Скачать книгу

analyzer

      ■ Interface monitoring tools

      ■ Port scanner

      ■ Top talkers/listeners

      ■ SNMP management software

      ■ Trap

      ■ Get

      ■ Walk

      ■ MIBS

      ■ Alerts

      ■ Email

      ■ SMS

      ■ Packet flow monitoring

      ■ SYSLOG

      ■ SIEM

      ■ Environmental monitoring tools

      ■ Temperature

      ■ Humidity

      ■ Power monitoring tools

      ■ Wireless survey tools

      ■ Wireless analyzers

      ✓ 2.2 Given a scenario, analyze metrics and reports from monitoring and tracking performance tools

      ■ Baseline

      ■ Bottleneck

      ■ Log management

      ■ Graphing

      ■ Utilization

      ■ Bandwidth

      ■ Storage

      ■ Network device CPU

      ■ Network device memory

      ■ Wireless channel utilization

      ■ Link status

      ■ Interface monitoring

      ■ Errors

      ■ Utilization

      ■ Discards

      ■ Packet drops

      ■ Interface resets

      ■ Speed and duplex

      ✓ 2.3 Given a scenario, use appropriate resources to support configuration management

      ■ Archives/backups

      ■ Baselines

      ■ On-boarding and off-boarding of mobile devices

      ■ NAC

      ■ Documentation

      ■ Network diagrams (logical/physical)

      ■ Asset management

      ■ IP address utilization

      ■ Vendor documentation

      ■ Internal operating procedures/policies/standards

      ✓ 2.4 Explain the importance of implementing network segmentation

      ■ SCADA systems/Industrial control systems

      ■ Legacy systems

      ■ Separate private/public networks

      ■ Honeypot/honeynet

      ■ Testing lab

      ■ Load balancing

      ■ Performance optimization

      ■ Security

      ■ Compliance

      ✓ 2.5 Given a scenario, install and apply patches and updates

      ■ OS updates

      ■ Firmware updates

      ■ Driver updates

      ■ Feature changes/updates

      ■ Major vs. minor updates

      ■ Vulnerability patches

      ■ Upgrading vs. downgrading

      ■ Configuration backup

      ✓ 2.6 Given a scenario, configure a switch using proper features

      ■ VLAN

      ■ Native VLAN/Default VLAN

      ■ VTP

      ■ Spanning tree (802.1d)/rapid spanning tree (802.1w)

      ■ Flooding

      ■ Forwarding/blocking

      ■ Filtering

      ■ Interface configuration

      ■ Trunking/802.1q

      ■ Tag vs. untag VLANs

      ■ Port bonding (LACP)

      ■ Port mirroring (local vs. remote)

      ■ Speed and duplex

      ■ IP address assignment

      ■ VLAN assignment

      ■ Default gateway

      ■ PoE and PoE+ (802.3af, 802.3at)

      ■ Switch management

      ■ User/passwords

      ■ AAA configuration

      ■ Console

      ■ Virtual terminals

      ■ In band/Out-of-band management

      ■ Managed vs. unmanaged

      ✓ 2.7 Install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices

      ■ Small office/home office wireless router

      ■ Wireless access points

      ■ Device density

      ■ Roaming

      ■ Wireless controllers

      ■ VLAN pooling

      ■ LWAPP

      ■ Wireless bridge

      ■ Site surveys

      ■ Heat maps

      ■ Frequencies

      ■ 2.4 GHz

      ■ 5.0 GHz

      ■ Channels

      ■ Goodput

      ■ Connection types

      ■ 802.11a-ht

      ■ 802.11g-ht

      ■ Antenna placement

      ■ Antenna types

      ■ Omnidirectional

      ■ Unidirectional

      ■ MIMO/MUMIMO

      ■ Signal strength

      ■ Coverage

      ■ Differences between device antennas

      ■ SSID broadcast

      ■ Topologies

      ■ Ad hoc

      ■ Mesh

      ■ Infrastructure

      ■ Mobile devices

      ■ Cell phones

      ■ Laptops

      ■ Tablets

      ■ Gaming devices

      ■ Media devices

      Chapter 3: Domain 3.0 Network Security

      ✓ 3.1 Compare and contrast risk related concepts

      ■ Disaster Recovery

      ■ Business Continuity

      ■ Battery Backups/UPS

      ■ First Responders

      ■ Data Breach

      ■ End user awareness and training

      ■ Single point of failure

      ■ Critical nodes

      ■

Скачать книгу