CompTIA(R) Network+ 2 - Operations, Security & Troubleshooting
Second in a series of 2 reference guides that will make your life easier preparing for the Network+ certification exam with the most thorough yet compact and succinct study tool on the market. Six durably laminated pages, easy to store and review anywhere with concise answers and examples providing key content for unlocking the best score on the exam. Author George Antoniou, PhD, is a professor with 30 years of experience in information security, risk management, and quality assurance compliance as well as strategic planning and enterprise level security architecture, plus security operations and policy development in small-medium-large, national and multi-national complex information security technology infrastructures. His experience providing instruction ensures this guide is a handy and powerful tool. We guarantee you will find answers faster than any book or website for a price that makes it easy to add this to your Network+ test prep toolbox. Based on studies regarding retention with screens verses tactile in-hand study tools, along with the growing sales of our computer titles, print is not dead - give it a try.
6 page laminated guide includes explanations, differences, and examples within:
NETWORK OPERATIONS
Explain the Purpose of Organizational Processes & Procedures
Documentation
Life-cycle management, Change management, Configuration management
Production configuration
Given a Scenario, Use Network Monitoring Technologies
Methods, Solutions
Explain DR Concepts
DR metrics, DR sites
High-availability approaches, Testing
Given a Scenario, Implement IPv4 & IPv6 Network Services
Dynamic addressing, Name resolution, Time protocols
Compare & Contrast Network Access & Management Methods
Site-to-site VPN, Client-to-site VPN
Connection methods
Jump box/host
In-band vs. out-of-band management
NETWORK SECURITY
Explain the Importance of Basic Network Security Concepts
Logical security, Physical security
Deception technologies
Common security terminology
Audits & regulatory compliance
Summarize Various Types of Attacks & Their Impact on the Network
DoS/DDoS
VLAN hopping
MAC flooding
Address Resolution Protocol (ARP) poisoning
Rogue devices & services
Evil twin
On-path attack
Social engineering
Malware
Given a Scenario, Apply Network Security Features, Defense Techniques & Solutions
Device hardening
Key management
Security rules
Zones
NETWORK TROUBLESHOOTING
Cyclic Redundancy Check (CRC)
Runts, Giants, Drops
Common Cabling & Physical Interface Issues
Single-mode vs. multimode fiber
Category 5/6/7/8 (Ethernet cables)
STP vs. UTP
Transmitter (TX) / Receiver (RX) Transposed
Switching & Routing Issues
Spanning Tree Protocol (STP)
ACL
Routing table
Address pool exhaustion
Duplicate IP address
Performance Issues
Latency
Packet loss
Jitter
Interference (wireless)
Tools & Protocols for Troubleshooting
Protocol analyzer
Ping, Traceroute, Netstat
Link Layer Discovery Protocol (LLDP) / Cisco Discovery Protocol (CDP)
Wi-Fi analyzer
Networking Device Commands
Show mac-address-table, Show route, Show interface