CompTIA Network Certification Exam Objectives
CompTIA Network Certification Exam Objectives
SSH 22 TCP The Secure Shell (SSH) protocol is Any Network SSH was meant to
a cryptographic network protocol Service replace FTP (Port 21)
that allows secure network services Common: and TELNET (Port
over an unsecured network. It uses ● Remote 23), which is why it
a client-server architecture to Comman was assigned Port 22.
connect an SSH client to an SSH d-line
server. ● Login
● Remote
Comman
d
Execution
DNS 53 UDP/TCP The Domain Name System (DNS) Human-readable DNS functions as the
protocol is a detailed specification Hostnames for phonebook for the
of all data structures and Websites Internet.
communication exchanges used in
the Domain Name System.
SMTP 25 TCP The Simple Mail Transfer Protocol Email SMTP is believed to
(SMTP) is a communication have roots in the Mail
protocol for email. Box Protocol
(disputed
implementation).
FTP 20, TCP The File Transfer Protocol (FTP) is File Transfer I didn’t find anything
21 a network protocol to transfer really interesting
computer files. It uses a about this one. Let me
client-server architecture to connect know in the comments
an FTP client with an FTP server. if you do.
TFTP 69 UDP The Trivial File Transfer Protocol Nodes Booting As the name
(TFTP) is a lockstep file transfer From a LAN suggests, TFTP has a
protocol used for transferring files. simple design and
limited features,
therefore it has a
small memory
footprint.
TELNET 23 TCP The TELNET (Teletype Network) ● Remote Not only does
protocol is an application protocol to Manage TELNET
provide bi-directional eight-bit byte ment communicate over
oriented communications. It is used ● Initial port 69, it was also
as a method of interfacing terminal Device developed in 1969.
devices and terminal-oriented Setup for
processes. Network
Hardware
DHCP 67, UDP The Dynamic Host Configuration Communicating DHCP is based on the
68 Protocol (DHCP) is a network network Bootstrap Protocol
protocol used by DHCP servers to parameters (BOOTP).
respond to queries by clients to be
set up on the network. Without
DHCP servers, network admins
would have to manually set up
every client that joins the network.
HTTPS 443 TCP The Hypertext Transfer Protocol Secure Data HTTPS is meant to
Secure (HTTPS) is the secure Communication provide all that HTTP
communication extension of HTTP. on the World does, with added
The communication protocol in Wide Web authentication,
HTTPS is encrypted using TLS. privacy, and integrity
through bi-directional
encryption.
SNMP 161 UDP The Simple Network Management Network I didn’t find anything
Protocol (SNMP) is a protocol to Management really interesting
help communicate management and Monitoring about this one. Let me
information for devices on the know in the comments
network. This can include routers, if you do.
modems, switches, servers,
workstations, printers, etc.
RDP 338 TCP/UDP The Remote Desktop Protocol Remote Access This protocol is
9 (RDP) is a network communications of Windows and proprietary and
protocol for remote management macOS. developed by
and access. Microsoft.
NTP 123 UDP The Network Time Protocol (NTP) Time NTP uses the
is a network protocol to synchronize Synchronization: intersection algorithm
clocks between devices to within a Air traffic control to choose time
few milliseconds of Coordinated was an early servers and prevent
Universal Time. application of network latency
NTP. issues.
SIP 506 TCP/UDP The Session Initiation Protocol Communication SIP is lauded for
0, (SIP) is a protocol used for real-time Over Voice, having been
506 voice, video, and messaging Video, and established in the
1 sessions. Messaging Internet community
instead of the
telecommunications
community.
SMB 445 TCP/UDP The Server Message Block (SMB) File Sharing I didn’t find anything
protocol is a protocol used to share really interesting
files, printers, serial ports, and about this one. Let me
communications abstractions know in the comments
between devices. if you do.
POP 110 TCP The Post Office Protocol (POP) is a Email Retrieval The name speaks for
protocol that is used to retrieve itself.
email from a mail server in
conjunction with SMTP.
IMAP 143 TCP The Internet Message Access Email Retrieval The main difference
Protocol (IMAP) is a protocol to between POP and
retrieve email from a mail server. IMAP is that IMAP
allows
synchronization
between devices and
the mail server.
LDAP 389 TCP/UDP The Lightweight Directory Access User Validation LDAP was used for
Protocol (LDAP) is a protocol for Through Storage the basis of Microsoft
maintaining distributed directory of Usernames Active Directory.
information services. This is and Passwords
important to help share information
about users, systems, networks,
services, and applications.
LDAPS 636 TCP/UDP The Lightweight Directory Access User Validation I didn’t find anything
Protocol over SSL (LDAPS) is a Through Storage really interesting
method of securing LDAP using an of Usernames about this one. Let me
SSL tunnel. and Passwords, know in the comments
Securely if you do.
H.323 172 TCP H.323 is a series of protocols for Voice and Video Though H.323 was
0 audio-visual communication. It Conferencing originally meant for
specifically addresses call signaling videoconferencing
and control, multimedia transport over LAN, it quicky
and control, and bandwidth control. spread to a variety of
networks including
WAN and the Internet.
Related Definitions
● Protocol
○ A protocol is a set of rules to determine how to act in a given situation.
● Cryptographic Protocol
○ A cryptographic protocol is a set of rules to allow secure communication under a given set of
circumstances.
● Client-server Architecture
○ Client-server architecture is an architecture of a computer network that allows clients, or client
computers, to request services from a server, or host computer.
● Domain Name System
○ The Domain Name System (DNS) is a decentralized, hierarchical naming system for devices connected
to the Internet or a private network.
● Decentralized System
○ A decentralized system is one in which some components operate on local information instead of all
being tied to the same source.
● Lockstep
○ Lockstep systems are systems that run the same set of operations at the same time in parallel so they
may be fault-tolerant. This allows error detection and correction, since the outputs can be compared
and corrected with at least three parallel systems.
● Local Area Network
○ A local area network (LAN) is a computer network that connects computers in a small (or local) area,
such as a house.
● Transport Layer Security
○ Transport Layer Security (TLS) is a cryptographic protocol to secure communications on a computer
network.
● Directory Service
○ A directory service is responsible for mapping network resources to network addresses.
● SSL Tunnel
○ An SSL tunnel is a communications protocol used to move data from one network to another securely
using SSL.
● Datagrams
○ Datagrams are a basic transfer unit with a header and payload section transmitted on the network.
Protocol Types
● ICMP
○ Internet Control Message Protocol (ICMP) is a supporting protocol for network devices. It allows them
to send error messages and operational information regarding success or failure during communication
with other devices. Unlike TCP and UDP, ICMP is not used for data exchange or for end-user network
applications (except ping and traceroute).
● UDP
○ User Datagram Protocol (UDP) is a protocol to send messages to other devices on the network without
the need for previous communications. UDP is fast, but not necessarily as reliable as TCP.
● TCP
○ Transmission Control Protocol (TCP) is a protocol to send bytes between devices on a network. It is
reliable, ordered, and error-checked on delivery, unlike UDP, which is much faster but more
error-prone.
● IP
○ Internet Protocol (IP) is the OG network communications protocol for relaying datagrams to other
devices across network boundaries. The IP enables internetworking, the foundations of the Internet.
● Connection-oriented
○ A connection-oriented protocol is a protocol where data transmission relies on an established
connection. A stream of data must be delivered in the appropriate order and a communication session
has to be established before data can be sent.
● Connectionless
○ Connectionless communication is data transmission that does not rely on an established connection.
Each data unit is addressed and routed based on the information it contains, therefore, any particular
message can be sent without previous communications being established, and data units can arrive in
any order.
1.2 Explain devices, applications, protocols, and services at their appropriate OSI
layers.
The Open Systems Interconnection (OSI) model is a standardized, conceptual model to help devices to communicate
with each other. It splits communication into seven stacked layers, each of which is able to communicate with the
layers above or below itself. When data is flowing through the OSI model, data on the sending device travels down,
while data on the receiving device travels up.
Something interesting to note: denial of service attacks target parts of the network layer. Application layer attacks
target the application layer. And protocol attacks target the protocol layer. Makes sense!
Layer 7: Application
The application layer is the layer used to communicate with the user; applications like web browsers and email rely on
the application layer for communication. Applications are not part of the application layer. They use the application
layer to communicate.
Layer 6: Presentation
The presentation layer does just what it says: it makes data “presentable” for the application layer. Think things like
data translation, encryption, and compression. Day to day, the presentation layer may need to work with the
application layer or the session layer. It translates incoming data so the application layer on the device can understand
it, and it also adds encryption/decryption as necessary. The presentation layer may also compress data coming in
from the application layer that it will then efficiently pass on to the session layer.
Layer 5: Session
The session layer opens and closes sessions between devices (hence, the session layer. I’m sensing a pattern…).
The session layer makes sure the session is open for as long as needed, can quickly close the session, and can
synchronize data transfers with checkpoints. Checkpoints help keep everything connected - if a session layer has a
checkpoint every five megabytes for a 100 megabyte file, but the file gets cut off at 44 megabytes, the session layer
will reconnect and transfer starting from the 40 megabyte mark (the latest checkpoint). Otherwise, it would have to
start from scratch every time a session is interrupted.
Layer 4: Transport
The transport layer is responsible for end-to-end communication on the network between devices; specifically, the
transport layer receives and outputs data without errors. Typically, the sending device breaks down application
messages into segments that are then passed on to the network layer. Contrastingly, the receiving device
reassembles segments into messages, which can then be passed to the application layer.
Layer 3: Network
The network layer is responsible for the facilitation of data transfer between devices on different networks. The
network layer is unnecessary if the devices are on the same network (more about that in the data link layer).
On the sender device, the network layer is responsible for packets: it creates packets from the segments passed in
from the transport layer. On the receiver device, the network layer reassembles the packets before sending them to
the transport layer. The network layer is also responsible for routing, finding an optimized path to pass data through.
Layer 1: Physical
The physical layer is responsible for the physical equipment necessary for data transfer, things like the cables and
switches. It’s also where data is converted into a bit stream. In order to properly align, the physical layer on both
devices must agree on a signal convention.
1.3 Explain the concepts and characteristics of routing and switching.
Routing
● Routing protocols (IPv4 and IPv6)
○ Routing protocols are used to identify routes on the network, create routing tables, and make routing
decisions.
○ Distance-vector routing protocols
■ Distance vector routing protocols use the hop count to determine the best route to take. This
protocol will continuously send neighboring routers a copy of its routing table to make sure they
are aware of the latest.
○ RIP
■ Routing Information Protocol (RIP) is a distance vector routing protocol that uses the hop count
to determine the best path.
○ EIGRP
■ Enhanced Interior Gateway Routing Protocol (EIGRP) is a distance vector routing protocol able
to automate routing decisions and configurations. It is only available on Cisco routers.
○ Link-state routing protocols
■ Link-state routing protocols is the yang to distance-vector routing protocols yin. Link state
routing happens at every switching node in the network, where switching nodes on the Internet
are also known as routers. Each node creates a map of the other nodes they are connected to
and calculates the best and most logical path for the packet to take.
○ OSPF
■ Open Shortest Path First is a routing protocol that uses link state routing. OSPF is a common
IGP used in larger enterprise networks.
○ Hybrid
■ The Hybrid Routing Protocol is a combination of distance vector routing and link state routing. It
uses distance vectors for the most accurate distance metrics, but only sends routing information
when there is a change in network topology. This requires less processing power than typical
link-state routing.
○ BGP
■ Border Gateway Protocol (BGP) is an exterior gateway protocol for transmitting routing and
reachability information between autonomous systems.
● Routing types
○ Static
■ Static routing is routing that requires the manual configuration of a routing entry. They are
typically configured by network administrators, who add entries to a routing table.
○ Dynamic
■ In contrast, dynamic routing adapts to the existing conditions between communication circuits to
avoid existing damages to the network.
IPv6 Concepts
● Addressing
○ IPv6 addressing is how we interface with and find a device on the network. IP addresses get
transmitted in packet headers as the source and destination of a particular packet.
● Tunneling
○ IPv6 tunneling is how to use the routing infrastructure from IPv4 for IPv6 traffic. Basically, this comes
down to encapsulating IPv6 datagrams within IPv4 packets.
● Dual stack
○ Dual stack refers to creating a system where devices may run IPv4 and IPv6 simultaneously. This is
particularly important as organizations transition from IPv4 to IPv6.
● Router advertisement
○ Router Advertisement Daemon (RADVD) is a way of automatically configuring devices joining the
network for IPv6. If this is enabled, autoconfiguration of the device’s IPv6 address, subnet prefix, and
default gateway can occur. If it is disabled, this must be done manually, typically by the network
administrator.
● Neighbor discovery
○ The Neighbor Discovery Protocol (NDP) gathers information for Internet communication. This can
include configuration information for local connections, domain name servers, and gateways for
connecting with other systems.
Performance Concepts
● Traffic shaping
○ Traffic shaping prioritizes bandwidth based on the type of network packet. Network packets with higher
priority are ensured better network performance.
● QoS
○ Quality of Service (QoS) is the quantitatively measured performance of the network. It can be based on
packet loss, bit rate, throughput, transmission, availability, delay, jitter, or more.
● DiffServ
○ Differentiated Services (DiffServ) is a networking architecture for managing network traffic and ensuring
QoS.
● CoS
○ Class of Service (CoS) is the parameter for assigning priorities to packets on the network.
Other Concepts
● NAT/PAT
○ Network Address Translation (NAT) is the way to remap an IP address space into another. It involves
altering the network address information, which is in the IP header of the packets, while they are
moving across a traffic routing device.
○ Port Address Translation (PAT) is the equivalent of NAT, but with ports. It is the way to translate ports.
● Port forwarding
○ Port forwarding is an application of NAT where not only is the IP address space remapped, but the port
number is as well. This lets devices on the Internet connect to devices on a LAN.
● Access control list
○ An access control list is a list of conditions to filter network traffic.
● Distributed switching
○ Distributed switching is where a distributed switch acts as the sole virtual switch. It is used to maintain
consistent network configurations as VMs move around several hosts.
● Packet-switched vs. circuit switched network
○ Packet-switched networks move data via packets. These packets can be sent in any order, as they are
rearranged at the destination based on information in the packet header. In contrast, circuit-switched
networks require point-to-point connections that are consistent and maintained until the data is
transmitted. With circuit-switched networks, an entire channel must be dedicated to a single interaction.
In contrast, packet-switched networks can maintain a single channel for multiple communications
simultaneously.
● Software-defined networking
○ Software-defined networking (SDN) is a method of network management where the network
configuration is dynamically upgraded to be the most efficient possible. THe goal is to improve network
performance and monitoring.
Helpful Definitions
● MAC
○ Medium Access Control (MAC) controls hardware that interacts wired, optical, or wireless
transmissions. The data link layer is made up of the MAC layer and the logical link control (LLC) layer.
● Carrier wave
○ A carrier wave is used to send information at a higher frequency than the input signal, so it can allow
several different carriers to transmit at once on the same transmission medium.
● Multiple Access Method
○ The multiple access method is a method that lets more than two terminals share one transmission
method.
● Ethernet over twisted pair
○ Ethernet over twisted pair are twisted pair cables used for the physical layer of an Ethernet computer
network.
● Interior Gateway Protocol
○ The Interior Gateway Protocol (IGP) is a protocol used to exchange router information. IGPs are
divided into distance vector routing protocols and link-state routing protocols.
● Autonomous Systems
○ An autonomous system (AS) is a group of routers where their prefixes and routing policies are all
controlled by the same administrator. This may be a Network Service Provider, a large business, a
university, or other larger organizations.
Helpful Definitions
● Internet Engineering Task Force
○ The Internet Engineering Task Force (IETF) is an organization that establishes standards for the
Internet, especially when it comes to TCP/IP.
● Internet Assigned Numbers Authority
○ The Internet Assigned Numbers Authority (IANA) oversees global IP address allocation, Internet
numbers, number allocation, root zone management, and other IP protocol-related systems.
● ARP
○ Address Resolution Protocol (ARP) is used to map IP addresses to their Ethernet addresses. ARP
packets typically start a conversation between two devices.
● Stateful vs Stateless
○ Stateful IP addresses provide a log that certain IP addresses were assigned to a specific MAC address.
○ Stateless IP addresses are more dynamic and are used to determine a device’s IP address at the time
for that particular network.
LAN Local area network A local area network (LAN) is a network that connects
devices in a small (or local) area, such as a house, over
Ethernet.
WLAN Wireless local area network A wireless local area network (WLAN) is a network that
connects devices in a local area. It differs from a traditional
LAN because it uses Wi-Fi instead of Ethernet.
MAN Metropolitan area network A metropolitan area network (MAN) is a network that
connects devices in a larger geographic region the size of a
metropolitan area.
WAN Wide area network A wide area network is a network that connects devices
across a large geographic area. A WAN can connect smaller
networks like MANs and LANs, so devices can communicate
across vast locations.
CAN Controller area network A controller area network (CAN bus) is a standard for
microcontrollers that lets them communicate without a host.
When a device communicates, the communication is sent to
all devices, including itself.
SAN Storage area network A storage area network (SAN) is a high-speed network for
easy access to storage. Storage devices are presented to the
host as though they are attached locally, which can be used
for business continuity management.
PAN Personal area network A personal area network (PAN) is a network for connecting
an individual’s devices together.
● Cellular
○ GSM
■ The Global System for Mobile Communications (GSM) is a standard developed by the ETSI for
second-generation (2G) cellular networks. It became the global standard for mobile
communications with over 90% market share.
○ TDMA
■ Time-division multiple access (TDMA) is a cellular communications technology to ensure
multiple individuals can use the same frequency without interference.
○ CDMA
■ Code-division Multiple Access (CDMA) is a channel access method, whereby several devices
can communicate over the same channel at the same time.
● Frequencies
○ 2.4 GHz
■ 2.4 GHz transmits data slower, but has a large range.
○ 5.0 GHz
■ 5.0 GHz transmits data quickly, but has less range. The higher the frequency, the faster the
data transmission. Its range is largely limited by its inability to pass through solid objects.
● Channel Bandwidth
○ Channel bandwidth changes the data transmission rate; higher bandwidth means faster connection.
● Channel Bonding
○ Channel bonding combines two channels with the same frequency to increase throughput. It is very
common in Wi-Fi applications.
● MIMO/MU-MIMO
○ Multiple input, multiple output (MIMO) and multi-user, multiple output (MU-MIMO) are wireless network
technology. MU-MIMO is the next evolution of MIMO, which enables devices with multiple antennas to
communicate with one another. MIMO solely allowed a single antenna to communicate with another
single antenna.
● Unidirectional/omnidirectional
○ A unidirectional network is a device that only allows data to flow in a single direction. This is commonly
used in military bases, nuclear power plants, and other critical infrastructure, that need to ensure
security. This is also known as a data diode.
○ An omnidirectional antenna is a type of antenna that sends equal radio power in every direction
perpendicular to the antenna. This creates a donut-like radiation pattern.
● Site surveys
○ A wireless site survey is a way of designing a wireless network such that it will meet QoS, data rates,
and coverage requirements.
Helpful Definitions
● ETSI
○ The European Telecommunications Standards Institute (ETSI) is a standardization organization for
telecommunications.
● Channel Access Method
○ A channel access method ensures that two devices can communicate over the same transmission
medium at the same time.
Helpful Definitions
● Zone
○ A zone is a domain, not including the subdomains delegated to other DNS servers.
Thanks again for downloading this PDF. I hope it was useful for you.
If you have any questions about this, head to my website hackerbella.xyz and comment on the blog. I’m
happy to help.
- Allie Mellen