Free CompTIA Network+ Study Guide

Free CompTIA Network+ Study Guide

Certiology’s CompTIA Network+ ( Network Plus ) N10-005 Computer Network  Technician Study guide, Notes and Tutorials are exactly what you need to prepare for your CompTIA Network+ ( Network Plus ) or N+ final exam.

Our free CompTIA Network+ ( Network Plus ) or N+ Study Guide gives you the opportunity to identify any knowledge gaps so you can refine your study strategy and ensure a passing score!

1.0 Networking Concepts

1.1 Compare the layers of the OSI and TCP/IP models.

1.2 Classify how applications, devices, and protocols relate to the OSI model

1.3 Explain the purpose and properties of IP addressing.

1.4 Explain the purpose and properties of routing and switching.

  • EIGRP
  • OSPF
  • RIP
  • Link state vs. distance vector vs. hybrid
  • Static vs. dynamic
  • Routing metrics
    • Hop counts
    • MTU, bandwidth
    • Costs
    • Latency
  • Next hop
  • Spanning-Tree Protocol
  • VLAN (802.1q)
  • Port mirroring
  • Broadcast domain vs. collision domain
  • IGP vs. EGP
  • Routing tables
  • Convergence (steady state)

1.5 Identify common TCP and UDP default ports.

1.6 Explain the function of common networking protocols.

1.7  Summarize DNS concepts and its components.

1.8 Given a scenario, implement the following network troubleshooting

  • methodology
  • Identify the problem:
    • Information gathering
    • Identify symptoms
    • Question users
    • Determine if anything has changed
  • Establish a theory of probable cause
    • Question the obvious
  • Test the theory to determine cause:
    • Once theory is confirmed determine next steps to resolve problem.
    • If theory is not confirmed, re-establish new theory or escalate.
  • Establish a plan of action to resolve the problem and identify potential effects
  • Implement the solution or escalate as necessary
  • Verify full system functionality and if applicable implement preventative measures
  • Document findings, actions and outcomes

1.9 Identify virtual network components.

2.0 Network Installation and Configuration

2.1 Given a scenario, install and configure routers and switches.

2.2 Given a scenario, install and configure a wireless network.

  • WAP placement
  • Antenna types
  • Interference
  • Frequencies
  • Channels
  • Wireless standards
  • SSID (enable/disable)
  • Compatibility (802.11 a/b/g/n)

2.3 Explain the purpose and properties of DHCP.

2.4 Given a scenario, troubleshoot common wireless problems.

  • Interference
  • Signal strength
  • Configurations
  • Incompatibilities
  • Incorrect channel
  • Latency
  • Encryption type
  • Bounce
  • SSID mismatch
  • Incorrect switch placement

2.5 Given a scenario, troubleshoot common router and switch problems.

  • Switching loop
  • Bad cables/improper cable types
  • Port configuration
  • VLAN assignment
  • Mismatched MTU/MUT black hole
  • Power failure
  • Bad/missing routes
  • Bad modules (SFPs, GBICs)
  • Wrong subnet mask
  • Wrong gateway
  • Duplicate IP address
  • Wrong DNS

2.6 Given a set of requirements, plan and implement a basic SOHO network.

  • List of requirements
  • Cable length
  • Device types/requirements
  • Environment limitations
  • Equipment limitations
  • Compatibility requirements

3.0 Network Media and Topologies

3.1 Categorize standard media types and associated properties.

3.2 Categorize standard connector types based on network media.

  • Fiber:
    • ST
    • SC
    • LC
    • MTRJ
  • Copper:
    • RJ-45
    • RJ-11
    • BNC
    • F-connector
    • DB-9 (RS-232)
    • Patch panel
    • 110 block (T568A, T568B)

3.3 Compare and contrast different wireless standards.

3.4 Categorize WAN technology types and properties.

  • Types:
    • T1/E1
    • T3/E3
    • DS3
    • OCx
    • SONET
    • SDH
    • DWDM
    • Satellite
    • ISDN
    • Cable
    • DSL
    • Cellular
    • WiMAX
    • LTE
    • HSPA+
    • Fiber
    • Dialup
    • PON
    • Frame relay
    • ATMs
  • Properties:
    • Circuit switch
    • Packet switch
    • Speed
    • Transmission media
    • Distance

3.5 Describe different network topologies.

3.6 Given a scenario, troubleshoot common physical connectivity problems.

  • Cable problems:
    • Bad connectors
    • Bad wiring
    • Open, short
    • Split cables
    • DB loss
    • TXRX reversed
    • Cable placement
    • EMI/Interference
    • Distance
    • Cross-talk

3.7 Compare and contrast different LAN technologies.

  • Types:
    • Ethernet
    • 10BaseT
    • 100BaseT
    • 1000BaseT
    • 100BaseTX
    • 100BaseFX
    • 1000BaseX
    • 10GBaseSR
    • 10GBaseLR
    • 10GBaseER
    • 10GBaseSW
    • 10GBaseLW
    • 10GBaseEW
    • 10GBaseT
  • Properties:
    • CSMA/CA
    • Broadcast
    • Collision
    • Bonding
    • Speed
    • Distance

3.8 Identify components of wiring distribution.

  • IDF
  • MDF
  • Demarc
  • Demarc extension
  • Smart jack
  • CSU/DSU

 4.0 Network Management

4.1 Explain the purpose and features of various network appliances.

4.2 Given a scenario, use appropriate hardware tools to troubleshoot connectivity issues.

  • Cable tester
  • Cable certifier
  • Crimper
  • Butt set
  • Toner probe
  • Punch down tool
  • Protocol analyzer
  • Loop back plug
  • TDR
  • OTDR
  • Multimeter
  • Environmental monitor

4.3 Given a scenario, use appropriate software tools to troubleshoot connectivity issues.

  • Protocol analyzer
  • Throughput testers
  • Connectivity software
  • Ping
  • Tracert/traceroute
  • Dig
  • Ipconfig/ifconfig
  • Nslookup
  • Arp
  • Nbtstat
  • Netstat
  • Route

4.4 Given a scenario, use the appropriate network monitoring resource to analyze traffic.

4.5 Describe the purpose of configuration management documentation.

  • Wire schemes
  • Network maps
  • Documentation
  • Cable management
  • Asset management
  • Baselines
  • Change management

4.6 Explain different methods and rationales for network performance optimization.

  • Methods:
    • QoS
    • Traffic shaping
    • Load balancing
    • High availability
    • Caching engines
    • Fault tolerance
    • CARP
  • Reasons:
    • Latency sensitivity
    • High bandwidth applications (VoIP, video applications, unified communications)
    • Uptime

5.0 Network Security

5.1 Given a scenario, implement appropriate wireless security measures.

5.2 Explain the methods of network access security.

5.3 Explain methods of user authentication.

5.4 Explain common threats, vulnerabilities, and mitigation techniques.

  • Wireless:
    • War driving
    • War chalking
    • WEP cracking
    • WPA cracking
    • Evil twin
    • Rogue access point
  • Attacks:
    • DoS
    • DDoS
    • Man in the middle
    • Social engineering
    • Virus
    • Worms
    • Buffer overflow
    • Packet sniffing
    • FTP bounce
    • Smurf
  •  Mitigation techniques:
    • Training and awareness
    • Patch management
    • Policies and procedures
    • Incident response

5.5 Given a scenario, install and configure a basic firewall.

  • Types:
    • Software and hardware firewalls
  • Port security
  • Stateful inspection vs. packet filtering
  • Firewall rules:
    • Block/allow
    • Implicit deny
    • ACL
  • NAT/PAT
  • DMZ

5.6 Categorize different types of network security appliances and methods.

  • IDS and IPS:
  • Vulnerability scanners:
    • NESSUS
    • NMAP
  •  Methods:
    • Honeypots
    • Honeynets

 

Search

Shortcodes Ultimate

 
Follow Us
 
BGP