Exam Insights |
|
xxv | |
Self-Assessment |
|
xxxvii | |
|
|
1 | (46) |
|
A Brief History of Networking |
|
|
2 | (1) |
|
|
2 | (4) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (4) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (5) |
|
Logical Network Topologies |
|
|
11 | (1) |
|
Physical Network Topologies |
|
|
11 | (4) |
|
|
15 | (1) |
|
|
15 | (1) |
|
Metropolitan Area Network (MAN) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (7) |
|
Network Interface Card (NIC) |
|
|
17 | (1) |
|
|
17 | (4) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (3) |
|
Future ISO 8802 Standards |
|
|
26 | (1) |
|
|
26 | (3) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
Network Operating Systems |
|
|
29 | (2) |
|
|
29 | (1) |
|
Microsoft Windows NT and Windows 2000 |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
Troubleshooting Challenges |
|
|
31 | (7) |
|
|
32 | (1) |
|
|
32 | (1) |
|
Network Access Challenges |
|
|
33 | (1) |
|
|
33 | (2) |
|
Troubleshooting Methodology |
|
|
35 | (3) |
|
|
38 | (1) |
|
|
38 | (4) |
|
|
42 | (5) |
|
|
47 | (42) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (5) |
|
|
53 | (1) |
|
|
53 | (2) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
Reserved and Private IP Addresses |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (2) |
|
|
60 | (1) |
|
|
61 | (1) |
|
Internet Control Message Protocol |
|
|
61 | (1) |
|
Address Resolution Protocol |
|
|
61 | (1) |
|
Reverse Address Resolution Protocol |
|
|
61 | (1) |
|
|
61 | (10) |
|
|
62 | (3) |
|
|
65 | (1) |
|
|
66 | (1) |
|
Trivial File Transfer Protocol |
|
|
67 | (1) |
|
|
67 | (1) |
|
Dynamic Host Configuration Protocol |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
Simple Mail Transfer Protocol |
|
|
71 | (1) |
|
Post Office Protocol (POP3) |
|
|
71 | (1) |
|
|
72 | (1) |
|
Internet Message Access Protocol |
|
|
72 | (1) |
|
|
72 | (2) |
|
|
74 | (4) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
Multipoint Access and Point-to-Point |
|
|
78 | (1) |
|
Troubleshooting Challenges |
|
|
79 | (2) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (3) |
|
|
85 | (4) |
|
|
89 | (34) |
|
|
91 | (2) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (13) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (3) |
|
|
99 | (1) |
|
|
99 | (2) |
|
|
101 | (1) |
|
|
101 | (2) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (2) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (6) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (2) |
|
|
112 | (1) |
|
|
113 | (1) |
|
Troubleshooting Challenges |
|
|
114 | (3) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (3) |
|
|
120 | (3) |
|
|
123 | (30) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (3) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
129 | (4) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (2) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (3) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (2) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (2) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
Troubleshooting Challenges |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (3) |
|
|
149 | (4) |
|
|
153 | (30) |
|
|
155 | (2) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (2) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
Collaboration Mail Servers |
|
|
162 | (1) |
|
SMTP, POP3, and IMAP4 Mail Servers |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (2) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (2) |
|
|
169 | (2) |
|
|
170 | (1) |
|
|
171 | (1) |
|
Troubleshooting Challenges |
|
|
171 | (5) |
|
|
172 | (3) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (3) |
|
|
179 | (4) |
|
|
183 | (42) |
|
|
184 | (3) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
187 | (4) |
|
|
189 | (1) |
|
|
189 | (2) |
|
|
191 | (1) |
|
Implementing Security: Authentication |
|
|
191 | (2) |
|
|
192 | (1) |
|
|
193 | (4) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (3) |
|
|
197 | (4) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
Monitoring and Maintenance |
|
|
201 | (3) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
204 | (5) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
Exploitation of Holes and Bugs |
|
|
208 | (1) |
|
|
209 | (4) |
|
|
210 | (1) |
|
Concentric Rings of Security |
|
|
211 | (1) |
|
|
212 | (1) |
|
Breaking News about Security |
|
|
213 | (2) |
|
|
213 | (1) |
|
|
214 | (1) |
|
Troubleshooting Challenges |
|
|
215 | (1) |
|
|
215 | (2) |
|
|
217 | (4) |
|
|
221 | (4) |
|
|
225 | (54) |
|
|
226 | (3) |
|
|
229 | (2) |
|
|
229 | (2) |
|
|
231 | (27) |
|
|
233 | (1) |
|
|
234 | (2) |
|
|
236 | (1) |
|
|
236 | (1) |
|
Naming Your Document: The Title Element |
|
|
237 | (2) |
|
|
239 | (7) |
|
|
246 | (1) |
|
|
246 | (3) |
|
|
249 | (3) |
|
|
252 | (2) |
|
|
254 | (4) |
|
|
258 | (11) |
|
|
259 | (1) |
|
|
260 | (2) |
|
|
262 | (2) |
|
|
264 | (2) |
|
|
266 | (3) |
|
|
269 | (1) |
|
Creating Browser Neutral Web Pages |
|
|
269 | (1) |
|
|
269 | (1) |
|
Troubleshooting Challenges |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
271 | (3) |
|
|
274 | (5) |
|
Creating Interactive Web Pages with Multimedia |
|
|
279 | (34) |
|
|
280 | (13) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (2) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
288 | (4) |
|
Placing Images in Your Web Page |
|
|
292 | (1) |
|
|
293 | (2) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (10) |
|
|
296 | (2) |
|
|
298 | (7) |
|
Troubleshooting Challenges |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
306 | (4) |
|
|
310 | (3) |
|
|
313 | (50) |
|
|
314 | (2) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
316 | (2) |
|
Cascading Style Sheets (CSSs) |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (3) |
|
|
319 | (2) |
|
|
321 | (1) |
|
|
321 | (1) |
|
Web Application Interfaces |
|
|
321 | (16) |
|
Common Gateway Interface (CGI) |
|
|
322 | (2) |
|
Internet Server API (ISAPI) |
|
|
324 | (1) |
|
ActiveX Components and Dynamic Link Libraries |
|
|
324 | (2) |
|
|
326 | (3) |
|
|
329 | (1) |
|
|
330 | (1) |
|
Client- and Server-Side Programming Languages |
|
|
331 | (4) |
|
Standard Generalized Markup Language (SGML) |
|
|
335 | (1) |
|
Extensible Markup Language (XML) |
|
|
336 | (1) |
|
Extensible Hypertext Markup Language (XHTML) |
|
|
337 | (1) |
|
|
337 | (11) |
|
Open Database Connectivity |
|
|
338 | (1) |
|
Java Database Connectivity (JDBC) |
|
|
338 | (1) |
|
Structured Query Language (SQL) |
|
|
339 | (1) |
|
|
340 | (2) |
|
|
342 | (1) |
|
|
343 | (4) |
|
|
347 | (1) |
|
Basic Database Services and Engines |
|
|
347 | (1) |
|
Creating Database-Driven Web Sites |
|
|
348 | (6) |
|
|
348 | (2) |
|
Updating Content on Demand |
|
|
350 | (1) |
|
Delivering Content on the Fly |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
352 | (1) |
|
Database Access and Security |
|
|
352 | (2) |
|
Troubleshooting Challenges |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
355 | (3) |
|
|
358 | (5) |
|
|
363 | (48) |
|
|
364 | (8) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (2) |
|
|
369 | (2) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (10) |
|
|
372 | (2) |
|
|
374 | (2) |
|
|
376 | (1) |
|
|
376 | (3) |
|
Effective Use of Style Sheets |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (12) |
|
|
382 | (3) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
Designing for Users with Disabilities |
|
|
391 | (2) |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
Listening to Your Customers |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
396 | (3) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
Improving Worker Productivity |
|
|
398 | (1) |
|
Main Components of an Intranet |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
399 | (2) |
|
|
399 | (1) |
|
XML and Related Technologies |
|
|
400 | (1) |
|
The Disappearance of the Web Browser |
|
|
400 | (1) |
|
|
401 | (1) |
|
Troubleshooting Challenges |
|
|
401 | (1) |
|
Client Interaction Challenges |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
403 | (3) |
|
|
406 | (5) |
|
|
411 | (40) |
|
Putting the .com in Commerce |
|
|
412 | (12) |
|
|
412 | (2) |
|
|
414 | (1) |
|
|
415 | (1) |
|
|
416 | (1) |
|
|
417 | (2) |
|
|
419 | (4) |
|
|
423 | (1) |
|
Marketing on the Internet |
|
|
424 | (11) |
|
|
424 | (3) |
|
|
427 | (1) |
|
|
427 | (1) |
|
|
427 | (2) |
|
|
429 | (1) |
|
|
429 | (1) |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
431 | (1) |
|
|
431 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
433 | (2) |
|
|
435 | (4) |
|
Business-to-Consumer (B2C) |
|
|
435 | (2) |
|
Business-to-Business (B2B) |
|
|
437 | (2) |
|
Working in a Global Market |
|
|
439 | (2) |
|
|
440 | (1) |
|
Encryption Technology Restrictions |
|
|
440 | (1) |
|
|
440 | (1) |
|
Importing and Exporting Issues |
|
|
441 | (1) |
|
Troubleshooting Challenges |
|
|
441 | (3) |
|
Organizational Challenges |
|
|
441 | (1) |
|
|
442 | (1) |
|
Customer Service Challenges |
|
|
442 | (1) |
|
|
443 | (1) |
|
Negative Response Challenges |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
444 | (1) |
|
|
444 | (4) |
|
|
448 | (3) |
|
|
451 | (24) |
|
|
452 | (2) |
|
|
452 | (1) |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
454 | (1) |
|
|
454 | (7) |
|
|
455 | (5) |
|
|
460 | (1) |
|
|
461 | (3) |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
464 | (3) |
|
|
465 | (2) |
|
|
467 | (1) |
|
|
467 | (1) |
|
|
468 | (1) |
|
Troubleshooting Challenges |
|
|
469 | (1) |
|
|
469 | (1) |
|
|
470 | (2) |
|
|
472 | (3) |
|
|
475 | (20) |
|
|
495 | (14) |
Appendix A Answers to Review Questions |
|
509 | (14) |
Appendix B i-NET+ Exam Objectives |
|
523 | (2) |
Appendix C Study Resources |
|
525 | (4) |
Appendix D Essential HTML Tags |
|
529 | (12) |
Appendix E List Processor Commands |
|
541 | (6) |
Glossary |
|
547 | (20) |
Index |
|
567 | |