CompTIA Network+ Review Guide - Jon Buhagiar - E-Book

CompTIA Network+ Review Guide E-Book

Jon Buhagiar

0,0
19,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

Essential last-minute review aid for the updated CompTIA Network+ Exam N10-007 CompTIA Network+ Review Guide Exam N10-007, 4th Edition, is your ideal study companion for preparing for the CompTIA Network+ exam (N10-007). Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CompTIA Network+ Study Guide, CompTIA Network+ Deluxe Study Guide, and CompTIA Network+ Practice Tests. The book is broken into 5 parts, each part corresponding to one of the 5 objective domain areas of the Network+ exam: Network Architecture; Network Operations; Network Security; Troubleshooting; and Industry Standards, Practices, and Network Theory. Readers will also be given access to the comprehensive online Sybex test bank, which includes two bonus practice tests, electronic flashcards, and a glossary of terms that you'll need to know come exam day. CompTIA's Network+ certification covers advances in networking technology, and reflects changes in associated job tasks. The exam places greater emphasis on network implementation and support, and includes expanded coverage of wireless networking topics. This review guide gives you the opportunity to identify your level of knowledge while there's still time to study, and avoid exam-day surprises. * Review network architecture and security * Understand network operations and troubleshooting * Gain insight into industry standards and best practices * Get a firmer grasp of network theory fundamentals If you're looking for a beginning, vendor-neutral networking certification, look no further than CompTIA Network+.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 749

Veröffentlichungsjahr: 2018

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



CompTIA®

Network+®Review Guide Exam N10-007

Fourth Edition

Jon Buhagiar

Senior Acquisitions Editor: Kenyon Brown

Development Editor: David Clark

Technical Editor: Wynn D. Smith, Brent Hamilton

Copy Editor: Elizabeth Welch

Editorial Manager: Pete Gaughan

Production Manager: Kathleen Wisor

Executive Editor: Jim Minatel

Proofreader: Kim Wimpsett

Indexer: John Sleeva

Project Coordinator, Cover: Brent Savage

Cover Designer: Wiley

Cover Image: ©Getty Images, Inc./Jeremy Woodhouse

Copyright © 2018 by John Wiley & Sons, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN: 978-1-119-43214-2

ISBN: 978-1-119-43231-9 (ebk.)

ISBN: 978-1-119-43230-2 (ebk.)

Manufactured in the United States of America

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Control Number: 2018933559

TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA and Network+ are registered trademarks of CompTIA Properties, LLC. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

I dedicate this book to my wife Teresa and my son Joseph. I love you both.

—JAB

Acknowledgments

I’d like to thank the many people who made this book possible. Thanks to: Kenyon Brown at Wiley Publishing, for giving me the opportunity to write this book. David Clark, for working with me as the developmental editor and making the entire process seamless. Wynn D. Smith and Brent Hamilton, working as the technical editors on this book to ensure I didn’t miss any details. Liz Welch, for her many edits that helped make this book a polished product. And the many other people I’ve never met who worked behind the scenes to make this book a success.

About the Author

Jon Buhagiar, BS/ITM, MCSE, CCNA is an information technology professional with two decades of experience in higher education and the private sector.

Jon currently serves as Supervisor of Network Operations at Pittsburgh Technical College. In this role, he manages datacenter and network infrastructure operations and IT operations and is involved in strategic planning of IT projects supporting the quality of education at the college. He also serves as an adjunct instructor in the college’s School of Information Technology department, where he teaches certification courses for Microsoft and Cisco certifications. Jon has taught as an instructor for 18 years with several colleges in the Pittsburgh area, since the introduction of the Windows NT MCSE in 1998.

Jon earned his BS in Information Technology Management from Western Governors University. He also achieved an Associates in Business Management from Pittsburgh Technical College. He has recently earned his Windows Server 2012 R2 MCSE as well as Cisco CCNA Routing & Switching certification. Other certifications include CompTIA Network+, A+, and Project+.

In addition to his professional and teaching roles, he has authored CCNA Routing and Switching Practice Tests: Exam 100-105, Exam 200-105, and Exam 200-125 (Sybex, 2016). He has also served as the technical editor for the second edition of the CompTIA Cloud+ Study Guide (Sybex, 2016), CCNA Security Study Guide: Exam 210-260 (Sybex, 2018), and CCNA Cloud Complete Study Guide: Exam 210-451 and Exam 210-455 (Sybex, 2018). He has spoken at several conferences about spam and email systems. He is an active radio electronics hobbyist and has held a ham radio license for the past 16 years (KB3KGS). He experiments with electronics and has a strong focus on the Internet of Things (IoT).

Contents

Introduction

What Is Network+ Certification?

Is This Book for You?

How Is This Book Organized?

Interactive Online Learning Environment and Test Bank

Tips for Taking the Network+ Exam

How to Contact the Publisher

The Exam Objectives

The Network+ Exam Objectives

Network+ Acronyms

Chapter 1 Domain 1.0: Networking Concepts

1.1 Explain the purposes and uses of ports and protocols.

1.2 Explain devices, applications, protocols and services at their appropriate OSI layers.

1.3 Explain the concepts and characteristics of routing and switching.

1.4 Given a scenario, configure the appropriate IP addressing components.

1.5 Compare and contrast the characteristics of network topologies, types, and technologies.

1.6 Given a scenario, implement the appropriate wireless technologies and configurations.

1.7 Summarize cloud concepts and their purposes.

1.8 Explain the functions of network services.

Review Questions

Chapter 2 Domain 2.0: Infrastructure

2.1 Given a scenario, deploy the appropriate cabling solution.

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

2.3 Explain the purposes and use cases for advanced networking devices.

2.4 Explain the purposes of virtualization and network storage technologies.

2.5 Compare and contrast WAN technologies.

Review Questions

Chapter 3 Domain 3.0: Network Operations

3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.

3.2 Compare and contrast business continuity and disaster recovery concepts.

3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.

3.4 Given a scenario, use remote access methods.

3.5 Identify policies and best practices.

Review Questions

Chapter 4 Domain 4.0: Network Security

4.1 Summarize the purposes of physical security devices.

4.2 Explain authentication and access controls.

4.3 Given a scenario, secure a basic wireless network.

4.4 Summarize common networking attacks.

4.5 Given a scenario, implement network device hardening.

4.6 Explain common mitigation techniques and their purposes.

Review Questions

Chapter 5 Domain 5.0 Network Troubleshooting and Tools

5.1 Explain the network troubleshooting methodology.

5.2 Given a scenario, use the appropriate tool.

5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.

5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues.

5.5 Given a scenario, troubleshoot common network service issues.

Review Questions

Appendix Answers to Review Questions

Chapter 1: Domain 1.0: Networking Concepts

Chapter 2: Domain 2.0: Infrastructure

Chapter 3: Domain 3.0: Network Operations

Chapter 4: Domain 4.0: Network Security

Chapter 5: Domain 5.0 Network Troubleshooting and Tools

Advert

EULA

List of Tables

Chapter 1

TABLE 1.1

TABLE 1.2

TABLE 1.3

TABLE 1.4

TABLE 1.5

Chapter 2

TABLE 2.1

TABLE 2.2

Chapter 3

TABLE 3.1

Chapter 5

TABLE 5.1

List of Illustrations

Chapter 1

FIGURE 1.1

FTP active and passive modes

FIGURE 1.2

An overview of the DHCP process

FIGURE 1.3

UDP segment

FIGURE 1.4

TCP three-way handshake

FIGURE 1.5

TCP sliding window example

FIGURE 1.6

TCP segment

FIGURE 1.7

An IP packet

FIGURE 1.8

The layers of the OSI

FIGURE 1.9

Transport server port binding

FIGURE 1.10

Transport client requests

FIGURE 1.11

Logical network addressing

FIGURE 1.12

Network layer protocol numbers

FIGURE 1.13

The data link layer and the sublayers within

FIGURE 1.14

The LLC sublayer and the network layer

FIGURE 1.15

An Ethernet II frame

FIGURE 1.16

MAC address format

FIGURE 1.17

Hubs, switches, and collision domains

FIGURE 1.18

Two broadcast domains connected with a router

FIGURE 1.19

OSI layers and PDUs

FIGURE 1.20

A broadcast frame and IP packet

FIGURE 1.21

A unicast frame and packet

FIGURE 1.22

A flat switched network

FIGURE 1.23

A network using VLANs

FIGURE 1.24

Routed VLANs

FIGURE 1.25

An 802.1Q frame

FIGURE 1.26

802.1Q trunk link and broadcasts

FIGURE 1.27

Untagging and tagging ports

FIGURE 1.28

Duplicate unicast packets

FIGURE 1.29

A broadcast storm

FIGURE 1.30

Three switches with redundant links

FIGURE 1.31

Three switches with STP calculated

FIGURE 1.32

Backup and alternate ports

FIGURE 1.33

Two firewalls connected to a DMZ

FIGURE 1.34

One firewall connected to a DMZ

FIGURE 1.35

The MAC address learning process

FIGURE 1.36

The basic routing process

FIGURE 1.37

Two-router network

FIGURE 1.38

Default routing example

FIGURE 1.39

EIGRP tables

FIGURE 1.40

IPv6 address example

FIGURE 1.41

Breakdown of an IPv6 global unicast address

FIGURE 1.42

A link-local prefix

FIGURE 1.43

A traffic shaping example

FIGURE 1.44

An 802.1Q frame

FIGURE 1.45

The static NAT process

FIGURE 1.46

Dynamic NAT process

FIGURE 1.47

Port address translation process

FIGURE 1.48

Port forwarding example

FIGURE 1.49

ACL example

FIGURE 1.50

Three-tier model vs. collapsed core model

FIGURE 1.51

Typical FHRP setup

FIGURE 1.52

The ANDing process

FIGURE 1.53

Subnetting of an IP address

FIGURE 1.54

Subnet IDs

FIGURE 1.55

Host ID calculations

FIGURE 1.56

Creating a subnet calculator

FIGURE 1.57

The subnet calculator

FIGURE 1.58

Subnetting for hosts

FIGURE 1.59

Valid host IDs for a 13-bit host ID

FIGURE 1.60

A variable-length subnet mask (VLSM) network

FIGURE 1.61

VLSM worksheet

FIGURE 1.62

A CIDR calculator

FIGURE 1.63

The DHCP DORA process

FIGURE 1.64

The Windows DHCP/static IP address dialog box

FIGURE 1.65

Padding process of EUI-64 addresses

FIGURE 1.66

Bit flipping for EUI-64 addresses

FIGURE 1.67

A typical star topology

FIGURE 1.68

A logical ring topology

FIGURE 1.69

A physical topology of a full mesh

FIGURE 1.70

A comparison of bus networks to SCSI disk networks

FIGURE 1.71

A hybrid topology

FIGURE 1.72

Basic service set example

FIGURE 1.73

Extended service set example

FIGURE 1.74

Mesh WAP example

FIGURE 1.75

The 2.4 GHz channel plan

FIGURE 1.76

The 5 GHz channel plan

FIGURE 1.77

802.11ac data rates vs. distance

FIGURE 1.78

Channel bonding in the 5GHz radio band

FIGURE 1.79

MIMO wireless example

FIGURE 1.80

A Yagi antenna radiation pattern example

FIGURE 1.81

An omnidirectional antenna radiation pattern example

FIGURE 1.82

DNS hierarchy

FIGURE 1.83

Primary and secondary DNS servers

FIGURE 1.84

The Windows DHCP management console

FIGURE 1.85

The DHCP client lease life cycle

FIGURE 1.86

An example of a network router configured with an IP helper

FIGURE 1.87

An example of a DHCP relay agent configured on a server

Chapter 2

FIGURE 2.1

A common UTP cable

FIGURE 2.2

A common STP cable

FIGURE 2.3

Coax cable elements

FIGURE 2.4

Cross-section of solid core vs. stranded core cables

FIGURE 2.5

A typical fiber-optic cable

FIGURE 2.6

An RJ-45 connector

FIGURE 2.7

An RJ-11 connector

FIGURE 2.8

A BNC connector

FIGURE 2.9

A DB-9 (RS-232) connector

FIGURE 2.10

A DB-25 connector

FIGURE 2.11

An F-connector

FIGURE 2.12

An LC connector

FIGURE 2.13

An ST connector

FIGURE 2.14

An SC connector

FIGURE 2.15

An MTRJ connector

FIGURE 2.16

A typical SFP transceiver

FIGURE 2.17

A typical GBIC transceiver

FIGURE 2.18

A QSFP transceiver

FIGURE 2.19

How bidirectional transceivers work

FIGURE 2.20

A 66 block panel

FIGURE 2.21

A 110 block panel

FIGURE 2.22

A typical patch panel

FIGURE 2.23

A typical fiber distribution panel

FIGURE 2.24

TIA/EIA 568A and 568B wiring standard

FIGURE 2.25

Straight-through cable wiring

FIGURE 2.26

Crossover cable wiring

FIGURE 2.27

A typical hardware firewall appliance

FIGURE 2.28

Typical edge router

FIGURE 2.29

Typical managed switches

FIGURE 2.30

Four-port active hub

FIGURE 2.31

WAPs with internal and external antennas

FIGURE 2.32

Wireless LAN controller functionality

FIGURE 2.33

Overview of a proxy server implementation

FIGURE 2.34

Overview of a reverse proxy server implementation

FIGURE 2.35

AAA/RADIUS components

FIGURE 2.36

UC platform and VoIP gateway

FIGURE 2.37

VoIP gateway acting as the PSTN

FIGURE 2.38

VoIP gateway serving POTS

FIGURE 2.39

Hypervisor types

FIGURE 2.40

A typical storage area network

FIGURE 2.41

A comparison between separate SAN and network switching vs. a converged FCoE network

FIGURE 2.42

A DSL network

FIGURE 2.43

The broadband cable network

FIGURE 2.44

A typical satellite network

FIGURE 2.45

Circuit-switched vs. packet-switched

FIGURE 2.46

A typical Frame Relay network

FIGURE 2.47

The PPP protocol suite

Chapter 3

FIGURE 3.1

Hub symbols

FIGURE 3.2

Switch symbols

FIGURE 3.3

Router symbols

FIGURE 3.4

Firewall symbols

FIGURE 3.5

WAP symbols

FIGURE 3.6

Client and server symbols

FIGURE 3.7

Layer 3 multifunction switch symbol

FIGURE 3.8

Connection and network type symbols

FIGURE 3.9

Typical network diagram

FIGURE 3.10

A logical diagram

FIGURE 3.11

A physical diagram

FIGURE 3.12

A conceptual logical diagram

FIGURE 3.13

ANSI/TIA-606-B grid coordinate naming system

FIGURE 3.14

Network cable label wrap

FIGURE 3.15

RAID level 1 (mirroring)

FIGURE 3.16

RAID level 5 (striping with parity)

FIGURE 3.17

RAID level 6 (striping with two parity schemes)

FIGURE 3.18

Redundancy in a network

FIGURE 3.19

Scaling out a web server

FIGURE 3.20

Redundant team of NICs

FIGURE 3.21

LACP port aggregation between two switches

FIGURE 3.22

Nmap tool example

FIGURE 3.23

WSUS computer report

FIGURE 3.24

Manual uninstall of a Windows update

FIGURE 3.25

SNMP monitor graph

FIGURE 3.26

IPsec tunnel phases

FIGURE 3.27

A typical site-to-site VPN

FIGURE 3.28

A typical host-to-site VPN

FIGURE 3.29

Client-to-site VPN connection

FIGURE 3.30

A typical host-to-host VPN

FIGURE 3.31

A modem for out-of-band management

FIGURE 3.32

A router console connection

Chapter 4

FIGURE 4.1

A typical PIR sensor

FIGURE 4.2

A typical biometric reader

FIGURE 4.3

A typical smartcard

FIGURE 4.4

A typical key fob

FIGURE 4.5

A typical combination door lock

FIGURE 4.6

AAA bank analogy

FIGURE 4.7

802.1x switch control

FIGURE 4.8

NAC and 802.1x

FIGURE 4.9

An inline captive portal

FIGURE 4.10

An out-of-band captive portal

FIGURE 4.11

A typical corporate network

FIGURE 4.12

Wireless authentication for 802.1x/EAP

FIGURE 4.13

A typical DMZ with two firewalls

FIGURE 4.14

A typical DMZ with one firewall

FIGURE 4.15

An ACL example

Chapter 5

FIGURE 5.1

A typical pair of cable crimpers

FIGURE 5.2

A cable tester pair

FIGURE 5.3

A time domain reflectometer

FIGURE 5.4

A cable certifier

FIGURE 5.5

A typical punchdown tool

FIGURE 5.6

A punchdown tool punching a wire into a patch panel

FIGURE 5.7

An optical time domain reflectometer

FIGURE 5.8

A tone generator and tracing probe

FIGURE 5.9

An LC fiber-optic loopback plug

FIGURE 5.10

A typical multimeter

FIGURE 5.11

NETSCOUT AirMagnet spectrum analyzer

FIGURE 5.12

Protocol analyzer of a TCP packet

FIGURE 5.13

Android Wifi Analyzer

FIGURE 5.14

Fiber-optic transceivers

FIGURE 5.15

A typical Ethernet jack

FIGURE 5.16

A typical Ethernet switch

FIGURE 5.17

A typical dipole wireless antenna on a WAP

FIGURE 5.18

The DNS query process

FIGURE 5.19

Incorrect /16 netmask in a /24 network

FIGURE 5.20

Incorrect /24 netmask in a /16 network

FIGURE 5.21

An untrusted SSL certificate warning

FIGURE 5.22

A self-signed certificate

FIGURE 5.23

Windows Date and Time dialog box

Guide

Cover

Table of Contents

Introduction

Pages

vii

ix

xi

xxiii

xxiv

xxv

xxvi

xxvii

xxviii

xxix

xxx

xxxi

xxxii

xxxiii

xxxiv

xxxv

xxxvi

xxxvii

xxxviii

xxxix

xl

xli

xlii

xliii

xliv

xlv

xlvi

xlvii

xlviii

xlix

l

li

lii

liii

liv

lv

lvi

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

135

136

137

138

139

140

141

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

Introduction

You may be new to the field of computer networking, or perhaps you are in pursuit of proving your knowledge and understanding of computer networking. In either case, the CompTIA Network+ certification exam is a great start to your professional development. The Network+ certification is considered by employers industry-wide to be proof of the knowledge of networking theory, skill, and systems. The Network+ certification is granted to those individuals who have attained this information and show a basic competency for meeting the needs of both personal and organization computing environments.

The CompTIA Network+ objectives have changed with the introduction of the CompTIA Network+ N10-007 certification exam. This change in objectives and topics from the prior exam was necessary to keep up with the latest technologies used in networks today. The foundation of networking concepts have remained relatively similar, despite the introduction of more advanced technologies. This is one of the reasons the CompTIA Network+ exam is so widely valued by employers. As of this writing, the objectives are current for the Network+ N10-007 certification exam as stated by CompTIA (https://www.comptia.org).

What Is Network+ Certification?

The Computing Technology Industry Association (CompTIA) developed the Network+ certification to be vendor neutral and recognized industry-wide. The Network+ certification is considered the benchmark of networking theory. Candidates who earn the Network+ certification have knowledge of the design, operation, maintenance, security, and troubleshooting of networks. Employers worldwide recognize Network+ certified individuals as having a basic vendor-agnostic networking theory that can be applied to any specific system.

The Network+ certification was originally sponsored by IT industry leaders like IBM, Microsoft, and Compaq, among others. The goal was to create a certification that would give recognition of individuals with a basic theory of networking. Today, more complex networking theory is required by employers, and Network+ has evolved into a comprehensive exam. The CompTIA Network+ Exam N10-007 tests five domains of network theory:

Network Concepts

Infrastructure

Network Operations

Network Security

Network Troubleshooting and Tools

For the latest pricing on the exam and updates to the registration procedures, go to www.vue.com. You can register online for the exam. If you have further questions about the scope of the exam or related CompTIA programs, refer to the CompTIA website at www.comptia.org.

Is This Book for You?

The CompTIA Network+ Review Guide: Exam N10-007, Fourth Edition is designed to be a complete, portable exam review guide that can be used either in conjunction with a more complete study program (such as Sybex’s CompTIA Network+ Study Guide: Exam N10-007, computer-based training courseware, or a classroom/lab environment) or as an exam review for those who don’t need more extensive test preparation. The goal of this book to thoroughly cover those topics you can expect to be tested on.

Perhaps you’ve been working with information technologies for many years. The thought of paying lots of money for a specialized IT exam preparation course probably doesn’t sound too appealing. What can they teach you that you don’t already know, right? Be careful, though—many experienced network administrators have walked confidently into the test center only to walk sheepishly out of it after failing an IT exam. I’ve run across many of these network administrators throughout my 20 years of teaching networking. After you’ve finished reading this book, you should have a clear idea of how your understanding of networking technologies matches up with the expectations of the Network+ test writers.

 The goal of the Review Guide series is to help Network+ candidates brush up on the subjects on which they can expect to be tested on the Network+ exam. For complete in-depth coverage of the technologies and topics involved, we recommend CompTIA Network+ Study Guide from Sybex.

How Is This Book Organized?

This book is organized according to the official objectives list prepared by CompTIA for the Network+ Exam N10-007. The chapters correspond to the five major domains of objective and topic groupings. The exam is weighted across these five domains:

Domain 1.0 Network Concepts (23 percent)

Domain 2.0 Infrastructure (18 percent)

Domain 3.0 Network Operations (17 percent)

Domain 4.0 Network Security (20 percent)

Domain 5.0 Network Troubleshooting and Tools (22 percent)

In each chapter, the top-level exam objective from each domain is addressed in turn. This discussion also contains an Exam Essentials section. Here you are given a short list of topics that you should explore fully before taking the test. Included in the Exam Essentials are notations on key pieces of information you should have gleaned from CompTIA Network+ Review Guide: Exam N10-007, Fourth Edition. At the end of each chapter you’ll find the “Review Questions” section. These questions are designed to help you gauge your mastery of the content in the chapter.

Interactive Online Learning Environment and Test Bank

The interactive online learning environment that accompanies CompTIA Network+ Review Guide: Exam N10-007, Fourth Edition provides a test bank with study tools to help you prepare for the certification exam, and it increases your chances of passing it the first time. The test bank includes the following:

Sample Tests All of the questions in this book are provided, including the chapter review tests at the end of each chapter. In addition, there are two practice exams. Use these questions to test your knowledge of the review guide material. The online test bank runs on multiple devices.

Flashcards Flashcard questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and prepare last minute before the exam.

Other Study Tools A glossary of key terms from this book and their definitions is available as a fully searchable PDF.

 Go to http://www.wiley.com/go/netplustestprep to register and gain access to this interactive online learning environment and test bank with study tools.

Tips for Taking the Network+ Exam

Here are some general tips for taking your exams successfully:

Bring two forms of ID with you. One must be a photo ID, such as a driver’s license. The other can be a major credit card or a passport. Both forms must include a signature.

Arrive early at the exam center so you can relax and review your study materials, particularly tables and lists of exam-related information.

Read the questions carefully. Don’t be tempted to jump to an early conclusion. Make sure you know exactly what the question is asking.

Don’t leave any unanswered questions. Unanswered questions give you no opportunity for guessing correctly and scoring more points.

There will be questions with multiple correct responses. When there is more than one correct answer, a message on the screen will prompt you to either “Choose two” or “Choose all that apply.” Be sure to read the messages displayed so that you know how many correct answers you must choose.

Questions needing only a single correct answer will use radio buttons for selecting an answer, whereas those needing two or more answers will use checkboxes.

When answering multiple-choice questions you’re not sure about, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.

On form-based tests (nonadaptive), because the hard questions will eat up the most time, save them for last. You can move forward and backward through the exam.

For the latest pricing on the exams and updates to the registration procedures, visit CompTIA’s website at

www.comptia.org

.

How to Contact the Publisher

Sybex welcomes feedback on all of its titles. Visit the Sybex website at www.sybex.com for book updates and additional certification information. You’ll also find forms you can use to submit comments or suggestions regarding this or any other Sybex titles.

The Exam Objectives

The following are the areas (referred to as domains by CompTIA) in which you must be proficient in order to pass the Network+ exam:

Domain 1.0: Network Concepts This domain begins with the descriptions of several protocols you will encounter as a network professional. The OSI layers and their specific function and purpose are then covered. The domain explores the basic concepts and characteristics of routing and switching. IP addressing, subnetting, and VLSM are covered to support routing and efficient network design. The domain also describes the various network topologies for both wired and wireless networking, as well as the technologies that support the Internet of Things (IoT). The domain also explores wireless technologies, their characteristics, and various configurations. Cloud computing concepts according to the NIST definitions are covered. The domain concludes with various network services that support IP addressing and name resolution.

Domain 2.0: Infrastructure This domain covers the various cabling media, specifications, standards, connectors, and transceivers that you will encounter in network infrastructure. The domain explores the basic building blocks of network devices, such as firewalls, routers, switches, and more. The domain then covers more advanced network devices, such as wireless controllers, multilayer switches, VPN concentrators, and more. The domain also explores virtualization and network storage concepts found in many networks today to support private cloud computing. The domain concludes with the coverage of various WAN technologies that are used today, along with their characteristics and common media.

Domain 3.0: Network Operations This domain covers the various diagram and documentation components so that network operations can be documented properly. The domain then explores availability concepts such as high availability and fault tolerance to support the network and its components. Recovery of sites and data are also covered to support the concepts of recovery from failure. The topics of scanning, monitoring, and patching are examined to support the concepts of secure operations and overall monitoring. The topic of remote access methods is also explored so you can understand how network operations are supported remotely. This domain concludes with the coverage of policies and best practices to support network operations.

Domain 4.0: Network Security This domain focuses on security for both the physical and nonphysical aspects of network design and operations. This domain covers the various detection and prevention methods of security. It then explores authorization, authentication, and accounting theory and practice, along with the various factors of security and access control systems. Wireless security is also covered in its entirety to support secure wireless communications. The domain examines the various network attacks that you may encounter in a network. The domain concludes with hardening techniques and mitigation techniques so that security problems can be avoided.

Domain 5.0: Network Troubleshooting and Tools This domain covers the various troubleshooting methodologies used to diagnose problems in a network. It then explores the various hardware and software tools that you will use to diagnose problems in both wired and wireless networks. The domain covers both wired and wireless connectivity issues and performance-related issues that you may encounter in your daily operations. The domain concludes with real-world application of the tools and troubleshooting methodologies used to diagnose problems in a network.

The Network+ Exam Objectives

 At the beginning of each chapter, I have included a complete listing of the topics that will be covered in that chapter. These topic selections are developed straight from the test objectives listed on CompTIA’s website. They are provided for easy reference and to assure you that you are on track with learning the objectives. Note that exam objectives are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit the Network+ Certification page of CompTIA’s website (https://certification.comptia.org/certifications/network) for the most current listing of exam objectives.

Chapter 1: Domain 1.0: Networking Concepts

1.1 Explain the purposes and uses of ports and protocols.

Protocols and ports

SSH 22

DNS 53

SMTP 25

SFTP 22

FTP 20, 21

TFTP 69

TELNET 23

DHCP 67, 68

HTTP 80

HTTPS 443

SNMP 161

RDP 3389

NTP 123

SIP 5060, 5061

SMB 445

POP 110

IMAP 143

LDAP 389

LDAPS 636

H.323 1720

Protocol types

ICMP

UDP

TCP

IP

Connection-oriented vs. connectionless

1.2 Explain devices, applications, protocols and services at their appropriate OSI layers.

Layer 7 – Application

Layer 6 – Presentation

Layer 5 – Session

Layer 4 – Transport

Layer 3 – Network

Layer 2 – Data link

Layer 1 – Physical

1.3 Explain the concepts and characteristics of routing and switching.

Properties of network traffic

Collision domains

Broadcast domains

CSMA/CD

CSMA/CA

Protocol data units

MTU

Broadcast

Multicast

Unicast

Segmentation and interface properties

VLANs

Trunking (802.1Q)

Tagging and untagging ports

Port mirroring

Switching loops/spanning tree

PoE and PoE+ (802.3af, 802.3at)

DMZ

MAC address table

ARP table

Routing

Routing types

Static

Dynamic

Default

Routing protocols (IPv4 and IPv6)

Distance-vector routing protocols

RIP

EIGRP

Link-state routing protocols

OSPF

Hybrid

BGP

IPv6 concepts

Addressing

Tunneling

Dual stack

Router advertisement

Neighbor discovery

Performance concepts

Traffic shaping

QoS

Diffserv

CoS

NAT/PAT

Port forwarding

Access control list

Distributed switching

Packet-switched vs. circuit-switched network

Software-defined networking

1.4 Given a scenario, configure the appropriate IP addressing components.

Private vs. public

Loopback and reserved

Default gateway

Virtual IP

Subnet mask

Subnetting

Classful

Classes A, B, C, D, and E

Classless

VLSM

CIDR notation (IPv4 vs. IPv6)

Address assignments

DHCP

DHCPv6

Static

APIPA

EUI64

IP reservations

1.5 Compare and contrast the characteristics of network topologies, types, and technologies.

Wired topologies

Logical vs. physical

Star

Ring

Mesh

Bus

Wireless topologies

Ad-hoc

Infrastructure

Mesh

Types

LAN

WLAN

WAN

MAN

CAN

SAN

PAN

Technologies that facilitate the Internet of Things (IoT)

Z-Wave

Ant+

Bluetooth

NFC

IR

RFID

802.11

1.6 Given a scenario, implement the appropriate wireless technologies and configurations.

802.11 standards

b

a

g

n

ac

Cellular

TDMA

CDMA

GSM

Frequencies

2.4GHz

5.0GHz

Speed and distance requirements

Channel bandwidth

Channel bonding

MIMO/MU-MIMO

Unidirectional/omnidirectional

Site surveys

1.7 Summarize cloud concepts and their purposes.

Types of services

SaaS

PaaS

IaaS

Cloud delivery models

Private

Public

Hybrid

Connectivity methods

Security implications/considerations

Relationship between local and cloud resources

1.8 Explain the functions of network services.

DNS service

Record types

A, AAAA

TXT (SPF, DKIM)

SRV

MX

CNAME

NS

PTR

Internal vs. external DNS

Third-party/cloud-hosted DNS

Hierarchy

Forward vs. reverse zone

DHCP service

MAC reservations

Pools

IP exclusions

Scope options

Lease time

TTL

DHCP relay/IP helper

NTP

IPAM

Chapter 2: Domain 2.0: Infrastructure

2.1 Given a scenario, deploy the appropriate cabling solution.

Media types

Copper

UTP

STP

Coaxial

Fiber

Single-mode

Multimode

Plenum vs. PVC

Connector types

Copper

RJ-45

RJ-11

BNC

DB-9

DB-25

F-type

Fiber

LC

ST

SC

APC

UPC

MTRJ

Transceivers

SFP

GBIC

SFP+

QSFP

Characteristics of fiber transceivers

Bidirectional

Duplex

Termination points

66 block

110 block

Patch panel

Fiber distribution panel

Copper cable standards

Cat 3

Cat 5

Cat 5e

Cat 6

Cat 6a

Cat 7

RG-6

RG-59

Copper termination standards

TIA/EIA 568A

TIA/EIA 568B

Crossover

Straight-through

Ethernet deployment standards

100BaseT

1000BaseT

1000BaseLX

1000BaseSX

10GBaseT

2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

Firewall

Router

Switch

Hub

Bridge

Modems

Wireless access point

Media converter

Wireless range extender

VoIP endpoint

2.3 Explain the purposes and use cases for advanced networking devices.

Multilayer switch

Wireless controller

Load balancer

IDS/IPS

Proxy server

VPN concentrator

AAA/RADIUS server

UTM appliance

NGFW/Layer 7 firewall

VoIP PBX

VoIP gateway

Content filter

2.4 Explain the purposes of virtualization and network storage technologies.

Virtual networking components

Virtual switch

Virtual firewall

Virtual NIC

Virtual router

Hypervisor

Network storage types

NAS

SAN

Connection type

FCoE

Fibre Channel

iSCSI

InfiniBand

Jumbo frame

2.5 Compare and contrast WAN technologies.

Service type

ISDN

T1/T3

E1/E3

OC-3 – OC-192

DSL

Metropolitan Ethernet

Cable broadband

Dial-up

PRI

Transmission mediums

Satellite

Copper

Fiber

Wireless

Characteristics of service

MPLS

ATM

Frame relay

PPPoE

PPP

DMVPN

SIP trunk

Termination

Demarcation point

CSU/DSU

Smart jack

Chapter 3: Domain 3.0: Network Operations

3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.

Diagram symbols

Standard operating procedures/work instructions

Logical vs. physical diagrams

Rack diagrams

Change management documentation

Wiring and port locations

IDF/MDF documentation

Labeling

Network configuration and performance baselines

Inventory management

3.2 Compare and contrast business continuity and disaster recovery concepts.

Availability concepts

Fault tolerance

High availability

Load balancing

NIC teaming

Port aggregation

Clustering

Power management

Battery backups/UPS

Power generators

Dual power supplies

Redundant circuits

Recovery

Cold sites

Warm sites

Hot sites

Backups

Full

Differential

Incremental

Snapshots

MTTR

MTBF

SLA requirements

3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.

Processes

Log reviewing

Port scanning

Vulnerability scanning

Patch management

Rollback

Reviewing baselines

Packet/traffic analysis

Event management

Notifications

Alerts

SIEM

SNMP monitors

MIB

Metrics

Error rate

Utilization

Packet drops

Bandwidth/throughput

3.4 Given a scenario, use remote access methods.

VPN

IPSec

SSL/TLS/DTLS

Site-to-site

Client-to-site

RDP

SSH

VNC

Telnet

HTTPS/management URL

Remote fie access

FTP/FTPS

SFTP

TFTP

Out-of-band management

Modem

Console router

3.5 Identify policies and best practices.

Privileged user agreement

Password policy

On-boarding/off-boarding procedures

Licensing restrictions

International export controls

Data loss prevention

Remote access policies

Incident response policies

BYOD

AUP

NDA

System life cycle

Asset disposal

Safety procedures and policies

Chapter 4: Domain 4.0: Network Security

4.1 Summarize the purposes of physical security devices.

Detection

Motion detection

Video surveillance

Asset tracking tags

Tamper detection

Prevention

Badges

Biometrics

Smart cards

Key fob

Locks

4.2 Explain authentication and access controls.

Authentication, authorization, and accounting

RADIUS

TACACS+

Kerberos

Single sign-on

Local authentication

LDAP

Certificates

Auditing and logging

Multifactor authentication

Something you know

Something you have

Something you are

Somewhere you are

Something you do

Access control

802.1x

NAC

Port security

MAC filtering

Captive portal

Access control lists

4.3 Given a scenario, secure a basic wireless network.

WPA

WPA2

TKIP-RC4

CCMP-AES

Authentication and authorization

EAP

PEAP

EAP-FAST

EAP-TLS

Shared or open

Preshared key

MAC filtering

Geofencing

4.4 Summarize common networking attacks.

DoS

Reflective

Amplified

Distributed

Social engineering

Insider threat

Logic bomb

Rogue access point

Evil twin

War-driving

Phishing

Ransomware

DNS poisoning

ARP poisoning

Spoofing

Deauthentication

Brute force

VLAN hopping

Man-in-the-middle

Exploits vs. vulnerabilities

4.5 Given a scenario, implement network device hardening.

Changing default credentials

Avoiding common passwords

Upgrading firmware

Patching and updates

File hashing

Disabling unnecessary services

Using secure protocols

Generating new keys

Disabling unused ports

IP ports

Device ports (physical and virtual)

4.6 Explain common mitigation techniques and their purposes.

Signature management

Device hardening

Change native VLAN

Switch port protection

Spanning tree

Flood guard

BPDU guard

Root guard

DHCP snooping

Network segmentation

DMZ

VLAN

Privileged user account

File integrity monitoring

Role separation

Restricting access via ACLs

Honeypot/honeynet

Penetration testing

Chapter 5: Domain 5.0: Network Troubleshooting and Tools

5.1 Explain the network troubleshooting methodology.

Identify the problem

Gather information

Duplicate the problem, if possible

Question users

Identify symptoms

Determine if anything has changed

Approach multiple problems individually

Establish a theory of probable cause

Question the obvious

Consider multiple approaches

Top-to-bottom/bottom-to-top OSI model

Divide and conquer

Test the theory to determine the cause

Once the theory is confirmed, determine the next steps to resolve the problem

If the theory is not confirmed, reestablish a new theory or escalate

Establish a plan of action to resolve the problem and identify potential effects

Implement the solution or escalate as necessary

Verify full system functionality and, if applicable, implement preventive measures

Document findings, actions, and outcomes

5.2 Given a scenario, use the appropriate tool.

Hardware tools

Crimper

Cable tester

Punchdown tool

OTDR

Light meter

Tone generator

Loopback adapter

Multimeter

Spectrum analyzer

Software tools

Packet sniffer

Port scanner

Protocol analyzer

Wi-Fi analyzer

Bandwidth speed tester

Command line

ping

tracert, traceroute

nslookup

ipconfig

ipconfig

iptables

netstat

tcpdump

pathping

nmap

route

arp

dig

5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.

Attenuation

Latency

Jitter

Crosstalk

EMI

Open/short

Incorrect pin-out

Incorrect cable type

Bad port

Transceiver mismatch

TX/RX reverse

Duplex/speed mismatch

Damaged cables

Bent pins

Bottlenecks

VLAN mismatch

Network connection LED status indicators

5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues.

Reflection

Refraction

Absorption

Latency

Jitter

Attenuation

Incorrect antenna type

Interference

Incorrect antenna placement

Channel overlap

Overcapacity

Distance limitations

Frequency mismatch

Wrong SSID

Wrong passphrase

Security type mismatch

Power levels

Signal-to-noise ratio

5.5 Given a scenario, troubleshoot common network service issues.

Names not resolving

Incorrect gateway

Incorrect netmask

Duplicate IP addresses

Duplicate MAC addresses

Expired IP address

Rogue DHCP server

Untrusted SSL certificate

Incorrect time

Exhausted DHCP scope

Blocked TCP/UDP ports

Incorrect host-based firewall settings

Incorrect ACL settings

Unresponsive service

Hardware failure

Network+ Acronyms

Here are the acronyms of security terms that CompTIA deems important enough that they’re included in the objectives list for the exam. We’ve repeated them here exactly as listed by CompTIA.

AAA Authentication Authorization and Accounting

AAAA Authentication, Authorization, Accounting and Auditing

ACL Access Control List

ADSL Asymmetric Digital Subscriber Line

AES Advanced Encryption Standard

AH Authentication Header

AP Access Point

APC Angle Polished Connector

APIPA Automatic Private Internet Protocol Addressing

APT Advanced Persistent Tool

ARIN American Registry for Internet Numbers

ARP Address Resolution Protocol

AS Autonomous System

ASIC Application Specific Integrated Circuit

ASP Application Service Provider

ATM Asynchronous Transfer Mode

AUP Acceptable Use Policy

BCP Business Continuity Plan

BERT Bit-Error Rate Test

BGP Border Gateway Protocol

BLE Bluetooth Low Energy

BNC British Naval Connector/Bayonet Neill-Concelman

BootP Boot Protocol/Bootstrap Protocol

BPDU Bridge Protocol Data Unit

BRI Basic Rate Interface

BSSID Basic Service Set Identifier

BYOD Bring Your Own Device

CaaS Communication as a Service

CAM Content Addressable Memory

CAN Campus Area Network

CARP Common Address Redundancy Protocol

CASB Cloud Access Security Broker

CAT Category

CCTV Closed Circuit TV

CDMA Code Division Multiple Access

CSMA/CD Carrier Sense Multiple Access/Collision Detection

CHAP Challenge Handshake Authentication Protocol

CIDR Classless Inter-Domain Routing

CNAME Canonical Name

CoS Class of Service

CPU Central Processing Unit

CRAM-MD5 Challenge-Response Authentication Mechanism–Message Digest 5

CRC Cyclic Redundancy Checking

CSMA/CA Carrier Sense Multiple Access/Collision Avoidance

CSU Channel Service Unit

CVW Collaborative Virtual Workspace

CWDM Course Wave Division Multiplexing

DaaS Desktop as a Service

dB Decibel

DCS Distributed Computer System

DDoS Distributed Denial of Service

DHCP Dynamic Host Configuration Protocol

DLC Data Link Control

DLP Data Loss Prevention

DLR Device Level Ring

DMZ Demilitarized Zone

DNAT Destination Network Address Translation

DNS Domain Name Service/Domain Name Server/Domain Name System

DOCSIS Data-Over-Cable Service Interface Specification

DoS Denial of Service

DR Designated Router

DSCP Differentiated Services Code Point

DSL Digital Subscriber Line

DSSS Direct Sequence Spread Spectrum

DSU Data Service Unit

DWDM Dense Wavelength Division Multiplexing

E1 E-Carrier Level 1

EAP Extensible Authentication Protocol

EDNS Extension Mechanisms for DNS

EGP Exterior Gateway Protocol

EIA/TIA Electronic Industries Alliance/Telecommunication Industries Association

EMI Electromagnetic Interference

ESD Electrostatic Discharge

ESP Encapsulated Security Payload

ESSID Extended Service Set Identifier

EUI Extended Unique Identifier

FC Fibre Channel

FCoE Fibre Channel over Ethernet

FCS Frame Check Sequence

FDM Frequency Division Multiplexing

FHSS Frequency Hopping Spread Spectrum

FM Frequency Modulation

FQDN Fully Qualified Domain Name

FTP File Transfer Protocol

FTPS File Transfer Protocol Security

GBIC Gigabit Interface Converter

Gbps Gigabits per second

GLBP Gateway Load Balancing Protocol

GPG GNU Privacy Guard

GRE Generic Routing Encapsulation

GSM Global System for Mobile Communications

HA High Availability

HDLC High-Level Data Link Control

HDMI High-Definition Multimedia Interface

HIDS Host Intrusion Detection System

HIPS Host Intrusion Prevention System

HSPA High-Speed Packet Access

HSRP Hot Standby Router Protocol

HT High Throughput

HTTP Hypertext Transfer Protocol

HTTPS Hypertext Transfer Protocol Secure

HVAC Heating, Ventilation and Air Conditioning

Hz Hertz

IaaS Infrastructure as a Service

IANA Internet Assigned Numbers Authority

ICA Independent Computer Architecture

ICANN Internet Corporation for Assigned Names and Numbers

ICMP Internet Control Message Protocol

ICS Internet Connection Sharing/Industrial Control System

IDF Intermediate Distribution Frame

IDS Intrusion Detection System

IEEE Institute of Electrical and Electronics Engineers

IGMP Internet Group Message Protocol

IGP Interior Gateway Protocol

IGRP Interior Gateway Routing Protocol

IKE Internet Key Exchange

IMAP4 Internet Message Access Protocol version 4

InterNIC Internet Network Information Center

IoT Internet of Things

IP Internet Protocol

IPS Intrusion Prevention System

IPSec Internet Protocol Security

IPv4 Internet Protocol version 4

IPv6 Internet Protocol version 6

ISAKMP Internet Security Association and Key Management Protocol

ISDN Integrated Services Digital Network

IS-IS Intermediate System to Intermediate System

ISP Internet Service Provider

IT Information Technology

ITS Intelligent Transportation System

IV Initialization Vector

Kbps Kilobits per second

KVM Keyboard Video Mouse

L2TP Layer 2 Tunneling Protocol

LACP Link Aggregation Control Protocol

LAN Local Area Network

LC Local Connector

LDAP Lightweight Directory Access Protocol

LEC Local Exchange Carrier

LED Light Emitting Diode

LLC Logical Link Control

LLDP Link Layer Discovery Protocol

LSA Link State Advertisements

LTE Long Term Evolution

LWAPP Light Weight Access Point Protocol

MaaS Mobility as a Service

MAC Media Access Control/Medium Access Control

MAN Metropolitan Area Network

Mbps Megabits per second

MBps Megabytes per second

MDF Main Distribution Frame

MDI Media Dependent Interface

MDIX Media Dependent Interface Crossover

MGCP Media Gateway Control Protocol

MIB Management Information Base

MIMO Multiple Input, Multiple Output

MLA Master License Agreement/Multilateral Agreement

MMF Multimode Fiber

MOA Memorandum of Agreement

MOU Memorandum of Understanding

MPLS Multiprotocol Label Switching

MS-CHAP Microsoft Challenge Handshake Authentication Protocol

MSA Master Service Agreement

MSDS Material Safety Data Sheet

MT-RJ Mechanical Transfer-Registered Jack

MTU Maximum Transmission Unit

MTTR Mean Time To Recovery

MTBF Mean Time Between Failures

MU-MIMO Multiuser Multiple Input, Multiple Output

MX Mail Exchanger

NAC Network Access Control

NAS Network Attached Storage

NAT Network Address Translation

NCP Network Control Protocol

NDR Non-Delivery Receipt

NetBEUI Network Basic Input/Output Extended User Interface

NetBIOS Network Basic Input/Output System

NFC Near Field Communication

NFS Network File Service

NGFW Next-Generation Firewall

NIC Network Interface Card

NIDS Network Intrusion Detection System

NIPS Network Intrusion Prevention System

NIU Network Interface Unit

nm Nanometer

NNTP Network News Transport Protocol

NTP Network Time Protocol

OCSP Online Certificate Status Protocol

OCx Optical Carrier

OS Operating System

OSI Open Systems Interconnect

OSPF Open Shortest Path First

OTDR Optical Time Domain Reflectometer

OUI Organizationally Unique Identifier

PaaS Platform as a Service

PAN Personal Area Network

PAP Password Authentication Protocol

PAT Port Address Translation

PC Personal Computer

PCM Phase-Change Memory

PDoS Permanent Denial of Service

PDU Protocol Data Unit

PGP Pretty Good Privacy

PKI Public Key Infrastructure

PoE Power over Ethernet

POP Post Office Protocol

POP3 Post Office Protocol version 3

POTS Plain Old Telephone Service

PPP Point-to-Point Protocol

PPPoE Point-to-Point Protocol over Ethernet

PPTP Point-to-Point Tunneling Protocol

PRI Primary Rate Interface

PSK Pre-Shared Key

PSTN Public Switched Telephone Network

PTP Point-to-Point

PTR Pointer

PUA Privileged User Agreement

PVC Permanent Virtual Circuit

QoS Quality of Service

QSFP Quad Small Form-Factor Pluggable

RADIUS Remote Authentication Dial-In User Service

RARP Reverse Address Resolution Protocol

RAS Remote Access Service

RDP Remote Desktop Protocol

RF Radio Frequency

RFI Radio Frequency Interference

RFP Request for Proposal

RG Radio Guide

RIP Routing Internet Protocol

RJ Registered Jack

RPO Recovery Point Objective

RSA Rivest, Shamir, Adelman

RSH Remote Shell

RSTP Rapid Spanning Tree Protocol

RTO Recovery Time Objective

RTP Real-Time Protocol

RTSP Real-Time Streaming Protocol

RTT Round Trip Time or Real Transfer Time

SA Security Association

SaaS Software as a Service

SC Standard Connector/Subscriber Connector

SCADA Supervisory Control and Data Acquisition

SCP Secure Copy Protocol

SDLC Software Development Life Cycle

SDN Software Defined Network

SDP Session Description Protocol

SDSL Symmetrical Digital Subscriber Line

SFP Small Form-factor Pluggable

SFTP Secure File Transfer Protocol

SGCP Simple Gateway Control Protocol

SHA Secure Hash Algorithm

SIEM Security Information and Event Management

SIP Session Initiation Protocol

SLA Service Level Agreement

SLAAC Stateless Address Auto Configuration

SLIP Serial Line Internet Protocol

SMB Server Message Block

SMF Single-Mode Fiber

SMS Short Message Service

SMTP Simple Mail Transfer Protocol

SNAT Static Network Address Translation/Source Network Address Translation

SNMP Simple Network Management Protocol

SNTP Simple Network Time Protocol

SOA Start of Authority

SOHO Small Office Home Office

SONET Synchronous Optical Network

SOP Standard Operating Procedure

SOW Statement of Work

SPB Shortest Path Bridging

SPI Stateful Packet Inspection

SPS Standby Power Supply

SSH Secure Shell

SSID Service Set Identifier

SSL Secure Sockets Layer

ST Straight Tip or Snap Twist

STP Spanning Tree Protocol/Shielded Twisted Pair

SVC Switched Virtual Circuit

SYSLOG System Log

T1 Terrestrial Carrier Level 1

TA Terminal Adaptor

TACACS Terminal Access Control Access Control System

TACACS+ Terminal Access Control Access Control System+

TCP Transmission Control Protocol

TCP/IP Transmission Control Protocol/Internet Protocol

TDM Time Division Multiplexing

TDR Time Domain Reflectometer

Telco Telecommunications Company

TFTP Trivial File Transfer Protocol

TKIP Temporal Key Integrity Protocol

TLS Transport Layer Security

TMS Transportation Management System

TOS Type of Service

TPM Trusted Platform Module

TTL Time to Live

TTLS Tunneled Transport Layer Security

UC Unified Communications

UDP User Datagram Protocol

UNC Universal Naming Convention

UPC Ultra Polished Connector

UPS Uninterruptible Power Supply

URL Uniform Resource Locator

USB Universal Serial Bus

UTM Unified Threat Management

UTP Unshielded Twisted Pair

VDSL Variable Digital Subscriber Line

VLAN Virtual Local Area Network

VNC Virtual Network Connection

VoIP Voice over IP

VPN Virtual Private Network

VRF Virtual Routing Forwarding

VRRP Virtual Router Redundancy Protocol

VTC Video Teleconference

VTP VLAN Trunk Protocol

WAF Web Application Firewall

WAN Wide Area Network

WAP Wireless Application Protocol/Wireless Access Point

WEP Wired Equivalent Privacy

WLAN Wireless Local Area Network

WMS Warehouse Management System

WPA Wi-Fi Protected Access

WPS Wi-Fi Protected Setup

WWN World Wide Name

XDSL Extended Digital Subscriber Line

XML eXtensible Markup Language

Zeroconf Zero Configuration

Chapter 1Domain 1.0: Networking Concepts

THE FOLLOWING COMPTIA NETWORK+ OBJECTIVES ARE COVERED IN THIS CHAPTER:

 1.1 Explain the purposes and uses of ports and protocols.

Protocols and ports

SSH 22

DNS 53

SMTP 25

SFTP 22

FTP 20, 21

TFTP 69

TELNET 23

DHCP 67, 68

HTTP 80

HTTPS 443

SNMP 161

RDP 3389

NTP 123

SIP 5060, 5061

SMB 445

POP 110

IMAP 143

LDAP 389

LDAPS 636

H.323 1720

Protocol types

ICMP

UDP

TCP

IP

Connection-oriented vs. connectionless

 1.2 Explain devices, applications, protocols and services at their appropriate OSI layers.

Layer 7 – Application

Layer 6 – Presentation

Layer 5 – Session

Layer 4 – Transport

Layer 3 – Network

Layer 2 – Data link

Layer 1 – Physical

 1.3 Explain the concepts and characteristics of routing and switching.

Properties of network traffic

Collision domains

Broadcast domains

CSMA/CD

CSMA/CA

Protocol data units

MTU

Broadcast

Multicast

Unicast

Segmentation and interface properties

VLANs

Trunking (802.1Q)

Tagging and untagging ports

Port mirroring

Switching loops/spanning tree

PoE and PoE+ (802.3af, 802.3at)

DMZ

MAC address table

ARP table

Routing

Routing types

Static

Dynamic

Default

Routing protocols (IPv4 and IPv6)

Distance-vector routing protocols

RIP

EIGRP

Link-state routing protocols

OSPF

Hybrid

BGP

IPv6 concepts

Addressing

Tunneling

Dual stack

Router advertisement

Neighbor discovery

Performance concepts

Traffic shaping

QoS

Diffserv

CoS

NAT/PAT

Port forwarding

Access control list

Distributed switching

Packet-switched vs. circuit-switched network

Software-defined networking

 1.4 Given a scenario, configure the appropriate IP addressing components.

Private vs. public

Loopback and reserved

Default gateway

Virtual IP

Subnet mask

Subnetting

Classful

Classes A, B, C, D, and E

Classless

VLSM

CIDR notation (IPv4 vs. IPv6)

Address assignments

DHCP

DHCPv6

Static

APIPA

EUI64

IP reservations