Network+ N10-004 Exam Objectives
The CompTIA Network+ N10-004 exam is based on the following objectives. The percentages indicate the relative weight of each major topic area on the exam.
1.0 Network Technologies (20% of examination)
1.1 Explain the function of common networking protocols
- TCP
- FTP
- UDP
- TCP/IP suite
- DHCP
- TFTP
- DNS
- HTTP(S)
- ARP
- SIP (VoIP)
- RTP (VoIP)
- SSH
- POP3
- NTP
- IMAP4
- Telnet
- SMTP
- SNMP2/3
- ICMP
- IGMP
- TLS
1.2 Identify commonly used TCP and UDP default ports
TCP ports
- FTP — 20, 21
- SSH — 22
- TELNET — 23
- SMTP — 25
- DNS — 53
- HTTP — 80
- POP3 — 110
- NTP — 123
- IMAP4 — 143
- HTTPS — 443
UDP ports
- TFTP — 69
- DNS — 53
- BOOTPS/DHCP — 67
- SNMP — 161
1.3 Identify the following address formats
- IPv6
- IPv4
- MAC addressing
1.4 Given a scenario, evaluate the proper use of the following addressing technologies and addressing schemes
Addressing Technologies
- Subnetting
- Classful vs. classless (e.g. CIDR, Supernetting)
- NAT
- PAT
- SNAT
- Public vs. private
- DHCP (static, dynamic APIPA)
Addressing schemes
- Unicast
- Multicast
- Broadcast
1.5 Identify common IPv4 and IPv6 routing protocols
Link state
- OSPF
- IS-IS
Distance vector
- RIP
- RIPv2
- BGP
Hybrid
- EIGRP
1.6 Explain the purpose and properties of routing
- IGP vs. EGP
- Static vs. dynamic
- Next hop
- Understanding routing tables and how they pertain to path selection
- Explain convergence (steady state)
1.7 Compare the characteristics of wireless communication standards
802.11 a/b/g/n
- Speeds
- Distance
- Channels
- Frequency
Authentication and encryption
- WPA
- WEP
- RADIUS
- TKIP
2.0 Network Media and Topologies (20% of examination)
2.1 Categorize standard cable types and their properties
Type:
- CAT3, CAT5, CAT5e, CAT6
- STP, UTP
- Multimode fiber, single-mode fiber
- Coaxial
- RG-59
- RG-6
- Serial
- Plenum vs. Non-plenum
Properties:
- Transmission speeds
- Distance
- Duplex
- Noise immunity (security, EMI)
- Frequency
2.2 Identify common connector types
- RJ-11
- RJ-45
- BNC
- SC
- ST
- LC
- RS-232
2.3 Identify common physical network topologies
- Star
- Mesh
- Bus
- Ring
- Point to point
- Point to multipoint
- Hybrid
2.4 Given a scenario, differentiate and implement appropriate wiring standards
- 568A
- 568B
- Straight vs. cross-over
- Rollover
- Loopback
2.5 Categorize WAN technology types and properties
Type:
- Frame relay
- E1/T1
- ADSL
- SDSL
- VDSL
- Cable modem
- Satellite
- E3/T3
- OC-x
- Wireless
- ATM
- SONET
- MPLS
- ISDN BRI
- ISDN PRI
- POTS
- PSTN
Properties
- Circuit switch
- Packet switch
- Speed
- Transmission media
- Distance
2.6 Categorize LAN technology types and properties
Types:
- Ethernet
- 10BaseT
- 100BaseTX
- 100BaseFX
- 1000BaseT
- 1000BaseX
- 10GBaseSR
- 10GBaseLR
- 10GBaseER
- 10GBaseSW
- 10GBaseLW
- 10GBaseEW
- 10GBaseT
Properties
- CSMA/CD
- Broadcast
- Collision
- Bonding
- Speed
- Distance
2.7 Explain common logical network topologies and their characteristics
- Peer to peer
- Client/server
- VPN
- VLAN
2.8 Install components of wiring distribution
- Vertical and horizontal cross connects
- Patch panels
- 66 block
- MDFs
- IDFs
- 25 pair
- 100 pair
- 110 block
- Demarc
- Demarc extension
- Smart jack
- Verify wiring installation
- Verify wiring termination
3.0 Network Devices (17% of examination)
3.1 Install, configure and differentiate between common network devices
- Hub
- Repeater
- Modem
- NIC
- Media converters
- Basic switch
- Bridge
- Wireless access point
- Basic router
- Basic firewall
- Basic DHCP server
3.2 Identify the functions of specialized network devices
- Multilayer switch
- Content switch
- IDS/IPS
- Load balancer
- Multifunction network devices
- DNS server
- Bandwidth shaper
- Proxy server
- CSU/DSU
3.3 Explain the advanced features of a switch
- PoE
- Spanning tree
- VLAN
- Trunking
- Port mirroring
- Port authentication
3.4 Implement a basic wireless network
- Install client
- Access point placement
- Install access point
- Configure appropriate encryption
- Configure channels and frequencies
- Set ESSID and beacon
- Verify installation
4.0 Network Management (20% of examination)
4.1 Explain the function of each layer of the OSI model
- Layer 1 — physical
- Layer 2 — data link
- Layer 3 — network
- Layer 4 — transport
- Layer 5 — session
- Layer 6 — presentation
- Layer 7 — application
4.2 Identify types of configuration management documentation
- Wiring schematics
- Physical and logical network diagrams
- Baselines
- Policies, procedures and configurations
- Regulations
4.3 Given a scenario, evaluate the network based on configuration management documentation
- Compare wiring schematics, physical and logical network diagrams, baselines, policies and procedures and configurations to network devices and infrastructure
- Update wiring schematics, physical and logical network diagrams, configurations and job logs as needed
4.4 Conduct network monitoring to identify performance and connectivity issues using the following:
- Network monitoring utilities (e.g. packet sniffers, connectivity software, load testing, throughput testers)
- System logs, history logs, event logs
4.5 Explain different methods and rationales for network performance optimization
Methods:
- QoS
- Traffic shaping
- Load balancing
- High availability
- Caching engines
- Fault tolerance
Reasons:
- Latency sensitivity
- High bandwidth applications
- VoIP
- Video applications
- Uptime
4.6 Given a scenario, implement the following network troubleshooting methodology
- Information gathering — identify symptoms and problems
- Identify the affected areas of the network
- Determine if anything has changed
- Establish the most probable cause
- Determine if escalation is necessary
- Create an action plan and solution identifying potential effects
- Implement and test the solution
- Identify the results and effects of the solution
- Document the solution and the entire process
4.7 Given a scenario, troubleshoot common connectivity issues and select an appropriate solution
Physical issues:
- Cross talk
- Nearing crosstalk
- Near End crosstalk
- Attenuation
- Collisions
- Shorts
- Open impedance mismatch (echo)
- Interference
Logical issues:
- Port speed
- Port duplex mismatch
- Incorrect VLAN
- Incorrect IP address
- Wrong gateway
- Wrong DNS
- Wrong subnet mask
Issues that should be identified but escalated:
- Switching loop
- Routing loop
- Route problems
- Proxy arp
- Broadcast storms
Wireless Issues:
- Interference (bleed, environmental factors)
- Incorrect encryption
- Incorrect channel
- Incorrect frequency
- ESSID mismatch
- Standard mismatch (802.11 a/b/g/n)
- Distance
- Bounce
- Incorrect antenna placement
5.0 Network Tools (12% of examination)
5.1 Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality
- Traceroute
- Ipconfig
- Ifconfig
- Ping
- Arp ping
- Arp
- Nslookup
- Hostname
- Dig
- Mtr
- Route
- Nbtstat
- Netstat
5.2 Explain the purpose of network scanners
- Packet sniffers
- Intrusion detection software
- Intrusion prevention software
- Port scanners
5.3 Given a scenario, utilize the appropriate hardware tools
- Cable testers
- Protocol analyzer
- Certifiers
- TDR
- OTDR
- Multimeter
- Toner probe
- Butt set
- Punch down tool
- Cable stripper
- Snips
- Voltage event recorder
- Temperature monitor
6.0 Network Security (11% of examination)
6.1 Explain the function of hardware and software security devices
- Network based firewall
- Host based firewall
- IDS
- IPS
- VPN concentrator
6.2 Explain common features of a firewall
- Application layer vs. network layer
- Stateful vs. stateless
- Scanning services
- Content filtering
- Signature identification
- Zones
6.3 Explain the methods of network access security
Filtering:
- ACL
- MAC filtering
- IP filtering
- Tunneling and encryption
- SSL VPN
- VPN
- L2TP
- PPTP
- IPSEC
- Remote access
- RAS
- RDP
- PPPoE
- PPP
- VNC
- ICA
- PKI
- Kerberos
- AAA
- RADIUS
- TACACS+
- Network access control
- 802.1x
- CHAP
- MS-CHAP
- EAP
- Physical security
- Restricting local and remote access
- Secure methods vs. unsecure methods
- SSH, HTTPS, SNMPv3, SFTP, SCP
- TELNET, HTTP, FTP, RSH, RCP, SNMPv1/2
- DoS
- Viruses
- Worms
- Attackers
- Man in the middle
- Smurf
- Rogue access points
- Social engineering (phishing)
- Policies and procedures
- User training
- Patches and updates
6.4 Explain methods of user authentication
6.5 Explain issues that affect device security
6.6 Identify common security threats and mitigation techniques
Security threats
Mitigation techniques