Title | |
---|---|
no bookmarked, confident, or note marked bookmark popover collapsed
1.2.1
Identifying network topologies
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.3.7
Understanding functions of OSI layers
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.3.8
Installing a NIC
|
Intermediate
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.4.6
Obtaining MAC address
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.5.9
Understanding IEEE wireless standards
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.5.10
Creating a network manually
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.5.11
Connecting Cable Internet Access for your Network
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.5.12
Configuring Windows 10 Wireless Settings
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.5.13
Connecting a Wireless Router to a Laptop
|
Intermediate
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.6.1
Assembling Components to Complete the Workstation
|
Beginner
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.6.2
Connecting a Workstation to the LAN and Configuring IPv4 Properties
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.6.3
Connecting a New Workstation to the Internet
|
Intermediate
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.7.1
Checking IP connectivity between two network devices
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.7.2
Understanding ipconfig commands
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
2.2.10
Connecting Patch Cables between the Patch Panel and Switch Ports
|
Beginner
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
2.4.5
Terminating a cable with an RJ-45 plug
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.2.10
Understanding types of dispersion
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.2.11
Identifying components of an optical fiber
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.4.2
Identifying fiber connectors
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.4.3
Understanding intermediate components between transmitter and receiver
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.4.4
Understanding characteristics of light detectors
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.4.5
Preparing a Temporary Server for the Network or Internet Connection
|
Beginner
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.5.5
Understanding optical ethernet numeric
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
4.2.13
Configuring a Wireless Client
|
Intermediate
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
4.3.7
Connecting a system to a wireless network
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
4.4.14
Turning on bluetooth
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
4.4.15
Understanding WiMAX
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
4.4.16
Understanding RFID
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
4.4.17
Identifying wireless protocols
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.3.4
Using a switch to interconnect the networking devices
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.3.5
Connecting a hub to a switch
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.3.6
Using ping command
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.3.7
Understanding modes to forward frames
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.4.5
Identifying components of a Cisco 2800 series router
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.4.6
Identifying network symbols
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.5.2
Connecting systems to the Internet through a router
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.2.8
Identifying TCP/IP protocol layers
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.2.9
Identifying TCP/IP layers
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.2.10
Identifying abbreviations for various Internet layer protocols
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.2.11
Viewing TCP frame details using Network Monitor
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.3.1
Converting a Decimal Number to Binary
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.4.2
Configuring IPv4 address
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.4.3
Obtaining Automatic Private IP Addressing
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.4.4
Configuring Automatic Private IP Addressing
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.5.4
Using a Subnet Calculator
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.7.4
Understanding types of IPv6 data flows
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.7.5
Configuring and testing IPv6 addresses
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.7.6
Adding and removing an IPv6 address
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
7.2.2
Understanding types of VLANs
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
7.3.6
Configuring IP address on a switch interface
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
7.4.1
Identifying Spanning-Tree Protocol states
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
7.6.4
Identifying benefits of PoE
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
8.4.7
Understanding Router Prompts
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
8.4.8
Configuring password protection
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
9.2.15
Understanding commands used to configure static routing
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
9.3.8
Understanding route metrics
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
9.3.9
Learning the issues associated with dynamic routing protocols
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
9.8.3
Understanding components of EIGRP
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
9.8.4
Displaying route summary
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
9.9.2
Configuring IPv6 routing
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.2.4
Understanding CSU/DSU alarm modes
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.3.7
Checking properties of and deleting a dial-up connection
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.3.8
Creating a dial-up connection
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.3.9
Identifying client and server
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.3.10
Connecting Devices in a Peer- To- Peer Architecture
|
Beginner
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.3.11
Adding static routes in RRAS
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.4.1
Understanding Ethernet service types
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.5.7
Creating IPv6 scope
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.5.8
Configuring a DHCP Role with Error Notification
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.5.9
Creating DNS domains
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.5.10
Connecting the DHCP server and laptop to the VLAN
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.5.11
Adding DNS server
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.5.12
Using the nslookup command
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
11.2.4
Installing wireshark
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
11.2.5
Capturing packet using Wireshark
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
11.4.4
Viewing system reliability details
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
11.5.7
Configuring IP address on a router's interface
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
11.6.2
Finding out switched path
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
11.8.2
Diagnosing Networking Issues
|
Intermediate
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
11.9.16
Understanding troubleshooting approaches based on the OSI...
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.2.7
Using the netstat command
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.2.8
Identifying strategies for password protection
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.2.9
Scanning using nmap
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.3.2
Identifying attack types
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.3.3
Identifying the steps of IP address spoofing
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.4.7
Identifying stages of a forensics examination
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.4.8
Running Antivirus
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.4.9
Understanding firewall technologies
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.4.10
Creating a new inbound rule
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.4.11
Setting Up a DMZ on a SOHO Router
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.4.12
Turning on Windows Firewall
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.6.6
Connecting to a server using Remote Desktop Connection
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.6.7
Analyzing network paths with tracert
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.6.8
Creating a remote access VPN connection
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.6.9
Configuring VPN client in Windows 10
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.6.10
Configuring VPN client in Windows Server 2016
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.6.11
Understanding types of Virtual Private Networks
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.7.3
Configuring a new server
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.7.4
Configuring the SSID
|
Intermediate
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.7.5
Connecting to a Password Protected Network
|
Beginner
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
12.7.6
Configuring a client system to get event logs
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
13.2.4
Installing Hyper-V
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
13.2.5
Creating a new virtual machine
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
13.2.6
Performing a clean install of Windows 10
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
13.2.7
Creating a virtual switch
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
13.3.3
Identifying cloud computing categories
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
13.3.4
Understanding cloud infrastructures
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
13.4.6
Understanding storage technologies used in a SAN
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.3.1
Understanding federal laws
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.4.9
Learning about change management software
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.4.10
Understanding service agreements
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.4.11
Identifying steps in incident response
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.4.12
Configuring password policy
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.4.13
Changing Passwords for the Router
|
Intermediate
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.5.5
Understanding metrics of disaster recovery
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.5.6
Understanding types of backups
|
Unattempted
|
no bookmarked, confident, or note marked bookmark popover collapsed
14.5.7
Understanding types of disaster recovery sites
|
Unattempted
|