Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Network Plus 2005 In Depth

.pdf
Скачиваний:
85
Добавлен:
12.02.2015
Размер:
17.39 Mб
Скачать

702 Chapter 15 IMPLEMENTING AND MANAGING NETWORKS

Review Questions

1.A _________________________ is the process of clarifying the reasons and objectives underlying a proposed change.

a.patch assessment

b.needs assessment

c.milestone

d.feasibility study

2.Which of the following refers to the correction, improvement, or enhancement to a particular piece of a software application?

a.Milestone

b.Service pack

c.Gantt chart

d.Patch

3._________________________ represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software.

a.Application upgrades

b.Shared application upgrades

c.Project plans

d.Feasibility studies

4._________________________ is necessary to ensure that all participants understand the project’s goals, encourage teamwork, avoid duplicate efforts, and allow learning from prior mistakes.

a.Contingency planning

b.Testing and evaluation

c.Communication

d.Setting timelines

5._________________________ involves identifying and tracking the hardware and software on your network.

a.Needs assessment

b.Contingency planning

c.Fault management

d.Asset management

REVIEW QUESTIONS

Chapter 15 703

6.True or false? Migrating from a Token Ring network to Ethernet is an example of a backbone upgrade.

7.True or false? A contingency plan is a popular method for depicting when projects begin and end along a horizontal timeline.

8.True or false? You do not have to worry about downtime or notifying users when adding a new hub or access point, because it cannot affect anyone until it is actually in use.

9.True or false? The detection and signaling of device, link, or component faults is known as performance management.

10.True or false? A small-scale network that stands in for a larger network is sometimes called a pilot network.

11.A(n) _________________________ is a reference point that marks the completion of a major task or group of tasks in the project and contributes to measuring the project’s progress.

12.A(n) _________________________ outlines the costs and benefits of the project and attempts to predict whether it will result in a favorable outcome.

13._________________________ is the process of identifying steps that minimize the risk of unforeseen events that could affect the quality or timeliness of the project’s goals.

14.The process of reverting to a previous version of software after attempting to upgrade is known as _________________________.

15._________________________ is the practice of managing staff, budget, timelines, and other resources and variables to achieve a specific goal within given bounds.

This page intentionally left blank

Appendix A

Network+

Examination

Objectives

This book covers all of the Network+ examination objectives, which were released by CompTIA (the Computing Technology Industry Association) in 2005. The official list of objectives is available at CompTIA’s Web site, www.comptia.org. For your reference, the following table lists each exam objective and the chapter of this book that explains the objective, plus the amount of the exam that will cover each certification domain. Each objective belongs to one of four domains (or main topics) of networking expertise. For example, the objective of recognizing an RJ-45 connector belongs to the “Media and Topologies” domain, which accounts for 20% of the exam’s content.

Domain 1.0 Media and Topologies—

20% of Examination

Table A-1 Network+ Examination Objectives—Media and Topologies

Objective

Chapter

1.1 Recognize the following logical or physical network topologies given a

 

diagram, schematic or description:

 

Star

1, 6, 7

Bus

1, 6, 7

Mesh

7

Ring

1, 6, 7

1.2 Specify the main features of 802.2 (Logical Link Control), 802.3

 

(Ethernet), 802.5 (token ring), 802.11 (wireless), and FDDI (Fiber Distributed

 

Data Interface) networking technologies, including:

 

Speed

3, 6

Access method (CSMA / CA (Carrier Sense Multiple Access / Collision

 

Avoidance) and CSMA / CD (Carrier Sense Multiple Access / Collision

 

Detection))

3, 6

Topology

6

Media

3, 6

1.3 Specify the characteristics (For example: speed, length, topology, and cable

 

type) of the following cable standards:

 

10BASE-T and 10BASE-FL

3

100BASE-TX and 100BASE-FX

3

1000BASE-T, 1000BASE-CX, 1000BASE-SX and 1000BASE-LX

3

10 GBASE-SR, 10 GBASE-LR and 10 GBASE-ER

3

1.4 Recognize the following media connectors and describe their uses:

 

RJ-11 (Registered Jack)

3, Appendix C

RJ-45 (Registered Jack)

3, Appendix C

F-Type

3, Appendix C

ST (Straight Tip)

3, Appendix C

DOMAIN 1.0 MEDIA AND TOPOLOGIES

Appendix A

 

 

707

 

Table A-1 Continued

 

 

 

 

 

 

 

 

 

 

 

 

 

Objective

Chapter

 

 

 

 

 

 

SC (Subscriber Connector or Standard Connector)

3, Appendix C

 

IEEE 1394 (FireWire)

5, Appendix C

 

Fiber LC (Local Connector)

3, Appendix C

 

MT-RJ (Mechanical Transfer Registered Jack)

3, Appendix C

 

USB (Universal Serial Bus)

5, Appendix C

 

1.5 Recognize the following media types and describe their uses:

 

 

 

 

Category 3, 5, 5e, and 6

3

 

 

 

UTP (Unshielded Twisted Pair)

3

 

 

 

STP (Shielded Twisted Pair)

3

 

 

 

Coaxial cable

3

 

 

 

SMF (Single Mode Fiber) optic cable

3

 

 

 

MMF (Multimode Fiber) optic cable

3

 

 

 

1.6 Identify the purposes, features and functions of the following network

 

 

 

 

components:

 

 

 

 

Hubs

3, 5

 

 

 

Switches

5, 7

 

 

 

Bridges

5

 

 

 

Routers

5, 11, 14

 

 

 

Gateways

5, 11, 14

 

 

 

CSU / DSU (Channel Service Unit / Data Service Unit)

7

 

 

 

NICs (Network Interface Cards)

1, 5

 

 

 

ISDN (Integrated Services Digital Network) adapters

7

 

 

 

WAPs (Wireless Access Points)

3, 5, 6

 

 

 

Modems

3, 7

 

 

 

Transceivers (media converters)

3

 

 

 

Firewalls

5, 14

 

 

 

1.7 Specify the general characteristics (For example: carrier speed, frequency,

 

 

 

 

transmission type and topology) of the following wireless technologies:

 

 

 

 

802.11 (Frequency hopping spread spectrum)

3, 6

 

 

 

802.11x(Direct sequence spread spectrum)

3, 6

 

 

 

Infrared

3, 6

 

 

 

Bluetooth

3, 6

 

 

 

1.8 Identify factors which affect the range and speed of wireless service (For

 

 

 

 

example: interference, antenna type and environmental factors).

3

 

 

 

 

 

 

 

 

708 Appendix A NETWORK+ EXAMINATION OBJECTIVES

Domain 2.0 Protocols and Standards—

20% of Examination

Table A-2 Network+ Examination Objectives—Protocols and Standards

Objective

Chapter

2.1

Identify a MAC (Media Access Control) address and its parts.

2

2.2

Identify the seven layers of the OSI (Open Systems Interconnect) model

 

and their functions.

2

2.3

Identify the OSI (Open Systems Interconnect) layers at which the

 

following network components operate:

 

 

Hubs

2, 5

 

Switches

5

 

Bridges

5

 

Routers

2, 5

 

NICs (Network Interface Cards)

2, 5

 

WAPs (Wireless Access Points)

3, 5

2.4

Differentiate between the following network protocols in terms of routing,

 

addressing schemes, interoperability and naming conventions:

 

 

IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange)

4

 

NetBEUI (Network Basic Input / Output System Extended User Interface)

4

 

AppleTalk / AppleTalk over IP (Internet Protocol)

4

 

TCP / IP (Transmission Control Protocol / Internet Protocol)

4, 11

2.5

Identify the components and structure of IP (Internet Protocol) addresses

 

(IPv4, IPv6) and the required setting for connections across the Internet.

4, 11

2.6

Identify classful IP (Internet Protocol) ranges and their subnet masks (For

 

example: Class A, B and C).

4, 11

2.7

Identify the purpose of subnetting.

4, 11

2.8

Identify the differences between private and public network addressing

 

schemes.

11

2.9

Identify and differentiate between the following IP (Internet Protocol)

 

addressing methods:

 

 

Static

3

 

Dynamic

3

 

Self-assigned (APIPA (Automatic Private Internet Protocol Addressing))

3

DOMAIN 2.0 PROTOCOLS AND STANDARDS

Appendix A

 

709

 

Table A-2 Continued

 

 

 

 

 

 

 

 

 

 

 

 

 

Objective

Chapter

 

 

 

 

 

2.10 Define the purpose, function and use of the following protocols used in

 

 

 

 

the TCP/IP (Transmission Control Protocol/Internet Protocol) suite:

 

 

 

 

TCP (Transmission Control Protocol)

2, 4

 

 

 

UDP (User Datagram Protocol)

2, 4

 

 

 

FTP (File Transfer Protocol)

4

 

 

 

SFTP (Secure File Transfer Protocol)

14

 

 

 

TFTP (Trivial File Transfer Protocol)

4

 

 

 

SMTP (Simple Mail Transfer Protocol)

11

 

 

 

HTTP (Hypertext Transfer Protocol)

2, 4

 

 

 

HTTPS (Hypertext Transfer Protocol Secure)

14

 

 

 

POP3 / IMAP4 (Post Office Protocol version 3 / Internet Message Access

 

 

 

 

Protocol version 4)

11

 

 

 

Telnet

4

 

 

 

SSH (Secure Shell)

14

 

 

 

ICMP (Internet Control Message Protocol)

4

 

 

 

ARP / RARP (Address Resolution Protocol/Reverse Address Resolution

 

 

 

 

Protocol)

4

 

 

 

NTP (Network Time Protocol)

4

 

 

 

NNTP (Network News Transport Protocol)

4

 

 

 

SCP (Secure Copy Protocol)

14

 

 

 

LDAP (Lightweight Directory Access Protocol)

8

 

 

 

IGMP (Internet Group Multicast Protocol)

4

 

 

 

LPR (Line Printer Remote)

9

 

 

 

2.11 Define the function of TCP / UDP (Transmission Control Protocol / User

 

 

 

 

Datagram Protocol) ports.

4

 

 

 

2.12 Identify the well-known ports associated with the following commonly

 

 

 

 

used services and protocols:

4

 

 

 

20 FTP (File Transfer Protocol)

4

 

 

 

21 FTP (File Transfer Protocol)

4

 

 

 

22 SSH (Secure Shell)

4

 

 

 

23 Telnet

4

 

 

 

25 SMTP (Simple Mail Transfer Protocol)

4

 

 

 

53 DNS (Domain Name Service)

4

 

 

 

69 TFTP (Trivial File Transfer Protocol)

4

 

 

 

80 HTTP (Hypertext Transfer Protocol)

4

 

 

 

110 POP3 (Post Office Protocol version 3)

4

 

 

 

119 NNTP (Network News Transport Protocol)

4

 

 

 

710

 

Appendix A NETWORK+ EXAMINATION OBJECTIVES

 

 

 

 

 

 

 

 

 

 

 

 

Table A-2 Continued

 

 

 

 

 

 

 

 

 

 

Objective

Chapter

 

 

 

 

 

 

 

 

 

123 NTP (Network Time Protocol)

4

 

 

 

143 IMAP4 (Internet Message Access Protocol version 4)

4

 

 

 

443 HTTPS (Hypertext Transfer Protocol Secure)

4

 

 

 

2.13 Identify the purpose of network services and protocols (For example:

 

 

 

 

DNS (Domain Name Service), NAT (Network Address Translation), ICS

 

 

 

 

(Internet Connection Sharing), WINS (Windows Internet Name Service),

 

 

 

 

SNMP (Simple Network Management Protocol), NFS (Network File

 

 

 

 

System), Zeroconf (Zero configuration), SMB (Server Message Block), AFP

 

 

 

 

(Apple File Protocol), LPD (Line Printer Daemon) and Samba).

4, 8, 9, 11, 14, 15

 

 

 

2.14 Identify the basic characteristics (For example: speed, capacity and

 

 

 

 

media) of the following WAN (Wide Area Networks) technologies:

 

 

 

 

Packet switching

6

 

 

 

Circuit switching

6

 

 

 

ISDN (Integrated Services Digital Network)

7

 

 

 

FDDI (Fiber Distributed Data Interface)

6

 

 

 

T1 (T Carrier level 1) / E1 / J1

7

 

 

 

T3 (T Carrier level 3) / E3 / J3

7

 

 

 

OCx (Optical Carrier)

7

 

 

 

X.25

7

 

 

 

2.15 Identify the basic characteristics of the following internet access

 

 

 

 

technologies:

 

 

 

 

xDSL (Digital Subscriber Line)

7

 

 

 

Broadband Cable (Cable modem)

7

 

 

 

POTS / PSTN (Plain Old Telephone Service / Public Switched Telephone

 

 

 

 

Network)

7

 

 

 

Satellite

7

 

 

 

Wireless

7

 

 

 

2.16 Define the function of the following remote access protocols and services:

 

 

 

 

RAS (Remote Access Service)

7

 

 

 

PPP (Point-to-Point Protocol)

7

 

 

 

SLIP (Serial Line Internet Protocol)

7

 

 

 

PPPoE (Point-to-Point Protocol over Ethernet)

7

 

 

 

PPTP (Point-to-Point Tunneling Protocol)

7

 

 

 

VPN (Virtual Private Network)

7

 

 

 

RDP (Remote Desktop Protocol)

7

DOMAIN 3.0 NETWORK IMPLEMENTATION

Appendix A

 

711

 

Table A-2 Continued

 

 

 

 

 

 

 

 

 

 

 

 

 

Objective

Chapter

 

 

 

 

 

2.17 Identify the following security protocols and describe their purpose and

 

 

 

 

function:

 

 

 

 

IPSec (Internet Protocol Security)

14

 

 

 

L2TP (Layer 2 Tunneling Protocol)

7

 

 

 

SSL (Secure Sockets Layer)

14

 

 

 

WEP (Wired Equivalent Privacy)

14

 

 

 

WPA (Wi-Fi Protected Access)

14

 

 

 

802.1x

14

 

 

 

2.18 Identify authentication protocols (For example: CHAP (Challenge

 

 

 

 

Handshake Authentication Protocol), MS-CHAP (Microsoft Challenge

 

 

 

 

Handshake Authentication Protocol), PAP (Password Authentication Protocol),

 

 

 

 

RADIUS (Remote Authentication Dial-In User Service), Kerberos and EAP

 

 

 

 

(Extensible Authentication Protocol)).

14

 

 

 

 

 

 

 

 

Domain 3.0 Network Implementation—

25% of Examination

Table A-3 Network+ Examination Objectives—Network Implementation

Objective

Chapter

3.1 Identify the basic capabilities (For example: client support, interoperability,

 

authentication, file and print services, application support and security) of the

 

following server operating systems to access network resources:

 

UNIX / Linux / Mac OS X Server

9

Netware

10

Windows

8

Appleshare IP (Internet Protocol)

9

3.2 Identify the basic capabilities needed for client workstations to connect to

 

and use network resources (For example: media, network protocols and peer and

 

server services).

3, 4, 8

3.3 Identify the appropriate tool for a given wiring task (For example: wire

 

crimper, media tester / certifier, punch down tool or tone generator).

3

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]