+ All Categories
Home > Documents > TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B...

TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B...

Date post: 25-Jun-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
234
TestOut Network Pro - English 5.0.x LESSON PLAN Modified: 2020- 06-12
Transcript
Page 1: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

TestOut Network Pro - English 5.0.x

LESSON PLAN

Modified: 2020-06-12

Page 2: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

2

Table of ContentsTable of Contents........................................................................................................................................20.1: Network Pro Introduction....................................................................................................................40.2: Use the Simulator................................................................................................................................51.1: Networking Overview..........................................................................................................................61.2: Network Topologies............................................................................................................................81.3: The OSI Model...................................................................................................................................101.4: Network Protocols.............................................................................................................................121.5: Numbering Systems..........................................................................................................................142.1: Twisted Pair........................................................................................................................................152.2: Coaxial................................................................................................................................................172.3: Fiber Optic..........................................................................................................................................192.4: Wiring Implementation......................................................................................................................212.5: Troubleshoot Network Media...........................................................................................................243.1: Network Adapters..............................................................................................................................273.2: Network Devices................................................................................................................................303.3: Internetwork Devices........................................................................................................................324.1: Ethernet...............................................................................................................................................344.2: Ethernet Specifications.....................................................................................................................364.3: Connect Network Devices................................................................................................................384.4: Troubleshoot Physical Connectivity...............................................................................................405.1: IP Addressing.....................................................................................................................................425.2: APIPA and Alternate Addressing....................................................................................................455.3: DHCP Server Configuration.............................................................................................................475.4: DHCP Relay.......................................................................................................................................495.5: DNS Name Resolution.....................................................................................................................515.6: IP Version 6........................................................................................................................................545.7: Multicast..............................................................................................................................................575.8: Troubleshoot IP Configuration Issues............................................................................................585.9: Troubleshoot IP Communications...................................................................................................605.10: Troubleshoot Name Resolution....................................................................................................626.1: Switch Access....................................................................................................................................646.2: Switch IP Configuration....................................................................................................................666.3: Switch Interface Configuration........................................................................................................676.4: Virtual LANs.......................................................................................................................................696.5: Trunking..............................................................................................................................................716.6: Spanning Tree Protocol....................................................................................................................736.7: Switch Troubleshooting....................................................................................................................757.1: Routing Basics...................................................................................................................................777.2: Routing Protocols..............................................................................................................................797.3: Network Address Translation..........................................................................................................827.4: Routing Troubleshooting..................................................................................................................848.1: Firewalls..............................................................................................................................................868.2: Security Appliances...........................................................................................................................898.3: Firewall Design and Implementation..............................................................................................919.1: Network-Based Storage...................................................................................................................939.2: Voice over IP (VoIP).........................................................................................................................959.3: Virtualization.......................................................................................................................................98Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 3: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

3

9.4: Virtual Networking...........................................................................................................................1009.5: Cloud Computing.............................................................................................................................10210.1: Wireless Concepts........................................................................................................................10410.2: Wireless Standards.......................................................................................................................10610.3: Wireless Configuration.................................................................................................................10810.4: Wireless Network Design.............................................................................................................11010.5: Wireless Network Implementation..............................................................................................11310.6: Wireless Security...........................................................................................................................11510.7: Wireless Troubleshooting............................................................................................................11811.1: WAN Concepts..............................................................................................................................12011.2: WAN Connections.........................................................................................................................12311.3: Internet Connectivity.....................................................................................................................12511.4: Remote Access.............................................................................................................................12811.5: WAN Troubleshooting..................................................................................................................13012.1: Network Design, Documentation, and Policies........................................................................13212.2: Risk Management.........................................................................................................................13512.3: Security Policies............................................................................................................................13813.1: Physical Security...........................................................................................................................14113.2: Social Engineering........................................................................................................................14313.3: Network Vulnerabilities and Threats 1.......................................................................................14513.4: Network Vulnerabilities and Threats 2.......................................................................................14913.5: Authentication................................................................................................................................15113.6: Secure Protocols...........................................................................................................................15413.7: Remote Access Security..............................................................................................................15613.8: Troubleshoot Network Security Issues......................................................................................15814.1: Detection and Prevention.............................................................................................................16014.2: Penetration Testing.......................................................................................................................16314.3: Network Hardening.......................................................................................................................16615.1: Update Management....................................................................................................................16915.2: Data Protection..............................................................................................................................17115.3: Remote Management...................................................................................................................17315.4: Mobile Device Management........................................................................................................17515.5: Data Center Management...........................................................................................................17715.6: Monitoring.......................................................................................................................................17915.7: Log File Management...................................................................................................................18115.8: Network Management with SNMP.............................................................................................18316.1: Optimization...................................................................................................................................18516.2: Troubleshooting Methodology.....................................................................................................189Practice Exams........................................................................................................................................191Appendix A: Approximate Time for the Course..................................................................................192

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 4: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

4

0.1: Network Pro Introduction

Lecture Focus Questions:

What are the course prerequisites? What major topics are covered in the course? What certification does this course prepare me for?

 Video/Demo Time

0.1.1 Network Pro Introduction 3:35Total Video Time 3:35

Total TimeAbout 4 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 5: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

5

0.2: Use the Simulator

Summary

In this section, you will learn to:

Read simulated component documentation and view components to make appropriate choices and meet the scenario's requirements.

Add and remove simulated computer components. Change views and navigate between floors and buildings to view and add

simulated components. Use the zoom feature to view additional image details. Attach simulated cables. Use the simulation interface to identify where simulated cables connect to the

computer. Configure services on Hyper-V guest servers.

 Video/Demo Time

0.2.1 Use the Simulator 10:59Total Video Time 10:59

Lab/Activity0.2.2 Explore a Single Location in a Lab0.2.3 Explore Multiple Locations in a Lab

Total TimeAbout 35 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 6: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

6

1.1: Networking Overview

Lecture Focus Questions:

Why are protocols important for networking? What are the advantages of a client-server network as compared to a peer-to-

peer network? What is the main characteristic of a subnet? How can you tell one subnet from

another? How does an intranet differ from the internet? What is the main purpose of an extranet?

The key terms for this section include:Term Definition

Internet Protocol Address (IP Address)

The Internet Protocol (IP) address identifies the network and host address assigned to a device.

Subnet Address The portion of the IP address that identifies the network the device is assigned to.

Local Area Network(LAN)

A group of computers and associated devices that share a common communications line or wireless link, typically to a server.

Metropolitan Area Network (MAN)

All of the networks within the same metropolitan area that are connected together.

Wide Area Network(WAN)

A WAN connects several LANs. Wans are often limited to a corporation or an organization, but are sometimes accessible to the public.

InternetThe internet is a collection of many different networks owned by many different entities that all share information and communicate together.

Intranet A local or restricted communications network, especially a private network created using World Wide Web software.

ExtranetAn intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

1.5 Compare and contrast the characteristics of network topologies, types and technologies.

Types o LAN o MAN o WAN o CAN

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 7: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

7

 Video/Demo Time

1.1.1 Introduction to Networking 5:231.1.2 Network Types 7:471.1.3 Networking Terms 10:58

Total Video Time 24:08

Fact Sheets1.1.4 Networking Facts

Number of Exam Questions4 questions

Total TimeAbout 34 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 8: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

8

1.2: Network Topologies

Lecture Focus Questions:

What is defined by the logical topology? How does the logical topology differ from the physical topology? Why can a single physical topology support multiple logical topologies? Why is a physical mesh topology normally an impractical solution? What advantages of the logical star topology have as compared to the logical bus

topology? Why is termination important on a physical bus topology? How do hosts on a physical ring topology communicate?

The key terms for this section include:Term Definition

Topology

Topology is the term used to describe how devices are connected and how messages flow from device to device. The physical topology describes the way the network is wired. The logical topology describes the way messages are sent.

LAN LAN is the acronym for local area network. A LAN is a computer network that interconnects computers within a limited area.

Terminator Terminators absorb signals and prevent them from reflecting repeatedly back and forth on the cable. Terminators are used with bus topology.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

1.5 Compare and contrast the characteristics of network topologies, types and technologies.

Wired topologies o Logical vs. physical o Star o Ring o Mesh o Bus

 Video/Demo Time

1.2.1 Network Topologies 7:09Total Video Time 7:09

Fact Sheets1.2.2 Topology Facts

Number of Exam Questions12 questionsCopyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 9: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

9

Total TimeAbout 25 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 10: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

10

1.3: The OSI Model

Lecture Focus Questions:

What is the OSI model? Why is it important for understanding networking? What are the advantages of using a theoretical model to describe networking? What is the name of Layer 3 in the OSI model? Layer 5? Which OSI model layers typically correspond to the network architecture? How does the session ID differ from the port number? Which OSI model layer would you find a frame at? What is the difference between connectionless and connection-oriented

services?

The key terms for this section include:Term Definition

Open Systems Interconnection (OSI)

Model

 A reference model for how applications communicate over a network without regard to its underlying internal structure and technology.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

1.2 Explain devices, applications, protocols and services at their appropriate OSI layers.

Layer 1 - Physical Layer 2 - Data link Layer 3 - Network Layer 4 - Transport Layer 5 - Session Layer 6 - Presentation Layer 7 - Application

 Video/Demo Time

1.3.1 The OSI Model 3:011.3.3 OSI Model Layers 7:561.3.4 OSI Model Communications 3:14

Total Video Time 14:11

Fact Sheets1.3.2 OSI Model Facts1.3.5 OSI Layers Facts

Number of Exam Questions14 questions

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 11: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

11

Total TimeAbout 39 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 12: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

12

1.4: Network Protocols

Lecture Focus Questions:

How does a protocol suite differ from a protocol? How does TCP differ from UDP? What are the differences between the three email protocols (IMAP4, POP3, and

SMTP)? How does SSH differ from Telnet? How does HTTPS differ from HTTP?

The key terms for this section include:Term Definition

Protocol A protocol is a set of standards for communication between network hosts.

TCP/IP Suite

The internet protocol suite (frequently referred to as TCP/IP) is the most widely used protocol suite today.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+ 1.1 Explain the purposes and uses of ports and protocols.

Protocols and ports o SSH 22 o DNS 53 o SMTP 25 o SFTP 22 o FTP 20, 21 o TFTP 69 o TELNET 23 o DHCP 67, 68 o HTTP 80 o HTTPS 443 o SNMP 161 o RDP 3389 o NTP 123 o SIP 5060, 5061 o SMB 445 o POP 110 o IMAP 143 o LDAP 389 o LDAPS 636 o H.323 1720

Connection-oriented vs. connectionless

1.8 Explain the functions of network services.Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 13: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

13

NTP

3.4 Given a scenario, use remote access methods.

RDP Telnet

 Video/Demo Time

1.4.1 TCP/IP Protocol Suite 7:571.4.2 Common Network Services 8:141.4.3 Explore Network Services 7:58

Total Video Time 24:09

Fact Sheets1.4.4 Common TCP/IP Protocols

Number of Exam Questions12 questions

Total TimeAbout 42 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 14: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

14

1.5: Numbering Systems

Lecture Focus Questions:

What is the difference between a binary numbering system and a hexadecimal numbering system?

What are the possible values in a binary number? In a hexadecimal number, how many possible characters can be used for each

number space? In a 3-bit binary number, how many possible combinations are there?

The key terms for this section include:Term Definition

Binary Number A number system that only has two values, typically 0 (zero) and 1 (one).

Octal Number A base-8 number system that uses the digits 0-7.Hexadecimal

Number A numbering system with 16 symbols, 1-9 and A-F.

 Video/Demo Time

1.5.1 Numbering Systems 8:39Total Video Time 8:39

Fact Sheets1.5.2 Numbering System Facts

Number of Exam Questions3 questions

Total TimeAbout 17 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 15: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

15

2.1: Twisted Pair

Lecture Focus Questions:

Why are wires twisted together in twisted pair cables? What is the difference between STP cabling and UTP cabling? What is the difference between Cat 3, Cat 5e, and Cat 6a cables? How can you tell the difference between RJ11 and RJ45 connectors? You have an installation that requires Cat 5 cabling. Which cable ratings could

you use for the installation?

In this section, you will learn to:

Select and install cables to connect a DSL modem. Select and install cables to connect to an Ethernet network.

The key terms for this section include:Term Definition

Crosstalk An unwanted transfer of signals between communication channels.

UTP UTP stands for unshielded twisted pair. UTP cables are easy to work with and less expensive than shielded cables.

STPSTP stands for shielded twisted pair. Shielding is electrically conductive foil or braided material that is wrapped around pairs of wires, around the overall cable, or both.

Plenum Space

A plenum space is a part of a building that provides a pathway for the airflow needed by heating and air conditioning systems, such as above a dropped ceiling or below a raised floor.

Riser Space

An area that connects multiple floors where cables can be run. This area cannot be a plenum space.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 1.1 Implement a cabling solution to establish network communication.

CompTIA Network+ 2.1 Given a scenario, deploy the appropriate cabling solution.

Media types o Copper

UTP STP

o Plenum vs. PVC o Connector types

Copper RJ-45 RJ-11

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 16: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

16

o Copper cable standards Cat 3 Cat 5 Cat 5e Cat 6 Cat 6a Cat 7

 Video/Demo Time

2.1.1 Twisted Pair 11:25Total Video Time 11:25

Lab/Activity2.1.3 Connect to an Ethernet Network

Fact Sheets2.1.2 Twisted Pair Facts

Number of Exam Questions7 questions

Total TimeAbout 36 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 17: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

17

2.2: Coaxial

Lecture Focus Questions:

What is the function of the wire mesh in coaxial cables? Which part of the cable is used to carry data? Which connector type and cable grade is used to connect a cable modem to the

internet? Is twisted pair cable more immune to EMI than coaxial cable?

In this section, you will learn to:

Connect a cable modem.

The key terms for this section include:Term DefinitionPVC Polyvinyl chloride is a type of plastic use to shield objects such as coaxial cable.

EMIElectromagnetic interference (EMI) is a disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction.

BNCA BNC (Bayonet Neill–Concelman) is a type of quick connect/disconnect adapter used on some types of cables, such as the RG-58 A/U cable used with the 10Base-2 Ethernet system.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 1.1 Implement a cabling solution to establish network communication.

CompTIA Network+ 2.1 Given a scenario, deploy the appropriate cabling solution.

Media types o Copper o Connector types

Copper BNC DB-9 DB-25 F-type

Copper cable standards RG-6 RG-59

3.4 Given a scenario, use remote access methods.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 18: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

18

Out-of-band management o Modem

 Video/Demo Time

2.2.1 Coaxial 4:54Total Video Time 4:54

Lab/Activity2.2.3 Connect a Cable Modem

Fact Sheets2.2.2 Coaxial Cable Facts

Number of Exam Questions6 questions

Total TimeAbout 28 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 19: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

19

2.3: Fiber Optic

Lecture Focus Questions:

How do light waves within a fiber optic cable travel around corners? What advantages do fiber optic cables offer over twisted pair cables and other

media choices? What are the disadvantages of implementing fiber optic cables? What is the difference between single mode and multimode cables? How can you tell the difference between an ST connector and an SC connector? Which connector types combine two strands of fiber into a single connector? What are media converters used for?

In this section, you will learn to:

Select and install components to connect to a network that uses fiber optic media.

The key terms for this section include:Term Definition

LED A light-emitting diode is a two-lead semiconductor light source that emits visible light when an electric current passes through it.

WDM Wave Division Multiplexing (WDM) joins several light wavelengths (colors) onto a single strand of fiber.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro1.1 Implement a cabling solution to establish network communication. 

CompTIA Network+ 2.1 Given a scenario, deploy the appropriate cabling solution.

Media types o Copper o Fiber

Single-mode Multimode

o Connector types Fiber

LC ST SC

APC UPC MTRJ

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 20: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

20

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

Media converter

 Video/Demo Time

2.3.1 Fiber Optic 10:52Total Video Time 10:52

Lab/Activity2.3.3 Connect Fiber Optic Cables

Fact Sheets2.3.2 Fiber Optic Facts

Number of Exam Questions9 questions

Total TimeAbout 37 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 21: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

21

2.4: Wiring Implementation

Lecture Focus Questions:

What is the difference between the T568A and T568B standards? When should you use both standards?

What type of cable would you use to connect two hosts together in a back-to-back configuration using twisted pair cable?

When should you use stranded core twisted pair cable instead of solid core twisted pair?

What is the difference between the MDF and an IDF? What type of cable connects an IDF to the MDF? Who is typically responsible for installing a demarc extension? What is the difference between a 25 pair block and a 50 pair block? What can

you use to make the 50 pair block function like a 25 pair block? When you use a punch down tool, which way should the blade be facing? What is a patch panel used for?

In this section, you will learn to:

Use the appropriate tools to create Cat 5 drop cables. Use the appropriate tools to connect cables using punch down blocks. Connect patch panel cables.

The key terms for this section include:Term Definition

PoEPower over Ethernet (PoE) is a technology that allows a single cable to provide both data and electric power to devices such as wireless access points, IP cameras, and VoIP phones.

Pinout When connecting two devices using twisted pair cabling, the pinout determines which wire goes to which pin of the connector.

LECWhen you contract with a local exchange carrier (LEC) for data, internet, or telephone services, they install a physical cable and a termination jack onto your premises.

DemarcThe demarc (short for demarcation point) is the line that marks the boundary between the telecommunications (telco) equipment and your private network or telephone system.

MDFs

A frame or rack that is used to interconnect and manage telecommunication wiring in a building. It functions like an old-time telephone switchboard, where operators used connecting wires to route telephone calls. Today's MDF describes the room that houses the traditional MDF along with networking patch panels. Often, rack-mounted equipment is also housed in an MDF.

Punchdown Block

 A device that connects one group of wires to another group of wires through a system of metal pegs that the wires are attached to.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 22: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

22

Patch PanelPatch panels permit circuits to be arranged and rearranged by plugging and unplugging respective patch cords in a mounted hardware assembly.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 1.1 Implement a cabling solution to establish network communication.

CompTIA Network+

2.1 Given a scenario, deploy the appropriate cabling solution.

Copper termination standards o TIA/EIA 568a o TIA/EIA 568b

Termination points o 66 block o 110 block o Patch panel o Fiber distribution panel

2.5 Compare and contrast WAN technologies.

Termination o Demarcation point o Smart jack

3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.

Wiring and port locations IDF/MDF documentation

 Video/Demo Time

2.4.1 Twisted Pair Cable Construction 9:582.4.3 Wiring Distribution 5:152.4.4 Use Punchdown Blocks 5:31

Total Video Time 20:44

Lab/Activity2.4.6 Connect Patch Panel Cables 12.4.7 Connect Patch Panel Cables 2

Fact Sheets2.4.2 Cable Construction Facts

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 23: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

23

2.4.5 Wiring Distribution Facts

Number of Exam Questions13 questions

Total TimeAbout 68 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 24: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

24

2.5: Troubleshoot Network Media

Lecture Focus Questions:

How do you prevent back reflection and optical return loss? What is the difference between a short circuit and an open circuit? What happens when you connect a single mode fiber to multimode fiber? What is the difference between a time-domain reflectometer and an optical time-

domain reflectometer? Which tool would you use to test the bandwidth of your internet connection? Which cable types are immune to the effects of EMI? How does distance affect attenuation? How does distance affect impedance? What is the single best method to reduce the effects of an impedance mismatch? What is the difference between a regular cable tester and a cable certifier? Which tool would you use to find the end of a specific cable within a wiring

closet?

The key terms for this section include:Term Definition

Electromagnetic Interference (EMI)

andRadio Frequency Interference (RFI)

Electromagnetic interference and radio frequency interference are external signals that interfere with normal network communications. Common sources of EMI/RFI include nearby generators, motors (such as elevator motors), radio transmitters, welders, transformers, and fluorescent lighting.

CrosstalkCrosstalk is interference that is caused by signals within twisted pairs of wires (for example, current flow on one twisted pair causing a current flow on an adjacent pair).

Attenuation Attenuation is the loss of signal strength from one end of a cable to the other. This is also known as dB loss.

Short

An electrical short occurs when electrical signals take a path other than the intended path. In the case of twisted pair wiring, a short means that a signal sent on one wire arrives on a different wire.

Open Circuit

An open circuit is when a cut in the wire prevents the original signal from reaching the end of the wire. An open circuit is different from a short in that the signal stops (electricity cannot flow because the path is disconnected).

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 5.1 Troubleshoot issues with networking media or devices to establish network communication.

CompTIA Network+ 2.5 Compare and contrast WAN technologies.

Termination

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 25: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

25

o Smart jack

5.2 Given a scenario, use the appropriate tool.

Hardware tools o Crimper o Punchdown tool o OTDR o Multimeter o Light meter o Tone generator o Cable tester o Loopback adapter o Spectrum analyzer

Software tools o Bandwidth speed tester

5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.

Attenuation Crosstalk EMI Open/short Incorrect pin-out Incorrect cable type Transceiver mismatch TX/RX reverse Damaged cables Bent pins

5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues.

Reflection Refraction Absorption

 Video/Demo Time

2.5.1 Troubleshoot Copper Wiring Issues 13:522.5.3 Troubleshoot Fiber Optic Wiring Issues 7:302.5.5 Troubleshooting Tools 6:08

Total Video Time 27:30

Fact SheetsCopyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 26: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

26

2.5.2 Copper Wiring Troubleshooting Facts2.5.4 Fiber Optic Wiring Troubleshooting Facts2.5.6 Troubleshooting Tools Facts

Number of Exam Questions15 questions

Total TimeAbout 58 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 27: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

27

3.1: Network Adapters

Lecture Focus Questions:

What are two major differences between a modem and an Ethernet NIC? How can you identify a network card manufacturer from its MAC address? What is the function of a transceiver? What is the purpose of the CRC? At which OSI layer does a network adapter card operate? At which layer does a

media converter work? Can you use a media converter to connect network segments that are using

different architecture types? Why or why not? How does a computer find the MAC address of another device on the same

subnet? What does the MAC address FF-FF-FF-FF-FF-FF indicate?

In this section, you will learn to:

Select and install network cards to meet network connection requirements. Connect a media converter.

The key terms for this section include:Term Definition

NIC

A network interface card (NIC), also called a network adapter, connects a host to the network medium. It is responsible for converting binary data into a format that can be sent on the network medium.

GBICA GBIC (gigabit interface converter) is a large transceiver that fits in a port slot and is used for Gigabit media, including copper and optical fiber.

SFP An SFP (small form-factor pluggable) is similar to a GBIC, but is a smaller size. An SFP is sometimes called a mini-GBIC.

XFP An XFP transceiver is similar to an SFP in size, but is used for 10-Gigabit networking.

QSFPQSFP (quad, or 4-channel, small form-factor pluggable) is a compact hot-pluggable transceiver that is also used for data communication applications.

MAC Address A Media Access Control (MAC) address is a unique identifier burned into the ROM of every Ethernet NIC.

Address Resolution Protocol(ARP)

Hosts use ARP to discover the MAC address of a device from its IP address.

Reverse Address Resolution

Hosts use the reverse address resolution protocol (RARP) to find the IP address of a host with a known MAC address.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 28: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

28

Protocol(RARP)

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.2 Deploy appropriate wired networking or internetworking device(s).

5.1 Troubleshoot issues with networking media or devices to establish network communication. 

CompTIA Network+

2.1 Given a scenario, deploy the appropriate cabling solution.

Transceivers o SFP o GBIC o SFP+ o QSFP o Characteristics of fiber transceivers

Bidirectional

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

Modems

 Video/Demo Time

3.1.1 Network Adapters 8:34Total Video Time 8:34

Lab/Activity3.1.3 Select and Install a Network Adapter3.1.4 Connect a Media Converter

Fact Sheets3.1.2 Network Adapter Facts

Number of Exam Questions10 questions

Total TimeAbout 48 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 29: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

29

3.2: Network Devices

Lecture Focus Questions:

A host on a network sends a frame to the hub. Which other devices on the network will see this frame?

A host on a network sends a frame to a switch. Which other devices on the network will see this frame?

What are the similarities and differences between a bridge and a switch? What are the advantages of using switches instead of hubs? At which OSI model layer do wireless access points operate? What type of device do you use to translate from one network architecture to

another?

In this section, you will learn to:

Select and install appropriate networking hardware.

The key terms for this section include:Term DefinitionHub The central connecting point of a physical star, logical bus topology.

BridgeA device that connects two (or more) media segments on the same subnet. It filters traffic between both segments based on the MAC address in the frame.

Switch A multi-port bridge that performs filtering based on MAC addresses and provides additional features not found in a bridge.

Wireless Access Point (AP)

A hub for a wireless network. As with a hub, any message sent to any wireless host connected to the AP can be received by all other wireless hosts.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.2 Deploy appropriate wired networking or internetworking device(s).5.1 Troubleshoot issues with networking media or devices to establish network communication.

CompTIA Network+

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

Switch Hub

 Video/Demo Time

3.2.1 Network Devices 10:10Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 30: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

30

Total Video Time 10:10

Lab/Activity3.2.3 Install a Hub3.2.4 Select a Networking Device

Fact Sheets3.2.2 Network Connection Device Facts

Number of Exam Questions14 questions

Total TimeAbout 54 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 31: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

31

3.3: Internetwork Devices

Lecture Focus Questions:

What is the main role of a router? How does a router differ from a switch or a hub? How are the physical and logical network addresses used when data is routed

through an internetwork? Which addresses stay the same? Which addresses change from hop to hop?

How does a firewall protect a network?

In this section, you will learn to:

Select the appropriate device to connect two networks

The key terms for this section include:Term Definition

Router A router is a device that connects two or more network segments or subnets.

FirewallA firewall is a router with additional security features. Firewalls can be programmed with security rules to restrict the flow of traffic between networks.

Layer 3 Switch

A Layer 3 switch is capable of reading Layer 3 (network) addresses and routing packets between subnets. A Layer 3 switch often provides better performance than a router, but it does not support as many features as a router.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.2 Deploy appropriate wired networking or internetworking device(s).5.1 Troubleshoot issues with networking media or devices to establish network communication.

CompTIA Network+

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

Firewall Router

2.3 Explain the purposes and use cases for advanced networking devices.

Multilayer switch

 Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 32: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

32

Video/Demo Time3.3.1 Internetwork Devices 6:28

Total Video Time 6:28

Lab/Activity3.3.3 Select a Router

Fact Sheets3.3.2 Internetwork Device Facts

Number of Exam Questions5 questions

Total TimeAbout 29 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 33: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

33

4.1: Ethernet

Lecture Focus Questions:

What logical topologies are supported on an Ethernet network? What is the purpose of the backoff on Ethernet networks? How can you eliminate collisions on an Ethernet network? What device is used to enable full-duplex communications with Ethernet?

The key terms for this section include:Term Definition

UTP UTP stands for unshielded twisted pair. UTP cables are easy to work with and less expensive than shielded cables.

MAC Address

A Media Access Control (MAC) address is a unique identifier burned into the ROM of every Ethernet NIC.

CRCThe cyclic redundancy check (CRC) is the result of a mathematical calculation performed on the frame. The CRC helps verify that the frame contents have arrived uncorrupted.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

Properties of network traffic o CSMA/CD

2.1 Given a scenario, deploy the appropriate cabling solution.

Transceivers o Characteristics of fiber transceivers

Duplex

 Video/Demo Time

4.1.1 Ethernet Architecture 8:20Total Video Time 8:20

Fact Sheets4.1.2 Ethernet Facts

Number of Exam Questions4 questions

Total TimeCopyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 34: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

34

About 18 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 35: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

35

4.2: Ethernet Specifications

Lecture Focus Questions:

What is the maximum cable length for most Ethernet standards that use twisted pair cables?

Which twisted pair cable category should you use on a 1000BaseT network? What is the advantage of using single mode cable on a 1000BaseLX network? What is the difference between 1000BaseLX and 1000BaseSX?

In this section, you will learn to:

Reconnect to an Ethernet network

The key terms for this section include:Term Definition

UTP UTP stands for unshielded twisted pair. UTP cables are easy to work with and less expensive than shielded cables.

Fiber Optic Cable

Fiber optic cable is a high-speed data transmission medium. It contains tiny glass or plastic optical fibers that carry light beams. Digital data is transmitted through the cable via rapid pulses of light.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 1.1 Select and install cables for communication between computers and networking devices.

CompTIA Network+

2.1 Given a scenario, deploy the appropriate cabling solution.

Ethernet deployment standards o 100BaseT o 1000BaseT o 1000BaseLX o 1000BaseSX o 10GBaseT

 Video/Demo Time

4.2.1 Ethernet Specifications 6:18Total Video Time 6:18

Lab/Activity4.2.3 Reconnect to an Ethernet Network

Fact Sheets4.2.2 Ethernet Specifications Facts

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 36: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

36

Number of Exam Questions15 questions

Total TimeAbout 39 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 37: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

37

4.3: Connect Network Devices

Lecture Focus Questions:

Which cable type would you use to connect a workstation to a regular port on a hub or a switch?

Which cable type would you use to connect a router to the uplink port on a switch?

Which cable type would you use to connect two switches together using their uplink ports?

Which switch feature makes choosing crossover or straight-through cables easier?

When would you use a rollover cable?

In this section, you will learn to:

Connect network devices.

The key terms for this section include:Term Definition

Straight-Through

Cable

A straight-through cable connects each wire to the same pin on each connector (pin 1 to pin 1, pin 2 to pin 2, etc.). A straight-through cable is used when a crossover is performed with a hub or a switch.

Crossover Cable

A crossover cable matches the transmit (Tx) wires on one connector with the receive (Rx) wires on the other connector. A crossover cable is used when crossing is not performed automatically or when crossover is performed twice.

RolloverA rollover cable might also have an RJ45 connector on both ends, requiring an adapter to convert from the RJ45 connector to the serial cable.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.1 Select and install cables for communication between computers and networking devices.2.1 Select and install the appropriate networking or internetworking device(s).

CompTIA Network+ 2.1 Given a scenario, deploy the appropriate cabling solution.

Connector types o Copper o DB-9 o DB-25

Copper termination standards o Crossover

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 38: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

38

o Straight-through

 Video/Demo Time

4.3.1 Connect Devices 7:38Total Video Time 7:38

Lab/Activity4.3.3 Connect Network Devices

Fact Sheets4.3.2 Device Connection Facts

Number of Exam Questions11 questions

Total TimeAbout 36 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 39: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

39

4.4: Troubleshoot Physical Connectivity

Lecture Focus Questions:

What happens if a host goes down in a star topology? What happens if a host goes down in a token ring topology?

What happens if there is a cable break on a bus topology? What happens is there is a cable break on a dual ring topology?

What is indicated by a flashing green link light? What might be the problem if none of the NIC lights are working?

In this section, you will learn to:

Connect a network cable. Replace the patch cable. Replace a faulty cable. Troubleshoot a faulty cable. Reconnect a switch. Troubleshoot a switch. Connect an unplugged cable. Troubleshoot an unplugged cable.

The key terms for this section include:Term Definition

CollisionIn a half duplex Ethernet network, a collision is the result of two devices on the same Ethernet network attempting to transmit data at exactly the same time.

Keepalive Signal

A Keepalive signal is a message sent by one device (such as a network interface card)  to another device (such as a switch) to check that the link between the two is operating. A keepalive signal is sometimes referred to as a heartbeat.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.2 Deploy appropriate wired networking or internetworking device(s).5.1 Troubleshoot issues with networking media or devices to establish network communication.

CompTIA Network+ 1.5 Compare and contrast the characteristics of network topologies, types and technologies.

Wired topologies o Logical vs. physical o Star o Ring o Mesh

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 40: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

40

o Bus

5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.

Duplex/speed mismatch Network connection LED status indicators

5.5 Given a scenario, troubleshoot common network service issues.

Hardware failure

 Video/Demo Time

4.4.1 Troubleshoot the Physical Network Topology 6:554.4.3 Troubleshoot the Link Status 6:24

Total Video Time 13:19

Lab/Activity4.4.5 Explore Physical Connectivity4.4.6 Troubleshoot Physical Connectivity 14.4.7 Troubleshoot Physical Connectivity 24.4.8 Troubleshoot Physical Connectivity 34.4.9 Troubleshoot Physical Connectivity 4

Fact Sheets4.4.2 Physical Network Topology Troubleshooting Facts4.4.4 Link Status Troubleshooting Facts

Number of Exam Questions12 questions

Total TimeAbout 96 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 41: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

41

5.1: IP Addressing

Lecture Focus Questions:

What is an octet? What is the decimal equivalent of the following binary number? 01100111. What

is the binary equivalent of the following decimal number? 211. How is the network portion of an IP address identified? Which portion of a class C address designates the network address? What is the difference between subnetting and supernetting? Which method uses

a subnet mask that is longer than the default subnet mask? What does /14 mean in the following IP address: 199.78.11.12/14? How does variable-length subnet masking work?

In this section, you will learn to:

Configure IP addresses. Configure IP addresses on mobile devices.

The key terms for this section include:Term Definition

IANA

The Internet Assigned Numbers Authority is a function of a nonprofit private American corporation that oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System, media types, and other Internet Protocol-related symbols and internet numbers.

Classful IP Addresses

Classful addresses are IP addresses that use a default subnet mask, as follows:

Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0

VLSM

Variable Length Subnet Masking (VLSM) is the method used to divide an IP address into subnets of different sizes. When using VLSM, you ignore the default subnet mask boundaries and specify a custom number of subnet mask bits.

Subnetting The process of dividing a large network into smaller networks.Supernetting The process of combining two or more networks.

Classless Inter-Domain Routing

(CIDR)

A set of internet protocol standards used to create unique identifiers for networks and host devices.

ANDing The process used to determine the network address/ID.Subnet Mask A 32-bit number that defines which portion of an IPv4 address

identifies the network address and which portion of the address Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 42: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

42

defines the host address.

Network ID A 32-bit number that identifies the network an IPv4 address belongs to.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 2.1 Configure IP addressing, DNS, and DHCP for a network host.

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

Properties of network traffic o Broadcast

1.4 Given a scenario, configure the appropriate IP addressing components.

Subnet mask Subnetting

o Classful Classes A, B, C, D, and E

o Classless VLSM CIDR notation (IPv4 vs. IPv6)

o Address assignments DHCP Static

 Video/Demo Time

5.1.1 IP Addresses 10:435.1.3 Subnets 12:135.1.6 IP Address Assignment 6:42

Total Video Time 29:38

Lab/Activity5.1.7 Configure IP Addresses5.1.8 Configure IP Addresses on Mobile Devices

Fact Sheets5.1.2 IP Address Facts5.1.4 Subnet Facts5.1.5 Variable Length Subnet Mask (VLSM) Facts5.1.9 IP Address Assignment Facts

Number of Exam QuestionsCopyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 43: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

43

15 questions

Total TimeAbout 89 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 44: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

44

5.2: APIPA and Alternate Addressing

Lecture Focus Questions:

How do you know if a host is using an APIPA address? Which IP configuration parameters are set when APIPA is used? Which

parameters are not set? In which scenarios would an alternate IP configuration simplify IP configuration?

In this section, you will learn to:

Set Up alternate addressing. Configure alternate addressing.

The key terms for this section include:Term Definition

Automatic Private IP Addressing (APIPA)

APIPA provides an option for automatic IP address assignment without a DHCP server. APIPA is enabled by default on most modern operating systems, including Windows and Linux.

Alternate IP Configuration

A manual configuration of a computer's IP address, default gateway, DNS server address, and WINS address. This configuration is used if the DHCP server fails to provide this similar information.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 2.1 Configure IP addressing, DNS, and DHCP for a network host.

CompTIA Network+

1.4 Given a scenario, configure the appropriate IP addressing components.

Address assignments o APIPA

 Video/Demo Time

5.2.1 APIPA 4:035.2.2 Set Up Alternate Addressing 3:53

Total Video Time 7:56

Lab/Activity5.2.3 Configure Alternate Addressing

Fact Sheets5.2.4 APIPA and Alternate IP Addressing Facts

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 45: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

45

Number of Exam Questions3 questions

Total TimeAbout 28 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 46: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

46

5.3: DHCP Server Configuration

Lecture Focus Questions:

What type of configuration parameters can be delivered using DHCP? What are the advantages of static IP address assignments? When might you want to use static IP addressing?

In this section, you will learn to:

Configure a DHCP server. Configure DHCP options. Create DHCP exclusions. Create DHCP client reservations. Configure a DHCP client.

The key terms for this section include:Term DefinitionDHCP

Discover (D)

The client begins by sending out a DHCP Discover frame to identify DHCP servers on the network.

DHCP Offer (O)

A DHCP server that receives a Discover request from a client responds with a DHCP Offer advertisement, which contains an available IP address. If more than one DHCP server responds with an offer, the client usually responds to the first offer it receives.

DHCP Request

(R)

The client accepts the offered IP address by sending a DHCP request back to the DHCP server.

DHCP ACK (A)

The DHCP server responds to the request by sending a DHCP ACK (acknowledgement). At this point, the IP address is leased to and configured on the DHCP client.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 3.1 Configure DHCP services for a network subnet.

CompTIA Network+ 1.4 Given a scenario, configure the appropriate IP addressing components.

Address assignments o DHCP o IP reservations

1.8 Explain the functions of network services.

DHCP service Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 47: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

47

o MAC reservations o Pools o IP exclusions o Scope options o Lease time

 Video/Demo Time

5.3.1 DHCP Server 10:375.3.3 DHCP Options 4:175.3.7 Configure Host Addressing 2:24

Total Video Time 17:18

Lab/Activity5.3.2 Configure a DHCP Server5.3.4 Configure DHCP Options5.3.5 Create DHCP Exclusions5.3.6 Create DHCP Client Reservations5.3.8 Configure a DHCP Client

Fact Sheets5.3.9 DHCP Configuration Facts

Number of Exam Questions8 questions

Total TimeAbout 91 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 48: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

48

5.4: DHCP Relay

Lecture Focus Questions:

What is the difference between an RFC 1542 compliant router and a DHCP relay agent?

In this section, you will learn to:

Configure a DHCP relay agent Add a DHCP server on another subnet

The key terms for this section include:Term Definition

RFC 1542 Compliant

Router

An RFC 1542 compliant router listens for DHCP traffic and routes any received DHCP frames to the appropriate subnet. .

DHCP Relay Agent

A function of the Routing and Remote Access service (RRAS) role on a Windows server, the DHCP Relay Agent service sends the DHCP packets it receives to a remote DHCP server on a different subnet.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 3.1 Configure DHCP services for a network subnet.

CompTIA Network+

1.8 Explain the functions of network services.

DHCP service o DHCP relay/IP helper

 Video/Demo Time

5.4.1 Configure DHCP Relay 5:50Total Video Time 5:50

Lab/Activity5.4.3 Configure a DHCP Relay Agent5.4.4 Add a DHCP Server on Another Subnet

Fact Sheets5.4.2 DHCP Relay Facts

Number of Exam Questions3 questions

Total TimeCopyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 49: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

49

About 38 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 50: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

50

5.5: DNS Name Resolution

Lecture Focus Questions:

How are host names organized in DNS? What is the difference between a forward lookup zone and a reverse lookup? What is the role of the root servers in DNS? In DNS, what is the difference between a zone and a domain? What is the difference between an A record and a PTR record?

In this section, you will learn to:

Configure DNS addresses. Create standard DNS zones. Create reverse DNS zones. Create host records. Create CNAME records. Troubleshoot DNS records.

The key terms for this section include:Term Definition

. (dot) domain The . (dot) domain, or root domain, denotes a fully qualified, unambiguous domain name.

Top-Level Domain(TDL)

The last part of a domain name (for example, .com, .edu, .gov). TDLs are managed by the Internet Corporation of Assigned Names and Numbers (ICANN).

Fully Qualified Domain Name

(FQDN)

The host name and all domain names separated by periods. The final period (which is for the root domain) is often omitted and only implied.

Additional Domains

Additional domains are second-level domains with names registered to an individual or organization for use on the internet. These names are based on an appropriate top-level domains, depending on the type of organization or geographic location where a name is used. Yahoo.com and microsoft.com are examples of additional domains in your DNS structure.

Hostname The hostname is the part of a domain name that represents a specific host. For example, "www" is the hostname of www.example.com.

Records

Records are used to store entries for hostnames, IP addresses, and other information in the zone database. Each host has at least one record in the DNS database that maps the hostname to the IP address.

Authoritative Server

An authoritative server is a DNS server that has a complete copy of all the records for a particular domain.

Dynamic DNS(DDNS)

DDNS enables clients or the DHCP server to update records in the zone database. Without dynamic updates, all A (host) and PTR

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 51: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

51

(pointer) records must be configured manually. With dynamic updates, host records are created and deleted automatically whenever the DHCP server creates or releases an IP address lease.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 3.2 Configure DNS for the network.

CompTIA Network+

1.8 Explain the functions of network services.

DNS service o Record types

A, AAA TXT (SPF, DKIM) SRV MX CNAME NS PTR

o Internal vs. external DNS o Third-party/cloud-hosted DNS o Hierarchy o Forward vs. reverse zone

 Video/Demo Time

5.5.1 DNS 12:535.5.2 Configure DNS 11:34

Total Video Time 24:27

Lab/Activity5.5.4 Configure DNS Addresses5.5.5 Create Standard DNS Zones5.5.6 Create Host Records5.5.7 Create CNAME Records5.5.8 Troubleshoot DNS Records

Fact Sheets5.5.3 DNS Facts

Number of Exam Questions5 questions

Total TimeAbout 95 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 52: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

52

5.6: IP Version 6

Lecture Focus Questions:

What is the primary reason for developing IPv6? How many hexadecimal numbers are in an IPv6 address? How does this

compare to a MAC address? What do you add to an IPv6 address when you remove one or more quartets with

all 0s? What information is included within the IPv6 address prefix? How many numbers are used for the interface ID? How can the interface ID be

related to the MAC address? What is the difference between ISATAP and 6to4 tunneling? What is the difference between stateful autoconfiguration and stateless

autoconfiguration?

In this section, you will learn to:

Configure IPv6 addresses. Configure a DHCP6 server. Configure an IPv6 address.

The key terms for this section include:Term Definition

Global-Unicast An IPv6 address type that is publicly routable and can be used in the internet.

Unique-Local An IPv6 address type that indicates an IP address is a private IP address.

Link-Local An IPv6 address type that indicates that the IP address was configured by default.

Multicast An IPv6 address type that indicates that the packet is addressed to a number of hosts on the network, but not all hosts.

Prefix ID The leftmost bits of the IPv6 address, also know as the network ID. The prefix is used for routing IPv6 packets.

Interface ID The rightmost bits of the IPv6 address used to uniquely identify a network card (interface) in a host.

Anycast A unicast address that is assigned to more than one interface, typically interfaces belonging to different hosts.

Local Loopback

The local loopback address for the local host is 0:0:0:0:0:0:0:1 (also identified as ::1 or ::1/128). The local loopback address is not assigned to an interface. It can verify that the TCP/IP protocol stack is properly installed on the host.

Dual StackA dual stack configuration enables a host to communicate with IPv4 and IPv6 hosts; the IPv4 and IPv6 protocol stacks run concurrently on a host.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 53: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

53

Tunneling

Tunneling allows IPv6 hosts or sites to communicate over the existing IPv4 infrastructure. A device encapsulates IPv6 packets within IPv4 packets for transmission across an IPv4 network, and then the IPv6 packets are de-encapsulated by another device at the other end.

Static Full Assignment

The entire 128-bit address and all other configuration information is statically assigned to the host.

Static Partial Assignment

The prefix is statically assigned. The interface ID is derived from the MAC address.

Stateless Autoconfiguration

Clients automatically generate the interface ID and learn the subnet prefix and default gateway through the Neighbor Discovery Protocol (NDP).

DHCPv6 IPv6 uses an updated version of DHCP, DHCPv6. It operates in two modes, stateful and stateless.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 2.1 Configure IP addressing, DNS, and DHCP for a network host.

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

IPv6 concepts o Addressing o Tunneling o Dual stack o Router advertisement o Neighbor discovery

1.4 Given a scenario, configure the appropriate IP addressing components.

Loopback and reserved Default gateway Address assignments

o DHCPv6 o EUI64

1.8 Explain the functions of network services.

IPAM

 Video/Demo Time

5.6.1 IP Version 6 9:275.6.5 IPv6 Address Assignment 11:06

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 54: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

54

5.6.6 Configure IPv6 Addresses 9:335.6.7 Configure a DHCP6 Server 4:59

Total Video Time 35:05

Lab/Activity5.6.9 Configure an IPv6 Address

Fact Sheets5.6.2 IPv6 Facts5.6.3 IPv6 Address Type Facts5.6.4 IPv4 to IPv6 Migration5.6.8 IPv6 Address Assignment Facts

Number of Exam Questions8 questions

Total TimeAbout 76 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 55: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

55

5.7: Multicast

Lecture Focus Questions:

How does multicast differ from unicast and broadcast? What is the IP address range reserved for multicast groups? What does a regular switch do when it receives a multicast frame? Which device would you configure to prevent multicast traffic from being sent to

non-group members?

The key terms for this section include:Term Definition

UnicastMessages are sent to a specific host address. The sending device must know the IP address of all recipients and must create a separate packet for each destination device.

BroadcastA single packet that, when sent, is processed by all hosts. Broadcast packets are not typically forwarded by routers, so broadcast traffic is limited to within a single subnet.

IGMPThe Internet Group Management Protocol (IGMP) is used to identify group members and to forward multicast packets on to the segments where group members reside.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

Properties of network traffic o Multicast o Unicast

 Video/Demo Time

5.7.1 Multicast 6:24Total Video Time 6:24

Fact Sheets5.7.2 Multicast Facts

Number of Exam Questions6 questions

Total TimeAbout 18 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 56: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

56

5.8: Troubleshoot IP Configuration Issues

Lecture Focus Questions:

What does the /release switch do when used with ipconfig? How can you tell if a rogue DHCP server is active on your network? How do you know if a host is using APIPA?

In this section, you will learn to:

Find information about IP configuration settings on Windows and Linux systems. Troubleshoot IP configuration problems.

The key terms for this section include:Term Definition

APIPA

APIPA (Automatic Private IP Addressing) is the Windows function that provides DHCP autoconfiguration addressing. When the DHCP process fails, Windows will automatically assign an IP address from the private range of 169.254.0.1 to 169.254.255.254. Once the address has been assigned, the host uses Address Resolution Protocol (ARP) to verify that the chosen APIPA address is unique.

ipconfig ipconfig is a command line tool used to control the network connections on Windows machines.

DHCP Dynamic Host Configuration Protocol (DHCP) is a protocol used to centrally manage the distribution of IP addresses within a network.

DNS DNS stands for Domain Name System. The main function of DNS is to translate domain names into IP Addresses, which computers can understand.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

3.4 Use network tools to discover network devices and resources.5.2 Troubleshoot IP configuration issues to establish network communication.

CompTIA Network+ 5.2 Given a scenario, use the appropriate tool.

Software tools o Command line o ipconfig o ifconfig

5.5 Given a scenario, troubleshoot common network service issues.

Incorrect gateway Incorrect netmask

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 57: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

57

Duplicate IP addresses Duplicate MAC addresses Expired IP address Exhausted DHCP scope Rogue DHCP server

 Video/Demo Time

5.8.1 IP Configuration Troubleshooting 12:075.8.2 Use ipconfig 6:465.8.3 Use ifconfig 4:12

Total Video Time 23:05

Lab/Activity5.8.5 Explore IP Configuration5.8.6 Troubleshoot IP Configuration 15.8.7 Troubleshoot IP Configuration 25.8.8 Troubleshoot IP Configuration 3

Fact Sheets5.8.4 Ipconfig Utility Facts

Number of Exam Questions5 questions

Total TimeAbout 82 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 58: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

58

5.9: Troubleshoot IP Communications

Lecture Focus Questions:

What is the difference between netstat and arp? If a ping test fails, what should you do? What information does tracert provide? What does TCPdump do?

In this section, you will learn to:

Use ping and tracert. Use arp and netstat. Use tcpdump. Explore network communications.

The key terms for this section include:Term Definition

pingping sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them.

Address Resolution Protocol(ARP)

Hosts use ARP to discover the MAC address of a device from its IP address.

tcpdumptcpdump is a packet analyzer that runs in a command line utility. It allows the user to view TCP/IP and other packets as they are transmitted and received over a computer's network.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

3.4 Use network tools to discover network devices and resources.5.2 Troubleshoot IP configuration issues to establish network communication.

CompTIA Network+ 1.3 Explain the concepts and characteristics of routing and switching.

Segmentation and interface properties o ARP table

5.2 Given a scenario, use the appropriate tool.

Software tools o Command line

ping Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 59: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

59

tracert, traceroute iptables netstat tcpdump route arp

5.5 Given a scenario, troubleshoot common network service issues.

Unresponsive service

 Video/Demo Time

5.9.1 Network Communication Troubleshooting 7:185.9.2 Use ping and tracert 9:265.9.4 Use arp and netstat 8:325.9.6 Use tcpdump 5:41

Total Video Time 30:57

Lab/Activity5.9.8 Explore Network Communications

Fact Sheets5.9.3 Network Communication Troubleshooting Facts5.9.5 arp and netstat Facts5.9.7 tcpdump Facts

Number of Exam Questions15 questions

Total TimeAbout 73 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 60: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

60

5.10: Troubleshoot Name Resolution

Lecture Focus Questions:

What are the symptoms of name resolution problems? What is the difference between nslookup and dig?

In this section, you will learn to:

Use nslookup

The key terms for this section include:Term Definition

tracert or traceroute

The tracert or traceroute commands are used to show details about the path that a packet takes from the computer to whatever destination you specify.

nslookupA command-line tool used (in Windows and other operating systems) to query the Domain Name System (DNS) to obtain the domain name, the IP address mapping, or for any other specific DNS record.

digDomain Information Groper (dig) is a Unix-like network administration command-line tool used to determine what a particular DNS server thinks the given host’s IP address should be.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

3.4 Use network tools to discover network devices and resources.5.3 Troubleshoot wired or wireless network connectivity to establish network communication.

CompTIA Network+

5.2 Given a scenario, use the appropriate tool.

Software tools o Command line

dig

5.5 Given a scenario, troubleshoot common network service issues.

Names not resolving

 Video/Demo Time

5.10.1 Name Resolution Troubleshooting 4:115.10.3 Use nslookup 9:13

Total Video Time 13:24

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 61: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

61

Lab/Activity5.10.4 Explore nslookup

Fact Sheets5.10.2 Name Resolution Troubleshooting Facts

Number of Exam Questions7 questions

Total TimeAbout 38 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 62: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

62

6.1: Switch Access

Lecture Focus Questions:

What are the requirements for connecting a VTY (virtual terminal) to a Cisco device?

What types of cable can you use to connect a PC to a router console port? What is the difference between a managed switch and an unmanaged switch? What is the difference between in-band and out-of-band management?

In this section, you will learn to:

Use the command line interface (CLI).

The key terms for this section include:Term Definition

Managed Switch A switch that must be configured before you can use it.

Unmanaged Switch

An unmanaged switch allows Ethernet devices to communicate with one another automatically using auto-negotiation to determine parameters such as the data rate and whether to use half-duplex or full-duplex mode.

Out-of-Band Management

Out-of-band management allows you to use a dedicated communication channel that separates management traffic from normal network traffic. Network switches and routers allow you to use console redirection to access the device's console through a built-in serial or USB port.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 2.3 Perform basic router configuration tasks.

CompTIA Network+

3.4 Given a scenario, use remote access methods.

Out-of-band management o Console router

 Video/Demo Time

6.1.1 Device Access 4:146.1.2 Use the Command Line Interface (CLI) 7:23

Total Video Time 11:37

Fact Sheets6.1.3 Device Connection Facts

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 63: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

63

Number of Exam Questions3 questions

Total TimeAbout 20 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 64: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

64

6.2: Switch IP Configuration

Lecture Focus Questions:

Why would you configure an IP address on a switch? What does the ip address dhcp command allow you to do?

In this section, you will learn to:

Configure management VLAN settings. Configure switch IP settings.

The key terms for this section include:Term Definition

VLAN

A VLAN (Virtual Local Network) is a group of devices on one or more local area networks (LANs) that are configured to communicate as if they were attached to the same wire when, in fact, they could be located on a number of different LAN segments.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 4.3 Configure security for a switch. Video/Demo Time

6.2.1 IP Address and Default Gateway Configuration 3:29Total Video Time 3:29

Lab/Activity6.2.3 Configure Management VLAN Settings6.2.4 Configure Switch IP Settings

Fact Sheets6.2.2 Switch IP Configuration Facts

Number of Exam Questions3 questions

Total TimeAbout 36 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 65: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

65

6.3: Switch Interface Configuration

Lecture Focus Questions:

How does the VLAN interface configuration mode differ from Ethernet, FastEthernet, and GigabitEthernet interface configuration modes?

What must you consider if you manually configure speed or duplex settings? What happens when autonegotiation fails for the Ethernet interface on a Cisco

device? What is the default setting for all ports on a switch?

In this section, you will learn to:

Configure switch interfaces. Configure switch ports.

The key terms for this section include:Term Definition

Forwarding Database

A forwarding database is a list of Layer 2 MAC addresses and the ports used to reach each device.

Content Addressable

Memory(CAM)

The Content Addressable Memory (CAM) table stores the relationship between the MAC addresses on the network and the switch port each one is connected to.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 2.2 Perform basic switch configuration tasks.

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

Segmentation and interface properties o Port mirroring

 Video/Demo Time

6.3.1 Switch Operations 7:086.3.3 Switch Configuration Overview 3:316.3.4 Configure Switch Interfaces 5:48

Total Video Time 16:27

Lab/Activity6.3.7 Configure Switch Ports

Fact Sheets6.3.2 Switch Forwarding Facts

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 66: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

66

6.3.5 Switch Configuration Mode Facts6.3.6 Switch Configuration Command List

Number of Exam Questions4 questions

Total TimeAbout 48 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 67: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

67

6.4: Virtual LANs

Lecture Focus Questions:

What are two advantages of creating VLANs on your network? You have two VLANs configured on a single switch. How many broadcast

domains are there? How many collision domains are there? What happens if two devices on the same switch are assigned to different

VLANs?

In this section, you will learn to:

Create VLANs. Explore VLANs.

The key terms for this section include:Term Definition

VLAN

A VLAN (Virtual Local Network) is a group of devices on one or more local area networks (LAN) that are configured to communicate as if they were attached to the same wire when, in fact, they could be located on a number of different LAN segments.

VLAN ID

Switches use VLAN identifications (IDs) to route VLAN traffic. VLAN IDs are appended to the header of each frame.In addition, VLAN IDs allow switches to identify which VLAN the frame belongs to and are used for inter-switch traffic. 

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 3.6 Configure virtual networking.

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

Segmentation and interface properties o VLANs

 Video/Demo Time

6.4.1 VLAN Overview 5:266.4.3 Configure VLANs 6:26

Total Video Time 11:52

Lab/Activity6.4.5 Create VLANs6.4.6 Explore VLANs

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 68: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

68

Fact Sheets6.4.2 VLAN Facts6.4.4 VLAN Command List

Number of Exam Questions13 questions

Total TimeAbout 59 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 69: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

69

6.5: Trunking

Lecture Focus Questions:

What is trunking? Why is trunking important to VLAN configuration? What protocol does a Cisco switch use to automatically detect trunk ports? By default, traffic from which VLANs are allowed on trunk ports? What is the default configuration of most Cisco switches?

In this section, you will learn to:

Configure trunking Configure the native VLAN Configure allowed VLANs

The key terms for this section include:Term Definition

VTP

VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network. Trunking occurs when you configure VLANs that span multiple switches.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

Properties of network traffic o Broadcast domains

Segmentation and interface properties o VLANs o Trunking (802.1q) o Tagging and untagging ports

4.6 Explain common mitigation techniques and their purposes.

Change native VLAN

 Video/Demo Time

6.5.1 Access and Trunk Ports 8:406.5.2 Trunking 3:196.5.6 Native VLAN 6:06

Total Video Time 18:05Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 70: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

70

Lab/Activity6.5.5 Configure Trunking6.5.7 Configure the Native VLAN6.5.8 Configure Allowed VLANs

Fact Sheets6.5.3 Trunking Facts6.5.4 Trunking Command List

Number of Exam Questions7 questions

Total TimeAbout 72 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 71: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

71

6.6: Spanning Tree Protocol

Lecture Focus Questions:

Why does root switch selection never require a tie breaker? When would you modify an STP mode? How does PVST+ differ from Rapid PVST+? How do ports work in a multiple VLAN environment? How are root bridges designated in a multiple VLAN environment? What happens during STP convergence?

In this section, you will learn to:

Configure STP Select a root bridge Configure Rapid PVST+ Find STP Info Configure EtherChannels

The key terms for this section include:Term Definition

Switching Loop

Many networks implement redundant paths between multiple switches to create fault tolerance. However, providing redundant paths between segments could cause frames to pass between the redundant paths endlessly. This condition is known as a switching loop.

Spanning Tree Protocol

(STP)

The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks.

Root Bridge The root bridge is the master bridge, or controlling bridge.Designated

BridgeA designated bridge is any other device that participates in forwarding packets through the network.

Backup Bridge

All redundant devices are classified as backup bridges. They listen to network traffic and build the bridge database. However, they do not forward packets. They can take over if the root bridge or a designated bridge fails.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

Properties of network traffic o Protocol data units

Segmentation and interface properties o Switching loops/spanning tree

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 72: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

72

 Video/Demo Time

6.6.1 Spanning Tree Protocol 7:176.6.2 Configure STP 2:426.6.3 Select a Root Bridge 3:216.6.8 Configure EtherChannels 8:14

Total Video Time 21:34

Lab/Activity6.6.5 Configure the Root Bridge6.6.6 Configure Rapid PVST+6.6.7 Find STP Info

Fact Sheets6.6.4 STP Facts6.6.9 EtherChannel Facts

Number of Exam Questions15 questions

Total TimeAbout 83 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 73: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

73

6.7: Switch Troubleshooting

Lecture Focus Questions:

You have a network connected by switches with a single device connected to each switch port. Why would you be surprised to see collisions on this network?

What is a duplex mismatch? What conditions lead to a broadcast storm? How can you prevent switching loops from forming? You moved a device from one switch port to another, and now it cannot

communicate with any other device on the network. The switch link lights are lit. What switch configuration should you check?

Other than the switch configuration, what should you check if you see excessive frame errors on the switch?

The key terms for this section include:Term Definition

Broadcast Storm

A broadcast storm is excessive broadcast traffic that renders normal network communications impossible.

Collisions A collision occurs when two devices that share the same media segment transmit at the same time.

Duplex Mismatch

A duplex mismatch occurs when two devices use different duplex settings. For example, when one device tries to transmit using full duplex while the other expects half duplex communications.

Frame Errors

The switch examines incoming frames and only forwards frames that are complete and correctly formed; invalid frames are simply dropped. These types of frames are known as frame errors.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

Segmentation and interface properties o MAC address table

5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.

Bad port Duplex/speed mismatch VLAN mismatch

 Video/Demo Time

6.7.1 Switch Troubleshooting 12:38Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 74: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

74

Total Video Time 12:38

Fact Sheets6.7.2 Switch Troubleshooting Facts

Number of Exam Questions9 questions

Total TimeAbout 27 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 75: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

75

7.1: Routing Basics

Lecture Focus Questions:

With respect to routing, what is a packet? With respect to routing, what is a network? What does the next hop signify? What information is contained in a routing table? What is the function of a routing table? In a routing table, how is the default route used? What is the difference between static and dynamic routing? When would you create a static routing table entry? When would you configure both static and dynamic routing on the same router? What is the difference between interior and exterior routing?

The key terms for this section include:Term Definition

PacketA packet is the payload of an OSI Layer 2 frame. A packet has a header and a payload. The header contains the source and destination IP addresses. The payload depends on the protocol that formed the packet.

NetworkWhen used in routing, the term network can be defined as a broadcast domain where all the hosts have the same network portion in their IP address. Normally, a LAN fits this more precise definition of a network.

Routing Table

The routing table is a database of entries containing:

The address of a known network. The next hop gateway (router). The network interface to reach the next hop gateway. A metric or cost that indicates the desirability of the route (Tte

lower the metric, the more desirable the route).

Next Hop An IP address entry in a router's routing table that specifies the next or closest router in its routing path.

Default Route

The default route is an entry of 0.0.0.0 in a routing table. This entry matches every network.

Loopback Entry

Loopback entries contains loopback addresses, which are used for diagnostics and for troubleshooting the TCP/IP stack.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 2.3 Perform basic router configuration tasks.CompTIA Network+ 1.3 Explain the concepts and characteristics of

routing and switching.

Routing o Routing types

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 76: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

76

Default Static Dynamic

 Video/Demo Time

7.1.1 Routing 10:03Total Video Time 10:03

Fact Sheets7.1.2 Routing Facts

Number of Exam Questions6 questions

Total TimeAbout 22 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 77: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

77

7.2: Routing Protocols

Lecture Focus Questions:

What network link characteristics are used by routing protocols when computing a metric value or cost?

How does a distance vector routing protocol differ from a link state routing protocol?

How are routing paths shared by distance vector routing protocols? How are routing paths shared by link state routing protocols? What is a hybrid routing protocol? How is administrative distance used to select a best path? What is the difference between RIP and RIPv2? Why is this important in today's

networks? Which routing protocol is typically used within an ISP? Which protocol is used on

the internet? Which routing protocols divide an autonomous system into areas? How does IS-IS differ from OSPF?

In this section, you will learn to:

Configure a router with static routes. Enable OSPF routing.

The key terms for this section include:Term Definition

Hop CountThe distance between networks can be measured in hop counts, or the number times a router forwards an IP packet from one network to another. For a directly connected link, the hop count is zero.

BandwidthNetwork bandwidth measures the capacity of a link. If bandwidth is a factor in the cost, a link with a lower capacity link will have a higher cost than a link with high bandwidth.

Throughput

Although the advertised bandwidth is the maximum capacity of a link, its actual throughput will be less due to latency and other network overhead. If used in the cost calculation, larger throughput will contribute to a lower cost.

Link Utilization

Link utilization is the percentage of a network's bandwidth that is currently being consumed by network traffic. If utilization is used, the cost will be less for links with low utilization.

LoadThe load on a router refers to the amount of computational work that it performs. If load is a factor in the cost, links for routers that are performing under heavy load will have a higher cost.

MTU The maximum transmission unit (MTU) setting on a router determines the maximum payload size for a frame. While this characteristic is not usually included in a metric, it is sometimes used as a tie-breaker when

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 78: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

78

two links or paths have the same cost.

Packet LossPacket loss occurs when IP packets fail to reach their destination. If it is used in calculating cost, a link that experiences greater packet loss will have a higher cost.

Latency Latency is the delay in transmissions over the path. If latency is used in the cost, a path with higher latency has a higher cost.

Reliability Reliability is measured by how often the path is down. If it is used in cost calculations, a highly reliable path has a lower cost.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 2.3 Perform basic router configuration tasks.

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

Properties of network traffic o MTU

Routing o Routing types

Static Dynamic

o Routing protocols (IPv4 and IPv6) Distance-vector routing

protocols RIP EIGRP

Link-state routing protocols OSPF

Hybrid BGP

 Video/Demo Time

7.2.1 Routing Protocol Characteristics 12:407.2.3 Routing Protocols 5:207.2.5 High Availability 6:197.2.6 Configure Routing 11:01

Total Video Time 35:20

Lab/Activity7.2.7 Configure Static Routes7.2.8 Enable OSPF Routing

Fact Sheets7.2.2 Routing Protocol Characteristics Facts7.2.4 Routing Protocol Facts

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 79: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

79

Number of Exam Questions13 questions

Total TimeAbout 83 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 80: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

80

7.3: Network Address Translation

Lecture Focus Questions:

How does NAT work? What is the difference between static NAT and dynamic NAT? What is port forwarding? What is the difference between NAT and PAT? Which IP addresses are considered private and guaranteed not to be used on

the internet?

In this section, you will learn to:

Configure NAT from the CLI. Configure NAT on an NSA. Configure port forwarding.

The key terms for this section include:Term Definition

Network Address

Translation(NAT)

NAT translates private addresses to the public address of the NAT router. This allows you to connect a private network to the internet without obtaining registered (public) addresses for every host.

Port Address Translation

(PAT)

Technically speaking, NAT translates one address to another. Port address translation (PAT) associates a port number with the translated address.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

NAT/PAT Port forwarding

1.4 Given a scenario, configure the appropriate IP addressing components.

Private vs. public

 Video/Demo Time

7.3.1 Network Address Translation 9:537.3.2 Configure NAT from the CLI 8:417.3.3 Configure NAT on an NSA 5:167.3.4 Configure Port Forwarding 6:07

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 81: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

81

Total Video Time 29:57

Fact Sheets7.3.5 NAT Facts

Number of Exam Questions10 questions

Total TimeAbout 45 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 82: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

82

7.4: Routing Troubleshooting

Lecture Focus Questions:

How is it possible for all hosts on a subnet to be configured with the wrong default gateway address?

What is the format for the default route entry in a routing table? What purpose does the default route serve?

What are the symptoms of a routing loop? How can you identify a routing loop? Why might you escalate routing problems that you observe? How can proxy ARP settings appear as routing problems?

In this section, you will learn to:

Troubleshoot routing. Find path information.

The key terms for this section include:Term Definition

Neighbor Discovery

(ND)

ND enables routers on the same link to advertise their existence to neighboring routers and to learn about the existence of their neighbors. Routers use ND messages to identify the link-layer addresses of neighboring devices that are directly connected to the router.

Black Hole Router

A black hole router is a router that drops packets if the size of the packet exceeds the Maximum Transmission Unit (MTU) size it can support. It is called a black hole because the router does not send an error message to the sending host when it drops an oversize packet. In essence, the packet enters a network "black hole."

Routing loop

A routing loop occurs when data is being passed back and forth between routers in the path instead of forwarding it to the destination network.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 5.1 Troubleshoot issues with networking media or devices to establish network communication.

CompTIA Network+

5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.

Latency

 Video/Demo Time

7.4.1 Routing Troubleshooting 13:527.4.2 Troubleshoot Routing 5:59

Total Video Time 19:51

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 83: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

83

Lab/Activity7.4.4 Find Path Information 17.4.5 Find Path Information 2

Fact Sheets7.4.3 Troubleshoot Routing Facts

Number of Exam Questions9 questions

Total TimeAbout 58 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 84: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

84

8.1: Firewalls

Lecture Focus Questions:

How does a packet filtering firewall differ from a circuit-level gateway? Why is a packet filtering firewall a stateless device? What types of filter criteria can an application layer gateway use for filtering? Which security device might you choose to restrict access by user account? What is the difference between a proxy and a reverse proxy?

In this section, you will learn to:

Configure a host firewall. Configure Linux iptables.

The key terms for this section include:Term Definition

Firewall A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules.

Access Control List

(ACL)

Filtering rules firewalls use to identify which traffic to allow and which traffic to block.

Network Ports

Network ports are logical connections provided by the TCP or UDP protocols at the Transport layer. They are used by protocols in the upper layers of the OSI model. The TCP/IP protocol stack uses port numbers to determine which protocol incoming traffic should be directed to.

iptables iptables is a command line firewall utility for Linux operation systems that uses three different policy chains to allow or block network traffic.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 4.1 Configure a host firewall to provide local security.

CompTIA Network+ 1.1 Explain the purposes and uses of ports and protocols.

Protocols and ports o SSH 22 o DNS 53 o SMTP 25 o SFTP 22 o FTP 20, 21 o TFTP 69 o TELNET 23 o DHCP 67, 68 o HTTP 80

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 85: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

85

o HTTPS 443 o SNMP 161 o RDP 3389 o NTP 123 o SIP 5060, 5061 o SMB 445 o POP 110 o IMAP 143 o LDAP 389 o LDAPS 636 o 323 1720

1.3 Explain the concepts and characteristics of routing and switching.

Access control list

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

Firewall

2.3 Explain the purposes and use cases for advanced networking devices.

Proxy server UTM appliance NGFW/Layer 7 firewall Content filter

4.6 Explain common mitigation techniques and their purposes.

Restricting access via ACLs

 Video/Demo Time

8.1.1 Firewalls 3:158.1.2 Firewall Types 11:148.1.5 Configure Windows Firewall 4:068.1.6 Configure Linux iptables 4:02

Total Video Time 22:37

Lab/Activity8.1.8 Configure a Host Firewall

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 86: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

86

Fact Sheets8.1.3 Firewall Facts8.1.4 Common Ports8.1.7 Linux iptable Facts

Number of Exam Questions15 questions

Total TimeAbout 65 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 87: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

87

8.2: Security Appliances

Lecture Focus Questions:

Under which conditions would you use an all-in-one security appliance? Which security functions are included in an all-in-one security appliance?

In this section, you will learn to:

Configure network security appliance access.

The key terms for this section include:Term Definition

All-in-One Security Appliances

A device that combines many security functions into a single device, such as firewall, IDS/IPS, and antivirus.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 4.5 Perform administrative tasks on a network security appliance.

CompTIA Network+

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

Firewall

2.3 Explain the purposes and use cases for advanced networking devices.

 Video/Demo Time

8.2.1 All-in-One Security Appliances 3:338.2.3 Network Security Appliance Access 7:02

Total Video Time 10:35

Lab/Activity8.2.4 Configure Network Security Appliance Access

Fact Sheets8.2.2 Security Solution Facts

Number of Exam Questions3 questions

Total TimeAbout 31 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 88: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

88

8.3: Firewall Design and Implementation

Lecture Focus Questions:

How do firewalls manage incoming and outgoing traffic? What is the difference between a standard ACL and an extended ACL? What does the deny any statement do? What is the difference between a routed firewall and a transparent firewall?

In this section, you will learn to:

Create Firewall ACLs. Configure a DMZ. Configure a perimeter firewall. Configure a proxy server.

The key terms for this section include:Term Definition

Demilitarized Zone(DMZ)

A buffer network (or subnet) that sits between the private network and an untrusted network (such as the internet).

Access Control List

Filtering rules firewalls use to identify which traffic to allow and which to block.

Routed Firewall

A routed firewall is a Layer 3 router. Many hardware routers include firewall functionality. Transmitting data through this type of firewall counts as a router hop. A routed firewall usually supports multiple interfaces, each connected to a different network segment.

Transparent Firewall

A transparent firewall, also called a virtual firewall, operates at Layer 2 and is not seen as a router hop by connected devices. Both the internal and external interfaces on a transparent firewall connect to the same network segment.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 4.1 Configure a host firewall to provide local security.

CompTIA Network+ 1.3 Explain the concepts and characteristics of routing and switching.

Segmentation and interface properties o DMZ

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 89: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

89

Firewall

4.2 Explain authentication and access controls.

Access control o MAC filtering

5.5 Given a scenario, troubleshoot common network service issues.

Incorrect host-based firewall settings Incorrect ACL settings

 Video/Demo Time

8.3.1 Firewall Network Design Principles 10:098.3.2 Configure a Perimeter Firewall 9:528.3.3 Firewall ACLs 9:298.3.4 Create Firewall ACLs 6:048.3.7 Configure a Proxy Server 6:47

Total Video Time 42:21

Lab/Activity8.3.5 Configure a DMZ8.3.6 Configure a Perimeter Firewall

Fact Sheets8.3.8 Firewall Design and Configuration Facts

Number of Exam Questions15 questions

Total TimeAbout 87 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 90: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

90

9.1: Network-Based Storage

Lecture Focus Questions:

What is the difference between a SAN solution and a NAS solution? How does a SAN appear to users on a network? How does a NAS device appear to users on a network? How does a cluster appear to users on the network? What does load balancing alleviate on a network? What is failover?

In this section, you will learn to:

Configure an iSCSI target. Configure an iSCSI initiator.

The key terms for this section include:Term Definition

Host Bus Adapter(HBA)

A host bus adapter (HBA) is a hardware device, such as a circuit board or integrated circuit adapter, that provides I/O processing and physical connectivity between a host system, such as a server, and a storage device.

Target All SAN storage devices are called targets.

InitiatorThe servers that connect to the shared storage device are called initiators. They run initiator software that connects to and communicates with the SAN target.

Jumbo Frame An Ethernet packet larger than 1500 bytes is called a jumbo frame. Network-Attached Storage(NAS)

Network-Attached Storage (NAS) is a self-contained storage appliance designed to allow clients to store and share files over the network. It can also be used for backups and media streaming.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+ 1.5 Compare and contrast the characteristics of network topologies, types and technologies.

Types o SAN

2.4 Explain the purposes of virtualization and network storage technologies.

Network storage types o SAN

Connection type Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 91: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

91

o FCoE o Fibre Channel o iSCSI o InfiniBand

3.2 Compare and contrast business continuity and disaster recovery concepts.

Availability concepts o Load balancing o Clustering

 Video/Demo Time

9.1.1 Storage Area Networks 10:429.1.2 Configure an iSCSI SAN 5:549.1.6 Network Attached Storage 6:419.1.7 Configure a NAS Device 7:45

Total Video Time 31:02

Lab/Activity9.1.3 Configure an iSCSI Target9.1.4 Configure an iSCSI Initiator

Fact Sheets9.1.5 SAN Facts9.1.8 NAS Facts

Number of Exam Questions6 questions

Total TimeAbout 72 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 92: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

92

9.2: Voice over IP (VoIP)

Lecture Focus Questions:

How does VoIP differ from traditional phone service? What are the functions of a VoIP server? What are other names for a VoIP

server? What is the difference between a hard VoIP phone and a soft VoIP phone? How is a VoIP gateway used? What is the most common open source VoIP protocol? What is the function of a codec? Why is quality of service (QoS) important for VoIP? What happens if there is too much latency in a VoIP call? What is jitter? How does it affect VoIP calls?

In this section, you will learn to:

Configure VoIP.

The key terms for this section include:Term Definition

Voice over IP(VoIP)

Voice over IP (VoIP) is a protocol optimized for the transmission of voice data (telephone calls) through a packet-switched IP network. VoIP routes phone calls through an IP network, including the internet. VoIP solutions can integrate with the public switched telephone network (PSTN) to allow VoIP customers to make and receive external calls.

VoIP Gateway A  voice over IP (VoIP) gateway converts voice and fax calls between the PSTN and your IP network in real time.

Sampling In VoIP, audio is converted from an analog signal to digital data through a technique called sampling.

CodecA special algorithm called a codec compresses VoIP data to reduce bandwidth consumption. On the receiving end, the same algorithm is used again to decompress the data.

Network LatencyNetwork latency is how long it takes for a packet of data to get from one point to another. Too much latency causes VoIP callers to talk over each other.

JitterJitter is a variation in the delay or latency of received packets. Latency going up and down during a call can cause unusual sound effects (minor pauses, jumps, choppiness).

Unified Communications

Appliances that plug directly into your network and provide a wide variety of communication services, such as voice, voicemail, instant messaging, and faxing.

This section helps you prepare for the following certification exam objectives:Exam Objective

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 93: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

93

TestOut Network Pro 2.5 Configure a VoIP endpoint.

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

Segmentation and interface properties o PoE and PoE+ (802.3af, 802.3at)

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

VoIP endpoint

2.3 Explain the purposes and use cases for advanced networking devices.

VoIP PBX VoIP gateway

2.4 Explain the purposes of virtualization and network storage technologies.

Jumbo frame

5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.

Jitter

5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues.

Latency Jitter

 Video/Demo Time

9.2.1 Voice over IP (VoIP) 11:13Total Video Time 11:13

Lab/Activity9.2.3 Configure VoIP 19.2.4 Configure VoIP 2

Fact Sheets9.2.2 VoIP Facts

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 94: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

94

Number of Exam Questions13 questions

Total TimeAbout 54 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 95: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

95

9.3: Virtualization

Lecture Focus Questions:

What is the relationship between the host and the guest operating systems? What is the function of the hypervisor? What are the differences between a virtual machine and a virtual hard disk? Which type of virtualization allows applications to run within the virtual machine

without being modified in any way? What is paravirtualization? What is the difference between full and partial virtualization?

In this section, you will learn to:

Create a virtual machine.

The key terms for this section include:Term Definition

Virtualization Virtualization is the ability to install and run multiple operating systems simultaneously on a single physical machine.

Hypervisor

A hypervisor is thin layer of software that resides between the virtual operating system(s) and the hardware. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. A hypervisor also manages access to the CPU, storage, and RAM.

Virtual Machine

A virtual machine is a software implementation of a computer that executes programs like a physical machine. The virtual machine appears to be a self-contained and autonomous system, but is running on a host computer and functions through a hypervisor.

Virtual Hard Disk (VHD)

A virtual hard disk is a file created within the host operating system that simulates a hard disk for the virtual machine.

Full VirtualizationIn full virtualization, the virtual machine completely simulates a real physical host. This allows most operating systems and applications to run within the virtual machine without being modified in any way.

Partial Virtualization

In partial virtualization, only some of the components of the virtual machine are virtualized. The guest operating systems use some virtual components and some real physical hardware components in the actual device where the hypervisor is running. Operating systems or applications must be modified before they can run in a partial virtualization environment.

Paravirtualization In paravirtualization, the hardware is not virtualized. All of the guest operating systems running on the hypervisor directly access various hardware resources in the physical device; components are not virtual. The guest operating systems run in isolated domains on the same physical hardware. Operating systems and

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 96: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

96

applications must be modified before they can run in a paravirtualization environment.

 Video/Demo Time

9.3.1 Virtualization Overview 10:519.3.2 Create a Virtual Machine 3:28

Total Video Time 14:19

Fact Sheets9.3.3 Virtualization Facts

Number of Exam Questions4 questions

Total TimeAbout 24 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 97: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

97

9.4: Virtual Networking

Lecture Focus Questions:

How is network as a service (NaaS) similar to the offsite datacenter? How is it different?

What can you do to protect virtual hosts from network exploits? How does a virtual router differ from a physical router? What is the best way to set up a virtual firewall? What is the difference between a physical switch and a virtual switch? Where can you configure a custom MAC address for a virtual network interface?

In this section, you will learn to:

Configure virtual network devices.

The key terms for this section include:Term DefinitionVirtual

Network Interfaces

A virtual network interface is a software version of a physical network adapter, which is used in a virtual machine to allow it to connect to a network (either physical or virtual).

Virtual Switches

A virtual switch allows one virtual machine to communicate with another in much the same way that a physical switch allows physical hosts to communicate with each other.

Virtual VLANs

Most virtual switch implementations support VLANs. You can define VLANs within the virtual switch and associate specific hosts with a specific VLAN. However, because virtual hosts are not physically connected to the switch with cables, VLAN membership is defined within the configuration of each virtual machine.

Virtual Routers

A virtual router is a software-based routing framework, which allows the host machine to perform as a typical hardware router over a local area network.

Virtual Firewalls

A virtual firewall is a firewall within the hypervisor itself. It lets you monitor and filter traffic on the virtual network as it flows between virtual machines.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 3.6 Configure virtual networkingCompTIA Network+ 1.3 Explain the concepts and characteristics of

routing and switching.

Software-defined networking

2.4 Explain the purposes of virtualization and network storage technologies.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 98: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

98

Virtual networking components o Virtual switch o Virtual firewall o Virtual NIC o Virtual router o Hypervisor

 Video/Demo Time

9.4.1 Virtual Networking Implementations 6:049.4.2 Virtual Network Devices 7:089.4.3 Configure Virtual Network Devices 3:04

Total Video Time 16:16

Fact Sheets9.4.4 Virtualization Implementation Facts9.4.5 Virtual Networking Facts

Number of Exam Questions9 questions

Total TimeAbout 36 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 99: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

99

9.5: Cloud Computing

Lecture Focus Questions:

What is the difference between a hybrid cloud and a community cloud? What is the difference between IaaS and PaaS? What two implementations are available for SaaS? What services does cloud computing provide? Which cloud computing model allows the client to run software without

purchasing servers, data center space, or network equipment?

The key terms for this section include:Term Definition

Cloud Computing

Cloud computing is a combination of software, data access, computation, and storage services provided to clients through the internet. The term cloud is a metaphor for the internet based on the basic cloud drawing used to represent the telephone network

Public Cloud

Cloud-based computing resources such as platforms, applications, and storage are made available to the general public by a cloud service provider (such as Google's Gmail). A public cloud can be accessed by anyone, although some may require a fee.

Private Cloud

A private cloud provides resources to a single organization. Private clouds can be hosted internally, but because of the expense and expertise required to do so, they are typically hosted externally, by a third party.

Community Cloud A community cloud is designed to be shared by several organizations.

Hybrid Cloud A hybrid cloud is a combination of public, private, and community cloud resources from different service providers.

Infrastructure as a Service (IaaS)

IaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment.

Platform as a Service (PaaS)

PaaS delivers everything a developer needs to build an application. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers.

Software as a Service (SaaS)

SaaS delivers software applications to the client either over the internet or on a local area network.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+ 1.7 Summarize cloud concepts and their purposes.

Types of services o SaaS

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 100: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

100

o PaaS o IaaS

Cloud delivery models o Private o Public o Hybrid

Connectivity methods Security implications/ considerations Relationship between local and cloud

resources

 Video/Demo Time

9.5.1 Cloud Computing Overview 12:07Total Video Time 12:07

Fact Sheets9.5.2 Cloud Computing Facts

Number of Exam Questions5 questions

Total TimeAbout 23 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 101: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

101

10.1: Wireless Concepts

Lecture Focus Questions:

Under what circumstances might you choose an ad hoc wireless network? What device is used to create an infrastructure wireless network? How do wireless networks control media access? What is the difference between a BSS and an ESS? What do wireless clients use to identify a specific wireless access point? How do multiple access points identify themselves as part of the same network?

The key terms for this section include:Term Definition

Station(STA)

An STA is a wireless NIC in an end device such as a laptop or wireless PDA. STA often refers to the device itself, not just the NIC.

Access Point(AP)

An AP, sometimes called a wireless AP (WAP), is the device that coordinates all communications between wireless devices, as well as the connection to the wired network.

Basic Service Set

(BSS)

A BSS, also called a cell, is the smallest unit of a wireless network. All devices in the BSS can communicate with each other. The devices in the BSS depend on the operating mode. All devices within the BSS use the same radio frequency channel to communicate.

Independent Basic Service

Set(IBSS)

An IBSS is a set of STAs configured in ad hoc mode.

Extended Service Set

(ESS)

An ESS consists of multiple BSSs with a distribution system (DS). In an ESS, BSSs that have an overlapping transmission range use different frequencies.

Distribution System

(DS)

The DS is the LAN that connects multiple APs (and BSSs) together. The DS allows wireless clients to communicate with the wired network and with wireless clients in other cells.

Service Set Identifier(SSID)

The SSID, also called the network name, groups wireless devices into the same logical network.

Basic Service Set Identifier

(BSSID)

The BSSID is a 48-bit value that identifies an AP in an infrastructure network or an STA in an ad hoc network. The BSSID allows devices to find a specific AP within an ESS that has multiple access points, and STAs use it to keep track of APs as they roam between BSSs. The BSSID is the MAC address of the AP and is set automatically.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 102: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

102

device on the network. 

CompTIA Network+

1.3 Explain the concepts and characteristics of routing and switching.

Properties of network traffic o CSMA/CA

1.5 Compare and contrast the characteristics of network topologies, types and technologies.

Wireless topologies o Mesh o Ad hoc o Infrastructure

2.5 Compare and contrast WAN technologies.

Transmission mediums o Wireless

 Video/Demo Time

10.1.1 Radio Frequency Wireless 8:0610.1.2 Wireless Architecture 7:50

Total Video Time 15:56

Fact Sheets10.1.3 Wireless Architecture Facts10.1.4 Wireless Infrastructure Facts

Number of Exam Questions5 questions

Total TimeAbout 31 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 103: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

103

10.2: Wireless Standards

Lecture Focus Questions:

What are the differences between 802.11a and 802.11g specifications? Devices that support the 802.11g standards are typically compatible with which

other wireless standard? How does MIMO differ from channel bonding? Why is channel bonding typically not used with the 2.4 GHz range? What happens when an 802.11a device connects to an access point that

supports both 802.11n and 802.11a? What happens if the access point uses MIMO and supports dual band?

Which types of devices typically use Bluetooth wireless?

In this section, you will learn to:

Configure Bluetooth Connections

The key terms for this section include:Term Definition

Multiple-Input, Multiple-Output

(MIMO)

MIMO increases bandwidth by using multiple antennas for both the transmitter and receiver.

Channel BondingChannel bonding combines two non-overlapping 20 MHz channels into a single 40 MHz channel, resulting in slightly more than double the bandwidth.

Multi-User MIMO(MU-MIMO)

MU-MIMO is an enhancement to MIMO that allows multiple users to use the same channel. In addition to adding MU-MIMO, 802.11ac doubled the number of MIMO radio streams from four to eight.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a device on the network.

CompTIA Network+ 1.5 Compare and contrast the characteristics of network topologies, types and technologies.

Types

o pan

Technologies that facilitate the Internet of Things (IoT)

o Bluetooth Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 104: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

104

o IR o RFID

1.6 Given a scenario, implement the appropriate wireless technologies and configurations.

802.11 standards

o a o b o g o n o ac

Frequencies

o 2.4GHz o 5.0GHz

Channel bandwidth Channel bonding

 Video/Demo Time

10.2.1 Wireless Standards 13:2210.2.2 Infrared 3:3310.2.3 Bluetooth 4:2810.2.4 Configure Bluetooth Connections 5:25

Total Video Time 26:48

Fact Sheets10.2.5 Wireless Standards Facts

Number of Exam Questions12 questions

Total TimeAbout 44 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 105: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

105

10.3: Wireless Configuration

Lecture Focus Questions:

What information does the wireless profile contain? What is the strongest encryption method? How does a MAC access list help keep a network secure? What is the purpose of a beacon? How are wireless networks listed in the notification area?

In this section, you will learn to:

Create a Home Wireless Network. Secure a Home Wireless Network. Configure Wireless Profiles.

The key terms for this section include:Term Definition

Access Point(AP)

A access point (AP), sometimes called a wireless access point, is the device that allows a Wi-Fi device to connect to a wired network.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a device on the network.

CompTIA Network+

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

Bridge Wireless access point Wireless range extender

 Video/Demo Time

10.3.1 Wireless Network Configuration 9:3010.3.3 Configure Wireless Networks 9:47

Total Video Time 19:17

Lab/Activity10.3.4 Create a Home Wireless Network10.3.5 Secure a Home Wireless Network10.3.6 Configure Wireless Profiles

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 106: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

106

Fact Sheets10.3.2 Wireless Configuration Tasks

Number of Exam Questions5 questions

Total TimeAbout 66 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 107: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

107

10.4: Wireless Network Design

Lecture Focus Questions:

What is device density? What is the difference between received signal length and signal to noise ratio? Which implementation automatically partitions a single broadcast domain into

multiple VLANs? What information is specified in a logical network diagram? How do you measure the signal strength at a given distance from the access

point? What is the Z-Wave protocol commonly used for?

In this section, you will learn to:

Design an Indoor Wireless Network. Design an Outdoor Wireless Network.

The key terms for this section include:Term Definition

Radio Frequency(RF)

Radio frequency (RF) refers to the rate of oscillation of electromagnetic radio waves in the range of 3 kHz to 300 GHz, as well as the alternating currents carrying the radio signals. This is the frequency band that is used for communications transmission and broadcasting.

Internet of Things(IoT)

The internet of things is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity. These embedded features enable these things to connect, collect, and exchange data.

Z-WaveZ-Wave is a wireless communication protocol for communication among devices used for home automation. It uses radio waves for signaling and control.

Ant+

Ant+ is a protocol used to monitor sensor data. It uses a 2.4 GHz ISM band and has fast transmission rates. It is compatible with the mesh topology, but can also be used with the point-to-point, star, and tree topologies.

Near-Field Communication

(NFC)

Near-field communication (NFC) allows devices to communicate and share data with each other. It requires devices to be about four inches apart to communicate with each other. It's very common to see NFC used with cell phones and mobile pay applications.

Spectrum Analyzer A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency. The frequency appears on the horizontal axis, and the amplitude is displayed on the

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 108: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

108

vertical axis.This section helps you prepare for the following certification exam objectives:

Exam Objective

TestOut Network Pro

1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a device on the network.

CompTIA Network+

1.5 Compare and contrast the characteristics of network topologies, types and technologies.

Types o WLAN

Technologies that facilitate the Internet of Things (IoT)

o Z-Wave o Ant+ o NFC o 11

1.6 Given a scenario, implement the appropriate wireless technologies and configurations.

Site survey Speed and distance requirements MIMO/MU-MIMO Unidirectional/ omnidirectional

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

Bridge Wireless access point

5.2 Given a scenario, use the appropriate tool.

Hardware tools o Spectrum analyzer

 Video/Demo Time

10.4.1 Wireless Network Design 7:0210.4.2 Site Survey 7:1710.4.3 Wireless Antenna Types 6:1010.4.5 Conduct a Wireless Survey 4:39

Total Video Time 25:08Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 109: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

109

Lab/Activity10.4.7 Design an Indoor Wireless Network10.4.8 Design an Outdoor Wireless Network

Fact Sheets10.4.4 Wireless Network Design Facts10.4.6 Wireless Site Survey Facts

Number of Exam Questions11 questions

Total TimeAbout 71 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 110: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

110

10.5: Wireless Network Implementation

Lecture Focus Questions:

What is the difference between a hub-and-spoke infrastructure and a distributed wireless mesh infrastructure?

What is a lightweight access point used for? Which protocol is used to route frames back and forth between the wireless

network and the wired LAN? Which enterprise deployment has limited mobility and is difficult to manage?

In this section, you will learn to:

Implement an Enterprise wireless network.

The key terms for this section include:Term Definition

Independent Access Points

Independent access points (APs) are where each AP stands alone, providing separate wireless networks by using its own independent configuration.

Hub-and-Spoke

In a hub-and-spoke configuration, a wireless controller is connected to all APs through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).

Distributed Wireless Mesh Infrastructure

Newer wireless networks can be deployed using a distributed wireless mesh architecture. These networks still use a controller, but they move some of the network intelligence from the controller out to the individual APs.

Wireless Bridges Wireless bridges are used to connect wired or wireless networks together.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a device on the network.

CompTIA Network+ 2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

Bridge Wireless access point

5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 111: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

111

Bottlenecks

 Video/Demo Time

10.5.1 Enterprise Wireless Equipment 7:4610.5.2 Configure Enterprise Wireless Networks 8:10

Total Video Time 15:56

Lab/Activity10.5.4 Implement an Enterprise Wireless Network

Fact Sheets10.5.3 Enterprise Wireless Facts

Number of Exam Questions4 questions

Total TimeAbout 37 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 112: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

112

10.6: Wireless Security

Lecture Focus Questions:

What does open authentication use to authenticate a device? Why is open authentication an unsecure solution? Which two additional components are required to implement 802.1x

authentication? What is the difference between WPA Personal and WPA Enterprise? How can geofencing protect your network? Which default values should you always change on your wireless network?

In this section, you will learn to:

Secure an Enterprise wireless network.

The key terms for this section include:Term DefinitionOpen

AuthenticationOpen authentication requires that clients provide a MAC address in order to connect to the wireless network.

Shared Key Authentication

With shared key authentication, clients and access points are configured with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.

802.1x Authentication

802.1x authentication uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.

Rogue Access Point

A rogue access point is any unauthorized access point added to a network.

Data EmanationThe electromagnetic field generated by a network cable or network device, such as wireless router, which can be manipulated in order to eavesdrop on conversations or steal data.

Packet Sniffing Packet sniffing (also known as eavesdropping) is the interception and decoding of wireless transmissions.

Interference

With wireless networks, interference is a signal that corrupts or destroys the wireless signal sent by APs and other wireless devices. Interference affects the availability of a network because normal communications are made impossible.

Jamming Jamming is signal interference that is created intentionally by an attacker to make a wireless network impossible to use.

Deauthentication Attack

A deauthentication attack is when an attack spoofs your MAC address and then tells you wireless network to disconnect you from the network. Attackers may use a deauthentication attack to stage evil twin or man-in-the-middle attacks.

Bluetooth Bluetooth is the standard for short-range wireless interconnection Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 113: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

113

and is designed to allow devices to communicate within a personal area network (PAN) of close proximity. PAN devices include cell phones, personal digital assistants (PDAs), printers, mice, and keyboards.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a device on the network.

CompTIA Network+

4.2 Explain authentication and access controls.

Access control o MAC filtering

4.3 Given a scenario, secure a basic wireless network.

WPA WPA2 TKIP-RC4 CCMP-AES Authentication and authorization

o Shared or open o Preshared key o MAC filtering

Geofencing

4.4 Summarize common networking attacks.

Rogue access point Evil twin War-driving Deauthentication

 Video/Demo Time

10.6.1 Wireless Security 8:4410.6.3 Wireless Attacks 9:3910.6.5 Secure a Wireless Network 13:26

Total Video Time 31:49

Lab/Activity10.6.6 Secure an Enterprise Wireless Network

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 114: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

114

Fact Sheets10.6.2 Wireless Security Facts10.6.4 Wireless Attack Facts

Number of Exam Questions15 questions

Total TimeAbout 69 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 115: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

115

10.7: Wireless Troubleshooting

Lecture Focus Questions:

Where is the best place to situate your wireless access point? What types of objects might obstruct radio frequency wireless transmissions? How many channels should separate two different wireless networks? Which types of wireless networks require line-of-sight connections? How do range and antenna placement affect wireless networks? How does refraction affect your RF signal?

In this section, you will learn to:

Optimize a wireless network. Explore wireless network problems. Troubleshoot wireless network problems.

The key terms for this section include:Term Definition

Directional Antenna

A directional antenna creates a narrow, focused signal in a particular direction, which increases the signal strength and transmission distance. It provides a stronger point-to-point connection and is better equipped to handle obstacles.

Omnidirectional Antenna

An omnidirectional antenna disperses the radio frequency wave in an equal 360-degree pattern. This provides access to many clients in a radius.

Bandwidth Saturation

Bandwidth saturation is the point at which all of the available bandwidth on an internet connection has achieved maximum capacity and cannot pass any more data through the connection.

Device SaturationDevice saturation is when the percentage of CPU time where I/O requests are issued to a device or the bandwidth utilization for the device is close to 100%.

Frequency Mismatch

Frequency mismatch is when devices on the network are not broadcasting on the same frequency.

Absorption Absorption is when a signal passes through objects and the signal loses power.

Refraction Refraction is when radio waves pass through objects of different densities, which cause the signal to bend or change speeds.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 5.3 Troubleshoot wired or wireless network connectivity to establish network communication.

CompTIA Network+ 5.2 Given a scenario, use the appropriate tool.

Software tools Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 116: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

116

o WiFi analyzer

5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues.

Reflection Refraction Absorption Latency Incorrect antenna type Interference Incorrect antenna placement Distance limitations Frequency mismatch Wrong SSID Wrong passphrase Security type mismatch Power levels

 Video/Demo Time

10.7.1 Wireless Communications Troubleshooting 11:3410.7.2 Troubleshoot Wireless Connections 6:2310.7.4 Optimize Wireless Networks 7:26

Total Video Time 25:23

Lab/Activity10.7.5 Optimize a Wireless Network10.7.6 Explore Wireless Network Problems10.7.7 Troubleshoot Wireless Network Problems

Fact Sheets10.7.3 Wireless Network Troubleshooting Facts

Number of Exam Questions14 questions

Total TimeAbout 81 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 117: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

117

11.1: WAN Concepts

Lecture Focus Questions:

What is the optical carrier specification base rate? Why is the base rate significant?

What are the differences between T1 and T3? E1 and E3? J1 and J3? Concerning WAN technologies, what is a channel? Why are channels important? What is the difference between a packet-switched network and a circuit-switched

network? What are the two parts of a CSU/DSU? Which functions does each perform? Which WAN technology uses fixed-length cells? Which WAN technology is a transport technology for carrying signals over fiber

optic cables? Which WAN technology can be implemented over regular telephone lines? How does MPLS add labels to packets? What are these labels used for?

The key terms for this section include:Term Definition

WAN CloudThe WAN cloud is the collection of equipment that makes up the WAN network. The WAN cloud is owned and maintained by telecommunications companies.

Central Office (CO)The central office is a switching facility connected to the WAN, and it is the nearest point of presence for the WAN provider. It provides WAN cloud entry and exit points.

Local LoopThe local loop is the cable that extends from the central office to the customer location. The local loop is owned and maintained by the WAN service provider.

Demarcation Point (Demarc)

When you contract with a local exchange carrier (LEC) for data or telephone services, they install a physical cable and a termination jack onto your premises. The demarcation point marks the boundary between the telco equipment and your organization's network or telephone system.

Customer Premises Equipment (CPE)

Devices physically located on the subscriber's premises are referred to as the customer premises equipment. CPE includes both the wiring and devices that the subscriber owns and the equipment leased from the WAN provider. CPE can include the smart jack, demarc, local loop, copper line drivers, and repeaters.

Channel Service Unit/Data Service Unit (CSU/DSU)

A CSU/DSU converts the signal received from the WAN provider into a signal that can be used by equipment at the customer site.

Public Switched Telephone Network

(PSTN)

The PSTN is the network used to place local and long distance phone calls.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 118: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

118

Integrated Services Digital Network

(ISDN)

ISDN is a WAN technology that provides increased bandwidth within the local loop. The two forms of ISDN are ISDN BRI (basic rate interface) and ISDN PRI (primary rate interface).

Frame RelayFrame Relay is a protocol used to connect to a WAN over dedicated (leased) lines. Frame Relay is a packet switching technology that supports variable-sized data units called frames.

Asynchronous Transfer Mode

(ATM)

ATM is a WAN communication technology originally designed for carrying time-sensitive data like voice and video. It can also be used for regular data transport. ATM is a packet switching technology that uses fixed-length data units called cells. Each cell is 53 bytes.

Distributed Switching

Distributed switching is an architecture in which multiple processor-controlled switching units are distributed. There is often a hierarchy of switching elements with a centralized host switch and remote switches located close to concentrations of users.

Multiprotocol Label Switching (MPLS)

MPLS is a WAN data classification and data carrying mechanism. MPLS is a packet switching technology that supports variable-length frames.

Dynamic Multipoint VPN (DMVPN)

DMVPN is a Cisco IOS Software solution for building scalable IPsec Virtual Private Networks (VPNs).

SIP Trunk SIP trunking is a method where business phone systems operate using an internet connection instead of a traditional phone line.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.2 Deploy appropriate wired networking or internetworking device(s).1.3 Implement appropriate wireless networking device(s).

CompTIA Network+ 1.3 Explain the concepts and characteristics of routing and switching.

Distributed switching Packet-switched vs. circuit-switched

network

2.5 Compare and Contrast WAN technologies.

Service type o ISDN o T1/T3 o E1/E3 o OC-3 - OC-192 o Metropolitan Ethernet o PRI

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 119: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

119

Transmission mediums o Copper o Fiber

Characteristics of service o MPLS o ATM o Frame relay o SIP trunk

Termination o Demarcation point o CSU/DSU

 Video/Demo Time

11.1.1 WAN Structure 5:1411.1.2 WAN Technologies 10:0211.1.3 WAN Services 10:29

Total Video Time 25:45

Fact Sheets11.1.4 WAN Media Facts11.1.5 WAN Facts11.1.6 WAN Services Facts

Number of Exam Questions15 questions

Total TimeAbout 56 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 120: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

120

11.2: WAN Connections

Lecture Focus Questions:

What is the difference between LCP and NCP? In which layer of the OSI model does PPP function? Which PPP feature can detect link errors? During PPP configuration, which authentication methods are available?

In this section, you will learn to:

Configure a PPP WAN link.

The key terms for this section include:Term Definition

PPP WAN Link

A point-to-point WAN link connects two endpoints on a pre-established communications path, usually through a telephone company.  The Point-to-Point Protocol (PPP) moves data through the connection.

Link Control Protocol (LCP)

LCP is responsible for establishing, maintaining, and tearing down the PPP link. LCP packets are exchanged periodically.

Network Control

Protocol (NCP)

NCP is used to agree on and configure Network layer protocols. Each Network layer protocol has a corresponding control protocol packet.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.2 Deploy appropriate wired networking or internetworking device(s).1.3 Implement appropriate wireless networking device(s).

CompTIA Network+

2.5 Compare and contrast WAN technologies.

Characteristics of Service o PPP

 Video/Demo Time

11.2.1 PPP WAN Connections 3:0111.2.2 Set Up a PPP WAN Link 3:22

Total Video Time 6:23

Lab/Activity11.2.4 Configure a PPP WAN Link

Fact SheetsCopyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 121: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

121

11.2.3 PPP WAN Connection Facts

Number of Exam Questions8 questions

Total TimeAbout 32 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 122: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

122

11.3: Internet Connectivity

Lecture Focus Questions:

What connection speeds should you expect from a PSTN internet connection? What is multiplexing? How does it increase the bandwidth of a connection? How does DSL enable you to talk on the phone and connect to the internet at the

same time? What are the requirements for qualifying for DSL service? Which DSL service does not support simultaneous voice and data

transmissions? What is the difference between BRI and PRI with ISDN? What is the difference between a B channel and a D channel? What are the disadvantages of a satellite internet connection?

In this section, you will learn to:

Connect to a DSL network.

The key terms for this section include:Term Definition

POTS Phone Line

POTS is the acronym for Plain Old Telephone Service, the standard telephone service most homes have.

Digital Subscriber

Line(DSL)

Digital subscriber line (DSL) is a high-speed digital bandwidth connection from a phone wall jack on an existing telephone network. With DSL, data and voice are both sent on the same copper wire with data using one frequency and voice using another.

Cellular Networking

Cellular networking uses a digital mobile phone network for internet access.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

1.2 Deploy appropriate wired networking or internetworking device(s).1.3 Implement appropriate wireless networking device(s).

CompTIA Network+ 1.6 Given a scenario, implement the appropriate wireless technologies and configurations.

Cellular o GSM o TDMA o CDMA

2.3 Explain the purposes and use cases for advanced networking devices.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 123: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

123

AAA/RADIUS server

2.5 Compare and contrast WAN technologies.

Characteristics of Service o PPPoE o PPP

Service type o DSL o Cable broadband o Dial-up o ISDN o PRI

Transmission mediums o Satellite

3.5 Identify policies and best practices.

Remote access policies

4.2 Explain authentication and access controls.

Authorization, authentication and accounting

o RADIUS o TACACS+

 Video/Demo Time

11.3.1 Traditional Internet Connectivity 13:0911.3.2 Mobile Internet Connectivity 8:09

Total Video Time 21:18

Lab/Activity11.3.4 Connect to a DSL Network

Fact Sheets11.3.3 Internet Services Facts

Number of Exam Questions15 questions

Total TimeAbout 54 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 124: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

124

11.4: Remote Access

Lecture Focus Questions:

What functions are performed by PPP for remote access connections? How does PPPoE differ from PPP? Why is proxy ARP necessary for dial-up remote access clients? What is the difference between authentication and authorization? What is an advantage of using RADIUS or TACACS+ in your remote access

solution? How does RADIUS differ from TACACS+?

In this section, you will learn to:

Configure a remote access server. Configure a RADIUS solution.

The key terms for this section include:Term Definition

Authentication Authentication is the process of proving identity where logon credentials are exchanged and logon is allowed or denied.

Authorization Authorization is the process of identifying the resources that a user can access over the remote access connection.

Accounting Accounting is an activity that tracks or logs the use of the remote access connection.

AAA Server

An AAA server is used to centralize authentication, authorization, and accounting for multiple remote access servers. Connection requests from remote clients are received by the remote access server and are forwarded to the AAA server to be approved or denied. Policies defined on the AAA server apply to all clients connected to all remote access servers.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 4.4 Configure systems and remote devices to create and use a VPN connection.

CompTIA Network+ 2.3 Explain the purposes and use cases for advanced networking devices.

AAA/RADIUS server

2.5 Compare and contrast WAN technologies.

Characteristics of Service o PPPoE

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 125: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

125

o PPP

3.5 Identify policies and best practices.

Remote access policies

4.2 Explain authentication and access controls.

Authorization, authentication and accounting

o RADIUS o TACACS+

 Video/Demo Time

11.4.1 Remote Access 15:0411.4.3 Configure a Remote Access Server 9:5111.4.4 Configure a RADIUS Solution 7:35

Total Video Time 32:30

Fact Sheets11.4.2 Remote Access Facts

Number of Exam Questions14 questions

Total TimeAbout 52 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 126: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

126

11.5: WAN Troubleshooting

Lecture Focus Questions:

Which command shows you summary information about the interface status? Which utility allows you to verify the Application layer connectivity and

configuration? What does an up/down interface status mean? Which command allows you to view the interface status and identify connectivity

problems on a WAN link? What does it mean if the interface status is administratively down/down?

In this section, you will learn to:

Troubleshoot WAN Issues.

The key terms for this section include:Term Definition

pingping sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them.

traceroute

traceroute uses ICMP packets to test connectivity between devices, but it also shows the path between the two devices. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach and then return back from the destination device.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

5.1 Troubleshoot issues with networking media or devices to establish network communication.5.3 Troubleshoot wired or wireless network connectivity to establish network communication.

CompTIA Network+

5.5 Given a scenario, troubleshoot common network service issues.

Incorrect time

 Video/Demo Time

11.5.1 WAN Troubleshooting 8:3911.5.2 Troubleshoot WAN Issues 8:02

Total Video Time 16:41

Fact Sheets11.5.3 WAN Troubleshooting Facts

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 127: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

127

Number of Exam Questions9 questions

Total TimeAbout 31 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 128: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

128

12.1: Network Design, Documentation, and Policies

Lecture Focus Questions:

Which document allows you to effectively monitor your system's performance? Why is it important to conduct a needs assessment? In the IT asset lifecycle, in which phase do you apply updates and patches? Why should you test a new asset in a sandbox environment? What information is needed to create a network diagram?

The key terms for this section include:Term Definition

Policy

A policy is a document that prescribes processes that help your organization reach goals and meet network requirements for such things as administrative delegation, network documentation, and security.

RegulationA regulation is a requirement published by a government or other licensing body, and it must be followed. Policies are often written in response to regulations.

Procedure A procedure is a step-by-step process outlining how to implement a specific action.

Network Diagram

A network diagram shows the logical and/or physical layout of your network.

Wiring Schematic

A wiring schematic is a type of network diagram that focuses on the physical connections between devices.

Configuration Configuration documentation identifies specific configuration information for a device, such as a firewall’s IP address assignments.

Change and Job Logs

A change or job log keeps track of changes to the configuration of a device or the network.

BaselineA baseline is a snapshot of the performance statistics of the network or devices. The baseline is used as a logical basis for future comparison.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+ 1.7 Summarize cloud concepts and their purposes.

Security implications/ considerations

3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.

Diagram symbols Logical vs. physical diagrams

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 129: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

129

Rack diagrams Wiring and port locations Inventory management Network configuration and performance

baselines Standard operating procedures/work

instructions

3.2 Compare and contrast business continuity and disaster recovery concepts.

MTTR MTBF

3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.

Processes o Reviewing baselines

3.5 Identify policies and best practices.

System life cycle o Asset disposal

 Video/Demo Time

12.1.1 Organization Policies and Procedures 3:4312.1.2 Network Design 8:5012.1.4 Network Documentation 8:3812.1.6 Asset Management 7:19

Total Video Time 28:30

Fact Sheets12.1.3 Network Design Facts12.1.5 Network Documentation Facts12.1.7 Asset Management Facts

Number of Exam Questions14 questions

Total TimeAbout 58 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 130: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

130

12.2: Risk Management

Lecture Focus Questions:

What is the difference between a threat and a vulnerability? What is a mission-critical system? What is the difference between a BCP and a BIA? Which part of risk response can introduce the possibility of negligence and lead

to liability? What is the difference between a tangible asset and an intangible asset? What is the difference between quantitative and qualitative analysis?

The key terms for this section include:Term DefinitionAsset An asset is a resource that has value to the organization.

Threat Threat is any potential danger to the confidentiality, integrity, or availability of information or systems.

Vulnerability Vulnerability is the possibility of an asset being exploited due to the absence or weakness of an asset safeguard.

Threat Agent A threat agent is an entity that may find and exploit a vulnerability, causing a threat to an asset.

Threat VectorA threat vector is the path or means that an attacker uses to compromise a system. Threat vectors expose a system's vulnerabilities and are exploited by an attacker.

Threat Probability Threat probability is the likelihood that a particular threat will exploit a specific vulnerability of a system.

Attack An attack is an action that intends to compromise an asset by exploiting a vulnerability.

Countermeasure A countermeasure is something done to reduce the likelihood of a successful attack.

Exposure Exposure is the vulnerability of losses from a threat agent.

Loss Loss is the real damage to an asset that reduces its confidentiality, integrity, or availability.

Risk Risk is the likelihood of a vulnerability being exploited. Reducing the vulnerability or minimizing the threat agent reduces the risk.

Residual RiskResidual risk is the portion of risk that remains after the implementation of a countermeasure. Residual risk almost always exists.

Business Continuity Plan

(BCP)

A BCP identifies appropriate disaster responses that allow business operations to continue when infrastructure and resource capabilities are restricted or reduced. This ensures that critical business functions (CBF) can be performed when operations are disrupted. Additionally, a BCP identifies the actions required to restore the business to normal operation.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 131: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

131

Business Impact Analysis (BIA)

A BIA focuses on the impact that losses will have on the organization.

Disaster Recovery Plan (DRP)

A DRP identifies short-term actions that can stop the incident and restore critical functions so the organization can continue to operate. The DRP is a subset of the BCP. The DRP is the plan for IT-related recovery and continuity.

Security IncidentA security incident is an event or series of events that result from a security policy violation and has adverse effects on a company's ability to proceed with business.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.

Change management documentation

3.5 Identify policies and best practices.

Incident response policies

4.6 Explain common mitigation techniques and their purposes.

Role separation

  Video/Demo Time

12.2.1 Risk Management 3:0412.2.3 Business Continuity 2:28

Total Video Time 5:32

Fact Sheets12.2.2 Risk Management Facts12.2.4 Business Continuity Facts12.2.5 Incident Response Facts

Number of Exam Questions14 questions

Total TimeAbout 35 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 132: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

132

12.3: Security Policies

Lecture Focus Questions:

What are the characteristics of a strong password? What information should be included in the privacy policy as personally

identifiable information? Which vulnerabilities does a vulnerability scan look for in your network? Why should you destroy old versions of the security plan? What is the difference between onboarding and off-boarding? Which document specifies who is going to do what and when?

The key terms for this section include:Term Definition

Onboarding

When one organization needs to work directly with another in either a vendor or partner relationship, steps should be taken to ensure that the integration process maintains the security of each party's network. This process is known as onboarding.

Off-boarding

When the relationship with the third party ends, you need to ensure that all of the doors that were opened between organizations during the onboarding phase are closed. This process is known as off-boarding.

Security Policy A security policy defines the overall security outlook for an organization.

Acceptable Use Policy

An acceptable use policy (AUP) identifies whether employees have rights to use company property, such as internet access and computer equipment, for personal use.

Authorized Access Policy

An authorized access policy documents access control to company resources and information. This policy specifies who is allowed to access an organization's various systems.

Remote Access Policy

A remote access policy is a document that outlines and defines remote connections methods that are accepted by a company.

Privileged User Account Policy

A privileged user account is any account that gives full access to the system. These accounts give users the ability to access and modify critical system settings, view restricted data, and so on.

Change and Configuration

Management Policy

A change and configuration management policy provides a structured approach to securing company assets and making process changes.

Code of Ethics A code of ethics is a set of rules or standards that help you to act ethically in various situations.

Human Resource Policies

These policies are the formal rules and guidelines that a business puts in place to hire, train, assess, and reward the members of their company.

Password Policy Password policies detail the requirements for passwords.Privacy Policy A privacy policy outlines how the organization will secure private

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 133: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

133

information for employees, clients, and customers. The privacy policy outlines how personally identifiable information (PII) can be used and how it is protected from disclosure.

User Management Policy

User management policies identify actions that must take place when employee status changes. The administrator of a network for an organization needs to be aware of new employees, employee advancements and transfers, and terminated employees to ensure the security of the system.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

3.2 Compare and contrast business continuity and disaster recovery concepts.

SLA requirements

3.5 Identify policies and best practices.

On-boarding/off-boarding procedures NDA

3.5 Identify policies and best practices.

Privileged user agreement Password policy Licensing restrictions International export controls Data loss prevention Remote access policies AUP Safety procedures and policies

4.6 Explain common mitigation techniques and their purposes.

Privileged user account Role separation

 Video/Demo Time

12.3.1 Security Policies 14:0512.3.3 Third-Party Integration Policies and Documents 8:55

Total Video Time 23:00

Fact Sheets12.3.2 Security Policy Facts12.3.4 Third-Party Integration Facts

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 134: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

134

Number of Exam Questions15 questions

Total TimeAbout 48 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 135: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

135

13.1: Physical Security

Lecture Focus Questions:

What are some examples of physical security measures you can implement to protect your network?

Which physical control measure uses mantraps, turnstiles, and double-entry doors?

Who can prevent and react to security breaches? Which type of physical security system establishes controls at each layer to

ensure that defeating one level of security does not allow an attacker subsequent access?

What is the difference between an anti-passback system and a motion detector?

In this section, you will learn to:

Implement Physical Security.

The key terms for this section include:Term Definition

Closed-Circuit Television

(CCTV)

CCTV is a television system in which signals are not publicly distributed but are monitored privately, primarily for surveillance and security purposes.

Mantrap

A mantrap is a specialized entrance with two doors that creates a security buffer zone between two areas.Once a person enters into the space between the doors, both doors are locked. To enter the facility, authentication must be provided.

Anti-Passback System

An anti-passback system prevents a card holder from passing their card back to a second person to gain entry into the same controlled area.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+ 4.1 Summarize the purposes of physical security devices.

Detection o Motion detection o Video surveillance o Asset tracking tags o Tamper detection

Prevention o Badges o Biometrics o Smart cards o Key fob

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 136: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

136

o Locks

 Video/Demo Time

13.1.1 Physical Security 10:19Total Video Time 10:19

Lab/Activity13.1.3 Implement Physical Security

Fact Sheets13.1.2 Physical Security Facts

Number of Exam Questions15 questions

Total TimeAbout 43 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 137: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

137

13.2: Social Engineering

Lecture Focus Questions:

What is social engineering? What is the best defense against social engineering? What is the difference between piggybacking and tailgating? How can you verify that a website is using HTTPS? What is the difference between pretexting and masquerading? In which type of social engineering attack does an attacker lie about having

authority or use their high status in a company to force victims to provide information?

In this section, you will learn to:

Respond to social engineering exploits.

The key terms for this section include:Term Definition

Social Engineering Social engineering is an attack that exploits human nature by convincing someone to reveal information or perform an activity.

Shoulder Surfing Shoulder surfing involves looking over the shoulder of someone working on a computer.

EavesdroppingEavesdropping refers to an unauthorized person listening to employees or other authorized personnel as they discuss sensitive topics.

Dumpster Diving Dumpster diving is the process of looking in the trash for sensitive information that has not been properly disposed of.

Tailgating and Piggybacking

Piggybacking and tailgating refer to an attacker entering a secured building by following an authorized employee through a secure door without providing identification. Piggybacking usually implies consent from the authorized employee, whereas tailgating implies no consent from the authorized employee.

MasqueradingMasquerading refers to convincing personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access.

PhishingA phishing scam is an email pretending to be from a trusted organization that asks a user to verify personal information or send money.

Caller ID SpoofingCaller ID spoofing causes the telephone network to display a number on the recipient's caller ID display that implies that a call is coming from a legitimate source.

Hoax Emails

Hoax emails prey on email recipients who are fearful and believe most information if it is presented in a professional manner. Usually, these hoax messages instruct the reader to delete key system files or download Trojan horse viruses.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 138: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

138

Spyware/Adware

Spyware and adware are pop-up advertisements that can have malicious objectives, such as tricking users into unknowingly downloading malware or gathering information about the user and sending it to a third party for commercial gain.

PretextingPretexting is the use of a fictitious scenario to persuade someone to perform an action or give information for which they are not authorized.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 4.6 Respond to social engineering exploits.

CompTIA Network+

4.4 Summarize common networking attacks.

Social engineering Insider threat Phishing

 Video/Demo Time

13.2.1 Social Engineering 11:0813.2.3 Identify Social Engineering Exploits 8:06

Total Video Time 19:14

Lab/Activity13.2.4 Respond to Social Engineering Exploits

Fact Sheets13.2.2 Social Engineering Facts

Number of Exam Questions12 questions

Total TimeAbout 49 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 139: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

139

13.3: Network Vulnerabilities and Threats 1

Lecture Focus Questions:

What is the main goal in a denial of service (DoS) attack? How do DDoS and DRDoS attacks differ? What is the difference between a virus and a worm? In addition to implementing virus scanning software, what must you do to ensure

that you are protected from the latest virus variations? In which type of spoofing are packets intended for the default gateway sent to the

attacker instead? In which type of session attack does the attacker hijack and exploit a user's

cookies?

In this section, you will learn to:

Perform a UDP Flood Attack. Perform ARP Poisoning.

The key terms for this section include:Term Definition

Malware Malware is a type of software designed to take over or damage a computer without the user's knowledge or approval.

DoS and DDoSDenial of Service (DoS) and Distributed Denial of Service (DDoS) attacks impact system availability by flooding the target system with traffic or requests or by exploiting a system or software flaw.

Permanent Denial-of-Service(PDoS)

A permanent denial-of-service (PDoS) is an attack that damages a system so badly that it requires the replacement or re-installation of hardware.

Virus A virus is a program that attempts to damage a computer system and replicate itself to other computer systems.

Worm A worm is a self-replicating program.

Trojan Horse A Trojan horse is a malicious program that is disguised as legitimate or desirable software.

ZombieA zombie is a computer that is infected with malware that allows remote software updates and control through a command and control center called a zombie master.

Botnet A botnet refers to a group of zombie computers that are commanded from a central control infrastructure.

Rootkit A rootkit is a set of programs that allow attackers to maintain permanent and hidden administrator-level access to a computer.

Logic Bomb A logic bomb is designed to execute only under predefined conditions and lies dormant until the predefined condition is met.

Spyware Spyware is software that is installed without the user's consent or Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 140: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

140

knowledge. Spyware is designed to intercept or take partial control of the user's interaction with the computer.

Adware Adware monitors actions that denote personal preferences and then sends pop-ups and ads that match those preferences.

Ransomware Ransomware denies access to a computer system until the user pays a ransom.

ScarewareScareware is a scam that fools users into thinking they have some form of malware on their system. The intent of the scam is to sell the user fake antivirus software to remove malware they don't have.

Crimeware Crimeware is designed to facilitate identity theft by gaining access to a user's online financial accounts, such as banks and online retailers.

Ping Flood A ping flood is a simple DoS attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets.

Ping of Death The ping of death is a DoS attack that uses the ping utility to send oversized ICMP packets.

SmurfA Smurf attack is a form of DrDoS attack that spoofs the source address in ICMP packets. A Smurf attack requires an attacker system, an amplification network, and a victim computer or network.

SYN FloodThe SYN flood exploits the TCP three-way handshake. So many resources are allocated that the victim cannot process a legitimate inbound request for a TCP/IP session.

LAND A LAND attack is when an attacker floods the victim's system with packets that have forged headers.

Christmas (Xmas) Tree

A Christmas (Xmas) tree attack (also known as Christmas tree scan, nastygram, kamikaze, or lamp test segment) uses an IP packet with every option turned on for the protocol being used. Christmas tree packets can be used to conduct reconnaissance by scanning for open ports and a DoS attack if sent in large numbers.

Man-in-the-Middle

A man-in-the-middle attack is used to intercept information between two communication partners.

TCP/IP (session) Hijacking

TCP/IP hijacking is an extension of a man-in-the-middle attack where the attacker steals an open and active communication session from a legitimate user.

HTTP (Session) Hijacking

HTTP (session) hijacking is a real-time attack in which the attacker hijacks a legitimate user's cookies and uses the cookies to take over the HTTP session.

Replay Attack

In a replay attack, the attacker uses a protocol analyzer or sniffer to capture authentication information going from the client to the server. The attacker then uses this information to connect at a later time and pretend to be the client.

IP Spoofing

IP spoofing changes the IP address information within a packet. It can be used to hide the origin of the attack by spoofing the source address. It can also amplify attacks by sending a message to a broadcast address and then redirecting responses to a victim who is overwhelmed with responses.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 141: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

141

MAC Spoofing

MAC spoofing is when an attacking device spoofs the MAC address of a valid host currently in the MAC address table of the switch. The switch then forwards frames destined for that valid host to the attacking device.

ARP Spoofing

ARP spoofing (also known as ARP poisoning) uses spoofed ARP messages to associate a different MAC address with an IP address. ARP spoofing can also be used to perform Denial of Service (DoS) attacks by redirecting communications to fake or nonexistent MAC addresses.

DNS Spoofing

DNS spoofing (also known as DNS poisoning or Pharming) takes advantage of the DNS server's ability to resolve a domain into its respective IP address. This attack exploits DNS vulnerabilities, resolving a domain typed on a browser into a fake IP address. It also redirects connection to a potentially malicious server.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 4.6 Respond to social engineering exploits.

CompTIA Network+

4.4 Summarize common networking attacks.

DoS o Reflective o Amplified o Distributed

Logic bomb Ransomware DNS poisoning ARP poisoning Spoofing Man-in-the-middle

 Video/Demo Time

13.3.1 Malware 10:5513.3.3 Denial of Service (DoS) 4:4413.3.4 Perform a UDP Flood Attack 4:0913.3.6 Session and Spoofing Attacks 5:1113.3.7 Perform ARP Poisoning 7:42

Total Video Time 32:41

Fact Sheets13.3.2 Malware Facts13.3.5 DoS Attack Facts13.3.8 Session and Spoofing Attack Facts

Number of Exam QuestionsCopyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 142: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

142

15 questions

Total TimeAbout 63 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 143: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

143

13.4: Network Vulnerabilities and Threats 2

Lecture Focus Questions:

What is a drive-by download? What is the difference between MAC flooding and MAC spoofing? How does a command injection attack a web application? What is the difference between XSS and CSRF/XSRF? How does salting the hash protect your network? What is the target of ARP spoofing? How does a buffer overflow differ from an integer overflow?

In this section, you will learn to:

Crack passwords.

The key terms for this section include:Term Definition

MAC Flooding MAC flooding overloads the switch's MAC forwarding table to make the switch function like a hub.

ARP Spoofing/Poisoning

ARP spoofing/poisoning associates the attacker's MAC address with the IP address of victim devices.

MAC Spoofing MAC spoofing changes the source MAC address on frames sent by the attacker.

VLAN HoppingVLAN hopping occurs when an attacking host on a VLAN attempts to access traffic on another VLAN that it should not have access to.

Drive-by Download A drive-by download is an attack where software or malware is downloaded and installed without explicit consent from the user.

Typosquatting or URL Hijacking

Typosquatting or URL hijacking occurs when an attacker registers domain names that correlate to common typographical errors users make while trying to access legitimate websites.

Watering Hole

A watering hole attack is a variation of a spear phishing attack, which is directed at a specific organization or person. Instead of overtly sending traditional phishing messages directly to the target, a watering hole attack is more passive than phishing; it relies on the trust the target has in specific websites.

Buffer Overflow

A buffer overflow occurs when the operating system or an application does not properly enforce boundaries for data input types and amounts. Hackers submit data beyond the size reserved for the data in the memory buffer, and the extra data overwrites adjacent memory locations. The extra data sent by the attacker could include executable code that might be able to execute in privileged mode.

This section helps you prepare for the following certification exam objectives:Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 144: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

144

Exam ObjectiveTestOut Network Pro 4.6 Respond to social engineering exploits.

CompTIA Network+

4.4 Summarize common networking attacks.

VLAN hopping Brute force

4.5 Given a scenario, implement network device hardening.

Changing default credentials Avoiding common passwords

4.4 Summarize common networking attacks.

Phishing

 Video/Demo Time

13.4.1 Switch Attacks 5:4313.4.3 Password Attacks 6:2213.4.4 Crack Passwords 8:2213.4.6 Web Attacks 4:39

Total Video Time 25:06

Fact Sheets13.4.2 Switch Attack Facts13.4.5 Password Attack Facts13.4.7 Web Attack Facts

Number of Exam Questions10 questions

Total TimeAbout 51 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 145: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

145

13.5: Authentication

Lecture Focus Questions:

What is the role of a CA in a PKI? What is the subject name within a certificate? What does an authentication protocol do? How does CHAP protect the password or shared secret during the authentication

process? Which authentication protocol would you choose if you needed to use smart

cards? What are the two ticket types used with Kerberos? How do tickets make

authentication and authorization more efficient? What device is required to implement 802.1x authentication? What is the difference between a strong authentication method and a mutual

authentication method?

The key terms for this section include:Term Definition

False Negative

A false negative (or Type I error) occurs when a person who should be allowed access is denied access. The false rejection rate (FRR) is a measure of the probability that a false negative will occur.

False Positive A false positive (or Type II error) occurs when a person who should be denied access is allowed access.

Crossover Error Rate

The crossover error rate, also called the equal error rate, is the point where the number of false positives matches the number of false negatives in a biometric system.

Processing Rate

The processing rate, or system throughput, identifies the number of subjects or authentication attempts that can be validated. An acceptable rate is ten subjects per minute or above.

KerberosKerberos is a free protocol that provides strong authentication for client/server applications using a secret-key cryptography so the client can prove its identity even across an unsecure network connection.

IEEE 802.1X

IEEE 802.1X is a port-based authentication service where the client initiates the authentication, a network device negotiates the authentication, and an authentication server is accessed after the supplicant is authenticated.

Captive PortalA captive portal is a web page that pops up when you access a public Wi-Fi. This portal usually summarizes terms disclosing types of activities the Wi-Fi provider is not liable for during public access.

CertificateA certificate is a digital document that identifies a user or a computer. The certificate includes a subject name, which is the name of a user or a computer.

This section helps you prepare for the following certification exam objectives:Exam Objective

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 146: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

146

TestOut Network Pro 4.6 Respond to social engineering exploits.

CompTIA Network+

4.2 Explain authentication and access controls.4.2 Explain authentication and access controls.

Authorization, authentication and accounting

o Kerberos o Single sign-on o Certificates o Auditing and logging

Multifactor authentication o Something you know o Something you have o Something you are o Somewhere you are o Something you do

Access control o 802.1x o Captive portal

4.3 Given a scenario, secure a basic wireless network.

Authentication and authorization o EAP

PEAP EAP-FAST EAP-TLS

4.6 Explain common mitigation techniques and their purposes.

Signature management

 Video/Demo Time

13.5.1 Authentication 10:3413.5.3 Authentication Protocols 11:1113.5.4 Digital Certificates 5:24

Total Video Time 27:09

Fact Sheets13.5.2 Authentication Facts13.5.5 Authentication Protocol Facts

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 147: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

147

Number of Exam Questions15 questions

Total TimeAbout 53 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 148: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

148

13.6: Secure Protocols

Lecture Focus Questions:

Which protocol is the secure alternative to Telnet? What is the difference between SFTP and FTPS? Which protocol is added to HTTP for secure Web browsing? What improvements does SNMPv3 provide over earlier SNMP versions?

In this section, you will learn to:

Add SSL on a website.

The key terms for this section include:Term Definition

SSLSecure Sockets Layer (SSL) is a protocol used to secure connections between servers and network application clients over an unsecure network, such as the internet.

TLSTransport Layer Security (TLS) is an improved version of SSL. Like SSL, TLS is an cryptographic protocol that provides communications security over a computer network.

SSH Secure Socket Shell (SSH) is a network protocol that provides administrators with a secure way to access a remote computer.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+ 3.4 Given a scenario, use remote access methods.

VPN o SSL/TLS/DTLS

4.4 Summarize common networking attacks.

Exploits vs. vulnerabilities

4.5 Given a scenario, implement network device hardening.

File hashing Using secure protocols Generating new keys

4.6 Explain common mitigation techniques and their purposes.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 149: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

149

File integrity monitoring

 Video/Demo Time

13.6.1 Secure Protocols 8:0213.6.2 Add SSL to a Website 4:29

Total Video Time 12:31

Fact Sheets13.6.3 Secure Protocol Facts

Number of Exam Questions7 questions

Total TimeAbout 25 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 150: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

150

13.7: Remote Access Security

Lecture Focus Questions:

How does a remote access VPN differ from a host-to-host VPN? With a site-to-site VPN, which devices are configured as the VPN tunnel

endpoints? What does PPTP use for encryption? What does L2TP use? What is the difference between AH and ESP used with IPsec? Why would you want to use SSL VPNs when creating VPNs?

In this section, you will learn to:

Configure a VPN connection. Configure a mobile device VPN connection.

The key terms for this section include:Term DefinitionVirtual Private Network(VPN)

A virtual private network (VPN) is a type of network that uses encryption to allow IP traffic to travel securely over the TCP/IP network. A VPN is used primarily to support secure communications over an untrusted network.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 4.4 Configure systems and remote devices to create and use a VPN connection.

CompTIA Network+

2.3 Explain the purposes and use cases for advanced networking devices.

VPN concentrator

2.5 Compare and contrast WAN technologies.

Characteristics of service o DMVPN

3.4 Given a scenario, use remote access methods.

VPN o IPSec o SSL/TLS/DTLS o Site-to-site o Client-to-site

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 151: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

151

 Video/Demo Time

13.7.1 Virtual Private Networks (VPNs) 10:2613.7.3 Set Up a VPN Connection 5:54

Total Video Time 16:20

Lab/Activity13.7.4 Configure a VPN Connection13.7.5 Configure a Mobile Device VPN Connection

Fact Sheets13.7.2 VPN Facts

Number of Exam Questions12 questions

Total TimeAbout 58 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 152: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

152

13.8: Troubleshoot Network Security Issues

Lecture Focus Questions:

How do you defend against a ping of death attack? What does the sniffer-detect script with the Nmap utility allow you to do? What tools can help you find backdoors? What can you do to prevent your network from becoming an amplifier for DoS

attacks? What do you need in order to configure two-factor authentication?

The key terms for this section include:Term Definition

DoS and DDoS

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks impact system availability by flooding the target system with traffic or requests or by exploiting a system or software flaw.

Ping of Death

The ping of death attack uses the ping utility to send oversized ICMP packets (larger than 65,536 bytes). The attacker sends a ping of death packet directly to the victim, which overflows the memory buffers on that system and causes it to freeze, crash, or reboot.

ARP Poisoning

In ARP poisoning, spoofed ARP messages are sent to hosts on an Ethernet LAN that contain false source MAC addresses. By doing this, the ARP tables on each host are updated with incorrect information.

Sniffing The process of capturing all network frames being transmitted. Network card must be in promiscuous mode.

Backdoor Access

A backdoor is an unprotected access method or pathway into a network system.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+ 4.2 Explain authentication and access controls.

Authorization, authentication and accounting

o Local authentication

4.4 Summarize common networking attacks.

Exploits vs. vulnerabilities

4.5 Given a scenario, implement network device hardening.

Disabling unused ports o IP ports

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 153: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

153

o Device ports (physical and virtual)

5.5 Given a scenario, troubleshoot common network service issues.

Untrusted SSL certificate Blocked TCP/UDP ports

 Video/Demo Time

13.8.1 Resolve Network Security Issues 8:4613.8.2 Respond to Network Attacks 3:0013.8.3 Authentication Issues 4:14

Total Video Time 16:00

Fact Sheets13.8.4 Security Troubleshooting Facts

Number of Exam Questions5 questions

Total TimeAbout 26 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 154: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

154

14.1: Detection and Prevention

Lecture Focus Questions:

What type of recognition method is used by most virus scanning software? How does an IPS differ from an IDS? What is the advantage of using a network-based IDS instead of a host-based

IDS? What should you do regularly when using a signature-based IDS? How can packet sniffing and port scanning software be used to improve the

security of your network? Which devices can you use to discover open ports?

In this section, you will learn to:

Configure Intrusion Prevention Enable Wireless Intrusion Prevention

The key terms for this section include:Term Definition

Intrusion Detection System(IDS)

A special network device that can detect attacks and suspicious activity.

Intrusion Prevention

System(IPS)

An intrusion prevention system (IPS) that can stop the malicious traffic before it makes it to the rest of your network.

HoneypotA honeypot is a device or virtual machine that entices intruders by displaying a vulnerability, displaying a configuration flaw, or appearing to contain valuable data.

Honeynet A honeynet is a network of honeypots.Tarpit(Sticky

Honeypot)

A tarpit (or sticky honeypot) is a honeypot that answers connection requests in such a way that the attacking computer is stuck for a period of time.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 4.5 Perform administrative tasks on a network security appliance.

CompTIA Network+ 2.3 Explain the purposes and use cases for advanced networking devices.

IDS/IPS

3.3 Explain common scanning, monitoring and Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 155: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

155

patching processes and summarize their expected outputs.

Processes o Port scanning o Vulnerability scanning

Event management o SIEM

4.5 Given a scenario, implement network device hardening.

Disabling unused ports o IP ports o Device ports (physical and virtual)

4.6 Explain common mitigation techniques and their purposes.

Honeypot/honeynet

5.2 Given a scenario, use the appropriate tool.

Software tools o Port scanner

 Video/Demo Time

14.1.1 Intrusion Detection and Prevention 4:2214.1.2 Configure an IDS/IPS 5:5814.1.3 Security Information and Event Management 4:2014.1.7 Vulnerability Assessment 4:23

Total Video Time 19:03

Lab/Activity14.1.5 Configure Intrusion Prevention14.1.6 Enable Wireless Intrusion Prevention

Fact Sheets14.1.4 Intrusion Detection and Prevention Facts14.1.8 Vulnerability Assessment Facts

Number of Exam Questions15 questions

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 156: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

156

Total TimeAbout 69 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 157: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

157

14.2: Penetration Testing

Lecture Focus Questions:

Why should you perform a penetration test on your network? Which type of penetration testing provides you with the most accurate results

regarding your network's vulnerabilities? How does black box testing differ from grey box testing? In which stage of penetration testing do you create a fingerprint of your system? What is the difference between operations penetration testing and electronic

penetration testing?

In this section, you will learn to:

Use penetration testing tools.

The key terms for this section include:Term Definition

Penetration Testing

A penetration test (or pen test) is an authorized simulated security attack on the network and is conducted from outside the organization's security perimeter.

Physical Penetration

A physical penetration test is where the tester attempts to physically enter a building without authorization, access servers or workstations, access wiring closets, and shut down power or other services.

Operations Penetration

An operations penetration test is where the tester attempts to gain as much information as possible using methods, such as dumpster diving, over-the-shoulder reconnaissance, and social engineering.

Electronic Penetration

An electronic penetration test is where the tester attempts to gain access and information about computer systems and the data on those systems using methods, such as system scanning, port scanning, network monitoring, sniffing, and fingerprinting (or footprinting).

FingerprintingFingerprinting (also called footprinting) scans a target system to identify the operating system, the patch level, and the applications and services available on it.

Black Box Test A black box test (also called a zero-knowledge test) is where the tester has no prior knowledge of the target system.

White Box Test A white box test (also called a full-knowledge test) is where the tester has detailed information prior to starting the test.

Grey Box TestA grey box test (also called a partial-knowledge test) is where the tester has the same amount of information that would be available to a typical insider in the organization.

Single-Blind Test A single-blind test is where one side has advanced knowledge, such as the attacker or the defender.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 158: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

158

Double-Blind TestA double-blind test is where the penetration tester does not have prior information about the system and the network administrator has no knowledge that the test is being performed.

Passive Reconnaissance

Passive reconnaissance is an attempt to gain data about targeted network and computers without directly affecting the target.

Network Enumeration

Network enumeration (also called network mapping) involves a thorough and systematic discovery of as much of the corporate network as possible. Vulnerability scanners are an important part of network enumeration.

System Enumeration

System enumeration is the process of gaining as much information about a specific computer as possible. System enumeration initiates fingerprinting.

Target SelectionTarget selection is the process of identifying servers that appear available. An attack typically involves targeted servers that present the path of least resistance and are the easiest to exploit.

Gaining Access

Gaining access is the act of performing the exploit. A successful exploit on a service or application typically leads to an attempt to elevate privilege to local administrator or domain administrator and grant more privileges to the system or the entire network.

Control and Reporting

Control and reporting is the process of documenting the following in as much detail as possible:

The level of access or control that was gained during the testing.

Methods used during the penetration test. Services and systems exploited.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro

4.6 Explain common mitigation techniques and their purposes.

Penetration testing

CompTIA Network+

5.2 Given a scenario, use the appropriate tool.Software toolsCommand lineNmap

 Video/Demo Time

14.2.1 Penetration Testing 2:3814.2.3 Explore Penetration Testing Tools 18:19

Total Video Time 20:57

Fact SheetsCopyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 159: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

159

14.2.2 Penetration Testing Facts

Number of Exam Questions10 questions

Total TimeAbout 36 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 160: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

160

14.3: Network Hardening

Lecture Focus Questions:

How does SecureDynamic differ from SecureSticky? How does DAI validate ARP packets on the network? What is the difference between enforcement and remediation servers? How does an A port violation occur? How can you resolve it? What does DHCP snooping do on your network?

In this section, you will learn to:

Configure port security.

The key terms for this section include:Term Definition

SecureConfigured Address

A MAC address that has been manually identified as an allowed address.

SecureDynamic Address

A MAC address that has been dynamically learned and allowed by the switch. SecureDynamic addresses are only saved in the MAC address table in RAM and are not added to the configuration file.

SecureSticky Address

A MAC address that is manually configured or dynamically learned and saved.

Port ViolationA port violation occurs when the maximum number of MAC addresses has been seen on the port and an unknown MAC address is then seen.

Network Access Protection

(NAP)

A collection of components that allow administrators to regulate network access and communication based on a computer's compliance with health requirement policies.

NAP Client

A  client that has NAP-aware software, either through the operating system or through other components. Client software generates a Statement of Health (SoH) that reports the client configuration for health requirements.

NAP Server

The NAP server is responsible for keeping track of health requirements and verifying that clients meet those requirements before gaining access. A Windows server running the Network Protection Service role is a NAP server.

Enforcement Server (ES)

ES (also called an enforcement point) is the connection point for clients to the network. Clients connect to the ES, submitting the SoH for validation. The ES forwards the SoH to the NAP server for validation. When the response from the NAP server is received, the ES allows or denies network access.

Remediation Server Remediation servers are a set of resources that a non-compliant computer can access on the limited-access network. The

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 161: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

161

purpose of a remediation server is to provide the resources necessary for non-compliant clients to become compliant. For example, remediation servers might hold operating system patches or antivirus definition files.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 4.3 Configure security for a switch.

CompTIA Network+

3.4 Given a scenario, use remote access methods.

SSH HTTPS/management URL Remote file access

o FTP/FTPS o SFTP o TFTP

4.2 Explain authentication and access controls.

Access control o NAC o Port security

4.5 Given a scenario, implement network device hardening.

Disabling unnecessary services Disabling unused ports

o IP ports o Device ports (physical and virtual)

4.6 Explain common mitigation techniques and their purposes.

Device hardening Switch port protection

o Spanning tree o Flood guard o BPDU guard o Root guard o DHCP snooping

 Video/Demo Time

14.3.1 Network Hardening Techniques 12:04

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 162: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

162

14.3.2 Switch Port Security 8:3914.3.4 Configure Switch Port Security 3:4814.3.6 Network Access Control 6:5014.3.7 Configure NAC 14:03

Total Video Time 45:24

Lab/Activity14.3.5 Configure Port Security

Fact Sheets14.3.3 Switch Port Security Facts14.3.8 NAC Facts

Number of Exam Questions13 questions

Total TimeAbout 81 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 163: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

163

15.1: Update Management

Lecture Focus Questions:

What is the difference between a hotfix and a service pack? What does flashing do to firmware? Where can you go to find updates for applications or drivers? What does Windows Update do?

In this section, you will learn to:

Configure an update server.

The key terms for this section include:Term Definition

Upgrading

Upgrading is the process of replacing a product with a newer version of the same product. When you perform an upgrade, you generally replace hardware, software, or firmware with a newer or better version to bring the system up to date or to improve its characteristics.

Downgrading Downgrading is the process of reverting software (or hardware) back to an older version; a downgrade is the opposite of an upgrade.

Hotfix A hotfix is an operating system patch that fixes bugs and other software vulnerabilities.

Service Pack (SP)

A service pack is a collection of hotfixes and other system enhancements.

Flashing Updating firmware by flashing (replacing or updating) the code stored on a ROM chip.

RollbackRollback means to revert the system to the pre-update version. This is useful in cases when updates interfere with certain programs or you simply prefer the pre-update system.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+ 3.3  Explain common scanning, monitoring and patching processes and summarize their expected outputs.

Processes o Patch management o Rollback

4.5 Given a scenario, implement network device hardening.

Upgrading firmware

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 164: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

164

Patching and updates

  Video/Demo Time

15.1.1 Update Deployment and Management 7:3215.1.2 Configure an Update Server 7:22

Total Video Time 14:54

Fact Sheets15.1.3 Update Deployment and Management Facts

Number of Exam Questions4 questions

Total TimeAbout 24 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 165: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

165

15.2: Data Protection

Lecture Focus Questions:

What is the difference between a data backup and a server backup? What permissions do you need to perform a backup? Which type of server backup is for recovering only critical volumes? In Windows 8.x, which application do you use to back up user account files? How does backing up your server to an internal disk differ from backing up to an

external disk?

In this section, you will learn to:

Configure a data backup. Configure a server backup.

The key terms for this section include:Term Definition

Full Backup Backs up all data, both new data and old data that is already backed up.

Incremental Backup

Only backs up data that has changed since the last full backup or the last incremental backup.

Differential Backup Only backs up data that has changed since the last full backup.

System Image Backup

A system image backup consists of an entire volume backed up to a .vhd file. It contains everything on the system, including the operating system, installed programs, drivers, and user data files.

File Backup

A file backup includes specified files and folders backed up to a compressed file. File backups do not include system files, program files, encrypted files (including EFS-encrypted files), files in the Recycle Bin, user profile settings, or temporary files.

Hot Site A hot site is a duplicate of your primary site that contains full computer systems and complete data backups.

Warm Site A warm site includes critical hardware and data.

Cold Site A cold site is an alternate location with power that may or may not include some hardware.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 3.5 Perform data and server backup and recovery tasks.

CompTIA Network+ 3.2 Compare and contrast business continuity and disaster recovery concepts.

Recovery o Cold sites

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 166: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

166

o Warm sites o Hot sites o Backups

Full Differential Incremental

o Snapshots

 Video/Demo Time

15.2.1 Data Backups 9:4815.2.2 Protect Data 4:5815.2.3 Recover Files from Backup 4:04

Total Video Time 18:50

Lab/Activity15.2.6 Configure a Data Backup15.2.7 Configure a Server Backup

Fact Sheets15.2.4 Workstation Backup Facts15.2.5 Server Backup Facts

Number of Exam Questions4 questions

Total TimeAbout 57 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 167: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

167

15.3: Remote Management

Lecture Focus Questions:

What is the difference between Telnet and SSH? How does remote desktop software differ from terminal emulation software? How can you use a remote desktop solution for troubleshooting and technical

support within your organization? How does a remote desktop protocol minimize the data sent between the client

and server devices for a remote connection? What is device redirection? How does it add flexibility to remote desktop

connections? What are the differences between hot, warm, and cold sites?

In this section, you will learn to:

Allow remote desktop connections.

The key terms for this section include:Term Definition

Terminal Emulation

A terminal is a monitor and keyboard attached to a device (such as a mainframe, server, or router) through a serial or special console port. The terminal displays a text-based interface and users interact with the device by typing commands.

Terminal Emulation

Utility

A terminal emulation utility is a program that allows a console connection through the network. The terminal emulation software communicates with the device over the network and displays the text-based console screen. The two common terminal emulation programs used are Telnet and SSH.

Remote Desktop

A remote desktop utility displays the graphical user interface of a remote device. Remote desktop solutions are used to remotely manage a computer or allow support personnel to view and troubleshoot a remote user's system.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 3.3 Configure Remote Desktop to allow remote access to systems.

CompTIA Network+ 3.4 Given a scenario, use remote access methods.

VNC

3.5 Identify policies and best practices.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 168: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

168

Remote access policies

 Video/Demo Time

15.3.1 Remote Management 9:0715.3.2 Use Remote Desktop 10:48

Total Video Time 19:55

Lab/Activity15.3.3 Allow Remote Desktop Connections

Fact Sheets15.3.4 Remote Management Facts

Number of Exam Questions4 questions

Total TimeAbout 41 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 169: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

169

15.4: Mobile Device Management

Lecture Focus Questions:

What can you do to prevent malware from a mobile device from spreading? What can you use to remotely clear data on a mobile device? What should your acceptable use policy specify?

In this section, you will learn to:

Create a guest network for BYOD use.

The key terms for this section include:Term DefinitionMobile

DevicesMobile devices include smartphones, laptops, tablet PCs, PDAs, and other handheld computing devices.

BYODMobile devices that users bring to work and use to complete daily work-related tasks are sometimes referred to as bring your own device (BYOD) devices.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+

3.5 Identify policies and best practices.

On-boarding/off-boarding procedures BYOD

 Video/Demo Time

15.4.1 Mobile Device Management 10:2015.4.2 Enroll Mobile Devices 4:5415.4.3 Configure Mobile Device Policies 12:2015.4.4 Set Up a Guest Network for BYOD 6:03

Total Video Time 33:37

Lab/Activity15.4.5 Create a Guest Network for BYOD

Fact Sheets15.4.6 Mobile Device Management Facts

Number of Exam Questions13 questions

Total TimeAbout 64 minutesCopyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 170: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

170

15.5: Data Center Management

Lecture Focus Questions:

How does a brownout differ from a blackout? What are the best temperature and humidity ranges for electronic components? What is the difference between an SPS and a UPS? What is the air exchange rate for a server room? How should hot and cold aisles be set up for optimal air circulation?

In this section, you will learn to:

Configure UPS settings.

The key terms for this section include:Term Definition

Surge or Spike A sudden rise in voltage.

Sag or Dip A sudden reduction in voltage for a short period of time (as long as a few seconds).

Brownout A reduction in voltage that lasts longer than a few seconds.Blackout A complete power failure.

Fault A momentary power outage.Transient A fluctuation caused by line noise or disturbance.

Uninterruptible Power Supply

(UPS)

A device that constantly provides battery power to the computer and is recharged by the wall outlet. An online UPS constantly powers the computer from the battery. An offline UPS powers the computer from the wall outlet but switches to battery if the power fails.

Standby Power Supply(SPS)

An offline device that only switches on to provide power when an undervoltage occurs. If the switchover is not fast enough, the computer loses power and shuts down.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+ 3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.

Labeling

3.2 Compare and contrast business continuity and disaster recovery concepts.

Availability concepts o Power management

Battery backups/UPS Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 171: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

171

Power generators Dual power supplies Redundant circuits

 Video/Demo Time

15.5.1 Network Device Installation 7:3815.5.2 Power Management 11:3615.5.3 Configure UPS Settings 10:2515.5.5 Environmental Monitoring 7:10

Total Video Time 36:49

Fact Sheets15.5.4 Power Management Facts15.5.6 Environmental Monitoring Facts

Number of Exam Questions13 questions

Total TimeAbout 60 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 172: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

172

15.6: Monitoring

Lecture Focus Questions:

Why should you enable logging only for specific events? After you configure system logging, what else must you do to take advantage of

logging's benefits? How does a load tester differ from a throughput tester? What must you do to configure a packet sniffer to be able to see all frames on a

subnet?

In this section, you will learn to:

View Event Logs. Use a packet sniffer. Monitor utilization. Monitor Interface Statistics.

The key terms for this section include:Term Definition

Log

A record of events that have occurred on a system. Logging capabilities are built into operating systems, services, and applications. Log entries are generated in response to changes in configuration, system state, or network conditions.

Load TesterA tool that simulates a load on a server or service. For example, the load tester might simulate a large number of client connections to a website, test file downloads for an FTP site, or large volumes of email.

Throughput Tester

A device that measures the amount of data that can be transferred through a network or processed by a device (such as the amount of data that can be retrieved from a disk in a specific period of time).

Packet Sniffer

Software that captures (records) frames that are transmitted on the network.

Protocol Analyzer

A passive device that that captures transmitted frames and allows you to view the frame contents, but does not allow you to modify and retransmit frames.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 3.4 Use network tools to discover network devices and resources.

CompTIA Network+ 3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.

Processes o Packet/traffic analysis

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 173: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

173

Metrics o Error rate o Utilization o Packet drops o Bandwidth/throughput

5.2 Given a scenario, use the appropriate tool.

Software tools o Packet sniffer o Protocol analyzer o Command line

 Video/Demo Time

15.6.1 Network Monitoring 7:1115.6.2 Protocol Analyzers 2:3715.6.3 View Event Logs 4:0315.6.4 Use a Packet Sniffer 7:1415.6.5 Monitor Utilization 8:1915.6.6 Monitor Interface Statistics 5:07

Total Video Time 34:31

Fact Sheets15.6.7 Network Monitoring Facts

Number of Exam Questions15 questions

Total TimeAbout 55 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 174: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

174

15.7: Log File Management

Lecture Focus Questions:

When you enable logging for security level 4, what additional messages are received?

What does the logging process do? What information is provided in the facility component of the log message? Which log messages are sent to the console by default for a Cisco device?

In this section, you will learn to:

Configure a Syslog server.

The key terms for this section include:Term Definition

Timestamp The timestamp indicates when the message was generated.

Mnemonic A mnemonic is a device, such as a pattern of letters, that assists you with remembering something.

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 3.4 Use network tools to discover network devices and resources.

CompTIA Network+

3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.

Processes o Log reviewing

 Video/Demo Time

15.7.1 Log File Management 5:3315.7.2 Configure a Syslog Server 3:19

Total Video Time 8:52

Fact Sheets15.7.3 Log File Management Facts

Number of Exam Questions4 questions

Total TimeAbout 18 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 175: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

175

15.8: Network Management with SNMP

Lecture Focus Questions:

What is the role of the MIB when using SNMP? What is a trap? How can you use a trap in network administration? How is the community name used with SNMP? Why doesn't the community name provide security for SNMP devices?

In this section, you will learn to:

Configure an SNMP system.

The key terms for this section include:Term Definition

Simple Network Management

Protocol(SNMP)

Simple Network Management Protocol (SNMP) is designed for managing complex networks. SNMP lets network hosts exchange configuration and status information. This information can be gathered by management software and used to monitor and manage the network and network events.

ManagerA manager is the computer used to perform management tasks. The manager queries agents and gathers responses by sending messages.

AgentAn agent is a software process that runs on managed network devices. The agent communicates information to the manager and can send dynamic messages to the manager.

Management Information Base

(MIB)

The management information base (MIB) is a database of host configuration information. Agents report data to the MIB, and the manager can then view information by requesting data from the MIB.

Trap A trap is an event configured on an agent. When the event occurs, the agent logs details regarding the event.

Get A Get is a message sent from a management system that requests information about a specific OID.

Walk A Walk uses GETNEXT messages to navigate the structure of an MIB.

AlertAn alert can be configured so that when an event occurs (such as a trap), the network administrator receives an alert via email or SMS (text message).

This section helps you prepare for the following certification exam objectives:Exam Objective

TestOut Network Pro 3.4 Use network tools to discover network devices and resources.

CompTIA Network+ 3.3 Explain common scanning, monitoring and patching processes and summarize their

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 176: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

176

expected outputs.

Event management o Notifications o Alerts

SNMP monitors o MIB

 Video/Demo Time

15.8.1 Network Management 5:1215.8.2 Configure an SNMP System 2:36

Total Video Time 7:48

Fact Sheets15.8.3 SNMP Facts

Number of Exam Questions4 questions

Total TimeAbout 17 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 177: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

177

16.1: Optimization

Lecture Focus Questions:

Which feature would you use to configure a device with two connections to the same network?

What is the purpose of spanning tree in a switched network? How does spanning tree compare to Ethernet bonding? Why doesn't spanning tree provide improved performance? How does a caching server improve network performance? When should quality of service (QoS) be a major concern on your network? What is the difference between a collision domain and a broadcast domain? Your network uses hubs as connection devices. What happens to the number of

collisions on the network as you add devices? Which device provides guaranteed bandwidth between devices? Which device can you use to filter broadcast traffic? Your network uses switches as connection devices. All devices have a dedicated

switch port. What happens to the number of collisions on the network as you add devices?

In this section, you will learn to:

Configure NIC teaming.

The key terms for this section include:Term Definition

NIC Teaming

NIC Teaming (also called Ethernet bonding) logically groups two or more physical connections to the same network. Data is divided and sent on multiple interfaces, effectively increasing the speed at which the device can send and receive on the network.

Spanning Tree

A protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol (STP) runs on each switch and is used to select a single path between any two switches.

Load Balancing

Load balancing configures a group of servers in a logical group (called a server farm). Incoming requests to the group are distributed to individual members within the group. Incoming requests can be distributed evenly or unevenly between group members based on additional criteria, such as server capacity.

Caching EngineThe process of saving previously acquired data for quick retrieval at a later time. Caching stores data in memory or on disk within a network device, where it can quickly be retrieved when needed.

Quality of Service(QoS)

QoS refers to a set of mechanisms that try to guarantee timely delivery or minimal delay of important or time-sensitive communications.

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 178: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

178

Traffic Shaper A device that is capable of modifying the flow of data through a network in response to network traffic conditions.

Multilayer Switch or Content Switch

A multilayer switch operates at OSI model layers above Layer 2 and can use other information within a packet to make forwarding decisions.

Demilitarized Zone(DMZ)

A subnetwork that you place between your LAN and untrusted networks, such as the internet. External network nodes can only access what you choose to expose in the DMZ, and the rest of your network is protected by firewalls.

Port Aggregation (PAgP)

A Cisco protocol that lets you combine Ethernet ports to improve the speed of aggregated, or related, file transfers. This protocol is also called link aggregation, teaming ports, and pot trunking.

Differentiated Services(Diffserv)

A Layer 3 protocol QoS uses to classify IP packets. Each IP packet header has a DiffServ field. DiffServ inserts a differentiated services code point value, or DSCP value, in this filed to prioritize data flow. Routers forward packets according to the value in this field.

Collision and Broadcast Domains

A collision domain identifies all of the devices that share the same network segment and have the potential to send colliding signals. A broadcast domain identifies all the devices that will see a broadcast frame that is sent on the network. The two work together to minimize collisions.

Common Address Redundancy

Protocol (CARP)

A fault tolerance implementation that allows multiple firewalls and/or routers on the same local network to share a set of IP addresses. If one of the firewalls or routers fails, the shared IP address allows hosts to continue communicating with the firewall or router without interruption.

Switch Dependent Switch dependent teaming requires that the adapters in a team are connected to the same switch.

Switch Independent Switch independent teaming allows the adapters in a team to connect to different switches.

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+ 1.3 Explain the concepts and characteristics of routing and switching.

Properties of network traffic o Broadcast domains o Collision domains

Performance concepts o Traffic shaping o QoS o Diffserv o CoS

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 179: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

179

2.3 Explain the purposes and use cases for advanced networking devices.

Load balancer

3.2 Compare and contrast business continuity and disaster recovery concepts.

Availability concepts o Fault tolerance o High availability o NIC teaming o Port aggregation

4.6 Explain common mitigation techniques and their purposes.

Network segmentation o DMZ o VLAN

 Video/Demo Time

16.1.1 Optimization 7:5816.1.2 Network Segmentation 10:1216.1.4 NIC Teaming Concepts 4:4916.1.5 Set Up NIC Teaming 3:32

Total Video Time 26:31

Lab/Activity16.1.6 Configure NIC Teaming

Fact Sheets16.1.3 Optimization Facts16.1.7 NIC Teaming Facts

Number of Exam Questions15 questions

Total TimeAbout 64 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 180: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

180

16.2: Troubleshooting Methodology

Lecture Focus Questions:

Why is it important to follow a troubleshooting methodology? When faced with a problem, why shouldn't you start trying fixes immediately? What is escalation and when should it be performed? After the problem is fixed, what else must you do to finish troubleshooting? What is the difference between ping and traceroute? What Linux command is similar to ipconfig? When would you use nslookup or dig?

This section helps you prepare for the following certification exam objectives:Exam Objective

CompTIA Network+ 1.8 Explain the functions of network services.

DHCP service o TTL

5.1 Explain the network troubleshooting methodology.

Identify the problem o Gather information o Duplicate the problem, if possible o Question users o Identify symptoms o Determine if anything has changed o Approach multiple problems

individually Establish a theory of probable cause

o Question the obvious o Consider multiple approaches

Top-to-bottom/bottom-to-top OSI model

Divide and conquer o Test the theory to determine the

cause Once the theory is

confirmed, determine the next steps to resolve the problem

If the theory is not confirmed, reestablish a new theory or escalate

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 181: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

181

o Establish a plan of action to resolve the problem and identify potential effects

o Implement the solution or escalate as necessary

o Verify full system functionality and, if applicable, implement preventive measures

o Document findings, actions, and outcomes

5.2 Given a scenario, use the appropriate tool.

Software tools o Command line

ping tracert, traceroute nslookup pathping

 Video/Demo Time

16.2.1 Troubleshooting Methodology 6:0916.2.3 Troubleshooting Utilities 9:29

Total Video Time 15:38

Fact Sheets16.2.2 Troubleshooting Methodology Facts16.2.4 Troubleshooting Utility Facts

Number of Exam Questions10 questions

Total TimeAbout 36 minutes

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 182: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

182

Practice ExamsA.0: Network Pro Practice ExamsNetwork Pro Certification Practice Exam (12 questions)

B.0: Network+ Practice ExamsNetwork+ Certification Practice Exam (90 questions)

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 183: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

183

Appendix A: Approximate Time for the CourseThe total time for the LabSim for TestOut Network Pro course is approximately 56 hours and 54 minutes. Time is calculated by adding the approximate time for each section which is calculated using the following elements:

Video/demo times Text Lessons (5 minutes assigned per text lesson) Simulations (12 minutes assigned per simulation) Questions (1 minute per question)

Additionally, there are approximately another 33 hours and 11 minutes of Practice Test material at the end of the course.

The breakdown for this course is as follows:

Module Sections Time Videos Labs Text Exams0.0: Introduction

0.1: Network Pro Introduction 4 4 0 0 00.2: Use the Simulator 35 11 24 0 0

Total 0:39 0:15 0:24 0:00 0:001.0: Networking Basics

1.1: Networking Overview 34 25 0 5 41.2: Network Topologies 25 8 0 5 121.3: The OSI Model 39 15 0 10 141.4: Network Protocols 42 25 0 5 121.5: Numbering Systems 17 9 0 5 3

Total 2:37 1:22 0:00 0:30 0:452.0: Cables and Connectors

2.1: Twisted Pair 36 12 12 5 72.2: Coaxial 28 5 12 5 62.3: Fiber Optic 37 11 12 5 92.4: Wiring Implementation 68 21 24 10 132.5: Troubleshoot Network Media 58 28 0 15 15

Total 3:47 1:17 1:00 0:40 0:503.0: Networking Devices

3.1: Network Adapters 48 9 24 5 103.2: Network Devices 54 11 24 5 143.3: Internetwork Devices 29 7 12 5 5

Total 2:11 0:27 1:00 0:15 0:294.0: Ethernet

4.1: Ethernet 18 9 0 5 44.2: Ethernet Specifications 39 7 12 5 154.3: Connect Network Devices 36 8 12 5 114.4: Troubleshoot Physical Connectivity 96 14 60 10 12

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 184: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

184

Total 3:09 0:38 1:24 0:25 0:425.0: IP Configuration

5.1: IP Addressing 89 30 24 20 155.2: APIPA and Alternate Addressing 28 8 12 5 35.3: DHCP Server Configuration 91 18 60 5 85.4: DHCP Relay 38 6 24 5 35.5: DNS Name Resolution 95 25 60 5 55.6: IP Version 6 76 36 12 20 85.7: Multicast 18 7 0 5 65.8: Troubleshoot IP Configuration Issues 82 24 48 5 55.9: Troubleshoot IP Communications 73 31 12 15 155.10: Troubleshoot Name Resolution 38 14 12 5 7

Total 10:28 3:19 4:24 1:30 1:156.0: Switch Management

6.1: Switch Access 20 12 0 5 36.2: Switch IP Configuration 36 4 24 5 36.3: Switch Interface Configuration 48 17 12 15 46.4: Virtual LANs 59 12 24 10 136.5: Trunking 72 19 36 10 76.6: Spanning Tree Protocol 83 22 36 10 156.7: Switch Troubleshooting 27 13 0 5 9

Total 5:45 1:39 2:12 1:00 0:547.0: Routing

7.1: Routing Basics 22 11 0 5 67.2: Routing Protocols 83 36 24 10 137.3: Network Address Translation 45 30 0 5 107.4: Routing Troubleshooting 58 20 24 5 9

Total 3:28 1:37 0:48 0:25 0:388.0: Firewalls

8.1: Firewalls 65 23 12 15 158.2: Security Appliances 31 11 12 5 38.3: Firewall Design and Implementation 87 43 24 5 15

Total 3:03 1:17 0:48 0:25 0:339.0: Network Customization

9.1: Network-Based Storage 72 32 24 10 69.2: Voice over IP (VoIP) 54 12 24 5 139.3: Virtualization 24 15 0 5 49.4: Virtual Networking 36 17 0 10 99.5: Cloud Computing 23 13 0 5 5

Total 3:29 1:29 0:48 0:35 0:3710.0: Wireless Networking

10.1: Wireless Concepts 31 16 0 10 510.2: Wireless Standards 44 27 0 5 1210.3: Wireless Configuration 66 20 36 5 510.4: Wireless Network Design 71 26 24 10 1110.5: Wireless Network Implementation 37 16 12 5 410.6: Wireless Security 69 32 12 10 15

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 185: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

185

10.7: Wireless Troubleshooting 81 26 36 5 14Total 6:39 2:43 2:00 0:50 1:06

11.0: Wide Area Networks (WANs)11.1: WAN Concepts 56 26 0 15 1511.2: WAN Connections 32 7 12 5 811.3: Internet Connectivity 54 22 12 5 1511.4: Remote Access 52 33 0 5 1411.5: WAN Troubleshooting 31 17 0 5 9

Total 3:45 1:45 0:24 0:35 1:0112.0: Network Policies and Procedures

12.1: Network Design, Documentation, and Policies 58 29 0 15 1412.2: Risk Management 35 6 0 15 1412.3: Security Policies 48 23 0 10 15

Total 2:21 0:58 0:00 0:40 0:4313.0: Network Security

13.1: Physical Security 43 11 12 5 1513.2: Social Engineering 49 20 12 5 1213.3: Network Vulnerabilities and Threats 1 63 33 0 15 1513.4: Network Vulnerabilities and Threats 2 51 26 0 15 1013.5: Authentication 53 28 0 10 1513.6: Secure Protocols 25 13 0 5 713.7: Remote Access Security 58 17 24 5 1213.8: Troubleshoot Network Security Issues 26 16 0 5 5

Total 6:08 2:44 0:48 1:05 1:3114.0: Network Hardening

14.1: Detection and Prevention 69 20 24 10 1514.2: Penetration Testing 36 21 0 5 1014.3: Network Hardening 81 46 12 10 13

Total 3:06 1:27 0:36 0:25 0:3815.0: Network Management

15.1: Update Management 24 15 0 5 415.2: Data Protection 57 19 24 10 415.3: Remote Management 41 20 12 5 415.4: Mobile Device Management 64 34 12 5 1315.5: Data Center Management 60 37 0 10 1315.6: Monitoring 55 35 0 5 1515.7: Log File Management 18 9 0 5 415.8: Network Management with SNMP 17 8 0 5 4

Total 5:36 2:57 0:48 0:50 1:0116.0: Network Optimization

16.1: Optimization 64 27 12 10 1516.2: Troubleshooting Methodology 36 16 0 10 10

Total 1:40 0:43 0:12 0:20 0:25Total Course Time 67:10

Practice ExamsCopyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.

Page 186: TestOut · Web viewLecture Focus Questions: What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect

186

A.0: Network Pro Practice Exams Number of Questions TimeA.2: Network Pro Practice Exams - All Questions 61 12:12A.3: Network Pro Certification Practice Exam 12 2:00

Total 73 14:12B.0: Network+ Practice Exams Number of Questions TimeB.2: Network+ Practice Exams - 20 Random Questions 100 1:40B.3: Network+ Practice Exams - All Questions 949 15:49B.4: Network+ Certification Practice Exam 90 1:30

Total 1,139 18:59Total Practice Exam Time 33:11

Copyright © 2020 TestOut Corporation. CompTIA, A+, Network+, Security+, Linux+, IT Fundamentals, and related trademarks and trade names are the trademarks of CompTIA. Microsoft, MCITP, MSCA, MCTS, Office, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. TestOut has no affiliation with these companies and the products and services advertised herein are not endorsed by any of them.


Recommended