Contact us on (02) 8445 2300
For all customer service and order enquiries

Woodslane Online Catalogues

Comptia Network+ 2 - Operations, Security & Troubleshooting Study Guide

A Quickstudy Laminated Reference
Description
Google
Preview
CompTIA(R) Network+ 2 - Operations, Security & Troubleshooting Second in a series of 2 reference guides that will make your life easier preparing for the Network+ certification exam with the most thorough yet compact and succinct study tool on the market. Six durably laminated pages, easy to store and review anywhere with concise answers and examples providing key content for unlocking the best score on the exam. Author George Antoniou, PhD, is a professor with 30 years of experience in information security, risk management, and quality assurance compliance as well as strategic planning and enterprise level security architecture, plus security operations and policy development in small-medium-large, national and multi-national complex information security technology infrastructures. His experience providing instruction ensures this guide is a handy and powerful tool. We guarantee you will find answers faster than any book or website for a price that makes it easy to add this to your Network+ test prep toolbox. Based on studies regarding retention with screens verses tactile in-hand study tools, along with the growing sales of our computer titles, print is not dead - give it a try. 6 page laminated guide includes explanations, differences, and examples within: NETWORK OPERATIONS Explain the Purpose of Organizational Processes & Procedures Documentation Life-cycle management, Change management, Configuration management Production configuration Given a Scenario, Use Network Monitoring Technologies Methods, Solutions Explain DR Concepts DR metrics, DR sites High-availability approaches, Testing Given a Scenario, Implement IPv4 & IPv6 Network Services Dynamic addressing, Name resolution, Time protocols Compare & Contrast Network Access & Management Methods Site-to-site VPN, Client-to-site VPN Connection methods Jump box/host In-band vs. out-of-band management NETWORK SECURITY Explain the Importance of Basic Network Security Concepts Logical security, Physical security Deception technologies Common security terminology Audits & regulatory compliance Summarize Various Types of Attacks & Their Impact on the Network DoS/DDoS VLAN hopping MAC flooding Address Resolution Protocol (ARP) poisoning Rogue devices & services Evil twin On-path attack Social engineering Malware Given a Scenario, Apply Network Security Features, Defense Techniques & Solutions Device hardening Key management Security rules Zones NETWORK TROUBLESHOOTING Cyclic Redundancy Check (CRC) Runts, Giants, Drops Common Cabling & Physical Interface Issues Single-mode vs. multimode fiber Category 5/6/7/8 (Ethernet cables) STP vs. UTP Transmitter (TX) / Receiver (RX) Transposed Switching & Routing Issues Spanning Tree Protocol (STP) ACL Routing table Address pool exhaustion Duplicate IP address Performance Issues Latency Packet loss Jitter Interference (wireless) Tools & Protocols for Troubleshooting Protocol analyzer Ping, Traceroute, Netstat Link Layer Discovery Protocol (LLDP) / Cisco Discovery Protocol (CDP) Wi-Fi analyzer Networking Device Commands Show mac-address-table, Show route, Show interface
Google Preview content