch Features | p. 105 |
Power over Ethernet (PoE) | p. 106 |
Trunking | p. 106 |
Port Authentication | p. 107 |
Working with Hubs and Switches | p. 107 |
Hub and Switch Ports | p. 107 |
Hub and Switch Indicator Lights | p. 109 |
Rack-Mount, Stackable, and Freestanding Devices | p. 109 |
Managed Hubs and Switches | p. 109 |
Repeaters | p. 110 |
Bridges | p. 110 |
Bridge Implementation Considerations | p. 111 |
Types of Bridges | p. 114 |
Routers | p. 114 |
Gateways | p. 117 |
Modems | p. 118 |
Modem Connection Speeds | p. 119 |
Network Interface Cards (NIC) | p. 120 |
Types of Network Interfaces | p. 121 |
Installing Network Cards | p. 123 |
Media Converters | p. 124 |
Firewalls | p. 125 |
DHCP Server | p. 126 |
Specialized Network Devices | p. 127 |
Multilayer and Content Switches | p. 127 |
Intrusion Detection and Prevention Systems | p. 128 |
Load Balancer | p. 129 |
Multifunction Network Devices | p. 129 |
DNS Server | p. 129 |
Bandwidth Shaper | p. 130 |
Proxy Server | p. 131 |
CSUs/DSUs | p. 133 |
Network Devices Summary | p. 134 |
Summary | p. 136 |
Chapter 4 Understanding the TCP/IP Protocol Suite | p. 145 |
A Brief Introduction to Protocols | p. 146 |
Protocols from the Sending Device | p. 147 |
Protocols on the Receiving Device | p. 147 |
Transmission Control Protocol/Internet Protocol (TCP/IP) Protocol Suite | p. 148 |
Internet Protocol (IP) | p. 149 |
Transmission Control Protocol (TCP) | p. 149 |
User Datagram Protocol (UDP) | p. 150 |
File Transfer Protocol (FTP) | p. 151 |
Secure Shell (SSH) | p. 152 |
Secure File Transfer Protocol (SFTP) | p. 152 |
Trivial File Transfer Protocol (TFTP) | p. 153 |
Simple Mail Transfer Protocol (SMTP) | p. 153 |
Hypertext Transfer Protocol (HTTP) | p. 154 |
Hypertext Transfer Protocol Secure (HTTPS) | p. 154 |
Post Office Protocol Version 3/Internet Message Access Protocol Version 4 (POP3/IMAP4) | p. 155 |
Telnet | p. 155 |
Internet Control Message Protocol (ICMP) | p. 156 |
Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol | |
(RARP) | p. 156 |
Network Time Protocol (NTP) | p. 157 |
Network News Transfer Protocol (NNTP) | p. 157 |
Secure Copy Protocol (SCP) | p. 158 |
Lightweight Directory Access Protocol (LDAP) | p. 158 |
Internet Group Management Protocol (IGMP) | p. 158 |
Domain Name System (DNS) | p. 159 |
The DNS Namespace | p. 160 |
Types of DNS Entries | p. 162 |
DNS in a Practical Implementation | p. 163 |
Simple Network Management Protocol (SNMP) | p. 163 |
Components of SNMP | p. 164 |
SNMP Management Systems | p. 164 |
SNMP Agents | p. 165 |
Management Information Bases (MIB) | p. 165 |
SNMP Communities | p. 166 |
Dynamic Host Configuration Protocol (DHCP) | p. 167 |
Transport Layer Security | p. 170 |
Session Initiation Protocol | p. 170 |
Real-time Transport Protocol (RTP) | p. 171 |
TCP/IP Protocol Suite Summary | p. 171 |
Identifying Common TCP/IP Port Numbers | p. 173 |
Summary | p. 175 |
Chapter 5 TCP/IP Addressing and Routing | p. 185 |
Identifying MAC Addresses | p. 186 |
Understanding IPv4 Addressing Fundamentals | p. 187 |
General IP Addressing Principles | p. 188 |
IPv4 Addressing | p. 188 |
IPv4 Address Types | p. 190 |
Distributing IPv4 Addresses to the Network | p. 191 |
Static Addressing | p. 191 |
Dynamic Addressing | p. 191 |
Bootstrap Protocol (BOOTP) | p. 191 |
APIPA and IPv4 | p. 192 |
Broadcast Addresses and "This Network" | p. 193 |
Classless Interdomain Routing (CIDR) | p. 193 |
Default Gateways | p. 194 |
Understanding Subnetting | p. 195 |
Public and Private IP Address Schemes | p. 198 |
Private Address Ranges | p. 199 |
Practical Uses of Public and Private IP Addressing | p. 200 |
IPv6 Addressing | p. 201 |
Identifying IPv6 Addresses | p. 201 |
IPv6 Address Types | p. 202 |
Differentiating Between Routable and Routing Protocols | p. 204 |
Routable Protocols | p. 204 |
Routing Protocols | p. 205 |
Distance-Vector Routing Protocols | p. 206 |
Link-State Routing Protocols | p. 208 |
NAT, PAT, and SNAT | p. 209 |
Summary | p. 211 |
Chapter 6 Ethernet Networking Standards | p. 221 |
Characteristics Specified in the IEEE 802 Standards | p. 223 |
Speed | p. 223 |
Access Methods | p. 223 |
Carrier Sense Multiple Access/Collision Detection | p. 224 |
CSMA/CA | p. 225 |
Token Passing | p. 226 |
Bonding | p. 226 |
Topology | p. 226 |
Media | p. 227 |
Differentiating Between Baseband and Broadband Signaling | p. 227 |
Baseband | p. 227 |
Broadband | p. 227 |
Ethernet Standards | p. 228 |
10Base2 | p. 228 |
10BaseT | p. 229 |
10BaseFL | p. 230 |
Fast Ethernet | p. 230 |
100BaseTX | p. 231 |
100BaseT4 | p. 231 |
100BaseFX | p. 231 |
Fast Ethernet Comparison | p. 231 |
Gigabit Ethernet | p. 232 |
1000BaseX | p. 232 |
1000BaseT | p. 233 |
10Gigabit Ethernet | p. 234 |
10GBaseSR/SW | p. 234 |
10GBaseLR/LW | p. 235 |
10GBaseER/EW | p. 235 |
10GBaseT | p. 236 |
Summary | p. 236 |
Chapter 7 Wireless Networking | p. 245 |
Understanding Wireless Devices | p. 246 |
Wireless Access Point | p. 246 |
Wireless Antennas | p. 248 |
Antenna Ratings | p. 249 |
Types of Wireless Antennas | p. 249 |
802.11 Wireless Standards | p. 251 |
The Magic Behind 802.11n | p. 254 |
Wireless Radio Channels | p. 254 |
Spread Spectrum Technology | p. 257 |
Frequency-Hopping Spread Spectrum (FHSS) Technology | p. 257 |
Direct-Sequence Spread Spectrum (DSSS) Technology | p. 258 |
Orthogonal Frequency Division Multiplexing | p. 258 |
FHSS, DSSS, OFDM, and 802.11 Standards | p. 258 |
Beacon Management Frame | p. 259 |
Configuring and Troubleshooting the Wireless Connection | p. 260 |
Configuring Communications Between Wireless Devices | p. 262 |
Troubleshooting Wireless Signals | p. 264 |
Site Surveys | p. 265 |
Troubleshooting AP Coverage | p. 266 |
Wireless Troubleshooting Checklist | p. 267 |
Securing Wireless Networks | p. 268 |
Defining Access Control, Authentication, Authorization, and Encryption | p. 268 |
Wireless Authentication and Encryption Methods | p. 269 |
Wired Equivalent Privacy (WEP) | p. 270 |
Wi-Fi Protected Access (WPA) | p. 270 |
Temporal Key Integrity Protocol (TKIP) | p. 271 |
802.1 X | p. 272 |
Securing the Access Point | p. 273 |
Summary | p. 273 |
Chapter 8 Wide Area Networking | p. 283 |
Public and Private Networks | p. 284 |
Public Networks | p. 284 |
Public Switched Telephone Network (PSTN) | p. 284 |
The Internet | p. 285 |
Advantages and Disadvantages of Public Networks | p. 286 |
Private Networks | p. 286 |
Switching Methods | p. 287 |
Packet Switching | p. 288 |
Virtual-Circuit Packet Switching | p. 289 |
Datagram Packet Switching | p. 289 |
Circuit Switching | p. 290 |
Message Switching | p. 290 |
Comparing Switching Methods | p. 291 |
WAN Technologies | p. 292 |
X.25 | p. 293 |
Frame Relay | p. 293 |
T-Carrier Lines | p. 295 |
T1/E1/J1 Lines | p. 295 |
T3 Lines | p. 297 |
SONET/OCx Levels | p. 297 |
Asynchronous Transfer Mode (ATM) | p. 298 |
Integrated Services Digital Network (ISDN) | p. 299 |
Basic Rate Interface (BRI) | p. 301 |
Primary Rate Interface (PRI) | p. 301 |
Comparing BRI and PRI ISDN | p. 301 |
WAN Technology Summary | p. 301 |
Internet Access Technologies | p. 302 |
POTS Internet Access | p. 303 |
POTS Troubleshooting Procedures | p. 303 |
Troubleshooting Poor Connection Speeds | p. 305 |
Modem-Specific Troubleshooting | p. 306 |
XDSL | p. 307 |
Cable Internet Access | p. 310 |
Satellite Internet Access | p. 313 |
Wireless Wide Area Networking | p. 315 |
Summary | p. 316 |
Chapter 9 OSI Model | p. 325 |
OSI Reference Model 101 | p. 326 |
Layer 1: the Physical Layer | p. 328 |
Layer 2: the Data Link Layer | p. 329 |
Layer 3: the Network Layer | p. 329 |
Switching Methods | p. 330 |
Network Layer Addressing | p. 331 |
Layer 4: the Transport Layer | p. 331 |
Connection-Oriented Protocols | p. 332 |
Connectionless Protocols | p. 332 |
Flow Control | p. 333 |
Layer 5: the Session Layer | p. 333 |
Layer 6: the Presentation Layer | p. 333 |
Layer 7: the Application Layer | p. 334 |
OSI Model Summary | p. 334 |
The Layers at Which Devices Operate | p. 335 |
Hubs | p. 336 |
Switches | p. 336 |
Bridges | p. 336 |
Routers | p. 336 |
NICs | p. 336 |
Wireless Access Points (APs) | p. 337 |
Summary of the Layers at Which Devices Operate | p. 337 |
TCP/IP Protocol Suite Summary | p. 337 |
Summary | p. 340 |
Chapter 10 Network Performance and Optimization | p. 349 |
Understanding Uptime | p. 350 |
Understanding the Risks | p. 352 |
RAID | p. 353 |
RAID 0 | p. 354 |
Advantages of RAID 0 | p. 354 |
Disadvantages of RAID 0 | p. 355 |
Recovering from a Failed RAID 0 Array | p. 355 |
RAID 1 | p. 355 |
Advantages of RAID 1 | p. 357 |
Disadvantages of RAID 1 | p. 357 |
Recovering from a Failed RAID 1 Array | p. 358 |
RAID 5 | p. 358 |
Advantages of RAID 5 | p. 358 |
Disadvantages of RAID 5 | p. 359 |
Recovering from a RAID 5 Array Failure | p. 359 |
RAID 10 | p. 360 |
Choosing a RAID Level | p. 361 |
Hardware and Software RAID | p. 362 |
Other Fault-Tolerance Measures | p. 363 |
Link Redundancy | p. 363 |
Using Uninterruptible Power Supplies | p. 364 |
Why Use a UPS? | p. 365 |
Power Threats | p. 365 |
Using Redundant Power Supplies | p. 366 |
Server and Services Fault Tolerance | p. 366 |
Using Standby Servers | p. 366 |
Server Clustering | p. 367 |
Preparing for Memory Failures | p. 368 |
Managing Processor Failures | p. 368 |
Disaster Recovery | p. 368 |
Backup Methods | p. 368 |
Full Backups | p. 369 |
Incremental Backups | p. 370 |
Differential Backups | p. 370 |
A Comparison of Backup Methods | p. 371 |
Backup Rotation Schedules | p. 371 |
Offsite Storage | p. 372 |
Backup Best Practices | p. 373 |
Hot and Cold Spares | p. 374 |
Hot Spare and Hot Swapping | p. 374 |
Cold Spare and Cold Swapping | p. 375 |
Recovery Sites | p. 375 |
Cold Site | p. 375 |
Hot Site | p. 376 |
Warm Site | p. 376 |
Network Optimization Strategies | p. 377 |
QoS | p. 377 |
Latency-Sensitive High-Bandwidth Applications | p. 378 |
Voice over Internet Protocol (VoIP) | p. 378 |
Video Applications | p. 379 |
Traffic Shaping | p. 379 |
Load Balancing | p. 381 |
Caching Engines | p. 381 |
Summary | p. 382 |
Chapter 11 Troubleshooting Procedures and Best Practices | p. 393 |
The Art of Troubleshooting | p. 394 |
Troubleshooting Servers and Workstations | p. 394 |
General Troubleshooting Considerations | p. 395 |
Troubleshooting Methods and Procedures | p. 396 |
Step 1: Information GatheringâÇôIdentify Symptoms and Problems | p. 397 |
Information from the Computer | p. 397 |
Information from the User | p. 398 |
Observation Techniques | p. 399 |
Effective Questioning Techniques | p. 399 |
Step 2: Identify the Affected Areas of the Network | p. 399 |
Step 3: Determine if Anything Has Changed | p. 400 |
Changes to the Network | p. 400 |
Changes to the Server | p. 401 |
Changes to the Workstation | p. 402 |
Step 4: Establish the Most Probable Cause | p. 402 |
Step 5: Determine if Escalation Is Necessary | p. 403 |
Step 6: Create an Action Plan and Solution Identifying Potential Effects | p. 403 |
Step 7: Implement and Test the Solution | p. 404 |
Step 8: Identify the Results and Effects of the Solution | p. 405 |
Step 9: Document the Solution and the Entire Process | p. 406 |
Troubleshooting the Network | p. 407 |
Troubleshooting Wiring | p. 407 |
Where the Cable Is Used | p. 408 |
Wiring Issues | p. 409 |
Crosstalk | p. 409 |
Near-End Crosstalk (NEXT) | p. 409 |
Far-End Crosstalk (FEXT) | p. 409 |
Electromagnetic interference (EMI) | p. 409 |
Attenuation | p. 410 |
Open Impedance Mismatch (Echo) | p. 410 |
Shorts | p. 410 |
Managing Collisions | p. 410 |
Troubleshooting Infrastructure Hardware | p. 411 |
Configuring and Troubleshooting Client Connectivity | p. 413 |
Verifying Client TCP/IP Configurations | p. 413 |
Setting Port Speeds and Duplex | p. 415 |
Troubleshooting Incorrect VLANs | p. 416 |
Identifying Issues That Might Need Escalation | p. 417 |
Troubleshooting Wireless Issues | p. 418 |
Troubleshooting Wireless Signals | p. 418 |
Troubleshooting Wireless Configurations | p. 420 |
Summary | p. 421 |
Chapter 12 Command-Line Networking Tools | p. 431 |
Common Networking Utilities | p. 432 |
The ping Utility | p. 432 |
Switches for ping | p. 434 |
Troubleshooting Steps with ping | p. 435 |
Ping Error Messages | p. 436 |
The Destination Host Unreachable Message | p. 437 |
The Unknown Host Message | p. 438 |
The traceroute Utility | p. 439 |
Reviewing tracert Command Printouts | p. 441 |
The traceroute Command | p. 444 |
The mtr Utility | p. 445 |
The arp Utility | p. 445 |
The ARP Cache | p. 445 |
Switches for arp | p. 446 |
The arp Command Printout | p. 447 |
The arp ping Utility | p. 447 |
The netstat Utility | p. 448 |
The netstat Command Printouts | p. 450 |
Netstat -e | p. 450 |
Netstat -a | p. 451 |
Netstat -r | p. 452 |
Netstat -s | p. 453 |
The nbtstat Utility | p. 454 |
The ipconfig and ifconfig Utilities | p. 456 |
The ipconfig Utility | p. 457 |
The ipconfig Command Printouts | p. 458 |
The ifconfig Command Printout | p. 460 |
The nslookup and dig Utilities | p. 461 |
The nslookup Utility | p. 461 |
The nslookup Command Printout | p. 463 |
The dig Utility | p. 464 |
The dig Command Printout | p. 465 |
The host Command | p. 466 |
The route Utility | p. 466 |
Summary | p. 468 |
Chapter 13 Network Management Tools and Documentation Procedures | p. 479 |
Documentation Management | p. 480 |
Wiring Schematics | p. 481 |
Physical and Logical Network Diagrams | p. 484 |
Physical Network Documentation | p. 484 |
Logical Network Documentation | p. 485 |
Baselines | p. 487 |
Policies, Procedures, Configurations, and Regulations | p. 488 |
Policy Documentation | p. 488 |
Network Procedure Documentation | p. 489 |
Configuration Documentation | p. 490 |
Regulations | p. 491 |
Monitoring the Network to Identify Performance | p. 492 |
Throughput Testing | p. 493 |
Port Scanners | p. 495 |
Network Testing | p. 498 |
Performance Testing | p. 498 |
Load Testing | p. 498 |
Stress Testing | p. 499 |
Logging | p. 499 |
Security Logs | p. 500 |
Application Logs | p. 501 |
System Logs | p. 502 |
History Logs | p. 502 |
Log Management | p. 503 |
Networking Tools | p. 503 |
Wire Crimpers | p. 504 |
Strippers and Snips | p. 504 |
Punchdown Tools | p. 505 |
Cable Certifiers | p. 505 |
Voltage Event Recorders | p. 506 |
Temperature Monitors | p. 506 |
Toner Probes | p. 508 |
Protocol Analyzer | p. 509 |
Media/Cable Testers | p. 509 |
Media Testers | p. 510 |
TDR | p. 510 |
OTDR | p. 510 |
Multimeter | p. 511 |
Network Qualification Tester | p. 512 |
Butt Set | p. 512 |
Wireless Detector | p. 512 |
Summary | p. 513 |
Chapter 14 Network Access Security | p. 525 |
Understanding Network Security Threats | p. 526 |
Security Responsibilities of a Network Administrator | p. 527 |
Physical and Logical Security | p. 528 |
Physical Security | p. 528 |
Network Hardware and Server Room Access | p. 529 |
Lock and Key | p. 529 |
Swipe Card and PIN Access | p. 529 |
Biometrics | p. 530 |
Hardware Room Best Practices | p. 531 |
Logical Security | p. 532 |
Firewalls | p. 532 |
The Purpose and Function of a Firewall | p. 534 |
Stateful and Stateless Firewalls | p. 536 |
Firewall Methods | p. 536 |
Network Layer Firewalls | p. 536 |
Circuit-Level Firewalls | p. 537 |
Application-Layer Firewalls | p. 537 |
Demilitarized Zones | p. 538 |
Intrusion Detection and Intrusion Prevention Systems | p. 539 |
Network Access Security | p. 539 |
Access Control Lists | p. 540 |
Access Control and MAC Filtering | p. 540 |
TCP/IP Filtering | p. 540 |
Port Blocking/Filtering | p. 541 |
Remote Access Protocols and Services | p. 542 |
Routing and Remote Access Service (RRAS) | p. 542 |
SLIP | p. 543 |
PPP | p. 543 |
PPPoE | p. 544 |
Tunneling and Encryption | p. 545 |
SSL VPNs | p. 546 |
VPN Concentrators | p. 546 |
Point-to-Point Tunneling Protocol (PPTP) | p. 547 |
Layer Two Tunneling Protocol (L2TP) | p. 548 |
Advantages of L2TP and PPTP | p. 548 |
Inside IPsec | p. 548 |
Authentication Headers | p. 549 |
Encapsulating Security Payloads | p. 549 |
IPsec Transmission Modes | p. 550 |
Remote Control Protocols | p. 550 |
Summary | p. 551 |
Chapter 15 Security Technologies and Malicious Software | p. 561 |
Authentication, Authorization, and Accounting (AAA) | p. 562 |
Authentication | p. 562 |
Password Policies | p. 562 |
Password Strength | p. 563 |
Multifactor Authentication | p. 565 |
Authentication Tokens | p. 565 |
Biometrics | p. 565 |
Multifactor Authentication/Two-Factor Authentication | p. 566 |
Authorization | p. 566 |
Accountability | p. 567 |
RADIUS and TACACS+ | p. 568 |
RADIUS | p. 568 |
TACACS+ | p. 570 |
Understanding Cryptography Keys | p. 570 |
Kerberos Authentication | p. 572 |
Public Key Infrastructure | p. 573 |
Components of a PKI | p. 574 |
Certificates | p. 575 |
Certificate Stores | p. 576 |
Trusts | p. 576 |
Certificate Authorities (CAs) | p. 577 |
Public CAs | p. 577 |
Private CAs | p. 577 |
Network Access Control | p. 578 |
Mandatory Access Control (MAC) | p. 578 |
Discretionary Access Control (DAC) | p. 579 |
Rule-Based Access Control (RBAC) | p. 579 |
Role-Based Access Control (RBAC) | p. 579 |
Remote Authentication Protocols | p. 580 |
Using Secure Protocols | p. 581 |
Malicious Software | p. 582 |
Malware Distribution | p. 583 |
Malware Payloads | p. 584 |
More About Viruses | p. 585 |
More About Trojan Horses and Worms | p. 586 |
Comparing Malware Types | p. 586 |
Types of Attacks | p. 587 |
Denial of Service and Distributed Denial of Service Attacks | p. 587 |
Other Common Attacks | p. 589 |
An Ounce of Prevention | p. 590 |
Maintaining Operating System Software | p. 592 |
Reasons to Use a Service Pack | p. 593 |
When to Use a Service Pack | p. 593 |
How to Apply a Service Pack | p. 594 |
Server Patches | p. 595 |
Summary | p. 596 |
Appendix A Answers to the Review Questions | p. 605 |
Index | p. 639 |
Elements on the CD-ROM | |
Appendix B Memory Tables | |
Appendix C Memory Tables Answer Key | |
Glossary | |
TOC, 9780789745590, 7/8/10 |