Network Implementation
- Domain 3: Network Implementation
- What You Will Need
- Lab 1: Active Directory Structure and Permissions
- Lab 2: Services and nbtstat
- Lab 3: Wiring, Part II
- Lab 4: VPN and Authentication Re-visited
- Lab 5: Firewalls, Proxies, and Ports
- Lab 6: Anti-Virus Software
- Lab 7: Fault Tolerance
- Lab 8: Disaster Recovery
- Domain 3 Practice Questions
- Answers and Explanations
This chapter builds on your previous learning, and shows how to implement the network technologies and concepts from Chapter 1, "Media and Topologies," and Chapter 2, "Protocols and Standards." You will work with rights and permissions, physical layer implementations, TCP/IP configurations, operating system interoperability, firewalls and anti-virus software, fault tolerance, and backup. There are eight labs in total in this chapter, so let's get started.
Domain 3: Network Implementation
The following is a list of the exam objectives covered in this chapter:
3.1 Identify the basic capabilities (For example: client support, interoperability, authentication, file and print services, application support and security) of the following server operating systems to access network resources: UNIX / Linux / Mac OS X Server, Netware, Windows, Appleshare IP (Internet Protocol).
3.2 Identify the basic capabilities needed for client workstations to connect to and use network resources (For example: media, network protocols and peer and server services).
3.3 Identify the appropriate tool for a given wiring task (For example: wire crimper, media tester / certifier, punch down tool or tone generator).
3.4 Given a remote connectivity scenario comprised of a protocol, an authentication scheme, and physical connectivity, configure the connection. Includes connection to the following servers: UNIX / Linux / MAC OS X Server, Netware, Windows, Appleshare IP (Internet Protocol).
3.5 Identify the purpose, benefits and characteristics of using a firewall.
3.6 Identify the purpose, benefits and characteristics of using a proxy service.
3.7 Given a connectivity scenario, determine the impact on network functionality of a particular security implementation (For example: port blocking / filtering, authentication and encryption).
3.8 Identify the main characteristics of VLANs (Virtual Local Area Networks).
3.9 Identify the main characteristics and purpose of extranets and intranets.
3.10 Identify the purpose, benefits and characteristics of using antivirus software.
3.11 Identify the purpose and characteristics of fault tolerance: Power, Link redundancy, Storage, Services.
3.12 Identify the purpose and characteristics of disaster recovery: Backup / restore, Offsite storage, Hot and cold spares, Hot, warm and cold sites.