0 ratings0% found this document useful (0 votes) 72 views21 pagesNetwork + Objectives
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
IN
Network+
CompTIA Network+
Certification Exam
Objectives
EXAM NUMBER: IN1O#006)
—_ : ComeTlA.About the Exam
Candidates are encouraged to use this document to help prepare for the CompTIA Network+ Ni0-006,
exam. This exam willcertity that the successful candidate has the knowledge and skills required
to troubieshoot, configure and manage common network wireless and wired devices.
Knowledge and skills include:
+ Establishing basic network design and connectivity
+ Understanding and maintaining network documentation
+ Identifying network limitations and weaknesses
+ Implementing network security, standards and protocols.
The successful candidate will have a basicunderstanding of emerging technologies
including unified communications, mobile, cloud and virtualization technologies.
These content examples are meant to clarify the test objectives and should not be
construed as a comprehensive listing ofall the content of this examination,
EXAM ACCREDITATION
‘The CompTia Network exam is accredited by the American National Standards Institute
(ANS) to show compliance with the International Organization for Standardization (ISO) 37024
Standard and, as such, undergoes regular reviews and updates to the exam objectives
EXAM DEVELOPMENT
‘Comptia exams result from subject matter expert workshops and industry-wide survey
results regarding the skills and knowledge required of an entry-level IT professional.
CompTIA AUTHORIZED MATERIALS USE POLICY
Compria Certifications, LLCis notaffiliated with and does not authorize, endorse or condone utilizing any
content provided by unauthorized third-party training sites (aka “brain dumps”) Individuals who utilize
such materials in preparation for any CompTIA examination will have their certifications revoked and be
suspended from future testing in accordance with the CompTIA Candidate Agreement. In an effort to more
clearly communicate CompTIA’s exam policies on use of unauthorized study materials, CompTIA directs
all certification candidates to the CompTIA Certification Exam Policies. Please review all CompTIA policies
before beginning the study process for any CompTIA exam, Candidates will be required to abide by the
‘CompTIA Candidate Agreement fa candidate has a question as to whether study materials are considered
unauthorized aka “brain dumps"), he/she should perform a search using CertGuard's engine, found here
PLEASE NOTE
The lists of examples provided in bulleted format are not exhaustive lists. Other examples of
technologies, processes or tasks pertaining to each objective may also be included on the exam
although not listed or covered inthis objectives document, CompTIA is constantly reviewing the
Content of our exams and updating test questions to be sure our exams are current and the security
of the questions is protected, When necessary, we will publish updated exams based on existing
‘exam objectives. Please know that all related exam preparation materials will til be valid
onpinstnak Creation ta jee Yeon oa Nombe eee) CompTlA.‘TEST DETAILS
Required exam 20-006
1Ko-023 for CompTIA Academy Partners only)
Number of questions Maximum of 90
‘Types of questions ‘Multiple choice and performance-based
Length of test sominutes
Recommended experience + CompTiAAt Certified, or equivalent
+ Minimum of g months of experience in
network support or administration; or academic training
Passing score 720 (on ascale of 100-900)
EXAM OBJECTIVES (DOMAINS)
‘The table below lists the domains measured by this examination
and the extent to which they are represented:
Cen Parsi igoe cd
CompriaNetwerks Certification Exam Objectives Version 29 fea Number: 20008)
CompTlA.-1.0 Network Architecture
_@ Explain the functions and applications of various network devices.
«Router s1Ds/Ps Analog modem
«Switch + Access point (wireless/wired) + Packet shaper
«+ Multilayer switch Content filter + -VPN concentrator
+ Firewall + Load balancer
+ HIDS “Hub
Compare and contrast the use of networking services and applications.
“ven sTACACS/RADIUS
-Sitetositeyhost-tositeyhostto-host_ + RAS.
Protocols + Web services
IPsec + Unified voice services
-GRE Network controllers
-SSLVEN
-PTP/PPTP
Install and configure the following networking services/applications.
“DHCP “DNs NAT
+ Statics. dynamic IP addressing, “DNS servers “PAT
Reservations DNS records (A, MX, AAA, CNAME, PTR) -SNAT
Scopes = Dynamic DNS -ONAT
Leases + Proxy/reverse proxy Port forwarding
Options (ONS servers, sufixes)
IP helper/DHCP relay
Explain the characteristics and benefits of various WAN technologies.
Fiber + Ppp/multilink PPP + Leased lines
~SONET “+ MPLS a
-DwoM + GSM/COMA 3
=CWOM “UTE/4G oe
+ Frame relay *HSPAL +63
+ Satelite “36 -0C3
Broadband cable “Edge -0ca2
+ DSY/ADSL. + Dialup + Circuit switch vs. packet switch
+ ISON + WIMAX
ATA + MetroEthernet
Compna ewer Cetin Exam Objectives Meson 0(Eam Number) CompwtlA.Lo Network Architecture TL
a Install and properly terminate various cable types
and connectors using appropriate tools.
*Copperconnectors Straight-through vs, Tools
“Ria crossover vs.rollover Cable crimpers
Ress + Fiber connectors -Punchdown tool
Ryg8C “st “Wire strippers
DagyRs232 sc Snips
-DBa5 oc -OTOR
-UTP coupler -MTR) “Cable certifier
“BNC coupler FC
Nc - Fiber coupler
F-connector Fiber cables
220 block -Single mode
66 block -Multimode
“Copper cables APCs, UPC
‘Shielded vs. unshielded
CAT, CATS, CATSe, CATS, CATEa
-PVC vs. plenum
RGsg
RCS
+ Media converters
Single-mode fiber to Ethernet
Multimode fiber to Ethernet
-Fiber to coaxial
+ Single-made to multimode fiber
@ Differentiate between common network topologies.
Mesh Bus + Pointto-point
Partial Ring + Point-tormultipoint
Full Star + Client-server
Hybrid Peer-to-peer
Differentiate between network infrastructure implementations.
“WAN sSCADA/ICS
MAN “ICS server
+LAN DcS/closed network
“WLAN Remote terminal unit
Hotspot Programmable logic controller
PAN + Medianets
Bluetooth vic
iR “ISDN
“NF “1Py/SIP
‘Compra Networks Certication Exam Objectives Version x0 (Exam Number: Nao)
Compr,10 Network Architecture oh
a Given a scenario, implement and configure the
appropriate addressing schema.
“Pv “Tunneling 6t04, 4to6
‘Auto-contfiguration ‘Teredo, miredo + Private vs. public
-EUI64 PVG “+ NAT/PAT
DHCPE Address structure + MAC addressing
Linklocal -Subnetting
Address structure -APIPA
Address compression -Classtul A, 8,0 Broadcast
Classless + Broadcast domains vs. collision domains
a Explain the basics of routing concepts and protocols.
+ Loopback interface + Link state routing protocols, + Route aggregation
+ Routing loops OSPF + Routing metrics
+ Routing tables “Isis -Hop counts
+ Static vs. dynamic routes + Interior vs. exterior gateway -MTU, bandwidth
+ Default route routing protocols “Costs
+ Distance vector routing protocols, + Autonomous system numbers Latency
RuPV2 + Route redistribution ‘Administrative distance
+ Hybrid routing protocols + High availability SPB
“BGP -VRRP
Virtual IP
HSRP.
@® Identify the basics elements of unified communication technologies.
Vole + Q05 Devices
“Video =DscP UCservers
+ Real-time services -COs UC devices
Presence UC gateways
Multicast vs. unicast
CompTlA.
Compria Newark Certification Exam Objectives Version 19 Exam Number N36006)Lo Network Architecture a
@ Compare and contrast technologies that
support cloud and virtualization.
+ Virtualization + Storage area network + Cloud concepts
Virtual switches iscst Public iaas, Saas, Pas
Virtual routers “Jumbo frame - Private laa, SaaS, PaaS
Virtual firewall «Fibre Channel Hybrid laas, Saas, PaaS
Virtual vs. physical NICs Network attached storage Community laaS, Saas, Paas
-Software-defined networking
© aivena set of requirements, implement a basic network.
+ List of requirements
+ Device types/requirements
+ Environment limitations
+ Security considerations-2.0 Network Operations
Bi Given a scenario, use appropriate monitoring tools.
+ Packet/network analyzer Alerts + Power monitoring tools
+ Interface monitoring tools “Email + Wireless survey tools
+ Port scanner -SMS + Wireless analyzers
+ Top talkersilisteners + Packet low monitoring
+SNMP management software + SYSLOG
Trap SIEM
-Get + Environmental monitoring tools
Walk “Temperature
MiBs “Humidity
® Given a scenario, analyze metrics and reports from
monitoring and tracking performance tools.
+ Baseline Network device CPU
+ Bottleneck. -Network device memory
+ Logmanagement -Wireless channel utilization
+ Graphing + Link status
+ Utilization + Interface monitoring
Bandwidth “Errors
Storage - Utilization
-Discards
Packet drops
Interface resets
‘Speed and duplex
@ Given a scenario, use appropriate resources to
support configuration management.
+ Archives/backups NAC
+ Baselines Documentation
+ On-boarding and oft-boarding Network diagrams (logical/physical)
of mobile devices Asset management
IP address utilization
Vendor documentation
-Internal operating procedures/
policies/standards
@ explain the importance of implementing network segmentation.
+ SCADA systems/industrial control systems
+ Legacy systems
+ Separate private/public networks
+Honeypot/honeynet
+Testinglab
+ Load balancing
Comatiatetwork Certication Exam Objectives Version x9 (Exam Number: 0.006)
+ Performance optimization
+ Security
+ Compliance
CompllA20 Network Operations
B civena scenario, install and apply patches and updates.
+ 0Supdates + Feature changes/updates + Upgrading vs. downgrading
+ Firmware updates ‘+ Major vs. minor updates Configuration backup
+ Driver updates + Vulnerability patches
@ Given a scenario, configure a switch using proper features.
“VLAN -Trunking/80239 + Switch management
+ Native VLAN/default VLAN Tag vs. untag WANs User/passwords
“vp Port bonding (LACP) -ARA configuration
+ Spanning tree (802.26)/rapid Port mirroring local vs, remote} Console
spanning tree (802.20) Speed and duplexing Virtual terminals
Flooding “IP address assignment -Imband/out-of-band management
+ Forwarding/blocking VLAN assignment + Managed vs. unmanaged
-Filtering + Default gateway
+ Interface configuration + PoE and PoE* (802 3af, So2.3at)
@ install and configure wireless LAN infrastructure and implement the
appropriate technologies in support of wireless capable devices.
+ Smal office, home office wireless router - Goodput + Topologies
+ Wireless access points *Connection types “adhoc
Device density “So2aag-ht Mesh
Roaming -Borarg-ht +Infrastructure
Wireless controllers Antenna placement + Mobile devices
“VLAN pooling. Antenna types Cell phones
“WARP. Omnidirectional Laptops
+ Wireless bridge Unidirectional “Tablets
+ Site surveys + MIMO/MUMIMO Gaming devices
Heat maps + Signal strength Media devices
+ Frequencies Coverage
24Gh2 = Differences between device antennas
-50Ghz +8510 broadcast
Channels
Compnntwak et eatin fam Ose Von (nr umber oa) ComplA-3.0 Network Security
© Compare and contrast risk related concepts.
‘Disaster recovery + End user awareness and training Adherence to standards and policies
+ Business continuity + Single point of failure + Vulnerability scanning
+ Battery backups/UPS -Critical nodes + Penetration testing
+ First responders Critical assets
Data breach « .*Redundancy
Compare and contrast common network vulnerabilities and threats.
+ Attacks/threats “Wireless + Zeroday attacks
=Dos Evil twin + Vulnerabilities
Distributed Dos Rogue AP Unnecessary running services
“Botnet = War driving. Open ports
Traffic spike War chalking, -Unpatched/legacy systems
*Coordinated attack Bluejacking, -Unencrypted channels
-Reflective/amplified -Bluesnarfing ~ Clear text credentials
= DNS -WPAYWEP/WPS attacks -Unsecure protocols
NTP Brute force “TELNET
-Smurfing, + Session hijacking. “HTTP
-Friendly/unintentional DoS Social engineering “SUP
Physical attack -Marvin-the:middle “FIP.
Permanent DoS = VLAN hopping “FT
“ARP cache poisoning -Compromised system = SNMPva and SNMPV2
+ Packet/protocol abuse + Effect of malware on the network ~TEMPEST/RF emanation
Spoofing «Insider threatfmalicious employee
Given a scenario, implement network hardening techniques.
+ Anti:malware software “TLS/SSL
023%
-Hostbased -SFTP sTus/TTis
-Cloud/serverbased HTTPS MAC filtering
-Networksbased IPsec + User authentication
+ Switch port security Access lists “CHAP/MSCHAP
“DHCP snooping -Web/content filtering PAP.
“ARP inspection = Port filtering “EAP
MAC address filtering -IP filtering Kerberos
“VLAN assignments Implicit deny Multifactor authentication
Network segmentation + Wireless security “Two-actor authentication
+ Security policies “WEP -Single sign-on,
+ Disable unneeded network services -WRA/WPAZ sHashes
Use! Enterprise “MDs :
“SSH -Personal “SHA
= SNMPY3 “TKIP/AES,
Comps Networks etieaon xamonetnesVesan (eran umber oe CompTlA.a Given a scenario, install and configure a basic firewall.
ypeofievials (Geen eniaues/
+ Firewall placement
‘based “ACL + Internal/external
“Network-based + Virtual wire vs. outed
~Software vs. hardware omz
~ Application aware/context aware Implicit deny
Small office, home office firewall -Block/allow
+Stateful vs, stateless inspection Outbound trafic
“UTM
+ Inbound traffic
’ @ Explain the purpose of various network access control models.
Como netwoke Cetin xan cies tn sfx hub 648) CompTlA-4.0 Troubleshooting
a Given a scenario, implement the following
network troubleshooting methodology.
+ Identify the problem
Gather information
‘Duplicate the probiem, if possible
Question users
= Identify symptoms
Determine if anything has changed
Approach multiple problems individually
+ Establisha theory of probable cause
Question the obvious
Consider multiple approaches
Top-to-bottom/
bottormto-top 051 model
= Divide and conquer
«Test the theory to determine cause
Once theory is confirmed, determine
ext steps to resolve problem
Hf theory is not confirmed, re
establish new theory or escalate
+ Establish a plan of action to resolve the
problem and identify potential effects
«Implement the solution or
escalateas necessary
+ Verify full system functionality
and, if applicable, implement
Preventative measures
+ Document findings, actions and outcom
Given a scenario, analyze and interpret the
output of troubleshooting tools.
+ Command line tools “arp
-ipconfignetstat +mac address lookup table
-ifconfig -pathping
-ping/ping6/ping-6 + Line testers
tracerttracert 6/ +Certifiers
tracerouteG/traceroute 6 + Multimeter
btstat + Cable tester
nslookup + Light meter
‘Toner probe
+ Speed test sites
+ Looking glass sites
+ WiFlanalyzer
+ Protocol analyzer
Given a scenario, troubleshoot and resolve common wireless issues.
+ Signal loss
+ Interference
+ Overlapping channels
~Mismatched channels
+ Signal-tenoise ratio
+ Device saturation
+ Bandwidth saturation
+ Rogue access point
+ Wrong antenna type
+ Incompatibilities
+ Wrong encryption
Bounce
MIMO
“AP placement
+ Untested updates + AP configurations
Wrong SSID =LWAPP
+ Power levels Thin vs. thick
+ Open networks
ompma Netwarke evtFcaton Exam Objectives Version 10 exam Number: Nx0008)
+ Environmental factors
Concrete walls
Window film
-Metal studs
+ Wireless standard related issues
‘Throughput
“Frequency
Distance
-Channels
CompTiA40 Troubleshooting
Given a scenario, troubleshoot and resolve common copper cable issues.
+ Shorts s EMI/RFL
Opens + Distance limitations
+ Incorrect termination + Attenuation/Db loss
(mismatched standards) + Bad connector
+ Straight-through + Bad wiring.
Crossover + Split pairs
+ Cross-talk + DyRK reverse
-Near end + Cable placement
Farend + Bad SFP/GBIC- cable or transceiver
@ civena scenario, troubleshoot and resolve common fiber cable issues,
+ Attenuation/Db loss + Dirty connectors
+ SFP/GBIC-cablemismatch *Connector mismatch
+ Bad SFP/GBIC- cable or transceiver + Bend radius limitations
+ Wavelength mismatch + Distance limitations
+ Fiber type mismatch
@civena scenario, troubleshoot and resolve common network issues,
“Incorrect configuration/default gateway Interface errors
+ Broadcast storms/switching loop + Simultaneous wired/wireless connections
Duplicate P + Discovering neighboring devices/nodes
+ Speed and duplex mismatch + Power failure/power anomalies
+ End-to-end connectivity + MTU/MTU black hole
+ Incorrect VLAN assignment + Missing IP routes
+ Hardware failure + NIC teaming misconfiguration
+ Misconfigured DHCP Active-active vs. active passive
+ Misconfigured DNS ~Multicastvs. broadcast
+ Incorrect interface/interface
misconfiguration
+ Cable placement4.0 Troubleshooting
@ivena scenario, troubleshoot and resolve common security issues.
+ Misconfigured firewall + Authentication issues
+ Misconfigured ACLs/applications ~TACACS/RADIUS misconfigurations
+ Malware Default passwords/settings
+Dos «Improper access/backdoor access
+ Open/closed ports ARP issues
sIEMP related issues + Banner grabbing/OUL
Ping of death + Domain/local group configurations —
-Unreachable default gateway Jamming
+ Unpatched firmware/OSs
+ Malicious users
Trusted
Untrusted users
Packet sniffing
Given a scenario, troubleshoot and resolve common WAN issues.
+ Loss of Internet connectivity + Customer premise equipment + Company security policy
+ Interface errors ‘Smart jack/NIU “Throttling
+ Split horizon, Demarc Blocking,
+ DNS issues Loopback Fair access policy/utilization limits
+ Interference ~csu/DSU + Satellite issues
+ Router configurations Copper line drivers/repeaters Latency
Compr Netw eatin Exam One Vesion 0 xan Number N06 Compa.-5.0 Industry Standards, Practices
and Network Theory
© analyze a scenario and determine the corresponding OSI layer.
+ Layera- Physical
+ Layer 2~ Data link
+ Layer 3 Network
+ Layer 4 Transport
+ Layer 7 ~ Application
* ) Explain the basics of network theory and concepts.
+ Encapsulation/de-encapsulation
+ Modulation techniques
Multiplexing
-Demultiplexing
Analog and digital techniques
“TOM
+ Numbering systems
Binary
Hexadecimal
-Octal
jroadband/baseband
it ratesvs. baud rate
Sampling size
+COMA
+ CSMA/CD and CSMA/CA,
+ Carrier detect/sense
Wavelength
“TCP/IP suite
“ICMP
-upP.
“TCP
Collision
(© Given a scenario, deploy the appropriate wireless standard.
802.214
+8022
+8028
+8023
sBozaaac
Given a scenario, deploy the appropriate wired connectivity standard.
+ Ethernet standards
+ 10BaseT
-2008aseT
+ 1000BaseT
-20008aseTX
-10GBaseT
+ 200BaseFX,
= 20Base2
20GBaseSR
-20GBaseER
-20GBasesW
“IEEE 19053-2013,
Ethernet over HDMI
-Ethemet over power line
‘Compra Network eriication Exam Objectives Version 10 (Exam Number Noe)
+ Wiring standards
EIA/TIA S6BA/S688
+ Broadband standards
*DOCSIS
CompiA.50 Industry Standards, Practices, and Network Theory
| Givena scenario, implement the appropriate policies or procedures.
+ Security policies + Standard business documents
Consent to monitoring SUA
+ Network policies Mou
+ Acceptable use policy MSA,
sow
Ba Summarize safety practices.
+ Electrical safety Placement, + Fail openvfal close
Grounding “Tool safety Emergency alert system
+850 +MsDs + Fire suppression systems
Static + Emergency procedures HVAC
+ Installation safety Buildinglayout
Lifting equipment Fire escape plan
+ Rack installation Safety/emergency exits
9 Givena scenario, install and configure equipment in
the appropriate location using best practices.
+ Intermediate distribution frame + Device placement + Labeling
+ Main distribution frame + Airflow + Portlabeling
Cable management + Cable trays + System labeling
Patch panels, + Rack systems -Circuitlabeling
+ Power management Serverrailracks Naming conventions
Power converters -Two-post racks Patch panel labeling
Circuits -Four-post racks + Rack monitoring
UPS + Freestanding racks + Rack security
Inverters
Power redundancy
a Explain the basics of change management procedures.
+ Document reason for a change + Maintenance window
+ Change request ‘Authorized downtime
Configuration procedures + Notification of change
Rollback process + Documentation
= Potential impact Network configurations
Notification Additions to network
Approval process + Physical location changes
Conpt twat ceiatin Bam betes Vso aft Number M9988) CompTlA.5.0 Industry Standards, Practices, and Network Theory
@ Compare and contrast the following ports and protocols.
+80 HTTP 135 sme step
sus HTTPS 5060/5062 SIP -Connection-oriented
+337239 NetBIOS. “277 MGCP upp
smo POP 5004/5005 RTP. -Connectiontess
+3 IMAP +3720 H323
& Givena scenario, configure and apply the
appropriate ports and protocols,
+2021 FTP
+361 SNMP.
“2 SSH
+23, Telnet
+53 ONS:
+6768 DHCP
+69 TIP
+458 SMB
+3389 ROP
Comprnewart Ceteaton Fam Ojcives son (Number Hoe) CompTlA.Network+ Acronym List
The followings a list of acronyms that appear on the CompTlA
Network+ exam. Candidates are encouraged to review the complete
list and attain a working knowledge of all listed acronyms as a
part of acomprehensive exam preparation program.
ACRONYM SPELLED OUT
A Address
AM Authentication, Authorization and Accounting
ARMA Authentication, Authorization,
Accounting and Address
ACL ‘Access Control List
ADSL Asymmetric Digital Subscriber Line
AES: ‘Advanced Encryption Standard
Aa ‘Authentication Header
AP Access Point
APC ‘Angle Polished Connector
AIPA ‘Automatic Private internet Protocol Addressing
APT Advanced Persistent Protocol
ARIN ‘American Registry for Internet Numbers
ARP ‘Address Resolution Protocol
as ‘Autonomous System
ASIC Application Specific Integrated Circuit
Asp Application Service Provider
ATM ‘Asynchronous Transfer Mode
AUP ‘Acceptable Use Policy
BERT Bit Error Rate Test
Bc Border Gateway Protocol
BLE Bluetooth Low Energy
BNC British Naval Connector
or Bayonet Neill Concelman
BootP Boot Protocol or Bootstrap Protocol
BeDU Bridge Protocol Data Unit
BRI Basic Rate Interface
BssID Basic Service Set Identifier
CAM Channel Access Method
CaN Campus Area Network
cane Common Address Redundancy Protocol
car Computer And Telephone
cc Closed Circuit TV
COMA Code Division Multiple Access
COMAICD Carrier Sense Multiple Access/Collision Detection
Compra Networke Certifeaton Exam Objectives Version 0 (Exam Number: N20-06)
‘ACRONYM
cHAP
cor
CNAME
cos
cpu
CRAM
‘CSMA/CA
csu
cwom
de
pcs,
Dos
DHCP
bic
DLP
mz
DNAT
DNS.
bocsis
Dos.
DscP
Dst
sss
psu
wom
a
EAP
EDNS
EGP
EINTIA
EMI
ESD
‘SPELLED OUT
Challenge Handshake Authentication Protocol
Classless Inter-Domain Routing
Canonical Name
Class Of Service
Central Processing Unit
Challenge-Response Authentication
‘Mechanism-Message Digest 5
Cartier Sense Multiple Access/Collision Avoidance
Channel Service Unit
Course Wave Division Multiplexing
Decibels
Distributed Computer System
Distributed Denial of Service
‘ynamic Host Configuration Protocol
Data Link Control
ata Leak Prevention
Demilitarized Zone
Destination Network Address Translation
Domain Name Service or Domain Name
Server or Domain Name System
Data Over-Cable Service Interface Specification
Denial of Service
Differentiated Services Code Point
Digital Subscriber Line
Direct Sequence Spread Spectrum
Data Service Unit
Dense Wavelength Division Multiplexing
EcarrierLevela
Extensible Authentication Protocol
Extension Mechanisms for ONS
Exterior Gateway Protocol
Electronic Industries Alliance/
Telecommunication Industries Association
Electromagnetic interference
Electrostatic Discharge
CompTlA.ACRONYM — SPELLED OUT ACRONYM SPELLED OUT
NAC Network Access Control ROP Remote Desktop Protocol
Nas Network attached Storage RF Radio Frequency
Nar Network Address Translation FL Radio Frequency Interference
Nee Network Control Protocol RG Radio Guide
NetBEUI Network Basic input/Output RIP Routing internet Protocol
Extended Userinterface———— nj _____Registeredjack ____
Netoi0s Network Basic Input/Output System RSA Rivest, Shamir, Adelman
NFS Network ile Service RSH Remote Shell
Nic Network interface Card RIP Real-Time Protocol
‘NIDS____. __Network Intrusion Detection System RTSP Real-Time Streaming Protocol
ues ‘Network Intrusion Prevention System, RIT Round-Tip Time or Real Transfer Time
Nw Network interface Unit SA Security Association
Nim Nanometer Saas Software asa Service
NNTP Network News Transport Protocol sc Standard Connector or Subscriber Connector
ne Network Time Protocol SCADA Supervisory Control And Data Acquistion
ocx optical Carrer scp Secure Copy Protocol
05) Operating Systems. souc Software Development Life Cycle
0si ‘open systems interconnect sor Session Description Protocol
oser (pen Shortest Path Fist sOst Symmetrical Digital Subscriber Line
oror ‘Optical Time Domain Reflectometer SFP ‘small FormfactorPluggable
out Organizationally Unique identifier SFTP Secure File Transfer Protocol
Paas, Platformasa Service soc Simple Gateway Control Protocol
Pan Personal Area Network SHA Secure Hash Algorithm
Pap Password Authentication Protocol sien Security Information and Event Management
ar Port Address Translation SP Session Initiation Protocol
°c Personal Computer sua Service Level Agreement
Pou Protocol Data Unit sup Serial Line Internet Protocol
PoP Pretty Good Privacy SMF Single-Mode Fiber
PAL Public key infrastructure SMS Short Message Service
PoE Power over Ethernet sure Simple Mail Transfer Protocol
PoP Post office Pratocol SNAT Stati Network Address Translation/
POPS Post Office Protocol version 3 Source Network Address
PoTs Plain Old Telephone System SNMP Simple Network Management Protocol
PPP Point-to-Point Protocol SNTP Simple Network Time Protacol
PPPOE —_—_—Paint-toPoint Protocol over Ethernet SOA Start of Authority
perp Point-to-Point Tunneling Protocol SOHO Small Office, Home Office
Pal Primary ate interface SONET Synchronous Optical Network
PSK Preshared key sow Statement Of Work
PSTN Public Switched Telephone Network SPB ‘Shortest Path Bridging.
PrP Point-to-Point ‘SPL ‘Stateful Packet Inspection
PrR Pointer ses standby Power Supply
Pvc Permanent Virtual Circuit, ssH Secure Shell
005 Quality of Service ssi0 Service Setldentifier
RADIUS Remote Authentication Diab User Service ss Secure Sockets Layer
ARP Reverse Address Resolution Protocol st Straight Tip or Snap Twist
as Remote Access Service sve Spanning Tree Protocol or Shielded Twisted Pair
cong wos aati am betes Won (ean Runber en) CompTlA.‘ACRONYM
svc
s¥stos
th
™
TACACS
TACACS+
TeP
Teepe
TOM
TOR
Telco
FIP
TKIP
Ts
T™s
Tos
Tm
ms
uc
upp
UNC
upc
ups
URL
use
‘SPELLED OUT
‘Switched Virtual Circuit
System Log
Terrestrial Carrier Level 1
Terminal adaptor
Terminal Access Control Access Control System
Terminal Access Control Access Control System Plus
Transmission Control Protocol
Transmission Control Protocol/Internet Protocol
Time Division Multiplexing
Time Domain Reflectometer
Telephone company
Trivial File Transfer Protocol
Temporal Key Integrity Protocol
Transport Layer Security
Transportation Management System
Type OF Service
TimeTo Live
Tunneled Transport Layer Security
Unified Communications
User Datagram Protocol
Universal Naming Convention
ultra Polished Connector
Uninterruptible Power Supply
Uniform Resource Locator
Universal Serial Bus
‘ACRONYM
uT™
ur.
vost.
VLAN
vnc
volP
veN
vaRP
vic
ve
WAN
war
wep
wins
wun
wns.
WPA
wes.
www
xDSL.
XML
ZEROCONE
CompraecworkeCeriication €xam Objectives Version 20 (Exam Number: ao)
‘SPELLED OUT
Unified Threat Management
Unshielded Twisted Pair
Variable Digital Subscriber Line
Virtual Local Area Network
Virtual Network Connection
Voice over IP
Virtual Private Network
Virtual Router Redundancy Protocol
Video Teleconference
VLAN Trunk Protocol
Wide Area Network
Wireless Application Protocol or
Wireless Access Point
Wired Equivalent Privacy
Window internet Name Service
Wireless Local Area Network
Warehouse Management System
WiFi Protected Access
WiFi Protected Setup
World Wide Web
Extended Digital Subscriber Line
Extensible Markup Language
Zero configuration
“ComeTlANetwork+ Proposed Hardware and Software List
CompTIA has included this sample list of hardware and software to assist
candidates as they prepare for the Network+ exam. This list mayalso be helpful
for training companies who wish to create a lab component to their training
offering, The bulleted lists below each topic are a sample list and not exhaustive.
EQUIPMENT
+ Optical and copper patch panels
+ Punchdown blocks (110)
+ Layer switch/router
+ Layer 2switch
+ Firewall
“VPN concentrator
= DHCP server
DNS server
sIDSAPS
+ Wireless access point
+ Two basic PCS
+ Media converters
+ Configuration terminal
(with Telnet and SSH)
+ VolP system (including a phone)
KVM switch
SPARE HARDWARE
NICs
+ Power supplies
+ GBICs
+ SEPS
Switch
Hub
Wireless access point
Ups:
SPARE PARTS
+ Patch cables
+ Rh4s connectors, modular jacks
+R) connectors
Cable spool
+ Coaxial cable spool
+Feonnectors
+ Fiber connectors
Antennas
«Bluetoothywireless adapters
+Console cables
Too.s
+Telco/network crimper
+ Cable tester
=Punchdown too!
+ Cable striper
Coaxial crimper
+ Wire cutter
Tone generator
= Fiber termination kit
+ Snips
Butt set
+ Optical power meter
SOFTWARE
+ Packet sniffer
+ Protocol analyzer
+ Terminal emulation software
+ Linux/windows OSs
+ Software firewall
+ Software IDS/1PS
+ Network mapper
+ Virtual network environment
+ WiFi analyzer
+ Spectrum analyzer
+ Antimalware software
+ Network monitoring software
OTHER
+ Sample network documentation
=Sample logs
+ Defective cables
+ Sample malware/viruses
S225 Compti ropes LG usd under arseyCompACeteatons UC Aligned A ein poyamsand eatin led ome)
obras ae peat exist by Cal erations Lc ComgiaiwargieesasenahotConpiAPepenes Lei ie us aed ccs
Compa. scien clansmen tamurntatifetentaahe tect
‘hoor dsemiation rote thos niten onset contropeieie Pee mines cts