19,99 €
Essential last-minute review aid for the updated CompTIA Network+ Exam N10-007 CompTIA Network+ Review Guide Exam N10-007, 4th Edition, is your ideal study companion for preparing for the CompTIA Network+ exam (N10-007). Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CompTIA Network+ Study Guide, CompTIA Network+ Deluxe Study Guide, and CompTIA Network+ Practice Tests. The book is broken into 5 parts, each part corresponding to one of the 5 objective domain areas of the Network+ exam: Network Architecture; Network Operations; Network Security; Troubleshooting; and Industry Standards, Practices, and Network Theory. Readers will also be given access to the comprehensive online Sybex test bank, which includes two bonus practice tests, electronic flashcards, and a glossary of terms that you'll need to know come exam day. CompTIA's Network+ certification covers advances in networking technology, and reflects changes in associated job tasks. The exam places greater emphasis on network implementation and support, and includes expanded coverage of wireless networking topics. This review guide gives you the opportunity to identify your level of knowledge while there's still time to study, and avoid exam-day surprises. * Review network architecture and security * Understand network operations and troubleshooting * Gain insight into industry standards and best practices * Get a firmer grasp of network theory fundamentals If you're looking for a beginning, vendor-neutral networking certification, look no further than CompTIA Network+.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 749
Veröffentlichungsjahr: 2018
Jon Buhagiar
Senior Acquisitions Editor: Kenyon Brown
Development Editor: David Clark
Technical Editor: Wynn D. Smith, Brent Hamilton
Copy Editor: Elizabeth Welch
Editorial Manager: Pete Gaughan
Production Manager: Kathleen Wisor
Executive Editor: Jim Minatel
Proofreader: Kim Wimpsett
Indexer: John Sleeva
Project Coordinator, Cover: Brent Savage
Cover Designer: Wiley
Cover Image: ©Getty Images, Inc./Jeremy Woodhouse
Copyright © 2018 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-43214-2
ISBN: 978-1-119-43231-9 (ebk.)
ISBN: 978-1-119-43230-2 (ebk.)
Manufactured in the United States of America
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.
Library of Congress Control Number: 2018933559
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA and Network+ are registered trademarks of CompTIA Properties, LLC. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
I dedicate this book to my wife Teresa and my son Joseph. I love you both.
—JAB
I’d like to thank the many people who made this book possible. Thanks to: Kenyon Brown at Wiley Publishing, for giving me the opportunity to write this book. David Clark, for working with me as the developmental editor and making the entire process seamless. Wynn D. Smith and Brent Hamilton, working as the technical editors on this book to ensure I didn’t miss any details. Liz Welch, for her many edits that helped make this book a polished product. And the many other people I’ve never met who worked behind the scenes to make this book a success.
Jon Buhagiar, BS/ITM, MCSE, CCNA is an information technology professional with two decades of experience in higher education and the private sector.
Jon currently serves as Supervisor of Network Operations at Pittsburgh Technical College. In this role, he manages datacenter and network infrastructure operations and IT operations and is involved in strategic planning of IT projects supporting the quality of education at the college. He also serves as an adjunct instructor in the college’s School of Information Technology department, where he teaches certification courses for Microsoft and Cisco certifications. Jon has taught as an instructor for 18 years with several colleges in the Pittsburgh area, since the introduction of the Windows NT MCSE in 1998.
Jon earned his BS in Information Technology Management from Western Governors University. He also achieved an Associates in Business Management from Pittsburgh Technical College. He has recently earned his Windows Server 2012 R2 MCSE as well as Cisco CCNA Routing & Switching certification. Other certifications include CompTIA Network+, A+, and Project+.
In addition to his professional and teaching roles, he has authored CCNA Routing and Switching Practice Tests: Exam 100-105, Exam 200-105, and Exam 200-125 (Sybex, 2016). He has also served as the technical editor for the second edition of the CompTIA Cloud+ Study Guide (Sybex, 2016), CCNA Security Study Guide: Exam 210-260 (Sybex, 2018), and CCNA Cloud Complete Study Guide: Exam 210-451 and Exam 210-455 (Sybex, 2018). He has spoken at several conferences about spam and email systems. He is an active radio electronics hobbyist and has held a ham radio license for the past 16 years (KB3KGS). He experiments with electronics and has a strong focus on the Internet of Things (IoT).
Introduction
What Is Network+ Certification?
Is This Book for You?
How Is This Book Organized?
Interactive Online Learning Environment and Test Bank
Tips for Taking the Network+ Exam
How to Contact the Publisher
The Exam Objectives
The Network+ Exam Objectives
Network+ Acronyms
Chapter 1 Domain 1.0: Networking Concepts
1.1 Explain the purposes and uses of ports and protocols.
1.2 Explain devices, applications, protocols and services at their appropriate OSI layers.
1.3 Explain the concepts and characteristics of routing and switching.
1.4 Given a scenario, configure the appropriate IP addressing components.
1.5 Compare and contrast the characteristics of network topologies, types, and technologies.
1.6 Given a scenario, implement the appropriate wireless technologies and configurations.
1.7 Summarize cloud concepts and their purposes.
1.8 Explain the functions of network services.
Review Questions
Chapter 2 Domain 2.0: Infrastructure
2.1 Given a scenario, deploy the appropriate cabling solution.
2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.
2.3 Explain the purposes and use cases for advanced networking devices.
2.4 Explain the purposes of virtualization and network storage technologies.
2.5 Compare and contrast WAN technologies.
Review Questions
Chapter 3 Domain 3.0: Network Operations
3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.
3.2 Compare and contrast business continuity and disaster recovery concepts.
3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.
3.4 Given a scenario, use remote access methods.
3.5 Identify policies and best practices.
Review Questions
Chapter 4 Domain 4.0: Network Security
4.1 Summarize the purposes of physical security devices.
4.2 Explain authentication and access controls.
4.3 Given a scenario, secure a basic wireless network.
4.4 Summarize common networking attacks.
4.5 Given a scenario, implement network device hardening.
4.6 Explain common mitigation techniques and their purposes.
Review Questions
Chapter 5 Domain 5.0 Network Troubleshooting and Tools
5.1 Explain the network troubleshooting methodology.
5.2 Given a scenario, use the appropriate tool.
5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.
5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues.
5.5 Given a scenario, troubleshoot common network service issues.
Review Questions
Appendix Answers to Review Questions
Chapter 1: Domain 1.0: Networking Concepts
Chapter 2: Domain 2.0: Infrastructure
Chapter 3: Domain 3.0: Network Operations
Chapter 4: Domain 4.0: Network Security
Chapter 5: Domain 5.0 Network Troubleshooting and Tools
Advert
EULA
Chapter 1
TABLE 1.1
TABLE 1.2
TABLE 1.3
TABLE 1.4
TABLE 1.5
Chapter 2
TABLE 2.1
TABLE 2.2
Chapter 3
TABLE 3.1
Chapter 5
TABLE 5.1
Chapter 1
FIGURE 1.1
FTP active and passive modes
FIGURE 1.2
An overview of the DHCP process
FIGURE 1.3
UDP segment
FIGURE 1.4
TCP three-way handshake
FIGURE 1.5
TCP sliding window example
FIGURE 1.6
TCP segment
FIGURE 1.7
An IP packet
FIGURE 1.8
The layers of the OSI
FIGURE 1.9
Transport server port binding
FIGURE 1.10
Transport client requests
FIGURE 1.11
Logical network addressing
FIGURE 1.12
Network layer protocol numbers
FIGURE 1.13
The data link layer and the sublayers within
FIGURE 1.14
The LLC sublayer and the network layer
FIGURE 1.15
An Ethernet II frame
FIGURE 1.16
MAC address format
FIGURE 1.17
Hubs, switches, and collision domains
FIGURE 1.18
Two broadcast domains connected with a router
FIGURE 1.19
OSI layers and PDUs
FIGURE 1.20
A broadcast frame and IP packet
FIGURE 1.21
A unicast frame and packet
FIGURE 1.22
A flat switched network
FIGURE 1.23
A network using VLANs
FIGURE 1.24
Routed VLANs
FIGURE 1.25
An 802.1Q frame
FIGURE 1.26
802.1Q trunk link and broadcasts
FIGURE 1.27
Untagging and tagging ports
FIGURE 1.28
Duplicate unicast packets
FIGURE 1.29
A broadcast storm
FIGURE 1.30
Three switches with redundant links
FIGURE 1.31
Three switches with STP calculated
FIGURE 1.32
Backup and alternate ports
FIGURE 1.33
Two firewalls connected to a DMZ
FIGURE 1.34
One firewall connected to a DMZ
FIGURE 1.35
The MAC address learning process
FIGURE 1.36
The basic routing process
FIGURE 1.37
Two-router network
FIGURE 1.38
Default routing example
FIGURE 1.39
EIGRP tables
FIGURE 1.40
IPv6 address example
FIGURE 1.41
Breakdown of an IPv6 global unicast address
FIGURE 1.42
A link-local prefix
FIGURE 1.43
A traffic shaping example
FIGURE 1.44
An 802.1Q frame
FIGURE 1.45
The static NAT process
FIGURE 1.46
Dynamic NAT process
FIGURE 1.47
Port address translation process
FIGURE 1.48
Port forwarding example
FIGURE 1.49
ACL example
FIGURE 1.50
Three-tier model vs. collapsed core model
FIGURE 1.51
Typical FHRP setup
FIGURE 1.52
The ANDing process
FIGURE 1.53
Subnetting of an IP address
FIGURE 1.54
Subnet IDs
FIGURE 1.55
Host ID calculations
FIGURE 1.56
Creating a subnet calculator
FIGURE 1.57
The subnet calculator
FIGURE 1.58
Subnetting for hosts
FIGURE 1.59
Valid host IDs for a 13-bit host ID
FIGURE 1.60
A variable-length subnet mask (VLSM) network
FIGURE 1.61
VLSM worksheet
FIGURE 1.62
A CIDR calculator
FIGURE 1.63
The DHCP DORA process
FIGURE 1.64
The Windows DHCP/static IP address dialog box
FIGURE 1.65
Padding process of EUI-64 addresses
FIGURE 1.66
Bit flipping for EUI-64 addresses
FIGURE 1.67
A typical star topology
FIGURE 1.68
A logical ring topology
FIGURE 1.69
A physical topology of a full mesh
FIGURE 1.70
A comparison of bus networks to SCSI disk networks
FIGURE 1.71
A hybrid topology
FIGURE 1.72
Basic service set example
FIGURE 1.73
Extended service set example
FIGURE 1.74
Mesh WAP example
FIGURE 1.75
The 2.4 GHz channel plan
FIGURE 1.76
The 5 GHz channel plan
FIGURE 1.77
802.11ac data rates vs. distance
FIGURE 1.78
Channel bonding in the 5GHz radio band
FIGURE 1.79
MIMO wireless example
FIGURE 1.80
A Yagi antenna radiation pattern example
FIGURE 1.81
An omnidirectional antenna radiation pattern example
FIGURE 1.82
DNS hierarchy
FIGURE 1.83
Primary and secondary DNS servers
FIGURE 1.84
The Windows DHCP management console
FIGURE 1.85
The DHCP client lease life cycle
FIGURE 1.86
An example of a network router configured with an IP helper
FIGURE 1.87
An example of a DHCP relay agent configured on a server
Chapter 2
FIGURE 2.1
A common UTP cable
FIGURE 2.2
A common STP cable
FIGURE 2.3
Coax cable elements
FIGURE 2.4
Cross-section of solid core vs. stranded core cables
FIGURE 2.5
A typical fiber-optic cable
FIGURE 2.6
An RJ-45 connector
FIGURE 2.7
An RJ-11 connector
FIGURE 2.8
A BNC connector
FIGURE 2.9
A DB-9 (RS-232) connector
FIGURE 2.10
A DB-25 connector
FIGURE 2.11
An F-connector
FIGURE 2.12
An LC connector
FIGURE 2.13
An ST connector
FIGURE 2.14
An SC connector
FIGURE 2.15
An MTRJ connector
FIGURE 2.16
A typical SFP transceiver
FIGURE 2.17
A typical GBIC transceiver
FIGURE 2.18
A QSFP transceiver
FIGURE 2.19
How bidirectional transceivers work
FIGURE 2.20
A 66 block panel
FIGURE 2.21
A 110 block panel
FIGURE 2.22
A typical patch panel
FIGURE 2.23
A typical fiber distribution panel
FIGURE 2.24
TIA/EIA 568A and 568B wiring standard
FIGURE 2.25
Straight-through cable wiring
FIGURE 2.26
Crossover cable wiring
FIGURE 2.27
A typical hardware firewall appliance
FIGURE 2.28
Typical edge router
FIGURE 2.29
Typical managed switches
FIGURE 2.30
Four-port active hub
FIGURE 2.31
WAPs with internal and external antennas
FIGURE 2.32
Wireless LAN controller functionality
FIGURE 2.33
Overview of a proxy server implementation
FIGURE 2.34
Overview of a reverse proxy server implementation
FIGURE 2.35
AAA/RADIUS components
FIGURE 2.36
UC platform and VoIP gateway
FIGURE 2.37
VoIP gateway acting as the PSTN
FIGURE 2.38
VoIP gateway serving POTS
FIGURE 2.39
Hypervisor types
FIGURE 2.40
A typical storage area network
FIGURE 2.41
A comparison between separate SAN and network switching vs. a converged FCoE network
FIGURE 2.42
A DSL network
FIGURE 2.43
The broadband cable network
FIGURE 2.44
A typical satellite network
FIGURE 2.45
Circuit-switched vs. packet-switched
FIGURE 2.46
A typical Frame Relay network
FIGURE 2.47
The PPP protocol suite
Chapter 3
FIGURE 3.1
Hub symbols
FIGURE 3.2
Switch symbols
FIGURE 3.3
Router symbols
FIGURE 3.4
Firewall symbols
FIGURE 3.5
WAP symbols
FIGURE 3.6
Client and server symbols
FIGURE 3.7
Layer 3 multifunction switch symbol
FIGURE 3.8
Connection and network type symbols
FIGURE 3.9
Typical network diagram
FIGURE 3.10
A logical diagram
FIGURE 3.11
A physical diagram
FIGURE 3.12
A conceptual logical diagram
FIGURE 3.13
ANSI/TIA-606-B grid coordinate naming system
FIGURE 3.14
Network cable label wrap
FIGURE 3.15
RAID level 1 (mirroring)
FIGURE 3.16
RAID level 5 (striping with parity)
FIGURE 3.17
RAID level 6 (striping with two parity schemes)
FIGURE 3.18
Redundancy in a network
FIGURE 3.19
Scaling out a web server
FIGURE 3.20
Redundant team of NICs
FIGURE 3.21
LACP port aggregation between two switches
FIGURE 3.22
Nmap tool example
FIGURE 3.23
WSUS computer report
FIGURE 3.24
Manual uninstall of a Windows update
FIGURE 3.25
SNMP monitor graph
FIGURE 3.26
IPsec tunnel phases
FIGURE 3.27
A typical site-to-site VPN
FIGURE 3.28
A typical host-to-site VPN
FIGURE 3.29
Client-to-site VPN connection
FIGURE 3.30
A typical host-to-host VPN
FIGURE 3.31
A modem for out-of-band management
FIGURE 3.32
A router console connection
Chapter 4
FIGURE 4.1
A typical PIR sensor
FIGURE 4.2
A typical biometric reader
FIGURE 4.3
A typical smartcard
FIGURE 4.4
A typical key fob
FIGURE 4.5
A typical combination door lock
FIGURE 4.6
AAA bank analogy
FIGURE 4.7
802.1x switch control
FIGURE 4.8
NAC and 802.1x
FIGURE 4.9
An inline captive portal
FIGURE 4.10
An out-of-band captive portal
FIGURE 4.11
A typical corporate network
FIGURE 4.12
Wireless authentication for 802.1x/EAP
FIGURE 4.13
A typical DMZ with two firewalls
FIGURE 4.14
A typical DMZ with one firewall
FIGURE 4.15
An ACL example
Chapter 5
FIGURE 5.1
A typical pair of cable crimpers
FIGURE 5.2
A cable tester pair
FIGURE 5.3
A time domain reflectometer
FIGURE 5.4
A cable certifier
FIGURE 5.5
A typical punchdown tool
FIGURE 5.6
A punchdown tool punching a wire into a patch panel
FIGURE 5.7
An optical time domain reflectometer
FIGURE 5.8
A tone generator and tracing probe
FIGURE 5.9
An LC fiber-optic loopback plug
FIGURE 5.10
A typical multimeter
FIGURE 5.11
NETSCOUT AirMagnet spectrum analyzer
FIGURE 5.12
Protocol analyzer of a TCP packet
FIGURE 5.13
Android Wifi Analyzer
FIGURE 5.14
Fiber-optic transceivers
FIGURE 5.15
A typical Ethernet jack
FIGURE 5.16
A typical Ethernet switch
FIGURE 5.17
A typical dipole wireless antenna on a WAP
FIGURE 5.18
The DNS query process
FIGURE 5.19
Incorrect /16 netmask in a /24 network
FIGURE 5.20
Incorrect /24 netmask in a /16 network
FIGURE 5.21
An untrusted SSL certificate warning
FIGURE 5.22
A self-signed certificate
FIGURE 5.23
Windows Date and Time dialog box
Cover
Table of Contents
Introduction
vii
ix
xi
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
xxxix
xl
xli
xlii
xliii
xliv
xlv
xlvi
xlvii
xlviii
xlix
l
li
lii
liii
liv
lv
lvi
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
135
136
137
138
139
140
141
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
You may be new to the field of computer networking, or perhaps you are in pursuit of proving your knowledge and understanding of computer networking. In either case, the CompTIA Network+ certification exam is a great start to your professional development. The Network+ certification is considered by employers industry-wide to be proof of the knowledge of networking theory, skill, and systems. The Network+ certification is granted to those individuals who have attained this information and show a basic competency for meeting the needs of both personal and organization computing environments.
The CompTIA Network+ objectives have changed with the introduction of the CompTIA Network+ N10-007 certification exam. This change in objectives and topics from the prior exam was necessary to keep up with the latest technologies used in networks today. The foundation of networking concepts have remained relatively similar, despite the introduction of more advanced technologies. This is one of the reasons the CompTIA Network+ exam is so widely valued by employers. As of this writing, the objectives are current for the Network+ N10-007 certification exam as stated by CompTIA (https://www.comptia.org).
The Computing Technology Industry Association (CompTIA) developed the Network+ certification to be vendor neutral and recognized industry-wide. The Network+ certification is considered the benchmark of networking theory. Candidates who earn the Network+ certification have knowledge of the design, operation, maintenance, security, and troubleshooting of networks. Employers worldwide recognize Network+ certified individuals as having a basic vendor-agnostic networking theory that can be applied to any specific system.
The Network+ certification was originally sponsored by IT industry leaders like IBM, Microsoft, and Compaq, among others. The goal was to create a certification that would give recognition of individuals with a basic theory of networking. Today, more complex networking theory is required by employers, and Network+ has evolved into a comprehensive exam. The CompTIA Network+ Exam N10-007 tests five domains of network theory:
Network Concepts
Infrastructure
Network Operations
Network Security
Network Troubleshooting and Tools
For the latest pricing on the exam and updates to the registration procedures, go to www.vue.com. You can register online for the exam. If you have further questions about the scope of the exam or related CompTIA programs, refer to the CompTIA website at www.comptia.org.
The CompTIA Network+ Review Guide: Exam N10-007, Fourth Edition is designed to be a complete, portable exam review guide that can be used either in conjunction with a more complete study program (such as Sybex’s CompTIA Network+ Study Guide: Exam N10-007, computer-based training courseware, or a classroom/lab environment) or as an exam review for those who don’t need more extensive test preparation. The goal of this book to thoroughly cover those topics you can expect to be tested on.
Perhaps you’ve been working with information technologies for many years. The thought of paying lots of money for a specialized IT exam preparation course probably doesn’t sound too appealing. What can they teach you that you don’t already know, right? Be careful, though—many experienced network administrators have walked confidently into the test center only to walk sheepishly out of it after failing an IT exam. I’ve run across many of these network administrators throughout my 20 years of teaching networking. After you’ve finished reading this book, you should have a clear idea of how your understanding of networking technologies matches up with the expectations of the Network+ test writers.
The goal of the Review Guide series is to help Network+ candidates brush up on the subjects on which they can expect to be tested on the Network+ exam. For complete in-depth coverage of the technologies and topics involved, we recommend CompTIA Network+ Study Guide from Sybex.
This book is organized according to the official objectives list prepared by CompTIA for the Network+ Exam N10-007. The chapters correspond to the five major domains of objective and topic groupings. The exam is weighted across these five domains:
Domain 1.0 Network Concepts (23 percent)
Domain 2.0 Infrastructure (18 percent)
Domain 3.0 Network Operations (17 percent)
Domain 4.0 Network Security (20 percent)
Domain 5.0 Network Troubleshooting and Tools (22 percent)
In each chapter, the top-level exam objective from each domain is addressed in turn. This discussion also contains an Exam Essentials section. Here you are given a short list of topics that you should explore fully before taking the test. Included in the Exam Essentials are notations on key pieces of information you should have gleaned from CompTIA Network+ Review Guide: Exam N10-007, Fourth Edition. At the end of each chapter you’ll find the “Review Questions” section. These questions are designed to help you gauge your mastery of the content in the chapter.
The interactive online learning environment that accompanies CompTIA Network+ Review Guide: Exam N10-007, Fourth Edition provides a test bank with study tools to help you prepare for the certification exam, and it increases your chances of passing it the first time. The test bank includes the following:
Sample Tests All of the questions in this book are provided, including the chapter review tests at the end of each chapter. In addition, there are two practice exams. Use these questions to test your knowledge of the review guide material. The online test bank runs on multiple devices.
Flashcards Flashcard questions are provided in digital flashcard format (a question followed by a single correct answer). You can use the flashcards to reinforce your learning and prepare last minute before the exam.
Other Study Tools A glossary of key terms from this book and their definitions is available as a fully searchable PDF.
Go to http://www.wiley.com/go/netplustestprep to register and gain access to this interactive online learning environment and test bank with study tools.
Here are some general tips for taking your exams successfully:
Bring two forms of ID with you. One must be a photo ID, such as a driver’s license. The other can be a major credit card or a passport. Both forms must include a signature.
Arrive early at the exam center so you can relax and review your study materials, particularly tables and lists of exam-related information.
Read the questions carefully. Don’t be tempted to jump to an early conclusion. Make sure you know exactly what the question is asking.
Don’t leave any unanswered questions. Unanswered questions give you no opportunity for guessing correctly and scoring more points.
There will be questions with multiple correct responses. When there is more than one correct answer, a message on the screen will prompt you to either “Choose two” or “Choose all that apply.” Be sure to read the messages displayed so that you know how many correct answers you must choose.
Questions needing only a single correct answer will use radio buttons for selecting an answer, whereas those needing two or more answers will use checkboxes.
When answering multiple-choice questions you’re not sure about, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.
On form-based tests (nonadaptive), because the hard questions will eat up the most time, save them for last. You can move forward and backward through the exam.
For the latest pricing on the exams and updates to the registration procedures, visit CompTIA’s website at
www.comptia.org
.
Sybex welcomes feedback on all of its titles. Visit the Sybex website at www.sybex.com for book updates and additional certification information. You’ll also find forms you can use to submit comments or suggestions regarding this or any other Sybex titles.
The following are the areas (referred to as domains by CompTIA) in which you must be proficient in order to pass the Network+ exam:
Domain 1.0: Network Concepts This domain begins with the descriptions of several protocols you will encounter as a network professional. The OSI layers and their specific function and purpose are then covered. The domain explores the basic concepts and characteristics of routing and switching. IP addressing, subnetting, and VLSM are covered to support routing and efficient network design. The domain also describes the various network topologies for both wired and wireless networking, as well as the technologies that support the Internet of Things (IoT). The domain also explores wireless technologies, their characteristics, and various configurations. Cloud computing concepts according to the NIST definitions are covered. The domain concludes with various network services that support IP addressing and name resolution.
Domain 2.0: Infrastructure This domain covers the various cabling media, specifications, standards, connectors, and transceivers that you will encounter in network infrastructure. The domain explores the basic building blocks of network devices, such as firewalls, routers, switches, and more. The domain then covers more advanced network devices, such as wireless controllers, multilayer switches, VPN concentrators, and more. The domain also explores virtualization and network storage concepts found in many networks today to support private cloud computing. The domain concludes with the coverage of various WAN technologies that are used today, along with their characteristics and common media.
Domain 3.0: Network Operations This domain covers the various diagram and documentation components so that network operations can be documented properly. The domain then explores availability concepts such as high availability and fault tolerance to support the network and its components. Recovery of sites and data are also covered to support the concepts of recovery from failure. The topics of scanning, monitoring, and patching are examined to support the concepts of secure operations and overall monitoring. The topic of remote access methods is also explored so you can understand how network operations are supported remotely. This domain concludes with the coverage of policies and best practices to support network operations.
Domain 4.0: Network Security This domain focuses on security for both the physical and nonphysical aspects of network design and operations. This domain covers the various detection and prevention methods of security. It then explores authorization, authentication, and accounting theory and practice, along with the various factors of security and access control systems. Wireless security is also covered in its entirety to support secure wireless communications. The domain examines the various network attacks that you may encounter in a network. The domain concludes with hardening techniques and mitigation techniques so that security problems can be avoided.
Domain 5.0: Network Troubleshooting and Tools This domain covers the various troubleshooting methodologies used to diagnose problems in a network. It then explores the various hardware and software tools that you will use to diagnose problems in both wired and wireless networks. The domain covers both wired and wireless connectivity issues and performance-related issues that you may encounter in your daily operations. The domain concludes with real-world application of the tools and troubleshooting methodologies used to diagnose problems in a network.
At the beginning of each chapter, I have included a complete listing of the topics that will be covered in that chapter. These topic selections are developed straight from the test objectives listed on CompTIA’s website. They are provided for easy reference and to assure you that you are on track with learning the objectives. Note that exam objectives are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit the Network+ Certification page of CompTIA’s website (https://certification.comptia.org/certifications/network) for the most current listing of exam objectives.
1.1 Explain the purposes and uses of ports and protocols.
Protocols and ports
SSH 22
DNS 53
SMTP 25
SFTP 22
FTP 20, 21
TFTP 69
TELNET 23
DHCP 67, 68
HTTP 80
HTTPS 443
SNMP 161
RDP 3389
NTP 123
SIP 5060, 5061
SMB 445
POP 110
IMAP 143
LDAP 389
LDAPS 636
H.323 1720
Protocol types
ICMP
UDP
TCP
IP
Connection-oriented vs. connectionless
1.2 Explain devices, applications, protocols and services at their appropriate OSI layers.
Layer 7 – Application
Layer 6 – Presentation
Layer 5 – Session
Layer 4 – Transport
Layer 3 – Network
Layer 2 – Data link
Layer 1 – Physical
1.3 Explain the concepts and characteristics of routing and switching.
Properties of network traffic
Collision domains
Broadcast domains
CSMA/CD
CSMA/CA
Protocol data units
MTU
Broadcast
Multicast
Unicast
Segmentation and interface properties
VLANs
Trunking (802.1Q)
Tagging and untagging ports
Port mirroring
Switching loops/spanning tree
PoE and PoE+ (802.3af, 802.3at)
DMZ
MAC address table
ARP table
Routing
Routing types
Static
Dynamic
Default
Routing protocols (IPv4 and IPv6)
Distance-vector routing protocols
RIP
EIGRP
Link-state routing protocols
OSPF
Hybrid
BGP
IPv6 concepts
Addressing
Tunneling
Dual stack
Router advertisement
Neighbor discovery
Performance concepts
Traffic shaping
QoS
Diffserv
CoS
NAT/PAT
Port forwarding
Access control list
Distributed switching
Packet-switched vs. circuit-switched network
Software-defined networking
1.4 Given a scenario, configure the appropriate IP addressing components.
Private vs. public
Loopback and reserved
Default gateway
Virtual IP
Subnet mask
Subnetting
Classful
Classes A, B, C, D, and E
Classless
VLSM
CIDR notation (IPv4 vs. IPv6)
Address assignments
DHCP
DHCPv6
Static
APIPA
EUI64
IP reservations
1.5 Compare and contrast the characteristics of network topologies, types, and technologies.
Wired topologies
Logical vs. physical
Star
Ring
Mesh
Bus
Wireless topologies
Ad-hoc
Infrastructure
Mesh
Types
LAN
WLAN
WAN
MAN
CAN
SAN
PAN
Technologies that facilitate the Internet of Things (IoT)
Z-Wave
Ant+
Bluetooth
NFC
IR
RFID
802.11
1.6 Given a scenario, implement the appropriate wireless technologies and configurations.
802.11 standards
b
a
g
n
ac
Cellular
TDMA
CDMA
GSM
Frequencies
2.4GHz
5.0GHz
Speed and distance requirements
Channel bandwidth
Channel bonding
MIMO/MU-MIMO
Unidirectional/omnidirectional
Site surveys
1.7 Summarize cloud concepts and their purposes.
Types of services
SaaS
PaaS
IaaS
Cloud delivery models
Private
Public
Hybrid
Connectivity methods
Security implications/considerations
Relationship between local and cloud resources
1.8 Explain the functions of network services.
DNS service
Record types
A, AAAA
TXT (SPF, DKIM)
SRV
MX
CNAME
NS
PTR
Internal vs. external DNS
Third-party/cloud-hosted DNS
Hierarchy
Forward vs. reverse zone
DHCP service
MAC reservations
Pools
IP exclusions
Scope options
Lease time
TTL
DHCP relay/IP helper
NTP
IPAM
2.1 Given a scenario, deploy the appropriate cabling solution.
Media types
Copper
UTP
STP
Coaxial
Fiber
Single-mode
Multimode
Plenum vs. PVC
Connector types
Copper
RJ-45
RJ-11
BNC
DB-9
DB-25
F-type
Fiber
LC
ST
SC
APC
UPC
MTRJ
Transceivers
SFP
GBIC
SFP+
QSFP
Characteristics of fiber transceivers
Bidirectional
Duplex
Termination points
66 block
110 block
Patch panel
Fiber distribution panel
Copper cable standards
Cat 3
Cat 5
Cat 5e
Cat 6
Cat 6a
Cat 7
RG-6
RG-59
Copper termination standards
TIA/EIA 568A
TIA/EIA 568B
Crossover
Straight-through
Ethernet deployment standards
100BaseT
1000BaseT
1000BaseLX
1000BaseSX
10GBaseT
2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.
Firewall
Router
Switch
Hub
Bridge
Modems
Wireless access point
Media converter
Wireless range extender
VoIP endpoint
2.3 Explain the purposes and use cases for advanced networking devices.
Multilayer switch
Wireless controller
Load balancer
IDS/IPS
Proxy server
VPN concentrator
AAA/RADIUS server
UTM appliance
NGFW/Layer 7 firewall
VoIP PBX
VoIP gateway
Content filter
2.4 Explain the purposes of virtualization and network storage technologies.
Virtual networking components
Virtual switch
Virtual firewall
Virtual NIC
Virtual router
Hypervisor
Network storage types
NAS
SAN
Connection type
FCoE
Fibre Channel
iSCSI
InfiniBand
Jumbo frame
2.5 Compare and contrast WAN technologies.
Service type
ISDN
T1/T3
E1/E3
OC-3 – OC-192
DSL
Metropolitan Ethernet
Cable broadband
Dial-up
PRI
Transmission mediums
Satellite
Copper
Fiber
Wireless
Characteristics of service
MPLS
ATM
Frame relay
PPPoE
PPP
DMVPN
SIP trunk
Termination
Demarcation point
CSU/DSU
Smart jack
3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.
Diagram symbols
Standard operating procedures/work instructions
Logical vs. physical diagrams
Rack diagrams
Change management documentation
Wiring and port locations
IDF/MDF documentation
Labeling
Network configuration and performance baselines
Inventory management
3.2 Compare and contrast business continuity and disaster recovery concepts.
Availability concepts
Fault tolerance
High availability
Load balancing
NIC teaming
Port aggregation
Clustering
Power management
Battery backups/UPS
Power generators
Dual power supplies
Redundant circuits
Recovery
Cold sites
Warm sites
Hot sites
Backups
Full
Differential
Incremental
Snapshots
MTTR
MTBF
SLA requirements
3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.
Processes
Log reviewing
Port scanning
Vulnerability scanning
Patch management
Rollback
Reviewing baselines
Packet/traffic analysis
Event management
Notifications
Alerts
SIEM
SNMP monitors
MIB
Metrics
Error rate
Utilization
Packet drops
Bandwidth/throughput
3.4 Given a scenario, use remote access methods.
VPN
IPSec
SSL/TLS/DTLS
Site-to-site
Client-to-site
RDP
SSH
VNC
Telnet
HTTPS/management URL
Remote fie access
FTP/FTPS
SFTP
TFTP
Out-of-band management
Modem
Console router
3.5 Identify policies and best practices.
Privileged user agreement
Password policy
On-boarding/off-boarding procedures
Licensing restrictions
International export controls
Data loss prevention
Remote access policies
Incident response policies
BYOD
AUP
NDA
System life cycle
Asset disposal
Safety procedures and policies
4.1 Summarize the purposes of physical security devices.
Detection
Motion detection
Video surveillance
Asset tracking tags
Tamper detection
Prevention
Badges
Biometrics
Smart cards
Key fob
Locks
4.2 Explain authentication and access controls.
Authentication, authorization, and accounting
RADIUS
TACACS+
Kerberos
Single sign-on
Local authentication
LDAP
Certificates
Auditing and logging
Multifactor authentication
Something you know
Something you have
Something you are
Somewhere you are
Something you do
Access control
802.1x
NAC
Port security
MAC filtering
Captive portal
Access control lists
4.3 Given a scenario, secure a basic wireless network.
WPA
WPA2
TKIP-RC4
CCMP-AES
Authentication and authorization
EAP
PEAP
EAP-FAST
EAP-TLS
Shared or open
Preshared key
MAC filtering
Geofencing
4.4 Summarize common networking attacks.
DoS
Reflective
Amplified
Distributed
Social engineering
Insider threat
Logic bomb
Rogue access point
Evil twin
War-driving
Phishing
Ransomware
DNS poisoning
ARP poisoning
Spoofing
Deauthentication
Brute force
VLAN hopping
Man-in-the-middle
Exploits vs. vulnerabilities
4.5 Given a scenario, implement network device hardening.
Changing default credentials
Avoiding common passwords
Upgrading firmware
Patching and updates
File hashing
Disabling unnecessary services
Using secure protocols
Generating new keys
Disabling unused ports
IP ports
Device ports (physical and virtual)
4.6 Explain common mitigation techniques and their purposes.
Signature management
Device hardening
Change native VLAN
Switch port protection
Spanning tree
Flood guard
BPDU guard
Root guard
DHCP snooping
Network segmentation
DMZ
VLAN
Privileged user account
File integrity monitoring
Role separation
Restricting access via ACLs
Honeypot/honeynet
Penetration testing
5.1 Explain the network troubleshooting methodology.
Identify the problem
Gather information
Duplicate the problem, if possible
Question users
Identify symptoms
Determine if anything has changed
Approach multiple problems individually
Establish a theory of probable cause
Question the obvious
Consider multiple approaches
Top-to-bottom/bottom-to-top OSI model
Divide and conquer
Test the theory to determine the cause
Once the theory is confirmed, determine the next steps to resolve the problem
If the theory is not confirmed, reestablish a new theory or escalate
Establish a plan of action to resolve the problem and identify potential effects
Implement the solution or escalate as necessary
Verify full system functionality and, if applicable, implement preventive measures
Document findings, actions, and outcomes
5.2 Given a scenario, use the appropriate tool.
Hardware tools
Crimper
Cable tester
Punchdown tool
OTDR
Light meter
Tone generator
Loopback adapter
Multimeter
Spectrum analyzer
Software tools
Packet sniffer
Port scanner
Protocol analyzer
Wi-Fi analyzer
Bandwidth speed tester
Command line
ping
tracert, traceroute
nslookup
ipconfig
ipconfig
iptables
netstat
tcpdump
pathping
nmap
route
arp
dig
5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.
Attenuation
Latency
Jitter
Crosstalk
EMI
Open/short
Incorrect pin-out
Incorrect cable type
Bad port
Transceiver mismatch
TX/RX reverse
Duplex/speed mismatch
Damaged cables
Bent pins
Bottlenecks
VLAN mismatch
Network connection LED status indicators
5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues.
Reflection
Refraction
Absorption
Latency
Jitter
Attenuation
Incorrect antenna type
Interference
Incorrect antenna placement
Channel overlap
Overcapacity
Distance limitations
Frequency mismatch
Wrong SSID
Wrong passphrase
Security type mismatch
Power levels
Signal-to-noise ratio
5.5 Given a scenario, troubleshoot common network service issues.
Names not resolving
Incorrect gateway
Incorrect netmask
Duplicate IP addresses
Duplicate MAC addresses
Expired IP address
Rogue DHCP server
Untrusted SSL certificate
Incorrect time
Exhausted DHCP scope
Blocked TCP/UDP ports
Incorrect host-based firewall settings
Incorrect ACL settings
Unresponsive service
Hardware failure
Here are the acronyms of security terms that CompTIA deems important enough that they’re included in the objectives list for the exam. We’ve repeated them here exactly as listed by CompTIA.
AAA Authentication Authorization and Accounting
AAAA Authentication, Authorization, Accounting and Auditing
ACL Access Control List
ADSL Asymmetric Digital Subscriber Line
AES Advanced Encryption Standard
AH Authentication Header
AP Access Point
APC Angle Polished Connector
APIPA Automatic Private Internet Protocol Addressing
APT Advanced Persistent Tool
ARIN American Registry for Internet Numbers
ARP Address Resolution Protocol
AS Autonomous System
ASIC Application Specific Integrated Circuit
ASP Application Service Provider
ATM Asynchronous Transfer Mode
AUP Acceptable Use Policy
BCP Business Continuity Plan
BERT Bit-Error Rate Test
BGP Border Gateway Protocol
BLE Bluetooth Low Energy
BNC British Naval Connector/Bayonet Neill-Concelman
BootP Boot Protocol/Bootstrap Protocol
BPDU Bridge Protocol Data Unit
BRI Basic Rate Interface
BSSID Basic Service Set Identifier
BYOD Bring Your Own Device
CaaS Communication as a Service
CAM Content Addressable Memory
CAN Campus Area Network
CARP Common Address Redundancy Protocol
CASB Cloud Access Security Broker
CAT Category
CCTV Closed Circuit TV
CDMA Code Division Multiple Access
CSMA/CD Carrier Sense Multiple Access/Collision Detection
CHAP Challenge Handshake Authentication Protocol
CIDR Classless Inter-Domain Routing
CNAME Canonical Name
CoS Class of Service
CPU Central Processing Unit
CRAM-MD5 Challenge-Response Authentication Mechanism–Message Digest 5
CRC Cyclic Redundancy Checking
CSMA/CA Carrier Sense Multiple Access/Collision Avoidance
CSU Channel Service Unit
CVW Collaborative Virtual Workspace
CWDM Course Wave Division Multiplexing
DaaS Desktop as a Service
dB Decibel
DCS Distributed Computer System
DDoS Distributed Denial of Service
DHCP Dynamic Host Configuration Protocol
DLC Data Link Control
DLP Data Loss Prevention
DLR Device Level Ring
DMZ Demilitarized Zone
DNAT Destination Network Address Translation
DNS Domain Name Service/Domain Name Server/Domain Name System
DOCSIS Data-Over-Cable Service Interface Specification
DoS Denial of Service
DR Designated Router
DSCP Differentiated Services Code Point
DSL Digital Subscriber Line
DSSS Direct Sequence Spread Spectrum
DSU Data Service Unit
DWDM Dense Wavelength Division Multiplexing
E1 E-Carrier Level 1
EAP Extensible Authentication Protocol
EDNS Extension Mechanisms for DNS
EGP Exterior Gateway Protocol
EIA/TIA Electronic Industries Alliance/Telecommunication Industries Association
EMI Electromagnetic Interference
ESD Electrostatic Discharge
ESP Encapsulated Security Payload
ESSID Extended Service Set Identifier
EUI Extended Unique Identifier
FC Fibre Channel
FCoE Fibre Channel over Ethernet
FCS Frame Check Sequence
FDM Frequency Division Multiplexing
FHSS Frequency Hopping Spread Spectrum
FM Frequency Modulation
FQDN Fully Qualified Domain Name
FTP File Transfer Protocol
FTPS File Transfer Protocol Security
GBIC Gigabit Interface Converter
Gbps Gigabits per second
GLBP Gateway Load Balancing Protocol
GPG GNU Privacy Guard
GRE Generic Routing Encapsulation
GSM Global System for Mobile Communications
HA High Availability
HDLC High-Level Data Link Control
HDMI High-Definition Multimedia Interface
HIDS Host Intrusion Detection System
HIPS Host Intrusion Prevention System
HSPA High-Speed Packet Access
HSRP Hot Standby Router Protocol
HT High Throughput
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol Secure
HVAC Heating, Ventilation and Air Conditioning
Hz Hertz
IaaS Infrastructure as a Service
IANA Internet Assigned Numbers Authority
ICA Independent Computer Architecture
ICANN Internet Corporation for Assigned Names and Numbers
ICMP Internet Control Message Protocol
ICS Internet Connection Sharing/Industrial Control System
IDF Intermediate Distribution Frame
IDS Intrusion Detection System
IEEE Institute of Electrical and Electronics Engineers
IGMP Internet Group Message Protocol
IGP Interior Gateway Protocol
IGRP Interior Gateway Routing Protocol
IKE Internet Key Exchange
IMAP4 Internet Message Access Protocol version 4
InterNIC Internet Network Information Center
IoT Internet of Things
IP Internet Protocol
IPS Intrusion Prevention System
IPSec Internet Protocol Security
IPv4 Internet Protocol version 4
IPv6 Internet Protocol version 6
ISAKMP Internet Security Association and Key Management Protocol
ISDN Integrated Services Digital Network
IS-IS Intermediate System to Intermediate System
ISP Internet Service Provider
IT Information Technology
ITS Intelligent Transportation System
IV Initialization Vector
Kbps Kilobits per second
KVM Keyboard Video Mouse
L2TP Layer 2 Tunneling Protocol
LACP Link Aggregation Control Protocol
LAN Local Area Network
LC Local Connector
LDAP Lightweight Directory Access Protocol
LEC Local Exchange Carrier
LED Light Emitting Diode
LLC Logical Link Control
LLDP Link Layer Discovery Protocol
LSA Link State Advertisements
LTE Long Term Evolution
LWAPP Light Weight Access Point Protocol
MaaS Mobility as a Service
MAC Media Access Control/Medium Access Control
MAN Metropolitan Area Network
Mbps Megabits per second
MBps Megabytes per second
MDF Main Distribution Frame
MDI Media Dependent Interface
MDIX Media Dependent Interface Crossover
MGCP Media Gateway Control Protocol
MIB Management Information Base
MIMO Multiple Input, Multiple Output
MLA Master License Agreement/Multilateral Agreement
MMF Multimode Fiber
MOA Memorandum of Agreement
MOU Memorandum of Understanding
MPLS Multiprotocol Label Switching
MS-CHAP Microsoft Challenge Handshake Authentication Protocol
MSA Master Service Agreement
MSDS Material Safety Data Sheet
MT-RJ Mechanical Transfer-Registered Jack
MTU Maximum Transmission Unit
MTTR Mean Time To Recovery
MTBF Mean Time Between Failures
MU-MIMO Multiuser Multiple Input, Multiple Output
MX Mail Exchanger
NAC Network Access Control
NAS Network Attached Storage
NAT Network Address Translation
NCP Network Control Protocol
NDR Non-Delivery Receipt
NetBEUI Network Basic Input/Output Extended User Interface
NetBIOS Network Basic Input/Output System
NFC Near Field Communication
NFS Network File Service
NGFW Next-Generation Firewall
NIC Network Interface Card
NIDS Network Intrusion Detection System
NIPS Network Intrusion Prevention System
NIU Network Interface Unit
nm Nanometer
NNTP Network News Transport Protocol
NTP Network Time Protocol
OCSP Online Certificate Status Protocol
OCx Optical Carrier
OS Operating System
OSI Open Systems Interconnect
OSPF Open Shortest Path First
OTDR Optical Time Domain Reflectometer
OUI Organizationally Unique Identifier
PaaS Platform as a Service
PAN Personal Area Network
PAP Password Authentication Protocol
PAT Port Address Translation
PC Personal Computer
PCM Phase-Change Memory
PDoS Permanent Denial of Service
PDU Protocol Data Unit
PGP Pretty Good Privacy
PKI Public Key Infrastructure
PoE Power over Ethernet
POP Post Office Protocol
POP3 Post Office Protocol version 3
POTS Plain Old Telephone Service
PPP Point-to-Point Protocol
PPPoE Point-to-Point Protocol over Ethernet
PPTP Point-to-Point Tunneling Protocol
PRI Primary Rate Interface
PSK Pre-Shared Key
PSTN Public Switched Telephone Network
PTP Point-to-Point
PTR Pointer
PUA Privileged User Agreement
PVC Permanent Virtual Circuit
QoS Quality of Service
QSFP Quad Small Form-Factor Pluggable
RADIUS Remote Authentication Dial-In User Service
RARP Reverse Address Resolution Protocol
RAS Remote Access Service
RDP Remote Desktop Protocol
RF Radio Frequency
RFI Radio Frequency Interference
RFP Request for Proposal
RG Radio Guide
RIP Routing Internet Protocol
RJ Registered Jack
RPO Recovery Point Objective
RSA Rivest, Shamir, Adelman
RSH Remote Shell
RSTP Rapid Spanning Tree Protocol
RTO Recovery Time Objective
RTP Real-Time Protocol
RTSP Real-Time Streaming Protocol
RTT Round Trip Time or Real Transfer Time
SA Security Association
SaaS Software as a Service
SC Standard Connector/Subscriber Connector
SCADA Supervisory Control and Data Acquisition
SCP Secure Copy Protocol
SDLC Software Development Life Cycle
SDN Software Defined Network
SDP Session Description Protocol
SDSL Symmetrical Digital Subscriber Line
SFP Small Form-factor Pluggable
SFTP Secure File Transfer Protocol
SGCP Simple Gateway Control Protocol
SHA Secure Hash Algorithm
SIEM Security Information and Event Management
SIP Session Initiation Protocol
SLA Service Level Agreement
SLAAC Stateless Address Auto Configuration
SLIP Serial Line Internet Protocol
SMB Server Message Block
SMF Single-Mode Fiber
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SNAT Static Network Address Translation/Source Network Address Translation
SNMP Simple Network Management Protocol
SNTP Simple Network Time Protocol
SOA Start of Authority
SOHO Small Office Home Office
SONET Synchronous Optical Network
SOP Standard Operating Procedure
SOW Statement of Work
SPB Shortest Path Bridging
SPI Stateful Packet Inspection
SPS Standby Power Supply
SSH Secure Shell
SSID Service Set Identifier
SSL Secure Sockets Layer
ST Straight Tip or Snap Twist
STP Spanning Tree Protocol/Shielded Twisted Pair
SVC Switched Virtual Circuit
SYSLOG System Log
T1 Terrestrial Carrier Level 1
TA Terminal Adaptor
TACACS Terminal Access Control Access Control System
TACACS+ Terminal Access Control Access Control System+
TCP Transmission Control Protocol
TCP/IP Transmission Control Protocol/Internet Protocol
TDM Time Division Multiplexing
TDR Time Domain Reflectometer
Telco Telecommunications Company
TFTP Trivial File Transfer Protocol
TKIP Temporal Key Integrity Protocol
TLS Transport Layer Security
TMS Transportation Management System
TOS Type of Service
TPM Trusted Platform Module
TTL Time to Live
TTLS Tunneled Transport Layer Security
UC Unified Communications
UDP User Datagram Protocol
UNC Universal Naming Convention
UPC Ultra Polished Connector
UPS Uninterruptible Power Supply
URL Uniform Resource Locator
USB Universal Serial Bus
UTM Unified Threat Management
UTP Unshielded Twisted Pair
VDSL Variable Digital Subscriber Line
VLAN Virtual Local Area Network
VNC Virtual Network Connection
VoIP Voice over IP
VPN Virtual Private Network
VRF Virtual Routing Forwarding
VRRP Virtual Router Redundancy Protocol
VTC Video Teleconference
VTP VLAN Trunk Protocol
WAF Web Application Firewall
WAN Wide Area Network
WAP Wireless Application Protocol/Wireless Access Point
WEP Wired Equivalent Privacy
WLAN Wireless Local Area Network
WMS Warehouse Management System
WPA Wi-Fi Protected Access
WPS Wi-Fi Protected Setup
WWN World Wide Name
XDSL Extended Digital Subscriber Line
XML eXtensible Markup Language
Zeroconf Zero Configuration
THE FOLLOWING COMPTIA NETWORK+ OBJECTIVES ARE COVERED IN THIS CHAPTER:
1.1 Explain the purposes and uses of ports and protocols.
Protocols and ports
SSH 22
DNS 53
SMTP 25
SFTP 22
FTP 20, 21
TFTP 69
TELNET 23
DHCP 67, 68
HTTP 80
HTTPS 443
SNMP 161
RDP 3389
NTP 123
SIP 5060, 5061
SMB 445
POP 110
IMAP 143
LDAP 389
LDAPS 636
H.323 1720
Protocol types
ICMP
UDP
TCP
IP
Connection-oriented vs. connectionless
1.2 Explain devices, applications, protocols and services at their appropriate OSI layers.
Layer 7 – Application
Layer 6 – Presentation
Layer 5 – Session
Layer 4 – Transport
Layer 3 – Network
Layer 2 – Data link
Layer 1 – Physical
1.3 Explain the concepts and characteristics of routing and switching.
Properties of network traffic
Collision domains
Broadcast domains
CSMA/CD
CSMA/CA
Protocol data units
MTU
Broadcast
Multicast
Unicast
Segmentation and interface properties
VLANs
Trunking (802.1Q)
Tagging and untagging ports
Port mirroring
Switching loops/spanning tree
PoE and PoE+ (802.3af, 802.3at)
DMZ
MAC address table
ARP table
Routing
Routing types
Static
Dynamic
Default
Routing protocols (IPv4 and IPv6)
Distance-vector routing protocols
RIP
EIGRP
Link-state routing protocols
OSPF
Hybrid
BGP
IPv6 concepts
Addressing
Tunneling
Dual stack
Router advertisement
Neighbor discovery
Performance concepts
Traffic shaping
QoS
Diffserv
CoS
NAT/PAT
Port forwarding
Access control list
Distributed switching
Packet-switched vs. circuit-switched network
Software-defined networking
1.4 Given a scenario, configure the appropriate IP addressing components.
Private vs. public
Loopback and reserved
Default gateway
Virtual IP
Subnet mask
Subnetting
Classful
Classes A, B, C, D, and E
Classless
VLSM
CIDR notation (IPv4 vs. IPv6)
Address assignments
DHCP
DHCPv6
Static
APIPA
EUI64
IP reservations