08.02.2015 Views

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index 189<br />

Simple network management<br />

protocol (SNMP), 85–86, 160,<br />

168<br />

Single mode fiber (SMF) cable, 33<br />

Single sign-on (SSO), 132–133<br />

Site-to-site VPN, 6<br />

Site survey, 69<br />

Smart jack, 27<br />

SONET, <strong>11</strong>1<br />

Spanning tree protocol (STP), 41<br />

Spread spectrum technology, 57<br />

Standard connector (SC), 20, 30<br />

Star topology (hierarchical),<br />

characteristics of, 9–10<br />

Static addressing, 96<br />

Storage area network (SAN), 15<br />

Straight tip (ST) connector, 20, 30<br />

Subnet mask, 94<br />

custom, 94<br />

default, 94<br />

determination of, 95<br />

Subnetting, 94<br />

Supernetting, 94<br />

Switched port analyzer (SPAN), 41<br />

Switches, 39<br />

multilayer, 40<br />

troubleshooting, 166<br />

Switching<br />

circuit, 108<br />

network performance improvement<br />

with, 40<br />

packet, 108<br />

routers, 47<br />

Symmetric DSL (SDSL), <strong>11</strong>2<br />

Synchronous optical network<br />

(SONET), <strong>11</strong>1<br />

T<br />

T/E/J carrier protocol, 109<br />

TCP/IP. See Transmission control<br />

protocol/internet protocol<br />

Telnet, 84, 168<br />

telnet command, 166<br />

Temporal key integrity protocol<br />

(TKIP), 62<br />

Terminal access controller access<br />

control system (TACACS), 136<br />

TACACS+, 136–137<br />

vulnerabilities and attacks with,<br />

137<br />

Three-factor authentication, 132<br />

Time domain reflectometer (TDR), 24<br />

Token Ring network, 39<br />

Token signal, 10<br />

Token technology, 132<br />

Tone generator, 24, 162<br />

traceroute command, 161<br />

tracert command, 157–158<br />

Transceivers, 33<br />

Transmission control<br />

protocol/internet protocol, 89<br />

addressing, troubleshooting, 166<br />

hijacking, 130<br />

stack, troubleshooting, 165<br />

Transport driver interface (TDI), 79<br />

Transport layer<br />

characteristics of, 76<br />

functions of, 76, 157<br />

troubleshooting, 166<br />

Transport layer security (TLS), 59<br />

Trunking, 41<br />

Tunneling protocols, VPN, 6<br />

Twisted-pair cable, 20<br />

preparation of, 25–26<br />

Two-factor authentication, 132<br />

U<br />

Unicast traffic, 98<br />

V<br />

Variable length subnet mask (VLSM),<br />

95<br />

Virtual local area network (VLAN), 41<br />

characteristics of, 7<br />

Virtual private network (VPN), 127<br />

protocols, 7<br />

remote access, 7<br />

site-to-site, 6<br />

tunneling protocol, 6<br />

VLAN. See Virtual local area network<br />

Voice over Internet Protocol (VoIP),<br />

51<br />

VPN. See Virtual private network<br />

W<br />

WAN. See Wide area network<br />

War driving, 67<br />

WEP. See Wireless equivalent privacy<br />

Wi-Fi protected access (WPA), 62<br />

Wide area network (WAN), 12<br />

characteristics of, 13<br />

definition of, 107<br />

E-mail process in, 14<br />

protocols and properties, 108–<strong>11</strong>1<br />

Windows Internet name service<br />

(WINS), 83<br />

Windows Sockets, 84<br />

Windows Vista Business, 69<br />

Windows XP Professional, 69<br />

Wireless application protocol (WAP)<br />

networks, 56<br />

Wireless communication, 56–58<br />

Wireless equivalent privacy (WEP), 61<br />

characteristics, 62<br />

creating privacy with, 63<br />

Wireless ISP (WISP), <strong>11</strong>5<br />

Wireless local area network (WLAN),<br />

56<br />

Wireless media, 33<br />

Wireless network, 50, 55, 58<br />

active attacks on, 67–69<br />

ad hoc and infrastructure, 60<br />

concepts, 56–66<br />

detecting, 66<br />

IEEE 802.<strong>11</strong> standards for, 59–60<br />

jamming attacks on, 69<br />

passive attacks on, 66–67<br />

protocols and operation, 58<br />

RF and antenna behaviors, 55<br />

security, 69<br />

wireless communication in, 56–58<br />

Wireless telephony application<br />

(WTA), 58<br />

Wireless topology<br />

characteristics of radio<br />

frequency-based, <strong>11</strong>, 12<br />

potential issues in, 12<br />

Wireless transport layer security<br />

(WTLS), 59<br />

Wireless wide area network (WWAN),<br />

<strong>11</strong>5<br />

Wire map tester, 24<br />

Wiretapping, 22<br />

Wiring schematics, 146<br />

WWAN. See Wireless wide area<br />

network<br />

X<br />

X.25 network, <strong>11</strong>1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!