Rights Contact Login For More Details
- Wiley
More About This Title Network Administrator Street Smarts: A Real WorldGuide to CompTIA Network+ Skills, 2nd Edition
- English
English
Toby Skandier, Network+, A+, i-Net+, Server+, is founder of Talskan Technologies, LLC, a technical education provider based in North Carolina. He is the author of the previous edition of Network Administrator Street Smarts and has coauthored numerous books for Sybex, including the bestselling Network+ Study Guide and CompTIA A+ Complete Study Guide.
- English
English
Phase 1 Designing an Internetwork.
Task 1.1: Drawing an Internetwork.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.2: Identifying Network Components.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.3: Differentiating Ethernet Devices.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.4: Discovering and Filtering MAC Addresses.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.5: Applying the OSI Model.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.6: Developing an IP Addressing Scheme.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.7: Designing a VLAN Scheme.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.8: Planning for Static and Dynamic Routing.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Implementing and Configuring the Design.
Task 2.1: Assigning IP Addresses.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.2: Naming Network Devices.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.3: Implementing Static and Dynamic Routing.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.4: Installing Wireless NICs.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.5: Measuring Wireless Signal Strength.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.6: Implementing Bluetooth.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.7: Implementing Ad Hoc Wireless Networking.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.8: Using an Analog Modem.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.9: Using a DSL Modem.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.10: Using a Router as a Frame Relay Switch.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.11: Simulating T1 CSU/DSUs.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Phase 3 Maintaining and Securing the Network.
Task 3.1: Creating Local User Accounts.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.2: Creating Local User Groups.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.3: Managing Access to Resources.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.4: Disabling Local User Accounts.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.5: Setting Password Restrictions.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.6: Mitigating the Ping of Death.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.7: Securing Links Between Routers.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.8: Guarding against SYN Flood Attacks.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.9: Implementing File-Level Encryption.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.10: Establishing Data Encryption Between Routers.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.11: Creating Data Backups.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.12: Running an Antivirus Scan.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.13: Running an Antispyware Scan.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.14: Searching for Operating System Updates.
Scenario.
Scope of Task Procedure Criteria for Completion.
Phase 4 Troubleshooting the Network.
Task 4.1: Using ARP Utilities.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.2: Using the NETSTAT.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.3: Using the FTP Utility.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.4: Using Ping Utilities.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.5: Using the IPCONFIG.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.6: Using Traceroute Utilities.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.7: Using Telnet Scenario.
Scope of Task Procedure Criteria for Completion.
Task 4.8: Using the NSLOOKUP Utility.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.9a: Using the Built-in Protocol Analyzer.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.9b: Using a Third-party Protocol Analyzer.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.10: Displaying Computer Event Logs.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Index.