Free CompTIA Network+ Study Guide
Free CompTIA Network+ Study Guide
Certiology’s CompTIA Network+ ( Network Plus ) N10-005 Computer Network Technician Study guide, Notes and Tutorials are exactly what you need to prepare for your CompTIA Network+ ( Network Plus ) or N+ final exam.
Our free CompTIA Network+ ( Network Plus ) or N+ Study Guide gives you the opportunity to identify any knowledge gaps so you can refine your study strategy and ensure a passing score!
1.0 Networking Concepts
1.1 Compare the layers of the OSI and TCP/IP models.
- OSI model:
- TCP/IP model:
- Network Interface Layer
- Internet Layer
- Transport Layer
- Application Layer
- (Also described as: Link Layer, Internet Layer, Transport Layer, Application Layer)
1.2 Classify how applications, devices, and protocols relate to the OSI model
- layers.
- MAC address
- IP address
- EUI-64
- Frames
- Packets
- Switch
- Router
- Multilayer switch
- Hub
- Encryption devices
- Cable
- NIC
- Bridge
1.3 Explain the purpose and properties of IP addressing.
- Classes of addresses
- A, B, C and D
- Public vs. Private
- Classless (CIDR)
- IPv4 vs. IPv6 (formatting)
- MAC address format
- Subnetting
- Multicast vs. unicast vs. broadcast
- APIPA
1.4 Explain the purpose and properties of routing and switching.
- EIGRP
- OSPF
- RIP
- Link state vs. distance vector vs. hybrid
- Static vs. dynamic
- Routing metrics
- Hop counts
- MTU, bandwidth
- Costs
- Latency
- Next hop
- Spanning-Tree Protocol
- VLAN (802.1q)
- Port mirroring
- Broadcast domain vs. collision domain
- IGP vs. EGP
- Routing tables
- Convergence (steady state)
1.5 Identify common TCP and UDP default ports.
- SMTP – 25
- HTTP – 80
- HTTPS – 443
- FTP – 20, 21
- TELNET – 23
- IMAP – 143
- RDP – 3389
- SSH – 22
- DNS – 53
- DHCP – 67, 68
1.6 Explain the function of common networking protocols.
- TCP
- FTP
- UDP
- TCP/IP suite
- DHCP
- TFTP
- DNS
- HTTPS
- HTTP
- ARP
- SIP (VoIP)
- RTP (VoIP)
- SSH
- POP3
- NTP
- IMAP4
- Telnet
- SMTP
- SNMP2/3
- ICMP
- TLS
1.7 Summarize DNS concepts and its components.
1.8 Given a scenario, implement the following network troubleshooting
- methodology
- Identify the problem:
- Information gathering
- Identify symptoms
- Question users
- Determine if anything has changed
- Establish a theory of probable cause
- Question the obvious
- Test the theory to determine cause:
- Once theory is confirmed determine next steps to resolve problem.
- If theory is not confirmed, re-establish new theory or escalate.
- Establish a plan of action to resolve the problem and identify potential effects
- Implement the solution or escalate as necessary
- Verify full system functionality and if applicable implement preventative measures
- Document findings, actions and outcomes
1.9 Identify virtual network components.
- Virtual switches
- Virtual desktops
- Virtual servers
- Virtual PBX
- Onsite vs. offsite
- Network as a Service (NaaS)
2.0 Network Installation and Configuration
2.1 Given a scenario, install and configure routers and switches.
- Routing tables
- NAT
- PAT
- VLAN (trunking)
- Managed vs. unmanaged
- Interface configurations
- Full duplex
- Half duplex
- Port speeds
- IP addressing
- MAC filtering
- PoE
- Traffic filtering
- Diagnostics
- VTP configuration
- QoS
- Port mirroring
2.2 Given a scenario, install and configure a wireless network.
- WAP placement
- Antenna types
- Interference
- Frequencies
- Channels
- Wireless standards
- SSID (enable/disable)
- Compatibility (802.11 a/b/g/n)
2.3 Explain the purpose and properties of DHCP.
- Static vs. dynamic IP addressing
- Reservations
- Scopes
- Leases
- Options (DNS servers, suffixes)
2.4 Given a scenario, troubleshoot common wireless problems.
- Interference
- Signal strength
- Configurations
- Incompatibilities
- Incorrect channel
- Latency
- Encryption type
- Bounce
- SSID mismatch
- Incorrect switch placement
2.5 Given a scenario, troubleshoot common router and switch problems.
- Switching loop
- Bad cables/improper cable types
- Port configuration
- VLAN assignment
- Mismatched MTU/MUT black hole
- Power failure
- Bad/missing routes
- Bad modules (SFPs, GBICs)
- Wrong subnet mask
- Wrong gateway
- Duplicate IP address
- Wrong DNS
2.6 Given a set of requirements, plan and implement a basic SOHO network.
- List of requirements
- Cable length
- Device types/requirements
- Environment limitations
- Equipment limitations
- Compatibility requirements
3.0 Network Media and Topologies
3.1 Categorize standard media types and associated properties.
- Fiber:
- Multimode
- Singlemode
- Copper:
- Plenum vs. non-plenum
- Media converters:
- Singlemode fiber to Ethernet
- Multimode fiber to Ethernet
- Fiber to Coaxial
- Singlemode to multimode fiber
- Distance limitations and speed limitations
- Broadband over powerline
3.2 Categorize standard connector types based on network media.
- Fiber:
- ST
- SC
- LC
- MTRJ
- Copper:
- RJ-45
- RJ-11
- BNC
- F-connector
- DB-9 (RS-232)
- Patch panel
- 110 block (T568A, T568B)
3.3 Compare and contrast different wireless standards.
- 802.11 a/b/g/n standards
- Distance
- Speed
- Latency
- Frequency
- Channels
- MIMO
- Channel bonding
3.4 Categorize WAN technology types and properties.
- Types:
- T1/E1
- T3/E3
- DS3
- OCx
- SONET
- SDH
- DWDM
- Satellite
- ISDN
- Cable
- DSL
- Cellular
- WiMAX
- LTE
- HSPA+
- Fiber
- Dialup
- PON
- Frame relay
- ATMs
- Properties:
- Circuit switch
- Packet switch
- Speed
- Transmission media
- Distance
3.5 Describe different network topologies.
- MPLS
- Point to point
- Point to multipoint
- Ring
- Star
- Mesh
- Bus
- Peer-to-peer
- Client-server
- Hybrid
3.6 Given a scenario, troubleshoot common physical connectivity problems.
- Cable problems:
- Bad connectors
- Bad wiring
- Open, short
- Split cables
- DB loss
- TXRX reversed
- Cable placement
- EMI/Interference
- Distance
- Cross-talk
3.7 Compare and contrast different LAN technologies.
- Types:
- Ethernet
- 10BaseT
- 100BaseT
- 1000BaseT
- 100BaseTX
- 100BaseFX
- 1000BaseX
- 10GBaseSR
- 10GBaseLR
- 10GBaseER
- 10GBaseSW
- 10GBaseLW
- 10GBaseEW
- 10GBaseT
- Properties:
- CSMA/CA
- Broadcast
- Collision
- Bonding
- Speed
- Distance
3.8 Identify components of wiring distribution.
- IDF
- MDF
- Demarc
- Demarc extension
- Smart jack
- CSU/DSU
4.0 Network Management
4.1 Explain the purpose and features of various network appliances.
- Load balancer
- Proxy server
- Content filter
- VPN concentrator
4.2 Given a scenario, use appropriate hardware tools to troubleshoot connectivity issues.
- Cable tester
- Cable certifier
- Crimper
- Butt set
- Toner probe
- Punch down tool
- Protocol analyzer
- Loop back plug
- TDR
- OTDR
- Multimeter
- Environmental monitor
4.3 Given a scenario, use appropriate software tools to troubleshoot connectivity issues.
- Protocol analyzer
- Throughput testers
- Connectivity software
- Ping
- Tracert/traceroute
- Dig
- Ipconfig/ifconfig
- Nslookup
- Arp
- Nbtstat
- Netstat
- Route
4.4 Given a scenario, use the appropriate network monitoring resource to analyze traffic.
- SNMP
- SNMPv2
- SNMPv3
- Syslog
- System logs
- History logs
- General logs
- Traffic analysis
- Network sniffer
4.5 Describe the purpose of configuration management documentation.
- Wire schemes
- Network maps
- Documentation
- Cable management
- Asset management
- Baselines
- Change management
4.6 Explain different methods and rationales for network performance optimization.
- Methods:
- QoS
- Traffic shaping
- Load balancing
- High availability
- Caching engines
- Fault tolerance
- CARP
- Reasons:
- Latency sensitivity
- High bandwidth applications (VoIP, video applications, unified communications)
- Uptime
5.0 Network Security
5.1 Given a scenario, implement appropriate wireless security measures.
- Encryption protocols:
- WEP
- WPA
- WPA2
- WPA Enterprise
- MAC address filtering
- Device placement
- Signal strength
5.2 Explain the methods of network access security.
- ACL:
- MAC filtering
- IP filtering
- Port filtering
- Tunneling and encryption:
- Remote access:
5.3 Explain methods of user authentication.
- PKI
- Kerberos
- AAA (RADIUS, TACACS+)
- Network access control (802.1x, posture assessment)
- CHAP
- MS-CHAP
- EAP
- Two-factor authentication
- Multifactor authentication
- Single sign-on
5.4 Explain common threats, vulnerabilities, and mitigation techniques.
- Wireless:
- War driving
- War chalking
- WEP cracking
- WPA cracking
- Evil twin
- Rogue access point
- Attacks:
- DoS
- DDoS
- Man in the middle
- Social engineering
- Virus
- Worms
- Buffer overflow
- Packet sniffing
- FTP bounce
- Smurf
- Mitigation techniques:
- Training and awareness
- Patch management
- Policies and procedures
- Incident response
5.5 Given a scenario, install and configure a basic firewall.
- Types:
- Software and hardware firewalls
- Port security
- Stateful inspection vs. packet filtering
- Firewall rules:
- Block/allow
- Implicit deny
- ACL
- NAT/PAT
- DMZ
5.6 Categorize different types of network security appliances and methods.
- IDS and IPS:
- Behavior based
- Signature based
- Network based
- Host based
- Vulnerability scanners:
- NESSUS
- NMAP
- Methods:
- Honeypots
- Honeynets