Test your skills

Complete our assessment and test your skill level!

Course Content

N10-006: CompTIA Network+

1.0 Network architecture

1.1 Explain the functions and applications of various network devices

  • Router
  • Switch
  • Multilayer switch
  • Firewall
  • HIDS
  • IDS/IPS
  • Access point (wireless/wired)
  • Content filter
  • Load balancer
  • Hub
  • Analog modem
  • Packet shaper
  • VPN concentrator

See fewer details

1.2 Compare and contrast the use of networking services and applications VPN

  • Site to site/hst to site/host to host
  • Protocols
  • IPsec
  • GRE
  • SSL VPN
  • PTP/PPTP
  • TACACS/RADIUS
  • RAS
  • Web services
  • Unified voice services
  • Network controllers

+ See more details

1.3 Install and configure the following networking services/applications DHCP

  • Static vs dynamic IP addressing
  • Reservations
  • Scopes
  • Leases
  • Options (DNS servers, suffixes)
  • IP helper/DHCP relay
  • DNS
  • DNS servers
  • DNS records (A, MX, AAAA, CNAME, PTR)
  • Dynamic DNS
  • Proxy/reverse proxy
  • NAT
  • PAT
  • SNAT
  • DNAT
  • Port forwarding

+ See more details

1.4 Explain the characteristics and benefits of various WAN technologies

  • Fiber
  • SONET
  • DWDM
  • CWDM
  • Frame relay
  • Satellite
  • Broadband cable
  • DSL/ADSL
  • ISDN
  • ATM
  • PPP/Multilink PPP
  • MPLS
  • GSM/CDMA
  • LTE/4G
  • HSPA+
  • 3G
  • Edge
  • Dialup
  • WiMAX
  • Metro-Ethernet
  • Leased lines
  • T-1
  • T-3
  • E-1
  • E-3
  • OC3
  • OC12
  • Circuit switch vs packet switch

+ See more details

1.5 Install and properly terminate various cable types and connectors using appropriate tools

  • Copper connectors
  • RJ-11
  • RJ-45
  • RJ-48C
  • DB-9/RS-232
  • DB-25
  • UTP coupler
  • BNC coupler
  • BNC
  • F-connector
  • 110 block
  • 66 block
  • Copper cables
  • Shielded vs unshielded
  • CAT3, CAT5, CAT5e, CAT6, CAT6a
  • PVC vs plenum
  • RG-59
  • RG-6
  • Straight-through vs crossover vs rollover
  • Fiber connectors
  • ST
  • SC
  • LC
  • MTRJ
  • FC
  • Fiber coupler
  • Fiber cables
  • Single mode
  • Multimode
  • APC vs UPC
  • Media converters
  • Single mode fiber to Ethernet
  • Multimode fiber to Ethernet
  • Fiber to coaxial
  • Single mode to multimode fiber
  • Tools
  • Cable crimpers
  • Punch down tool
  • Wire strippers
  • Snips
  • OTDR
  • Cable certifier

+ See more details

1.6 Differentiate between common network topologies

  • Mesh
  • Partial
  • Full
  • Bus
  • Ring
  • Star
  • Hybrid
  • Point-to-point
  • Point-to-multipoint
  • Client-server
  • Peer-to-peer

+ See more details

1.7 Differentiate between network infrastructure implementations

  • WAN
  • MAN
  • LAN
  • WLAN
  • Hotspot
  • PAN
  • Bluetooth
  • IR
  • NFC
  • SCADA/ICS
  • ICS server
  • DCS/closed network
  • Remote terminal unit
  • Programmable logic controller
  • Medianets
  • VTC
  • ISDN
  • IP/SIP

+ See more details

1.8 Given a scenario, implement and configure the appropriate addressing schema

  • IPv6
  • Aut-configuration
  • EUI 64
  • DHCP6
  • Link local
  • Address structure
  • Address compression
  • Tunneling 6to4, 4to6
  • Teredo, miredo
  • IPv4
  • Address structure
  • Subnetting
  • APIPA
  • Classful A, B, C, D
  • Classless
  • Private vs public
  • NAT/PAT
  • MAC addressing
  • Multicast
  • Unicast
  • Broadcast
  • Broadcast domains vs collision domains

+ See more details

1.9 Explain the basics of routing concepts and protocols

  • Loopback interface
  • Routing loops
  • Routing tables
  • Static vs dynamic routes
  • Default route
  • Distance vector routing protocols
  • RIP v2
  • Hybrid routing protocols
  • BGP
  • Link state routing protocols
  • OSPF
  • IS-IS
  • Interior vs exterior gateway routing protocols
  • Autonomous system numbers
  • Route redistribution
  • High availability
  • VRRP
  • Virtual IP
  • HSRP
  • Route aggregation
  • Routing metrics
  • Hop counts
  • MTU, bandwidth
  • Costs
  • Latency
  • Administrative distance
  • SPB

+ See more details

1.10 Identify the basics elements of unified communication technologies

  • VoIP
  • Video
  • Real time services
  • Presence
  • Multicast vs unicast
  • QoS
  • DSCP
  • COS
  • Devices
  • UC servers
  • UC devices
  • UC gateways

+ See more details

1.11 Compare and contrast technologies that support cloud and virtualization

  • Virtualization
  • Virtual switches
  • Virtual routers
  • Virtual firewall
  • Virtual vs physical NICs
  • Software defined networking
  • Storage area network
  • iSCSI
  • Jumbo frame
  • Fibre Channel
  • Network attached storage
  • Cloud concepts
  • Public IaaS, SaaS, PaaS
  • Private IaaS, SaaS, PaaS
  • Hybrid IaaS, SaaS, PaaS
  • Community IaaS, SaaS, PaaS

+ See more details

1.12 Given a set of requirements, implement a basic network

  • List of requirements
  • Device types/requirements
  • Environment limitations
  • Equipment limitations
  • Compatibility requirements
  • Wired/wireless considerations
  • Security considerations

+ See more details

2.0 Network operations

2.1 Given a scenario, use appropriate monitoring tools

  • Packet/network analyzer
  • Interface monitoring tools
  • Port scanner
  • Top talkers/listeners
  • SNMP management sftware
  • Trap
  • Get
  • Walk
  • MIBS
  • Alerts
  • Email
  • SMS
  • Packet flow monitoring
  • SYSLOG
  • SIEM
  • Environmental monitoring tools
  • Temperature
  • Humidity
  • Power monitoring tools
  • Wireless survey tools
  • Wireless analyzers

+ See more details

2.2 Given a scenario, analyze metrics and reports from monitoring and tracking performance tools

  • Baseline
  • Bottleneck
  • Log management
  • Graphing
  • Utilization
  • Bandwidth
  • Storage
  • Network device CPU
  • Network device memry
  • Wireless channel utilization
  • Link status
  • Interface monitoring
  • Errors
  • Utilization
  • Discards
  • Packet drops
  • Interface resets
  • Speed and duplex

+ See more details

2.3 Given a scenario, use appropriate resources to support configuration management

  • Archives/backups
  • Baselines
  • On-boarding and off-boarding of mobile devices
  • NAC
  • Documentation
  • Network diagrams (logical/physical)
  • Asset management
  • IP address utilization
  • Vendor documentation
  • Internal operating procedures/policies/standards

+ See more details

2.4 Explain the importance of implementing network segmentation

  • SCADA systems/Industrial control systems
  • Legacy systems
  • Separate private/public networks
  • Honeypot/honeynet
  • Testing lab
  • Load balancing
  • Performance optimization
  • Security
  • Compliance

+ See more details

2.5 Given a scenario, install and apply patches and updates

  • OS updates
  • Firmware updates
  • Driver updates
  • Feature changes/updates
  • Major vs minor updates
  • Vulnerability patches
  • Upgrading vs downgrading
  • Configuration backup

+ See more details

2.6 Given a scenario, configure a switch using proper features

  • VLAN
  • Native VLAN/Default VLAN
  • VTP
  • Spanning tree (802.1d)/rapid spanning tree (802.1w)
  • Flooding
  • Forwarding/blocking
  • Filtering
  • Interface configuration
  • Trunking/802.1q
  • Tag vs untag VLANs
  • Port bonding (LACP)
  • Port mirroring (local vs remote)
  • Speed and duplexing
  • IP address assignment
  • VLAN assignment
  • Default gateway
  • PoE and PoE+ (802.3af, 802.3at)
  • Switch management
  • User/passwords
  • AAA configuration
  • Console
  • Virtual terminals
  • In-band/Out-of-band management
  • Managed vs unmanaged

+ See more details

2.7 Install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices

  • Small office/home office wireless router
  • Wireless access points
  • Device density
  • Roaming
  • Wireless controllers
  • VLAN pooling
  • LWAPP
  • Wireless bridge
  • Site surveys
  • Heat maps
  • Frequencies
  • 2.4 Ghz
  • 5.0 Ghz
  • Channels
  • Goodput
  • Connection types
  • 802.11a-ht
  • 802.11g-ht
  • Antenna placement
  • Antenna types
  • Omnidirectional
  • Unidirectional
  • MIMO/MUMIMO
  • Signal strength
  • Coverage
  • Differences between device antennas
  • SSID broadcast
  • Topologies
  • Adhoc
  • Mesh
  • Infrastructure
  • Mobile devices
  • Cell phones
  • Laptops
  • Tablets
  • Gaming devices
  • Media devices

+ See more details

3.0 Network security

3.1 Compare and contrast risk related concepts

  • Disaster recovery
  • Business continuity
  • Battery backups/UPS
  • First responders
  • Data breach
  • End user awareness and training
  • Single point of failure
  • Critical nodes
  • Critical assets
  • Redundancy
  • Adherence to standards and policies
  • Vulnerability scanning
  • Penetration testing

+ See more details

3.2 Compare and contrast common network vulnerabilities and threats

  • Attacks/threats
  • Denial of service
  • Distributed DoS
  • Botnet
  • Traffic spike
  • Coordinated attack
  • Reflective/amplified
  • DNS
  • NTP
  • Smurfing
  • Friendly/unintentional DoS
  • Physical attack
  • Permanent DoS
  • ARP cache poisoning
  • Packet/protocol abuse
  • Spoofing
  • Wireless
  • Evil twin
  • Rogue AP
  • War driving
  • War chalking
  • Bluejacking
  • Bluesnarfing
  • WPA/WEP/WPS attacks
  • Brute force
  • Session hijacking
  • Social engineering
  • Man-in-the-middle
  • VLAN hopping
  • Compromised system
  • Effect of malware on the network
  • Insider threat/malicious employee
  • Zero day attacks
  • Vulnerabilities
  • Unnecessary running services
  • Open ports
  • Unpatched/legacy systems
  • Unencrypted channels
  • Clear text credentials
  • Unsecure protocols
  • TELNET
  • HTTP
  • SLIP
  • FTP
  • TFTP
  • SNMPv1 and SNMPv2
  • TEMPEST/RF emanation

+ See more details

3.3 Given a scenario, implement network hardening techniques

  • Anti-malware software
  • Host-based
  • Cloud/server-based
  • Network-based
  • Switch port security
  • DHCP snooping
  • ARP inspection
  • MAC address filtering
  • VLAN assignments
  • Network segmentation
  • Security policies
  • Disable unneeded network services
  • Use secure protocols
  • SSH
  • SNMPv3
  • TLS/SSL
  • SFTP
  • HTTPS
  • IPsec
  • Access lists
  • Web/content filtering
  • Port filtering
  • IP filtering
  • Implicit deny
  • Wireless security
  • WEP
  • WPA/WPA2
  • Enterprise
  • Personal
  • TKIP/AES
  • 802.1x
  • TLS/TTLS
  • MAC filtering
  • User authentication
  • CHAP/MSCHAP
  • PAP
  • EAP
  • Kerberos
  • Multifactor authentication
  • Tw-factor authentication
  • Single sign-on
  • Hashes
  • MD5
  • SHA

+ See more details

3.4 Compare and contrast physical security controls

  • Mantraps
  • Network closets
  • Video monitoring of IP cameras/CCTVs
  • Door access controls
  • Proximity readers/key fob
  • Biometrics
  • Keypad/cipher locks
  • Security guard

+ See more details

3.5 Given a scenario, install and configure a basic firewall

  • Types of firewalls
  • Host-based
  • Network-based
  • Software vs hardware
  • Application aware/context aware
  • Small office/home office firewall
  • Stateful vs stateless inspection
  • UTM
  • Settings/techniques
  • ACL
  • Virtual wire vs routed
  • DMZ
  • Implicit deny
  • Block/allow
  • Outbound traffic
  • Inbound traffic
  • Firewall placement
  • Internal/external

+ See more details

3.6 Explain the purpose of various network access control models

  • 802.1x
  • Posture assessment
  • Guest network
  • Persistent vs non-persistent agents
  • Quarantine network
  • Edge vs access control

+ See more details

3.7 Summarize basic forensic concepts

  • First responder
  • Secure the area of Escalate when necessary
  • Document the scene
  • eDiscovery
  • Evidence/data collection
  • Chain of custody
  • Data transport
  • Forensics report
  • Legal hold

+ See more details

4.0 Troubleshooting

4.1 Given a scenario, implement the following network troubleshooting methodology

  • Identify the problem
  • Gather information
  • Duplicate the problem, if possible
  • Question users
  • Identify symptoms
  • Determine if anything has changed
  • Approach multiple problems individually
  • Establish a theory of probable cause
  • Question the obvious
  • Consider multiple approaches
  • Top-t0-bottom/bottom-to-top OSI model
  • Divide and conquer
  • Test the theory to determine cause
  • Once theory is confirmed, determine next steps to resolve problem
  • If theory is not confirmed, re-establish new theory or escalate
  • Establish a plan of action to resolve the problem and identify potential effects
  • Implement the solution or escalate as necessary
  • Verify full system functionality and if applicable implement preventative measures
  • Document findings, actions, and outcomes

+ See more details

4.2 Given a scenario, analyze and interpret the output of troubleshooting tools

  • Command line tools
  • ipconfig
  • netstat
  • ifconfig
  • ping/ping6/ping -6
  • tracert/tracert -6/traceroute6/traceroute -6
  • nbtstat
  • nslookup
  • arp
  • mac address lookup table
  • pathping
  • Line testers
  • Certifiers
  • Multimeter
  • Cable tester
  • Light meter
  • Toner probe
  • Speed test sites
  • Looking glass sites
  • WiFi analyzer
  • Protocol analyzer

+ See more details

4.3 Given a scenario, troubleshoot and resolve common wireless issues

  • Signal loss
  • Interference
  • Overlapping channels
  • Mismatched channels
  • Signal-to-noise ratio
  • Device saturation
  • Bandwidth saturation
  • Untested updates
  • Wrong SSID
  • Power levels
  • Open networks
  • Rogue access point
  • Wrong antenna type
  • Incompatibilities
  • Wrong encryption
  • Bounce
  • MIMO
  • AP placement
  • AP configurations
  • LWAPP
  • Thin vs thick
  • Environmental factors
  • Concrete walls
  • Window film
  • Metal studs
  • Wireless standard related issues
  • Throughput
  • Frequency
  • Distance
  • Channels

+ See more details

4.4 Given a scenario, troubleshoot and resolve common copper cable issues

  • Shorts
  • Opens
  • Incorrect termination (mismatched standards)
  • Straight-through
  • Crossover
  • Cross-talk
  • Near end
  • Far end
  • EMI/RFI
  • Distance limitations
  • Attenuation/Db loss
  • Bad connector
  • Bad wiring
  • Split pairs
  • Tx/Rx reverse
  • Cable placement
  • Bad SFP/GBIC -cable or transceiver

+ See more details

4.5 Given a scenario, troubleshoot and resolve common fiber cable issues

  • Attenuation/Db loss
  • SFP/GBIC -cable mismatch
  • Bad SFP/GBIC -cable or transceiver
  • Wavelength mismatch
  • Fiber type mismatch
  • Dirty connectors
  • Connector mismatch
  • Bend radius limitations
  • Distance limitations

+ See more details

4.6 Given a scenario, troubleshoot and resolve common network issues

  • Incorrect IP configuration/default gateway
  • Broadcast storms/switching loop
  • Duplicate IP
  • Speed and duplex mismatch
  • End-to-end connectivity
  • Incorrect VLAN assignment
  • Hardware failure
  • Misconfigured DHCP
  • Misconfigured DNS
  • Incorrect interface/interface misconfiguration
  • Cable placement
  • Interface errors
  • Simultaneous wired/wireless connections
  • Discovering neighboring devices/nodes
  • Power failure/power anomalies
  • MTU/MTU black hole
  • Missing IP routes
  • NIC teaming misconfiguration
  • Active-active vs active-passive
  • Multicast vs broadcast

+ See more details

4.7 Given a scenario, troubleshoot and resolve common security issues

  • Misconfigured firewall
  • Misconfigured ACLs/applicatins
  • Malware
  • Denial of service
  • Open/closed ports
  • ICMP related issues
  • Ping of death
  • Unreachable default gateway
  • Unpatched firmware/OSs
  • Malicious users
  • Trusted
  • Untrusted users
  • Packet sniffing
  • Authentication issues
  • TACACS/RADIUS misconfigurations
  • Default passwords/settings
  • Improper access/backdoor access
  • ARP issues
  • Banner grabbing/OUI
  • Domain/local group configurations
  • Jamming

+ See more details

4.8 Given a scenario, troubleshoot and resolve common WAN issues

  • Loss of internet connectivity
  • Interface errors
  • Split horizon
  • DNS issues
  • Interference
  • Router configurations
  • Customer premise equipment
  • Smart jack/NIU
  • Demarc
  • Loopback
  • CSU/DSU
  • Copper line drivers/repeaters
  • Company security policy
  • Throttling
  • Blocking
  • Fair access policy/utilization limits
  • Satellite issues
  • Latency

+ See more details

5.0 Industry standards, practices, and network theory

5.1 Analyze a scenario and determine the corresponding OSI layer

  • Layer 1 – Physical
  • Layer 2 – Data link
  • Layer 3 – Network
  • Layer 4 – Transport
  • Layer 5 – Session
  • Layer 6 – Presentation
  • Layer 7 – Application

+ See more details

5.2 Explain the basics of network theory and concepts

  • Encapsulation/de-encapsulation
  • Modulation techniques
  • Multiplexing
  • De-multiplexing
  • Analog and digital techniques
  • TDM
  • Numbering systems
  • Binary
  • Hexadecimal
  • Octal
  • Broadband/base band
  • Bit rates vs baud rate
  • Sampling size
  • CDMA
  • CSMA/CD and CSMA/CA
  • Carrier detect/sense
  • Wavelength
  • TCP/IP suite
  • ICMP
  • UDP
  • TCP
  • Collision

+ See more details

5.3 Given a scenario, deploy the appropriate wireless standard

  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11n
  • 802.11ac

+ See more details

5.4 Given a scenario, deploy the appropriate wired connectivity standard

  • Ethernet standards
  • 10BaseT
  • 100BaseT
  • 1000BaseT
  • 1000BaseTX
  • 10GBaseT
  • 100BaseFX
  • 10Base2
  • 10GBaseSR
  • 10GBaseER
  • 10GBaseSW
  • IEEE 1905.1-2013
  • Ethernet over HDMI
  • Ethernet over power line
  • Wiring standards
  • EIA/TIA 568A/568B
  • Broadband standards
  • DOCSIS

+ See more details

5.5 Given a scenario, implement the appropriate policies or procedures

  • Security policies
  • Consent to monitoring
  • Network policies
  • Acceptable use policy
  • Standard business documents
  • SLA
  • MOU
  • MSA
  • SOW

+ See more details

5.6 Summarize safety practices

  • Electrical safety
  • Grounding
  • ESD
  • Static
  • Installation safety
  • Lifting equipment
  • Rack installation
  • Placement
  • Tool safety
  • MSDS
  • Emergency procedures
  • Building layout
  • Fire escape plan
  • Safety/emergency exits
  • Fail open/fail close
  • Emergency alert system
  • Fire suppression systems
  • HVAC

+ See more details

5.7 Given a scenario, install and configure equipment in the appropriate location using best practices

  • Intermediate distribution frame
  • Main distribution frame
  • Cable management
  • Patch panels
  • Power management
  • Power converters
  • Circuits
  • UPS
  • Inverters
  • Power redundancy
  • Device placement
  • Air flow
  • Cable trays
  • Rack systems
  • Server rail racks
  • Two-post racks
  • Four-post racks
  • Free-standing racks
  • Labeling
  • Port labeling
  • System labeling
  • Circuit labeling
  • Naming conventions
  • Patch panel labeling
  • Rack monitoring
  • Rack security

+ See more details

5.8 Explain the basics of change management procedures

  • Document reason for a change
  • Change request
  • Configuration procedures
  • Rollback process
  • Potential impact
  • Notification
  • Approval process
  • Maintenance window
  • Authorized downtime
  • Notification of change
  • Documentation
  • Network configurations
  • Additions to network
  • Physical location changes

+ See more details

5.9 Compare and contrast the following ports and protocols

  • 80 HTTP
  • 443 HTTPS
  • 137-139 NetBIOS
  • 110 POP
  • 143 IMAP
  • 25 SMTP
  • 5060/5061 SIP
  • 2427/2727 MGCP
  • 5004/5005 RTP
  • 1720 H.323
  • TCP
  • Connection-oriented
  • UDP
  • Connectionless

+ See more details

5.10 Given a scenario, configure and apply the appropriate ports and protocols

  • 20,21 FTP
  • 161 SNMP
  • 22 SSH
  • 23 Telnet
  • 53 DNS
  • 67,68 DHCP
  • 69 TFTP
  • 445 SMB
  • 3389 RDP

+ See more details

CTU Training Solutions, Updated: June 28th, 2018

Share with friends