Sumitup: A Complete Summary For Our N10-004 Practice Test

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

SumITUp

A Complete Summary for


Our N10-004 Practice Test
CompTIA Network+ (2009 Edition)

SumITUp is a great summary recap of the objectives & material


covered on the exam. Use it in addition to or in concert with your
practice test as:

 A bulleted overview of the exam scope and objectives before


you start your study to provide you with “the big picture”
objective by objective.

 A checklist & review of topics covered within each objective to


ensure you have studied all the critical areas.

 A tool you can print out for review on the go.

 A rapid review tool for the day before you take the exam.
Copyright ©2009 MeasureUp. All Rights Reserved
2 SumITUp | A Complete Summary for Our N10-004 Practice Test

Network Technologies
Explain the function of common networking protocols
• ICMP is used to report errors and send messages about packet delivery

- ICMP is used for testing and troubleshooting TCP/IP networks

• ARP is used to resolve the MAC hardware addresses from the IP addresses of networked devices
• UDP is used to provide connectionless packet delivery services
• SMTP is used to transfer e-mail messages and attachments between e-mail servers
• SNMP is used to provide a network management console with information about network devices and enable a
network management console to control network devices
• POP3 is an e-mail retrieval protocol that is used to deliver e-mail messages from e-mail servers to e-mail clients
• FTP is used to transfer files between FTP clients and servers
• TCP is a connection-oriented protocol that provides reliable packet transmission
• IP operates at the Internet layer and is responsible for addressing, routing, fragmenting, and reassembling
packets
• HTTP sends data in clear text between a Web browser and a Web server

Identify commonly used TCP and UDP default ports


• UDP port 67 is used by DHCP to assign IP addresses and TCP/IP configuration information
• DNS uses TCP port 53 and UDP port 53
• FTP uses TCP ports 20 and 21
• TCP port 443 is used for secure Hypertext Transfer Protocol HTTPS
• TCP port 80 is used by HTTP
• TCP port 110 is used by POP3 for e-mail retrieval
• TCP port 123 is used by NTP
• SSH uses TCP port 22

Identify the following address formats


• 00-90-4B-D5-B1-0E is an example of a MAC address

- A MAC address is typically written as twelve hexadecimal digits


- The MAC address is hard coded on a network device's network adapter

• FE80::210:5AFF:FEAA:20A2 is an example of a link local IPv6 address


- An IPv6 address is defined by 128 bits
- IPv6 addresses are typically represented using hexadecimal notation

• 192.185.44.3 is an example of an IPv4 host address


- An IPv4 address is defined by 32 bits, divided into four octets
- An IPv4 address is typically represented using Base-10 numerals in dotted decimal notation

Copyright ©2009 MeasureUp


3 SumITUp | A Complete Summary for Our N10-004 Practice Test

Given a scenario, evaluate the proper use of the following addressing technologies and
addressing schemes
• A private network address can be used for network communication across the local network, but the address
cannot be used and is not recognized on the Internet
• APIPA is used to assign addresses to Windows computers that are configured for dynamic addressing but do not
have access to a valid DHCP server
• NAT is used to enable hosts with a private IP address to access resources on the Internet
• DHCP provides for automatic IP address assignment, but you must install and configure a DHCP server or a
router (or other network server) that also acts as a DHCP server

Identify common IPv4 and IPv6 routing protocols


• OSPF is a link-state routing protocol that dynamically adjusts for changes in network conditions

- Because OSPF is a link-state routing protocol, it considers network bandwidth and traffic levels rather
than just the number of hops between links

• RIP is a dynamic distance-vector routing protocol, which means that routes are determined based primarily on
the number of hops (intervening routers) to the destination
• IS-IS can be used to pass route information and control routing on an IPv6 network

- IS-IS is a dynamic link-state routing protocol, which means that IS-IS routers can compensate for
changes in network conditions

Explain the purpose and properties of routing


• Network convergence is the state in which all network routers contain correct route information

- The network is in a steady state, and packets are being routed along optimal path
- In this state, network communications are at an optimum level

• A distance-vector routing protocol determine routes based on the least number of hops to a destination
• A link state routing protocol considers the number of hops, but it also considers bandwidth and traffic levels for
each of the hops when determining a path

Compare the characteristics of wireless communication standards


• Devices using the 802.11g standard use 2.4 GHz
- The same frequency is used by 802.11b devices, allowing for 802.11g devices to be downward
compatible with 802.11b devices

• The 802.11a standard specifies wireless communication at 5 GHz


- Due to the wavelength of the signal, the range is only 35 meters

• WPA uses an encryption that is inherently more powerful than that used with WEP

Copyright ©2009 MeasureUp


4 SumITUp | A Complete Summary for Our N10-004 Practice Test

Network Media and Topologies


Categorize standard cable types and their properties
• Plenum-rated cable is used when routing coaxial or twisted-pair cable in plenum spaces

- Unlike the plastics used to clad most common cables, the cladding used for plenum-rated cable,
typically Teflon, is not flammable and does not release toxic fumes when heated

• RG-58 cable has a maximum bandwidth of 10 megabits per second (Mbps) and a maximum segment length of
607 feet
• 10GBaseT implementations require CAT 6 or CAT 6e cabling
• CAT 5 and CAT 5e are required for 100BaseT and 1000BaseT Ethernet
• CAT 3 cable supports a maximum bandwidth of 16 Mbps and is commonly used in voice applications and to wire
10BaseT Ethernet networks
• STP has twisted copper wires encased in a metal sheath
- The metal sheath protects the wires from outside interference, such as EMI

• 1000BASE-SX is multi-mode fiber optic cable


- It provides bandwidth of 1 Gbps for a distance of less than 550 meters

Identify common connector types


• A BNC connector is used with coaxial cable on 10Base2 Ethernet, or Thinnet, networks
• RJ-11 is a modular connector used for standard telephone connections
• RJ-45 is a modular connector used for twisted pair networking implementations, including 10BaseT and
100BaseT Ethernet
• SC is a snap, or push-pull, connector used with fiber optic cable
• An ST connector is similar to a BNC connector, but for a fiber optic cable
• An LC connector is a small form SC connector and is used to connect a device to a fiber optic network

Identify common physical network topologies


• A bus topology uses one cable to which each network device connects
• The mesh topology has multiple connections between hosts, with each host directly connected to every other
host, providing multiple communication paths
• The star topology has host connecting through separate cables to a central connection point
• The tree topology is made up of multiple star topologies connected together
• Ring topology is used with Token Ring networks — networks are wired so that they visually resemble a star
topology, but the MAU used as the central connection is internally wired as a ring
• A hybrid topology is one in which the network contains devices connected with different topologies

Given a scenario, differentiate and implement appropriate wiring standards


• Wire pairs 2 and 3 are swapped when wiring a 10BaseT crossover cable
- A crossover cable is used to make a direct connection between two devices of the same type, such as a
direct connection between two computers

Copyright ©2009 MeasureUp


5 SumITUp | A Complete Summary for Our N10-004 Practice Test

• A patch cable is wired as a straight through cable

- A patch cable is used to configure modular patch panels or to connect to network communication
devices such as hubs or switches

Categorize WAN technology types and properties


• ISDN BRI supports a data transmission bandwidth of 128 Kbps

- An ISDN BRI includes two B-channels (each supporting 64 Kbps) that can carry data, voice and other
services
- The ISDN BRI also includes one 16 Kbps D-channel that carries control and signaling information

• Bandwidth for T1 in the United States is 1.536 Mbps for concurrent upload and download
• T3 bandwidth in the United States is up to 44.736 Mpbs

Categorize LAN technology types and properties


• 10GBaseER supports the greatest transmission range of those listed, supporting up to 40 km over single mode
fiber optic cable
• 10GBaseT uses copper twisted pair cable
- It supports up to 55 (m) with Cat 6 cable and up to 100 m with Cat 6a cable

• 10GBaseSR is a short range implementation over multi-mode fiber cable supporting a maximum range of 82 m
• 10GBaseLR is typically rated as having a 10 km range over single mode fiber cable, but has been used at up to
25 km without data loss
• 1000BaseT provide a 1 GB bandwidth and can be deployed on an existing 100BaseT copper cable with a
maximum cable segment length of 100 m
• 1000BaseCX requires two pairs of 100-ohm STP cable with a maximum cable length of 25 m

Explain common logical network topologies and their characteristics


• L2TP lets you establish a VPN tunnel with endpoints at each of the hosts

- In most situations, you would also use IPSec to encrypt the VPN traffic to provide a secure end-to-end
communication path

• Membership in a dynamic VLAN is configured through software

- VLAN membership is typically managed through either user name or the device's MAC address

Install components of wiring distribution


• A smart jack acts as the demark in telecommunication distribution
- The demark refers to the point where the telephone network ends and the customer equipment begins

• A 66 block is a component in the customer's on-premise wiring


- It is a punchdown block with 50 rows of 4 clips used for terminating telephone lines

• A 110 block is a punchdown block used as the termination point for communication cable
- A 110 block is certified for use with Cat 5 cabling and high-speed data communication applications

Copyright ©2009 MeasureUp


6 SumITUp | A Complete Summary for Our N10-004 Practice Test

Network Devices
Install, configure and differentiate between common network devices
• A repeater is used to extend the length of a network segment by simply amplifying the data signal
• A hub is a central connection device for a star topology network
• A switch is a more advanced central connection device than a hub
• A bridge is used to connect two segments in the same subnet
• A router connects different subnets into an internetwork and directs traffic to the correct destination
• A firewall is a device that filters traffic into and out of a network

Identify the functions of specialized network devices


• A bandwidth shaper can delay packets, letting you control bandwidth usage, a process known as bandwidth
throttling, effectively limiting the transmission rate for the data packets
• A multilayer switch is a network switch that operates at different layers within the OSI model
• A content switch is a specific type of multilayer switch that is used to balance the load among network servers of
the same type, such as a Web farm with multiple Web servers
• An IPS is designed to detect and respond to threats to a network
• An IDS is able to detect threats and can typically generate alerts

Explain the advanced features of a switch


• A switch can support access ports, which are used for host connections, and trunk ports, which are used to carry
traffic for multiple VLANs between two switches
• Port mirroring is a switch troubleshooting process in which a packet is sent from one switch port to another,
where the packet can be examined
• Trunking is a way to carry traffic for multiple VLANs between switches through a single port

Implement a basic wireless network


• You would configure an ESSID when you want to configure multiple access points as a local WLAN segment
• If would be necessary to use a WAP when integrating wired and wireless networking

Network Management
Explain the function of each layer of the OSI model
• Layer 7 - Application layer - Provides applications and users with access to network resources and includes
implementation of protocols like FTP and SMTP

- Application gateways operate at this layer

• Layer 6 - Presentation layer - Provides data translation and encryption, which includes implementations such as
serializing objects or data structures into XML
• Layer 5 - Session layer - Responsible for establishing, maintaining, and terminating communication sessions
between hosts
- Network security devices, such as IPSec endpoints, are implemented at this layer

Copyright ©2009 MeasureUp


7 SumITUp | A Complete Summary for Our N10-004 Practice Test

• Layer 4 - Transport layer - Provides end-to-end message delivery

- Implementations at this layer include TCP and UDP

• Layer 3 - Network layer - Enables the implementation of logical host addresses such as network addresses,
which is a requirement for a routable protocol

- Routers are implemented at this layer of the OSI model

• Layer 2 - Data Link layer - Provides for physical data transfer between hosts
- The MAC physical address is implemented at this layer
- Devices such as bridges are also implemented at this layer

• Layer 1 - Physical layer - Defines the physical network, including cable plant, connection, signal strength, and so
forth
- Repeaters and hubs are implemented at this layer

Identify types of configuration management documentation


• The wiring schematic describes the path the cable should take, along with cable and connection specifications
• The logical network diagram describes the devices that should be present, but not the specifics of how they are
connected
• A physical network diagram shows physical devices and the interconnections between them
• Network protocol specifications define the type of cable to use, connector type, signal levels, and so forth
• Local building codes and regulations can influence network designs through implementation requirements

Given a scenario, evaluate the network based on configuration management documentation


• Required bandwidth and similar specifications are typically included in baseline documentation, which may be
included as part of the basic design specifications or policy documentation
- The baseline defines target values that need to be met as minimums by the network design

• Domain structure, including trust relationships, is documented as part of the logical network diagram

Conduct network monitoring to identify performance and connectivity issues


• A packet sniffer lets you capture and analyze the packets passed by network traffic
• A performance monitor can give you information about network traffic, such as bandwidth usage, throughput, and
connectivity issues
• History logs provide information about events written to the logs, which can include periodic events (updates,
etc.), errors, or unexpected events
• In a bandwidth test, traffic is generated with a specified remote destination
- By controlling the amount of traffic generated by the test and reviewing the results, you can determine
the available bandwidth, or throughput, over the communication path

Explain different methods and rationales for network performance optimization


• Traffic shaping lets you prioritize traffic based on various factors including port and protocol usage
• Load balancing shares client requests and resource requirements between the servers

Copyright ©2009 MeasureUp


8 SumITUp | A Complete Summary for Our N10-004 Practice Test

Given a scenario, implement the following network troubleshooting methodology


• A systematic troubleshooting methodology typically includes the following steps
- Information gathering - identify symptoms and problems
- Identify the affected areas of the network
- Determine if anything has changed
- Establish the most probable cause
- Determine if escalation is necessary
- Create an action plan and solution identifying potential effects
- Implement and test the solution
- Identify the results and effects of the solution
- Document the solution and the entire process

Given a scenario, troubleshoot common connectivity issues and select an appropriate solution
• Attenuation is the loss of signal strength over distance
• If the default gateway is misconfigured, the computer is unable to reach destinations outside of the local subnet
• If a computer is configured with the wrong IP address or subnet mask, it will not be recognized as part of the
subnet and not be able to communicate with local computers

Network Tools
Given a scenario, select the appropriate command line interface tool and interpret the output to
verify functionality
• Tracert is a Windows utility that traces the route (the path taken through the network) between the local and
remote host and returns any failures

- The UNIX/Linux version of this command is traceroute

• The netstat command provides connection information, protocol statistics, and listening port use
• The nbtstat command is used to retrieve NetBIOS over TCP/IP protocol statistics information for local and
remote computers
• You can use the ipconfig command to retrieve IP address information and manage TCP/IP network interfaces on
a computer running Windows
• Ping is a troubleshooting utility used to test communication with a remote host or, using the loopback address, to
test the local TCP/IP protocol stack

Explain the purpose of network scanners


• A port scanner tests for open TCP and UDP ports
• An NIDS monitors all network activity
• An HIDS is designed to monitor the specific computer on which the HIDS software is running

Given a scenario, utilize the appropriate hardware tools


• A TDR works by sending a pulse through the cable and monitoring the pulse's reflection
- It will report the distance to a cable break or short, letting you quickly locate the problem

• A multimeter can be used to test cable termination and, in some cases, cable continuity

Copyright ©2009 MeasureUp


9 SumITUp | A Complete Summary for Our N10-004 Practice Test

• A toner probe, which is actually a simple signal generator, is used to test cable continuity by injecting a tone
signal on the cable so that you can listen for a cable fault
• You should use a butt set, also known as a linesman's handset, when checking for a dial tone on a line
• An OTDR is specifically designed to test fiber optic cable

- It can provide the estimated cable length and attenuation and can be used to locate cable faults
- It works by sending light pulses and evaluating the reflected light

Network Security
Explain the function of hardware and software security devices
• An IDS is a passive device that monitors and logs network activity and can send an alert if anomalous activity is
detected
• An IPS is similar to an IDS, but an IPS is an active system designed to react to network conditions and try to take
appropriate actions in response, such as reconfiguring a firewall to block detected traffic
• A firewall can be configured to filter network traffic, such as by source, protocol, or port
• A host-based firewall is implemented through software running on the host computer

Explain common features of a firewall


• A stateful firewall filters traffic by monitoring connections (connection state) and then allowing valid packets to
pass based on the connection type
• A stateless firewall filters traffic by individual packet headers only
• An application layer firewall is needed to intercept packets and block inappropriate packets that use a specific
protocol

Explain the methods of network access security


• Most routers support the use of ACLs to control traffic through the router (into or out of specific subnets) based
on factors such as IP address, network address, and port used
• When connecting through a Windows Terminal Services server, TLS can be used to provide secure
authentication and data encryption
• Both TLS and SSL provide security and data integrity over TCP/IP networks
• PPTP is one of the communication protocols capable of creating a communication tunnel between two
communication servers to support a VPN

Explain methods of user authentication


• Kerberos is the default authentication protocol used in Windows Active Directory domains and by current Linux
and UNIX LAN implementations
• RADIUS and TACACS+ both support centralized management of remote user authentication and authorization
• EAP is used for remote user authentication

Explain issues that affect device security


• RSH lets you run command line commands on a remote computer, but it does so over an unsecured connection
- Data could be intercepted or inserted during its use

Copyright ©2009 MeasureUp


10 SumITUp | A Complete Summary for Our N10-004 Practice Test

• Port 23 is used by unsecured telnet

- Telnet allows connections and command line access to remote computers

Identify common security threats and mitigation techniques


• A worm is a malicious program that resides in memory, copies itself, and sends copies of itself to other network
hosts
• A virus is similar to a worm, but it must attach itself to another program or file
• A Trojan is a program that appears to be one thing, but is actually something else
- It might appear to be a program such as a game or utility, but it actually performs malicious acts (such
as corrupting the hard disk drive) when executed

• Social engineering attacks are attacks that involve direct interaction with the target

- You can minimize the impact of social engineering attacks through user education and enforced policies
and procedures

Acronyms

Acronym Definition

ACL Access control list


AES Advanced Encryption Standard
AP Access point
APIPA Automatic Private IP Addressing
ARP Address Resolution Protocol
BRI Basic Rate Interface
CHAP Challenge-Handshake Authentication Protocol
CSMA/CA Carrier Sense Multiple Access/Collision Avoidance
CSMA/CD Carrier Sense Multiple Access/Collision Detection
CSU/DSU Channel service unit/digital service unit
DES Data Encryption Standard
DHCP Dynamic Host Configuration Protocol
DNS Domain Name System
DoS Denial of Service
EAP Extensible Authentication Protocol
EAP-TLS Extensible Authentication Protocol - Transport Layer Security
EGP Exterior Gateway Protocol
EIGRP Enhanced Interior Gateway Routing Protocol
EIRP Effective isotropic radiated power
EMI Electromagnetic Interference
ESD Electro-static Discharge
FTP File Transfer Protocol
GB Gigabyte
Gbps Gigabits per second

Copyright ©2009 MeasureUp


11 SumITUp | A Complete Summary for Our N10-004 Practice Test

Acronym Definition

HTTP Hypertext Transfer Protocol


HTTPS Secure Hypertext Transfer Protocol
IBGP Internal Border Gateway Protocol
ICMP Internet Control Message Protocol
IDS Intrusion Detection System
ISDL ISDN DSL
IEEE Institute of Electrical and Electronics Engineers
IGRP Interior Gateway Routing Protocol
IP Internet Protocol
IPS Intrusion Prevention System
IPSec Internet Protocol Security
ISDN Integrated Services Digital Network
IS-IS Intermediate System-to-Intermediate System
ISP Internet Service Provider
LAN Local area network
LDAP Lightweight Directory Access Protocol
MAC Media Access Control
MB Megabyte
Mbps Megabits per second
NAT Network address translation
NIC Network interface card
OSI Open System Interconnection
OSPF Open shortest path first
PoE Power over Ethernet
PPP Point-to-Point Protocol
PPTP Point-to-Point Tunneling Protocol
RADIUS Remote Authentication Dial-In User Service
RAID Redundant Array of Independent Disks
RDP Remote Desktop Protocol
RFI Radio Frequency Interference
RIP Routing Information Protocol
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SOHO Small Office Home Office
SSH Secure Shell
SSID Service Set Identifier
SSL Secure Sockets Layer
SSTP Secure Socket Tunneling Protocol
STP Spanning Tree Protocol

Copyright ©2009 MeasureUp


12 SumITUp | A Complete Summary for Our N10-004 Practice Test

Acronym Definition

TACACS Terminal Access Controller Access-Control System


TCP Transmission Control Protocol
TCP/IP Transmission Control Protocol/Internet Protocol
TLS Transport Layer Security
UDP User Datagram Protocol
VLAN Virtual local area network
VoIP Voice over Internet Protocol
VPN Virtual private network
WAN Wide area network
WAP Wireless Access Point
WEP Wired Equivalent Privacy
WINS Windows Internet Name Service
WLAN Wireless local area network
WPA WiFi Protected Access

Copyright ©2009 MeasureUp

You might also like