Toc 9780138213275
Toc 9780138213275
Access Code
Access interactive study tools on this book’s companion website, including practice test
software, review exercises, a Key Term flash card application, a study planner, and more!
1. Go to www.ciscopress.com/register.
6. Under the book listing, click on the Access Bonus Content link.
When you register your book, your Pearson Test Prep practice test access code will
automatically be populated with the book listing under the Registered Products tab. You
will need this code to access the practice test that comes with this book. You can redeem
the code at PearsonTestPrep.com. Simply choose Pearson IT Certification as your
product group and log into the site with the same credentials you used to register your
book. Click the Activate New Product button and enter the access code. More detailed
instructions on how to redeem your access code for both the online and desktop versions
can be found on the companion website.
If you have any issues accessing the companion website or obtaining your Pearson
Test Prep practice test access code, you can contact our support team by going to
pearsonitp.echelp.org.
Cisco Certified Support Technician CCST
Networking 100-150 Official Cert Guide
Table of Contents
Cover
Title Page
Copyright Page
Contents at a Glance
Contents
Introduction
Part I: Foundations
Chapter 1 Shipping Things
Do I Know This Already? Quiz
Foundation Topics
The Purpose of Packaging
The Physical World
Computer Networks
Addressing
The Physical World
Computer Networks
Hosts and Devices
Packaging Data
What Is a Protocol?
What Is Metadata?
Tunnels
Review All the Key Topics
Key Terms You Should Know
Table of Contents
Concepts and Actions
Chapter 2 Addresses
Do I Know This Already? Quiz
Foundation Topics
Address Scope
Receiver Set
Topological Reach
Physical Addresses
Internet Protocol Version 4
Why Two Addresses?
What an IP Address Represents
Calculating Prefixes and Subnets Using Subnet Masks
Calculating Prefixes and Subnets Using a Skip Chart
Calculating Prefixes Using Skips
Switching Packets
Multiple Hops and Switching
Routing Packets
Using the Routing Table to Forward Packets
Building the Routing Table
Metrics
What Happens Inside a Router?
Routers versus Switches
Routing Loops
Asymmetric Paths
macOS
System Preferences
Table of Contents
The Terminal Command Line
System Information
Linux
Verifying Connectivity
Ping
Traceroute
Fiber
Fiber Cables
Fiber Networking Hardware
Fiber Connectors
Looking into a Fiber
Table of Contents
Pluggable Interfaces
Review All the Key Topics
Key Terms You Should Know
Concepts and Actions
Chapter 8 Wireless Networks
Do I Know This Already? Quiz
Foundation Topics
Free Space Concepts
Wave Propagation and Beam Forming
Wireless Interference
Bandwidth and Signal Strength
The Electromagnetic Spectrum
Wi-Fi
Wi-Fi Components
Wi-Fi Mesh Systems
Advantages and Disadvantages of Wi-Fi
Sharing the Bandwidth
Channel Selection
Cellular
Radio Access Network (RAN)
Mobile Core
Advantages and Disadvantages of Cellular Networks
Satellite
Review All the Key Topics
Key Terms You Should Know
Concepts and Actions
Chapter 9 Bandwidth, Delay, and Jitter
Do I Know This Already? Quiz
Foundation Topics
Bandwidth and Throughput
Throughput versus Bandwidth
Table of Contents
Bandwidth versus Goodput
The Bandwidth of a Link versus Bandwidth of a Path
Jitter
Measuring Network Performance
Speed Test Websites
iPerf
Mikes Traceroute (MTR)
Secure Shell
Hypertext Transfer Protocol
File Transfer Protocol
Review All the Key Topics
Key Terms You Should Know
Concepts and Actions
Chapter 16 Names and Time
Do I Know This Already? Quiz
Table of Contents
Foundation Topics
The Domain Name Space
Domain Names Can Represent an Organization
Domain Names Can Represent a Service
Domain Names Can Represent a Piece of Information
Domain Names and Addresses from a Computer Networking Perspective
Diagnosing DNS
Name Server Lookup
Domain Information Groper
Web-Based DNS Tools
Part IV Security
Chapter 18 Security and Privacy Concepts
Do I Know This Already? Quiz
Foundation Topics
A Security Taxonomy
Shift Left
Privacy Concepts
Personally Identifiable Information
Data Lifecycle
The Law and Privacy
Privacy Tools
Suppression
Noise Injection
Aggregation
Table of Contents
Segmentation
Privacy and Network Operations
Forwarded Packets
Logged Information
Protecting Logged User Information
Gaining Access
Social Engineering
Malware
Supply Chain Attack
Poor Configuration
Man-in-the-Middle Attacks
Lateral Movement
Attack Actions
Command and Control
Data Exfiltration
Ransomware
Denial of Service
Direct (or Burner) Attack
Table of Contents
Reflection Attack
Resource Exhaustion
Encryption
Exchanging Private Keys
Cryptographic Signatures
Management Challenges
The Observability Problem
Failure Rates in the Real World
Connecting to Manage
In-Band and Out-of-Band Management
Connecting Through a Terminal Emulator
Device Management Security Practices
Management Systems
NMS Dashboard
Work Process System
Modeling Language versus Configuration
Cloud-Managed Networks
Packet Captures
Advice to Troubleshooters
Review All the Key Topics
Key Terms You Should Know
Concepts and Actions
Chapter 23 Configuring a Network
Do I Know This Already? Quiz
Foundation Topics
Initial Access
Configuring IPv4
Configuring Routing
Configuring Remote Access and Security
Adding IPv6
Adding a Switch
Review All the Key Topics
Key Terms You Should Know
Concepts and Actions