Network+ CompTIA BrainBuzz N10-002 Ver 3.5.0 Study Guide

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Language: English
Pages: 93

Star/Hierarchical......Page 8
Mesh......Page 9
Wireless......Page 10
IEEE 802.2 Logical Link Control (LLC)......Page 12
IEEE 802.11b Wireless......Page 13
1.3 Specify the characteristic (e.g., speed, length, topology, cable type, etc.) of the following:......Page 14
Gigabit Ethernet......Page 15
Fiber optic......Page 16
RJ-11......Page 17
AUI/DIX......Page 18
SC......Page 19
Hubs......Page 20
Switches......Page 21
Routers......Page 22
Gateways......Page 23
Wireless Access Points......Page 24
Modems......Page 25
ISDN......Page 26
2.1 Given an example, identify a MAC address.......Page 27
OSI Model......Page 28
IPX/SPX......Page 29
AppleTalk......Page 30
2.4 Identify the OSI layers at which the following network components operate:......Page 31
TCP (Transmission Control Protocol)......Page 32
FTP (File Transfer Protocol)......Page 33
HTTPS......Page 34
ICMP (Internet Control Message Protocol)......Page 35
NTP (Network Time Protocol)......Page 36
Function......Page 37
2.8 Identify IP addresses (IPv4, IPv6) and their default subnet masks.......Page 38
IPv6......Page 39
2.10 Identify the differences between public and private networks.......Page 40
Packet Switching vs Circuit Switching......Page 41
ISDN (Integrated Services Digital Network)......Page 43
FDDI (Fiber Distributed Data Interface)......Page 45
ATM (Asynchronous Transfer Mode)......Page 46
Sonet/SDH......Page 47
2.12 Define the function of the following remote access protocols and services:......Page 48
L2TP (Layer 2 Tunneling Protocol)......Page 49
Kerberos......Page 50
UNIX......Page 51
NetWare......Page 52
Windows......Page 53
3.2 Identify the basic capabilities of client workstations (i.e. client connectivity, local security mechanisms and authentication).......Page 54
VLAN Benefits......Page 55
Creating a VLAN......Page 56
3.4 Identify the main characteristics of network attached storage.......Page 57
RAID (Redundant Array of Inexpensive [or Independent] Disks)......Page 58
Guidelines......Page 62
The Three Hots (Spare, Plug, and Swap) and Fail Over......Page 63
Clustering, Scalability, and High Availability......Page 64
UPS (Uninterruptible Power Supply)......Page 65
GFS (Grandfather, Father, Son) Backup Rotation......Page 66
Backup Drives......Page 67
Hot and Cold Sites......Page 68
3.8 Identify the purpose, benefits, and characteristics of using a firewall.......Page 69
How Intruders Get In......Page 70
The Methods......Page 71
3.9 Identify the purpose, benefits, and characteristics of using a proxy.......Page 72
3.10 Given a scenario, predict the impact of a particular security implementation on network functionality (e.g. blocking port numbers, encryption, etc.)......Page 73
3.11 Given a network configuration, select the appropriate NIC and network configuration settings (DHCP, DNS, WINS, protocols, NETBIOS/host name, etc.)......Page 74
Switches to use with common TCP/IP utilities:......Page 75
4.2 Given a troubleshooting scenario involving a small office/home office network failure (e.g., xDSL, cable, home satellite, wireless, POTS), identify the cause of the failure.......Page 79
Installing UNIX/Linux client......Page 80
Installing Netware......Page 81
Configuring a MacIntosh to Connect to an ICS Host......Page 83
4.5 Given a wiring task, select the appropriate tool (e.g., wire crimper, media tester/certifier, punch down tool, tone generator, optical tester, etc.).......Page 87
4.8 Given a scenario, predict the impact of modifying, adding or removing network services (e.g., DHCP, DNS, WINS, etc.) on network resources and users.......Page 88
4.11 Given a network troubleshooting scenario involving a client connectivity problem (e.g., incorrect protocol/client software/authentication configuration or insufficient rights/permission), identify the cause of the problem.......Page 89
4.12 Given a network troubleshooting scenario involving a wiring/infrastructure problem, identify the cause of the problem (e.g., bad media, interference, network hardware).......Page 90
ieee.org......Page 0
POP - Webopedia.com......Page 91
IEEE-SA GetIEEE 802.12 LAN/MAN Demand Priority Access Method......Page 93