CompTIA+Network++ (N10 008) + (Study+Notes)
CompTIA+Network++ (N10 008) + (Study+Notes)
Introduction
● Introduction
○ CompTIA Network+ certification is considered the first networking certification
for anyone entering the IT or cybersecurity industry
■ It provides a solid foundation and baseline knowledge of networking,
covering configuration, management, and troubleshooting of network
infrastructure within a company or organization
○ This certification is designed for beginners with less than one year of IT
operations or administration experience or for those who have completed the
A+ examination
○ On the Network+ exam, knowledge of the CompTIA A+ exam is assumed, and the
course builds upon the foundational knowledge of hardware, software, and
computer networks
○ CompTIA Network+ (N10-008) certification exam consists of five domains or
areas of knowledge
■ 24% of Networking Fundamentals
■ 19% of Network Implementations
■ 16% of Network Operations
■ 19% of Network Security
■ 22% of Network Troubleshooting
1
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ While the course won't follow the order of the official exam objectives, each
section will cover all objectives, and videos will specify the objectives covered
○ Exam Format and Structure
■ The Network+ exam allows 90 minutes to answer up to 90 questions
■ Questions include multiple-choice and multiple-select, where you may
need to choose 2 or 3 correct answers
■ Performance-Based Questions (PBQs) simulate job functions in a
simulated environment
■ The exam requires a passing score of at least 720 points out of 900
■ Exam vouchers can be purchased from store.comptia.org or at
diontraining.com/vouchers for a 10% discount
○ Tips for Success in the Course
■ Closed Captioning
● Enable closed captions for accurate understanding, especially for
non-native English speakers
■ Playback Speed Control
● Adjust the playback speed to suit your preference for efficient
learning
■ Study Guide
● Download the PDF study guide from Lesson 2 to take notes and
highlight important information
■ Facebook Group
● Join the Facebook group at facebook.com/groups/diontraining for
community support, daily questions, and assistance from over
25,000 students
2
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
Networks Basics
Objectives:
● 1.2 - Explain the characteristics of network topologies and network types
● 2.1 - Compare and contrast various devices, their features, and heir appropriate
placement on the network
● Overview of Networks
○ Computer Networks
■ What comes to mind?
■ Is it limited to computers?
■ Is it limited to Ethernet, Wi-Fi, or fiber?
○ Purpose of Networks
■ To make connections between machines
■ Converged networks combine multiple types of traffic like data, video,
and voice
■ We expect 99.999% availability (The 5 9’s)
● Only 5 minutes downtime per year
○ Network Traffic Examples
■ File sharing
■ Video chatting
■ Surfing the Web
■ Social Media
■ Streaming Video
■ E-mail
■ Messaging
3
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ VoIP
● Network Components
○ Client
■ Device end-user accesses the network with
■ Workstation, laptop, tablet, smartphone, television, server, or other
terminal devices
■ Can be any device that connects to the network
○ Server
■ Provides resources to the rest of the network
■ Different servers provide different functions, such as an E-mail server,
Web server, File server, Chat server, and Print server
■ Can be a dedicated server hardware/software or can be a device that is
acting like a server for a particular function
○ Hub
■ Older technology to connect networked devices, such as clients and
servers
■ Can be interconnected to provide more ports, but leads to increased
network errors
■ Receives information in one port and rebroadcasts it out all the other
ports
○ Wireless Access Point (WAP)
■ Device that allows wireless devices to connect into a wired network
■ Commonly used in home, small business, and even some large enterprise
networks
■ Acts as a wireless hub
○ Switch
4
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Network Resources
○ Client/Server Model
○ Peer-to-Peer Model
6
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Network Geography
7
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
8
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Physical Topology
● How devices are physically connected by media
■ Logical Topology
● How the actual traffic flows in the network
○ Bus Topology
10
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Partial-Mesh Topology
11
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
12
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
13
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
OSI Model
Objectives:
● 1.1 - Compare and contrast the Open Systems Interconnection (OSI) model layers and
encapsulation concepts
● 5.3 - Given a scenario, use the appropriate network software tools and commands
14
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Layer 1 (Physical)
15
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Example
○ Ethernet
○ How can we get more out of a limited network?
17
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
18
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Packages data into frames and transmitting those frames on the network,
performing error detection/correction, and uniquely identifying network
devices with an address (MAC), and flow control
● MAC
● Physical addressing
● Logical topology
● Method of Transmission
● Link Layer Control (LLC)
○ Connection services
○ Synchronizing transmissions
○ Media Access Control (MAC)
■ Physical addressing
● Uses 48-bit address assigned to a network interface card (NIC) by
manufacturer
● First 24-bits is the vendor code
● Second 24-bits is a unique value
■ Logical topology
● Layer 2 devices view networks logically
● Ring, bus, star, mesh, hub-and-spoke, ...
■ Method of transmission
● Many devices are interconnected
● Determines whose turn it is to transmit to prevent interference
with other devices
■ Flow Control
● Limits amount of data sender can send at one time to keep
receiver from becoming overwhelmed
■ Error Control
● Allows receiver to let sender know when an expected data frame
wasn’t received or was corrupted by using a checksum
○ How is communication synchronized?
■ Isochronous
● Network devices use a common reference clock source and create
time slots for transmission
● Less overhead than synchronous or asynchronous
■ Synchronous
● Network devices agree on clocking method to indicate beginning
and end of frames
● Uses control characters or separate timing channel
■ Asynchronous
● Network devices reference their own internal clocks and use
start/stop bits
○ Examples at Layer 2
■ Network Interface Cards (NIC)
■ Bridges
■ Switches
● Layer 3 (Network)
○ Network Layer (Layer 3)
■ Forwards traffic (routing) with logical address
● Example
20
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
21
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Layer 4 (Transport)
22
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ TCP vs UDP
23
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Windowing
■ Allows the clients to adjust the amount of data sent in each segment
■ Continually adjusts to send more or less data per segment transmitted
● Adjusts lower as number of retransmissions occur
● Adjusts upwards as retransmissions are eliminated
○ Buffering
■ Devices, such as routers, allocate memory to store segments if bandwidth
isn’t readily available
■ When available, it transmits the contents of the buffer
■ If the buffer overflows, segments will be dropped
○ Examples at Layer 4
■ TCP
■ UDP
■ WAN Accelerators
■ Load Balancers
■ Firewalls
● Layer 5 (Session)
24
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ NetBIOS
● Used by computers to share files over a network
● Layer 6 (Presentation)
25
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Layer 7 (Application)
26
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Examples
● Printers
● File servers
○ Examples at Layer 7
■ E-mail (POP3, IMAP, SMTP)
■ Web Browsing (HTTP, HTTPS)
27
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Encapsulation
○ The process of putting headers (and sometimes trailers) around some data
● Decapsulation
○ Action of removing the encapsulation that was applied
○ If we move down the OSI layers from 7 to 1, we encapsulate data
○ If we move upward from layers 1 to 7, we decapsulate data
○ Protocol Data Unit
■ Single unit of information transmitted within a computer network
● Layer 1 - bits
● Layer 2 - frames
● Layer 3 - packets
● Layer 4 - segments if TCP or datagrams if UDP
■ Used to tear down the virtual connections created using the three-way
handshake and the SYN flag
■ The FIN flag always appears when the last packets are exchanged
between a client and server and the host is ready to shutdown the
connection
○ RST (or reset) Flag
■ Used when a client or server receives a packet that it was not expecting
during the current connection
○ PSH (or PUSH) Flag
■ Used to ensure that the data is given priority and is processed at the
sending or receiving ends
○ URG (or urgent) Flag
■ It is like the PUSH flag and identifies incoming data as “urgent”
■ The main difference is PSH is used by a sender to indicate data with a
higher priority level where URG is sent to tell the recipient to process it
immediately and ignore anything else in queue
● Source and Destination Ports
○ Just like the ones used in UDP, they dictate where the data
is coming from and where it is going to
● Length
○ Used to indicate how many bytes the UDP packet is,
including its header and its data
● Checksum
○ Not a mandatory field, but it can be used to provide some
validation that the UDP data being sent was received with
some level of integrity
○ MAC Address
29
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
30
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
TCP/IP Model
Objectives:
● 1.1 - Compare and contrast the Open Systems Interconnection (OSI) model layers and
encapsulation concepts
● 1.5 - Explain common ports and protocols, their application, and encrypted alternatives
● 5.3 - Given a scenario, use the appropriate network software tools and commands
● TCP/IP Model
○ TCP/IP Model
■ Also known as TCP/IP stack or the DoD Model
■ Alternative to the OSI Model
■ More relevant model for network designers since it’s based on TCP/IP
■ Only a 4-layer model
○ OSI Model to TCP/IP Model
■ Examples
● Ethernet
● Token Ring
● FDDI
● RS-232
○ Internet (Layer 2)
■ Packages data into IP datagrams
● Contains source and destination IPs
● Forwards datagrams between hosts across the networks
■ Routes IP datagrams across networks
■ Connectivity occurs externally
■ Examples
● IP
● ICMP
● ARP
● RARP
○ Transport (Layer 3)
■ Provides communication session management between hosts
■ Defines level of service and status of connection used for transport
■ Examples
● TCP
● UDP
● RTP
○ Application (Layer 4)
■ Defines TCP/IP application protocols
32
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
33
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Data Transfer
○ IPv4 Packets
■ Source Address
● IP of sender
■ Destination Address
● IP of receiver
■ IP Flags
● Allows packet fragmentation
■ Protocol
● Is this packet using TCP or UDP?
○ Overhead of TCP and UDP
34
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Internet Message Access Protocol over SSL IMAP over SSL (Port 993)
■ Secure and encrypted way to receive emails
○ Post Office Protocol Version 3 over SSL POP3 over SSL (Port 995)
■ Secure and encrypted way to receive emails
○ Structured Query Language Server Protocol SQL (Port 1433)
■ Used for communication from a client to the database engine
○ SQLnet Protocol (Port 1521)
■ Used for communication from a client to an Oracle database
○ MySQL (Port 3306)
■ Used for communication from a client to the MySQL database engine
○ Remote Desktop Protocol RDP (Port 3389)
■ Proprietary protocol developed by Microsoft
■ Provides a user with a graphical interface to connect to another
computer over a network connection
■ User employs RDP client software for this purpose and the other
computer must run RDP server software
○ Session Initiation Protocol SIP (Port 5060, 5061)
■ Provides signaling and controlling multimedia communication sessions in
applications
■ Used for Internet telephony for voice and video calls, VOIP, and instant
messaging
38
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Ports to remember
● IP Protocol Types
○ Transmission Control Protocol (TCP)
■ A transport protocol that operates at layer 4 of the OSI model
■ Used on top of the Internet Protocol for the reliable packet transmission
■ Operates by conducting a three-way handshake between a client and a
server, and then establishing the connection
■ TCP is considered a connection-oriented method of communication
○ User Datagram Protocol (UDP)
■ A lightweight data transport protocol that also works on top of IP
■ Can detect if its packets are corrupted when they are received by a client
using a checksum, but there is no connection and no sequencing to the
UDP segments
39
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Great for some applications, like streaming audio and video, but it
definitely does NOT provide reliable delivery of the data
○ Internet Control Message Protocol (ICMP)
■ A network level protocol that is used to communicate information about
network connectivity issues back to the sender
■ ICMP is used a lot by network technicians during troubleshooting, but it is
also used by attackers to conduct ping scans and network mapping
○ Generic Routing Encapsulation (GRE) Protocol
■ A tunneling protocol that was developed by Cisco to encapsulate a wide
variety of network layer protocols inside a virtual point-to-point or point-
to-multipoint link over an Internet Protocol network
■ Important to set a smaller maximum transmission unit or MTU size on
the tunnel
■ It does not provide any encryption
○ Internet Protocol Security (IPsec) Protocol
■ Set of secure communication protocols at the network or packet
processing layer that is used to protect data flows between peers
● Authentication Header (AH)
○ A protocol within IPSec that provides integrity and
authentication
● Encapsulating Security Payload (ESP)
○ Provides encryption and integrity for the data packets sent
over IPsec
○ Backwards-compatible with most IP routers including
those that were not designed to work with IPsec initially
40
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Media
○ Material used to transmit data over the network
● Copper Media
○ Types of Media
■ Three categories
● Copper
● Fiber optic
● Wireless
■ Each category is divided into subcategories
■ Each has different specifications and uses
○ Coaxial Cable (Coax)
■ Inner
● Insulated conductor or center wire passes data
■ Outer
● Braided metal shield used to help shield and protect the data
transmission
● Provides EMI resistance due to shielding
41
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Coaxial Cables
■ RG-6
● Commonly used by local cable companies to connect individual
homes
■ RG-59
● Typically used to carry composite video between two nearby
devices, such as from a cable box to the television
○ Coaxial Connectors
■ F-connector
● Typically used for cable TV and cable modem connections
■ BNC
● Termed Bayonet Neill-Concelman or British Naval Connector
● Was used for 10BASE2 Ethernet networks
○ Twinaxial Cable
■ Similar to coaxial cable but uses two inner conductors to carry the data
instead of just one
○ Serial Cable
■ Usually have a series of straight copper wires inside a single cable or
plastic jacket
■ DB-9 or DB-25 (RS-232)
42
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ RJ-11
● 6-pin connector
43
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Cable Lengths
■ Keep cable runs under 70 meters from the IDF to the office
○ Straight-Through Patch Cables
■ Contains the exact same pinout on both ends of the cable
44
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Fiber Media
○ Fiber Optic Cables
■ Uses light from an LED or laser to transmit information through a glass
fiber
● Immune to EMI
● Uses light instead of electricity
■ Benefits
● Greater range (many miles)
● Greater data-carrying capacity (measured in Tbps)
■ Types
● Multimode Fiber (MMF)
● Single-Mode Fiber (SMF)
47
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Transceivers
○ Copper vs Fiber Optic Cables
■ Fiber-Optic Advantages
● Higher bandwidth
48
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Longer distances
● Immune to EMI
● Better security
■ Copper Advantages
● Less expensive
● Easy to install
● Inexpensive tools
○ Media Converters
■ Convert media from one format to another
■ Layer 1 device
● Physical conversion of signal only
■ Examples
● Ethernet to Fiber Optic
● Fiber Optic to Ethernet
● Coaxial to Fiber
● Fiber to Coaxial
○ Transceivers
■ Device that sends (transmits) and receives data
● Bidirectional
○ Devices take turns communicating
○ Known as half-duplex
● Duplex
○ Full Duplex
■ Occurs when devices can both communicate at the
same time
○ Half Duplex
49
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Cable Distribution
○ An organized system to connect the network’s backbone in the main distribution
frame to the intermediate distribution frames and finally to the end user’s wall
jacks
○ Cable Distribution System
50
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ 110 Block
● Used for higher-speed network wiring
○ Required for CAT 5 or above cabling
■ Krone Block
● A proprietary European alternative to a 110 block
■ BIX Block
51
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
52
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
53
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
Ethernet Fundamentals
Objectives:
● 1.3 - Summarize the types of cables and connectors and explain which is the appropriate
type for a solution
● 2.1 - Compare and contrast various devices, their features, and their appropriate
placement on the network
● 2.3 - Given a scenario, configure and deploy common ethernet switching features
● 4.4 - Compare and contract remote access methods and security implications
● 5.5 - Given a scenario, troubleshoot general networking issues
● Ethernet Fundamentals
○ Ethernet Fundamentals
■ In early computer networks, there were many different network
technologies competing for a portion of the market share
■ Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), and others
fought for dominance
■ Currently, Ethernet is dominant for Layer 1
■ Due to Ethernet’s popularity, it is important to understand the
fundamentals of Ethernet
○ Origins of Ethernet
■ Was first run over coax cables (10Base5, 10Base2)
■ Ethernet has changed to using twisted pair cables
■ 10BASE-T is Unshielded Twisted Pair
● Maximum speed: 10 Mbps
● Maximum distance: 100 meters
54
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
55
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Example of CSMA/CD
○ Collision Domains
■ Comprised of all devices on a shared Ethernet segment (everything on
same cable or hub)
■ Devices operate at half-duplex when connected to a hub (Layer 1 device)
■ Devices must listen before they transmit to avoid collisions when
operating as CSMA/CD
56
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Bandwidth is the measure of how many bits the network can transmit in
1-second (bps)
■ Type of cable determines the bandwidth capacity of the network
○ Distance Limitations
57
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Hub
■ Layer 1 device used to connect multiple network devices/workstations
■ Known as Multiport Repeaters
■ Three basic types of ethernet hubs
● Passive Hub
○ Repeats signal with no amplification
● Active Hub
○ Repeats signal with amplification
● Smart Hub
○ Active hub with enhanced features like SNMP
○ Collision Domains
58
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Bridges
■ Bridges analyze source MAC addresses in frames entering the bridge and
populate an internal MAC address table
■ Makes intelligent forwarding decisions based on destination MAC
address in the frames
○ Switch
■ Layer 2 device used to connect multiple network segments together
■ Essentially a multiport bridge
■ Switches learn MAC addresses and make forwarding decisions based on
them
■ Switches analyze source MAC addresses in frames entering the switch
and populate an internal MAC address table based on them
59
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Layer 2 Switch
■ Each port on a switch represents an individual collision domain
■ All ports belong to the same broadcast domain
○ Router
■ Layer 3 device
used to connect
multiple networks
together
■ Make forwarding decisions based on logical network address information
● Such as using IP addresses (IPv4 or IPv6)
■ Routers are typically more feature rich and support a broader range of
interface types than multilayer switches
■ Each port is a separate collision domain
■ Each port is a separate broadcast domain
○ Layer 3 Switch
■ Layer 3 device used to connect multiple network segments together
■ Can make Layer 3 routing decisions and interconnect entire networks
(like a router), not just network segments (like a switch)
60
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
61
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Port monitoring
● User authentication
○ Link Aggregation (802.3ad)
■ Congestion can occur when ports all operate at the same speed
62
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
63
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
64
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Traffic Filtering
■ Multilayer switches may permit or deny traffic based on IP addresses or
application ports
65
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Broadcast Storms
■ If broadcast frame received by both switches, they can forward frames to
each other
66
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
67
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Port States
■ Non-designated ports do not forward traffic during normal operation;
however, they do receive bridge protocol data units (BPDUs)
■ If a link in the topology goes down, the non-designated port detects the
failure and determines whether it needs to transition to a forwarding
state
68
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Link Costs
■ Associated with the speed of a link
■ Lower the link’s speed, the higher the cost
69
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Long STP is being adopted due to higher link speeds over 10 Gbps
■ Values range from 2,000,000 for 10-Mbps Ethernet to as little as 2 for 10
Tbps
70
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Stateful Firewalls
● Allows traffic that originates from inside the network and go out
to the Internet
71
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Blocks traffic originated from the Internet from getting into the
network
○ Next-Generation Firewall (NGFW)
■ Conducts deep packet inspection at Layer 7
■ Detects and prevents attacks
■ Much more powerful than basic stateless or stateful firewalls
■ Continually connects to cloud resources for latest information on threats
○ Intrusion Detection or Prevention System (IDS/IPS)
■ Intrusion Detection System (IDS)
● Recognizes attacks through signatures and anomalies
■ Intrusion Prevention System (IPS)
● Recognizes and responds
○ Proxy Server
■ A specialized device that makes requests to an external network on
behalf of a client
○ Content Engine/Caching Engine
■ Dedicated appliance that performs the caching functions of a proxy
server
○ Content Switch/Load Balancer
■ Distributes incoming requests across various servers in a server farm
72
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
73
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
IP Addressing
Objectives:
● 1.4 - Given a scenario, configure a subnet and use appropriate IP addressing schemes
● 1.6 - Explain the use and purpose of network services
● IPv4 Addressing
○ Internet Protocol Version 4 (IPv4) Addressing
■ Written in dotted-decimal notation
● 10.1.2.3
● 172.21.243.67
■ Each IPv4 address is divided into 4 separate numbers and divided by dots
■ Each of these divisions are called octets due to having 8 bits assigned
■ 32-bits in length
74
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Classes of IP Addresses
■ Default subnet mask assigned by first octet
● Classful Masks if using default subnet mask
■ Defines the Class of IP Address
75
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Specialized IPs
■ Loopback Addresses (127.x.x.x range)
● Refers to the device itself and used for testing
● Most commonly used as 127.0.0.1
■ Automatic Private IP Addresses (APIPA)
● Dynamically assigned by OS when DHCP server is unavailable and
address not assigned manually
● Range of 169.254.x.x
76
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Multicast
■ Data travels from a single source device to multiple (but specific)
destination devices
77
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Broadcast
■ Data travels from a single source device to all devices on a destination
network
● Assigning IP Addresses
○ Static
■ Simple
■ Time-consuming
■ Prone to human errors
■ Impractical for large networks
○ Dynamic
■ Quicker
■ Easier
■ Less confusing
78
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ IP Address Management
79
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Used when device does not have a static IP address and cannot reach a
DHCP server
■ Allows a network device to self-assign an IP address from the
169.254.0.0/16 network
■ Designed to allow quick configuration of a LAN without need for DHCP
■ Non-routable but allows for network connectivity inside the local subnet
○ Zero Configuration (Zeroconf)
80
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Computer Mathematics
○ Humans count using Base-10 numbers
■ Decimals
■ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, …
○ Computers and networks do not understand decimal numbers natively
○ Process numbers using Base-2 numbers
■ Binary
■ 0, 1, 10, 11, …
82
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Binary Decimal
Decimal Binary
83
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Subnetting
○ Default classful subnet masks are rarely the optimal choice for a subnet size
○ Subnets can be modified using subnet masks to create networks that are better
scoped
○ Creating a subnet involves borrowing bits from the original host portion and
adding them to the network portion
○ Purpose of Subnets
■ More efficient use of IP addresses than classful default
84
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Subnet Masks
85
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
86
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Listing Subnets
87
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Subnetting Practice
88
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
89
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
90
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ IPv6
■ IPv4 essentially ran out of addresses due to proliferation of devices
■ IPv6 addressing provides enough IP addresses for generations to come
■ Enough IPv6 addresses for every person on the planet (5 x 1028)
91
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Multicast Addresses
92
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Neighbor Solicitation
● Used by nodes to determine link layer addresses
93
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Neighbor Advertisement
● Used by nodes to respond to solicitation messages
■ Redirect
● Routers informing host of better first-hop routers
○ Multicast
■ Data travels from a single source device to multiple (but specific)
destination devices
94
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Anycast
■ Designed to let one host initiate the efficient updating of router tables for
a group of hosts
■ IPv6 can determine which gateway host is closest and sends the packets
to that host as though it were a unicast communication
■ That host can anycast to another host in the group until all routing tables
are updated
■ Data travels from a single source device to the device nearest to multiple
(but specific) destination devices
95
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
Routing
Objectives:
● 1.4 - Given a scenario, configure a subnet and use appropriate IP addressing schemes
● 2.2 - Compare and contrast routing technologies and bandwidth management concepts
● 5.5 - Given a scenario, troubleshoot general networking issues
● Routers
○ Used to forward traffic between subnets, between an internal and external
network, or between two external networks
○ Each subnet or external network is going to be its own broadcast domain
○ Multilayer switches also perform routing functions
■ Switch
● Layer 2 Switch
■ Multilayer Switch
● Router
● Routing Fundamentals
○ Traffic is routed to flow between subnets
○ Each subnet is its own broadcast domain
○ Routers are the layer 3 devices that separate broadcast domains, but multilayer
switches can also separate broadcast domains
96
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
97
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Routing Tables
○ Routing Decisions
■ Layer 3 to Layer 2 Mapping
● Routers use ARP caches to map an IP address to a given MAC
address
■ Make packet-forwarding decisions based on its internal routing tables
○ Routing Tables
■ Table kept by the router to help determine which route entry is the best
fit for the network
■ A route entry with the longest prefix is the most specific network
■ 10.1.1.0/24 more specific than 10.0.0.0/8
98
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
99
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Static Routes
○ Dynamic
Routing Protocols
■ More than one route can exist for a network
■ Different protocols consider different criteria when deciding which route
to give preference
■ Based on number of hops (hop count in RIP), link bandwidths (OSPF), or
other criteria
100
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Routing Loops
101
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Routing Protocols
○ Internal and Exterior Routing Protocols
■ Interior Gateway Protocols (IGP)
● Operate within an autonomous system
■ Exterior Gateway Protocols (EGP)
● Operated between autonomous systems
102
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
103
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
104
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
105
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Metrics
■ If a routing protocol knows multiple paths to reach a network, how does
it choose its path?
● Metrics are the values assigned to a route
● Lower metrics are preferred over higher metrics
■ Metrics calculated differently for each protocol (RIP, OSPF, IS-IS, EIGRP,
and BGP)
● Hop count
● Bandwidth
● Reliability
● Delay
● Other metrics
106
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
107
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
108
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Multicast Routing
○ What is multicast touring?
■ Multicast sender sends traffic to a Class D IP Address, known as a
multicast group
■ Goal
● Send the traffic only to the devices that want it
■ Two primary protocols
● Internet Group Management Protocol (IGMP)
● Protocol Independent Multicast (PIM)
○ Internet Group Management Protocol (IGMP)
■ Used by clients and routers to let routers known which interfaces have
multicast receivers
■ Used by clients to join a multicast group
■ Versions
109
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● IGMPv1
○ Client requests to join the group and is asked every 60
seconds if it wants to remain in the group
● IGMPv2
○ Client can send a leave message to exit multicast group
● IGMPv3
○ Client can request multicast from only specific server
○ Called source-specific multicast (SSM)
○ Allows multiple video streams to single multicast
110
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
111
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Uses source distribution tree (SDT) to form an optimal path between source
router and last-hop router
○ Before the optimal path is formed, entire network is initially flooded and
consumes unnecessary bandwidth
○ If a router receives multicast traffic in the initial flood and the traffic is not
needed, then the router sends a prune message asking to be removed from the
source distribution tree
112
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ After sending prune messages, the resulting source distribution tree has an
optimal path between source router and last-hop router
○ Flood and prune repeat every 3 minutes which can cause excessive performance
impacts on the network
○ An optimal path between the source and last-hop routers is not initially created
○ Instead, a multicast source sends traffic directly to a rendezvous point (RP)
○ All last-hop routers send join messages to the RP
113
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
114
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
Networks Services
Objective 1.6: Explain the use and purpose of network services
● Zone Transfer
○ Sharing of information between DNS servers about which domain names they
have and their associated IP addresses
115
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● For example
○ diontraining.com is a second level domain, and it sits
underneath the top-level domain of .com
○ Sub-domain
■ A new server underneath a second-level domain
○ Host Level
■ This is the lowest and most detailed level inside of the DNS hierarchy and
refers to a specific machine
● DNS Records
○ A Records
■ Address Record
■ Used to link a hostname to an IPv4 address
■ A records work for IPv4 addresses
■ AAAA records work for IPv6 addresses
○ CNAME Record
■ Canonical Name Record
■ Used instead of a A record or AAAA record if you want to point a domain
to another domain name or subdomain
○ MX Record
■ Mail Exchange Record
■ Used to direct emails to a mail server
■ Used to indicate how email messages should be routed using the Simple
Mail Transfer Protocol, or SMTP, over port 25
■ Can only be used to point to another domain, not an IP address
○ SOA Record
■ Start of Authority Record
118
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ NS Record
■ Name Server Record
■ Used to indicate which DNS name server is the authoritative one for a
domain
119
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ External DNS
■ Records created around the domain names we purchase from a central
authority and use on the public internet
○ DNS Resolver
■ Also known as a DNS cache located on an individual host
■ This temporary database remembers the answers it received from the
DNS server
● Recursive Lookup
○ DNS server will hunt it down and report back to your
resolver
● Interactive Lookup
○ DNS resolve will continually query DNS servers until it finds
the one with the IP for the domain
120
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● 2.4 - Given a scenario, install and configure the appropriate wireless standards and
technologies
○ Circuit-Switched Connection
■ Connection is brought up only when needed, like making a phone call
121
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ On-demand bandwidth can provide cost savings for customers who only
need periodic connectivity to a remote site
○ Packet-Switched Connection
■ Always on like a dedicated leased line, but multiple customers share the
bandwidth
■ SLAs used to guarantee a certain quality
(5mbps at least 80% of the time)
■ Virtual circuits are represented as dashed lines
122
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Referred to as 3.75G
● 4G
○ Introduction of multiple input multiple output, or MIMO
○ Uses an even wider frequency band, covering frequencies
from 2 to 8 Ghz
○ Often called 4G LTE, or 4G Long Term Evolution
○ It was improved and became LTE Advanced or LTE-A
● 5G
○ Reach speeds up to 10 Gbps using high-band 5G
frequencies
○ 5G is split into 3 frequency bands
■ Low-band Frequencies
● Operates between 600-850 MHz and
provide us with speeds of 30-250 Mbps
■ Mid-band Frequencies
● Operate between 2.5 to 3.7 Ghz and
supports higher data rates of 100-900 Mbps
■ High-band Frequencies
● Operate between 25-39 Ghz
● Global System for Mobile Communications (GSM)
○ A cellular technology that takes your voice during a call
and converts it to digital data
○ A SIM card is used to identify yourself to the network
● Code-Division Multiple Access (CDMA)
○ A cellular technology that uses, code division, to split up
the channel
124
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
125
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Metro Ethernet
■ Service providers are beginning to offer Ethernet interfaces to their
customers
■ Less expensive and more common than specialized serial ports used in a
CSU/DSU
■ Technology used by service provider is hidden from customer and they
only need to connect their network’s router to a Smart Jack
○ Point-to-Point Protocol (PPP)
■ Commonly used Layer 2 protocol on dedicated leased lines to
simultaneously transmit multiple Layer 3 protocols (IP, IPX)
■ Each Layer 3 control protocol runs an instance of PPP’s Link Control
Protocol (LCP)
● Multilink interface
126
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
127
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
128
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Upstream: Up to 12 Mbps
○ Cable Modems
■ Hybrid Fiber-Coax (HFC) Distribution Network
● Cable television infrastructure containing both coaxial and fiber-
optic cabling
■ Specific frequency ranges are used for upstream and downstream data
transmission as determined by Data-Over-Cable Service Interface
Specification (DOCSIS)
● Upstream (5 MHz to 42 MHz)
● Downstream (50 MHz to 860 MHz)
■ Transmits and receives over cable television infrastructure
○ Satellite Modems
■ Used in remote, rural, or disconnected locations where other connections
are not available
■ Provides relatively fast speeds like a DSL modem, but contain low
bandwidth usage limits and charge high costs for over limit usage
■ Potential issues with Satellite communications:
!
● Delays - Time to satellite and back ( > " second)
● Weather conditions
○ Thunderstorms and snow can cause loss of connectivity
between satellite and receiver
129
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
131
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
132
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
Wireless Networks
Objectives:
● 2.1 - Compare and contrast various devices, their features, and their appropriate
placement on the network
133
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● 2.4 - Given a scenario, install and configure the appropriate wireless standards and
technologies
● 4.2 - Compare and contrast common types of attacks
● 4.3 - Given a scenario, apply network hardening techniques
● 5.4 - Given a scenario, troubleshoot common wireless connectivity issues
● Wireless Networking
○ Wireless Local Area Network (WLAN)
■ Allows users to roam within a coverage area
■ Popularity has increased exponentially
■ Convenient to use and expand network access throughout a room, floor,
or building
■ IEEE 802.11 is the most common type
■ Other wireless options exist (used for PAN)
● Bluetooth
● Infrared (IR)
● Near-Field Communications (NFC)
● Ant+
● Z-Wave
○ Ad Hoc
■ Wireless devices communicate directly with each other without the need
for a centralized access point
■ Peer-to-Peer connections
134
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Infrastructure
135
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
136
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Mesh Topology
■ May not use a centralized control
■ Range of combined wireless defines network
■ Uses Wi-Fi, Microwave, Cellular, and more
137
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ AP Placement
■ Careful
planning is
required to
prevent the APs from interfering with one another and still maintaining
the desired coverage area in ESS
■ Coverage should overlap between APs to allow uninterrupted roaming
from one cell to another but can’t use overlapping frequencies
138
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
overlapping coverage cells for 2.4 GHz band should have 10% to 15%
coverage overlap in coverage area
○ AP Placement (5 Ghz)
■ Identical channels should be separated by at least two cells instead of
one
139
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Site Surveys
■ Wireless survey to determine coverage areas
■ Produces a heat map with coverage
● Wireless Antennas
○ Antennas
■ Coverage areas vary based on the type used
■ Most SOHO wireless APs have fixed antennas
■ Enterprise-class APs support different types
■ Factors in antenna effectiveness
● Distance
● Pattern of Wireless Coverage
● Environment (indoor/outdoor)
● Avoiding Interference with other APs
○ Omnidirectional Antenna
140
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Unidirectional Antenna
● Wireless Frequencies
○ Spread Spectrum Wireless Transmissions
■ Direct-Sequence Spread Spectrum (DSSS)
■ Frequency-Hopping Spread Spectrum (FHSS)
■ Orthogonal Frequency-Division Multiplexing (OFDM)
■ Only DSS and OFDM are commonly utilized in today’s WLANs
○ Direct-Sequence Spread Spectrum (DSSS)
■ Modulates data over an entire range of frequencies using a series of
signals known as chips
■ More susceptible to environmental interference
■ Uses entire frequency spectrum to transmit
141
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● 5 GHz band
○ 5.75 GHz to 5.875 GHz range
142
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ 802.11 ax
● 6 GHz spectrum
● Can reach speeds of up to 9.6 Gbps using MU-MIMO technology
● Fully backward compatible with Wireless A, B, G, N, and AC
devices
● Wireless Security
○ Wireless networks offer convenience, but also many security risks
■ Encryption of data transferred is paramount to increasing security
○ Pre-Shared Key
■ Both AP and client uses same encryption key
■ Problems
● Scalability is difficult if key is compromised
● All clients must know the same password
○ Wired Equivalent Privacy
■ Original 802.11 wireless security standard
● Claimed to be as secure as wired networks
■ Static 40-bit pre-shared encryption key
144
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
145
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
146
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
148
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
149
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Hypervisor
■ Allow
the use of
VLANs and
trunking to divide up the broadcast domain
■ Layer 2 control provides VLANs and trunking
■ Provides Quality of Service and security
151
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Virtual Desktops
■ User’s
desktop
computer is
run in browser
■ Used
from web,
laptop, tablet,
or phone
■ Easier to secure and upgrade for the admins
○ Software-Defined Networking (SDN)
■ Provides the
administrator with
an easy-to-use
front end to
configure physical
and virtual devices throughout the network
■ All the configurations are automatically done
■ Provides administrator and overview of the entire network
152
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ VoIP can save a company money and provide enhanced services over a
traditional PBX solution
○ VoIP Topology
■ User’s desktop computer is run in browser
● Cloud Computing
○ Cloud Computing
■ Private Cloud
● Systems and users only have access with other devices inside the
same private cloud or system
■ Public Cloud
153
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Examples
● Amazon Web Services (AWS)
● Microsoft’s Azure
○ Software as a Service (SaaS)
■ User interacts with a web-based application
■ Details of how it works are hidden from users
■ Examples
● Google Docs
● Office 365
○ Platform as a Service (PaaS)
■ Provides a development platform for companies that are developing
applications without the need for infrastructure
■ Dion Training uses PaaS for our courses
■ Examples
● Pivotal
● OpenShift
● Apprenda
○ Desktop as a Service (DaaS)
■ Provides a desktop environment that is accessible through the Internet in
the form of a cloud desktop or virtual desktop environment
● Virtual Desktop Infrastructure (VDI)
● Cloud Concepts
○ Elasticity
155
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
156
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
157
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Connectivity Options
○ Virtual Private Network (VPN)
■ Establishes a secure connection between on-premises network, remote
offices, client devices, and provider’s global network
● Amazon Web Services - Direct Connect Gateway
● Microsoft Azure - Azure Private Link
○ Private-Direct Connection
■ Extends pre existing, on-premise data center into the provider’s network
to directly connect to your virtual private cloud network
158
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Datacenter Architecture
○ Datacenter
■ Any facility that businesses and other organizations use to organize,
process, store, and disseminate large amounts of data
○ Types
■ Three-tiered hierarchy
■ Software-defined networking
■ Spine and leaf architecture
■ Traffic flows
■ On-premise versus hosted data centers
159
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Benefits
■ Performance
■ Management
■ Scalability
■ Redundancy
○ Software-Defined Networking (SDN)
■ Enables the network to be intelligently and centrally controlled, or
programmed, using software applications
■ Application Layer
● Focuses on the communication resource requests or information
about the network as a whole
■ Control Layer
● Uses the information from the applications and decides how to
route a data packet on the network
■ Infrastructure Layer
● Contains the network devices that receive information about
where to move the data and then performs those movements
160
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Spine and leaf architecture can give faster speeds and lower
latency
● This architecture can be used in combination with the standard
three-tiered hierarchy
● North-South
○ Traffic that enters or leaves the data center from a system
physically residing outside the datacenter
○ Northbound is data leaving the datacenter
○ Southbound is data entering the datacenter
● East-West
161
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
Network Security
162
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
Objectives:
● 4.1 - Explain common security concepts
● 4.3 - Given a scenario, apply network hardening techniques
● 4.5 - Explain the importance of physical security
● CIA Triad
○ Network Security Fundamentals
■ Networks are increasingly dependent on interconnecting with other
networks
■ Risks exist not just on the untrusted Internet, but also inside our own
organization’s networks and must be minimized or eliminated
■ Understanding the various threats facing our networks is important in
order to best defend the network against the onslaught of cyber-attacks
they are constantly facing
○ Network Security Goals
■ Commonly called the CIA Triad
● Confidentiality
● Integrity
● Availability
○ Confidentiality
■ Keeping the data private and safe
● Encryption
● Authentication to access resources
■ Encryption ensures that data can only be read (decoded) by the intended
recipient
● Symmetric encryption
● Asymmetric encryption
163
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Integrity
■ Ensures data has not been modified in transit
■ Verifies the source that traffic originates from
■ Integrity violations
● Defacing a corporate web page
● Altering an e-commerce transaction
● Modifying electronically stored financial records
○ Hashing (Integrity)
■ Sender runs string of data through algorithm
● Result is a hash or hash digest
165
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Environmental Vulnerabilities
● Undesirable conditions or weaknesses that are in the general area
surrounding the building where a network is run
■ Physical Vulnerabilities
167
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Risk Management
○ The identification, evaluation, and prioritization of risks to minimize, monitor,
and control the vulnerability exploited by a threat
○ Risk Assessment
168
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Posture Assessment
■ Assesses cyber risk posture and exposure to threats caused by
misconfigurations and patching delays
● Define mission-critical components
● Identify strengths, weaknesses, and security issues
169
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Stay in control
● Strengthen position
○ Business Risk Assessment
■ Used to identify, understand, and evaluate potential hazards in the
workplace
○ Process Assessment
■ The disciplined examination of the processes used by the organization
against a set of criteria
● Determines if you are doing things right, and if you are doing the
right things
○ Vendor Assessment
■ The assessment of a prospective vendor to determine if they can
effectively meet the obligations and the needs of the business
● Security Principles
○ Least Privilege
■ Using the lowest level of permissions or privileges needed in order to
complete a job function or admin task
○ Role-based Access
■ Discretionary Access Control (DAC)
170
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
171
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Defense in Depth
○ Screen Subnet
■ Subnet in the network architecture that uses a single firewall with three
interfaces to connect three dissimilar networks
● Triple-homed firewall
○ Separation of Duties
■ Prevent frauds and abuse by distributing various tasks and approval
authorities across a number of different users
172
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Dual Control
■ Two people have to be present at the same time to do something
○ Split Knowledge
■ Two people each have half of the knowledge of how to do something
○ Honeypot/ Honeynet
■ Attracts and traps potential attackers to counteract any attempts at
unauthorized access to a network
■ Think vertical through the layers as well as horizontal or lateral across the
network using screen subnets
○ Dictionary Attack
■ Guesses the password by attempting to check every single word or
phrase contained within a word list, called a dictionary
● Do not use anything that looks like a regular word
○ Brute Force Attack
■ Tries every possible combination until they figure out the password
● Use a longer and more complicated password
○ Uppercase
173
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Lowercase
○ Numbers
○ Special characters
● For good security, use a minimum of 12 characters
○ Hybrid Attack
■ Combination of dictionary and brute force attacks
● Authentication Methods
○ Local Authentication
■ Process of determining whether someone or something is who or what it
● Claims itself to be
● Simplified version of X.500
○ Lightweight Directory Access Protocol (LDAP)
■ Validates a username and password combination against an LDAP server
as a form of authentication
174
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Commonly uses
■ Port 1812 Authentication messages
■ Port 1813 Accounting messages
○ Proprietary versions of RADIUS may also use
■ Port 1645 Authentication messages
■ Port 1646 Accounting messages
○ Terminal Access Controller Access Control System Plus (TACACS+)
■ Used to perform the role of an authenticator in an 802.1x network
● RADIUS (UDP)
175
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● TACACS+ (TCP)
● Ensure Port 49 is open
● Excellent if using Cisco devices
○ 802.1x
■ A standardized framework that’s used for port-based authentication on
both wired and wireless networks
● Supplicant
● Authenticator
● Authentication server
○ Extensible Authentication Protocol (EAP)
■ Allows for numerous different mechanisms of authentication
● EAP-MD5
○ Utilizes simple passwords and the challenge handshake
authentication process to provide remote access
authentication
● EAP-TLS
○ Uses public key infrastructure with a digital certificate
being installed on both the client and the server
● EAP-TTLS
○ Requires a digital certificate on the server and a password
on the client for its authentication
● EAP Flexible Authentication via Secure Tunneling (EAP-FAST)
○ Uses a protected access credential to establish mutual
authentication between devices
● Protected EAP (PEAP)
176
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ IEEE 802.1x
■ Used in port-based Network Access Control
● Time-based
○ Defines access periods for given hosts on using a time-
based schedule
● Location-based
○ Evaluates the location of the endpoint requesting access
using IP or GPS geolocation
● Role-based (Adaptive NAC)
177
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Physical Security
○ Detection Methods
■ Security control used during an event to find out whether or not
something malicious may have happened
● Wired
○ Allows the device to be physically cabled from its camera
all the way to a central monitoring station
● Wireless
○ Easier to install, but they can interfere with other wireless
systems, like 802.11 wireless networks
● Asset Disposal
○ Occurs whenever a system is no longer needed by an organization
■ Perform a factory reset
■ Wipe the configuration
■ Sanitize the devices
○ Factory Reset
■ Removes all customer specific data that has been added to a network
device since the time it was shipped from the manufacturer
● Enable
● Factory-reset all
● Write-erase
■ NVRAM stores configuration files
■ Flash Module stores the Cisco IOS
○ Degaussing
■ Exposes the hard drive to a powerful magnetic field to wipe previously
written data from the drive
○ Purging/Sanitizing
■ Removes data which cannot be reconstructed using any known forensic
techniques
○ Clearing Technique
■ Removes data with a certain amount of assurance that it can’t be
reconstructed
○ Data Remnants
■ Leftover pieces of data that may exist in the hard drive which we no
longer need
180
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
181
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
Network Attacks
Objective 4.2: Compare and contrast common types of attacks
182
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ DNS Poisoning
■ Occurs when an attacker manipulates known vulnerabilities within the
DNS to reroute traffic from one site to a fake version of that site
○ DNSSEC
■ Uses encrypted digital signatures when passing DNS information between
servers to help protect it from poisoning
■ Ensure server has the latest security patches and updates
○ Rogue DHCP Server
■ A DHCP server on a network which is not under the administrative
control of the network administrators
● Spoofing Attacks
○ Spoofing
■ Occurs when an attacker masquerades as another person by falsifying
their identity
○ IP Spoofing
■ Modifying the source address of an IP packet to hide the identity of the
sender or impersonate another client
■ IP spoofing is focused at Layer 3 of the OSI model
○ MAC Spoofing
■ Changing the MAC address to pretend the use of a different network
interface card or device
○ MAC Filtering
■ Relies on a list of all known and authorized MAC addresses
○ ARP Spoofing
■ Sending falsified ARP messages over a local area network
■ ARP spoofing attack can be used as a precursor to other attacks
183
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Malware
○ Malware
■ Designed to infiltrate a computer system and possibly damage it without
the user’s knowledge or consent
○ Virus
■ Made up of malicious code that is run on a machine without the user’s
knowledge and infects it whenever that code is run
○ Worm
■ A piece of malicious software that can replicate itself without user
interaction
○ Trojan Horse
■ A piece of malicious software disguised as a piece of harmless or
desirable software
○ Ransomware
■ Restricts access to a victim’s computer system or files until a ransom or
payment is received
○ Spyware
■ Gathers information about you without your consent
○ Keylogger
■ Captures any key strokes made on the victim machine
○ Rootkit
■ Designed to gain administrative control over a computer system or
network device without being detected
● Wireless Attacks
○ Rogue Access Point
■ A wireless access point that has been installed on a secure network
without authorization from a local network administrator
○ Shadow IT
■ Use of IT systems, devices, software, applications, or services without the
explicit approval of the IT department
○ Evil Twin
■ Wireless access point that uses the same name as your own network
○ Deauthentication
■ Attempts to interrupt communication between an end user and the
wireless access point
○ Dictionary Attack
■ Guesses the password by attempting to check every single word or
phrase contained within a word list, called a dictionary
185
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Insider Threat
○ An employee or other trusted insider who uses their authorized network access
in unauthorized ways to harm the company
● Logic Bomb
○ A specific type of malware that is tied to either a logical event or a specific time
Security Technologies
Objectives:
● 1.5 - Explain common ports and protocols, their application, and encrypted alternatives
187
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● 2.1 - Compare and contrast various devices, their features, and their appropriate
placement on the network
● 3.1 - Given a scenario, use the appropriate statistics and sensors to ensure network
availability
● 4.1 - Explain common security concepts
● 4.3 - Given a scenario, apply network hardening techniques
● 4.4 - Compare and contrast remote access methods and security implications
● Firewall
○ Uses a set of rules defining the traffic types permitted or denied through device
■ Software or hardware
■ Virtual or physical
■ Host-based or network-based
■ Can perform Network Address Translation (NAT) and/or Port Address
Translation (PAT)
○ Stateful Firewall
■ Inspects traffic as part of a session and recognizes where the traffic
originated
○ NextGen Firewall (NGFW)
■ Third-generation firewall that conducts deep packet inspection and
packet filtering
● Router
○ IP address
● Switch Firewall
○ IP address or port
■ Source/destination IP
■ Source/destination port
■ Source/destination MAC
○ Firewall Zone
■ Firewall interface in which you can set up rules
● Inside
○ Connects to corporate LAN
● Outside
○ Connects to the Internet
● Demilitarized Zone (DMZ)
○ Connects to devices that should have restricted access
from the outside zone (like web servers)
○ Unified Threat Management (UTM) Device
■ Combines firewall, router, intrusion detection/prevention system, anti-
malware, and other features into a single device
● Remote Access
○ Telnet Port 23
■ Sends text-based commands to remote devices and is a very old
networking protocol
■ Telnet should never be used to connect to secure devices
○ Secure Shell (SSH) Port 22
■ Encrypts everything that is being sent and received between the client
and the server
○ Clientless VPN
■ Creates a secure, remote-access VPN tunnel using a web browser without
requiring a software or hardware client
○ Secure Socket Layer (SSL)
■ Provides cryptography and reliability using the upper layers of the OSI
model, specifically Layers 5, 6, and 7
○ Transport Layer Security (TLS)
■ Provides secure web browsing over HTTPS
■ SSL and TLS use TCP to establish their secure connections between a
client and a server
○ Datagram Transport Layer Security (DTLS)
■ UDP-based version of the TLS protocol which operates a bit faster due to
having less overhead
○ Layer 2 Tunneling Protocol (L2TP)
■ Lacks security features like encryption by default and needs to be
combined with an extra encryption layer for protection
● IP Security (IPSec)
○ Provides authentication and encryption of data packets to create an secure
encrypted communication path between two computers
■ Confidentiality
● Using data encryption
■ Integrity
● Ensuring data is not modified in transit
■ Authentication
● Verifying parties are who they claim to be
■ Anti-Replay
● Checking sequence numbers on all packets prior to transmission
○ Key exchange request
○ IKE Phase 1
○ IKE Phase 2
○ Data transfer
○ Tunnel termination
○ Main Mode
■ Conducts three two-way exchanges between the peers, from the initiator
to the receiver
● First Exchange
○ Agrees upon which algorithms and hashes will be used to
secure the IKE communications throughout the process
● Second Exchange
○ Uses a Diffie-Hellman exchange to generate shared secret
keying material so that the two parties can prove their
identities
194
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Third Exchange
○ Verifies the identity of the other side by looking at an
encrypted form of the other peer’s IP address
○ Authentication methods used
■ Encryption and hash algorithms used
■ Diffie-Hellman groups used
■ Expiration of the IKE SA
■ Shared secret key values for the encryption algorithms
○ Aggressive Mode
■ Uses fewer exchanges, resulting in fewer packets and faster initial
connection than main mode
● Diffie-Hellman public key
● Signed random number
● Identity packet
● Negotiate the IPSec SA parameters protected by an existing IKE SA
● Establish IPSec SA
● Periodically renegotiate IPSec SAs to maintain security
● Perform additional Diffie-Hellman exchanges, if needed
○ Quick Mode
■ Only occurs after IKE already established the secure tunnel in Phase 1
using either main or aggressive mode
○ Diffie-Hellman Key Exchange
■ Allows two systems that don’t know each other to be able to exchange
keys and trust each other
● PC1 sends traffic to PC2 and then RTR1 initiates creation of IPSec
tunnel
195
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Tunneling
○ Site to site
○ Authentication Header (AH)
■ Provides connectionless data integrity and data origin authentication for
IP datagrams and provides protection against replay attacks
○ Encapsulating Security Payload (ESP)
■ Provides authentication, integrity, replay protection, and data
confidentiality
■ In transport mode, use AH to provide integrity for the TCP header and
ESP to encrypt it
196
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Integrity
○ Message hashing
● Authentication
○ Source validation
● PoE+ 802.3at Confidentiality
○ DES 56-bit encryption
● Network Logging
○ System Logging Protocol (Syslog)
■ Sends system log or event messages to a central server, called a syslog
server
● Security Information Management (SIM)
● Security Event Management (SEM)
● Security Information and Event Management (SIEM)
○ Client
■ Device sending the log information to the syslog server
○ Server
■ Receives and stores the logs from all of the clients
198
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Traffic Log
■ Contains information about the traffic flows on the network
■ Traffic logs allow for investigation of any abnormalities
○ Audit Log/ Audit Trail
■ Contains a sequence of events for a particular activity
○ Application Log
■ Contains information about software running on a client or server
● Informational
● Warning
● Error
○ Security Log
■ Contains information about the security of a client or server
○ System Log
199
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
201
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
Network Hardening
Objective 4.3: Given a scenario, apply network hardening techniques
● Hardening
○ Securing a system by reducing its surface of vulnerabilities
○ Healthy balance between operations and security
● Patch Management
○ Involves planning, testing, implementing, and auditing of software patches
■ Provides security
■ Increases uptime
■ Ensures compliance
■ Improves features
○ Ensure patches don’t create new problems once installed
■ Planning
● Tracks available patches and updates and determines how to test
and deploy each patch
■ Testing
● Tests any patch received from a manufacturer prior to automating
its deployment through the network
● Have a small test network, lab, or machine for testing new
patches before deployment
■ Implementing/Implementation
● Deploys the patch to all of the workstations and servers that
require it
202
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Password Security
○ Password Policy
■ Specifies minimum password length, complexity, periodic changes, and
limits on password reuse
○ Strong Password
■ Sufficiently long and complex which creates lots of possible combinations
for brute force attacks to be completed in time
● Long vs Complex
● Passwords should be up to 64 ASCII characters long
● Password aging policies should not be enforced
● Change default passwords
● Unneeded Services
○ A service is an application that runs in the background of an operating system or
device to perform a specific function
■ Disable any services that are not needed for business operations
○ Least Functionality
203
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
204
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Includes switch ports that can communicate with each other and the
primary VLAN but not other secondary VLANs
● Promiscuous Port (P-Port)
○ Can communicate with anything connected to the primary
or secondary VLANs
■ Host Ports
■ Isolated Ports (I-Port)
■ Community Ports (C-Port) df
● Isolated Port (I-Port)
○ Can communicate upwards to a P-Port and cannot talk
with other I-Ports
● Community Port (C-Port)
○ Can communicate with P-Ports and other C-Ports on the
same community VLAN
■ Default VLAN is known as VLAN 1
○ Native VLAN
■ VLAN where untagged traffic is put once it is received on a trunk port
○ DHCP Snooping
205
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Securing SNMP
○ SNMP
206
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Explicit Deny
■ Blocks matching traffic
○ Implicit Deny
■ Blocks traffic to anything not explicitly specified
○ Role-Based Access
■ Defines the privileges and responsibilities of administrative users who
control firewalls and their ACLs
● Wireless Security
○ MAC Filtering
■ Defines a list of devices and only allows those on your Wi-Fi network
● Explicit allow
● Implicit allow
● Always use explicit allow
● Don’t rely on it as your only wireless network protection
○ Wireless Client Isolation
■ Prevents wireless clients from communicating with one another
■ Wireless access points begin to operate like a switch using private VLANs
○ Guest Network Isolation
■ Keeps guests away from your internal network communications
○ Pre-Shared Key (PSK)
■ Secures wireless networks, including those protected with WEP, WPA,
WPA2, and WPA3
■ Ensure you choose a long and strong password
○ Extensible Authentication Protocol (EAP)
■ Acts as a framework and transport for other authentication protocols
○ Geofencing
208
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● IoT Considerations
○ Understand your endpoints
○ Track and manage your devices
○ Patch vulnerabilities
○ Conduct test and evaluation
○ Change defaults credentials
○ Use encryption protocols
○ Segment IoT devices
209
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
Network Availability
Objectives:
● 2.2 - Compare and contrast routing technologies and bandwidth management concepts
● 3.3 - Explain high availability and disaster recovery concepts and summarize which is the
best solution
● Network Availability
○ Measure of how well a computer network can respond to connectivity and
performance demands that are placed upon it
210
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Recovery Sites
○ Cold Sites
213
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
214
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Facilities Support
○ Uninterruptible Power Supply (UPS)
■ Provides emergency power to a load when the input power source or
main power fails
■ Great for short duration power outages (less than 15 minutes)
○ Power Distribution Unit (PDU)
■ Distributes electric power, especially to racks of computers and
networking equipment located within a data center
■ PDUs combined with a UPS or a generator can provide power during a
blackout
○ Generator
■ Provides long-term power during a power outage in a region
215
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ For example
● Voice (VoIP) and Video should have higher priority levels (less
latency)
216
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Categories of QoS
■ Delay
● Time a packet travels from source to destination
● Measured in milliseconds (ms)
■ Jitter
● Uneven arrival of packets
● Especially harmful in VoIP
■ Drops
● Occurs during link congestion
● Router’s interface queue overflows and causes packet loss
○ “Effective” Bandwidth
● QoS Categorization
○ Purpose of QoS
■ To categorize traffic, apply a policy to those traffic categories, and
prioritize them in accordance with a QoS policy
217
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Categorization of Traffic
■ Determine network performance requirements for various traffic types
(Voice, Video, Data)
■ Categorize traffic into specific categories:
● Low delay
○ Voice
○ Streaming Video
● Low priority
○ Web browsing
○ Non-mission critical data
■ Document your QoS policy and make it available to your users
218
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Best Effort
● Does not truly provide QoS to that traffic
● No reordering of packets
● Uses FIFO (first in, first out) queuing
■ Integrated Services (IntServ or Hard QoS)
● Makes strict bandwidth reservations
● Reserves bandwidth by signaling devices
■ Differentiated Services (DiffServ or Soft QoS)
● Differentiates between multiple traffic flows
● Packets are “marked”
● Routers and switches make decisions based on those markings
○ Methods of Categorizing Traffic
■ Classification
■ Marking
■ Congestion management
■ Congestion avoidance
■ Policing and shaping
■ Link efficiency
219
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● QoS Mechanisms
○ Ways of Categorizing Traffic
■ Classification
■ Marking
■ Congestion management
■ Congestion avoidance
■ Policing and shaping
■ Link efficiency
○ Classification of Traffic
■ Traffic is placed into different categories
■ For example, the E-mail class might contain various types of traffic
● POP3
● IMAP
● SMTP
● Exchange
■ Classification does not alter any bits in the frame or packet
○ Marking of Traffic
■ Altered bits within a frame, cell, or packet indicates handling of traffic
■ Network tools make decisions based on markings
○ Congestion Management
■ When a device receives traffic faster than it can be transmitted, it buffers
the extra traffic until bandwidth becomes available
● Called queuing
■ Queuing algorithm empties the packets in specified sequence and
amount
■ Queuing algorithms types
● Weighted fair queuing
220
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Low-latency queuing
● Weighted round-robin
○ Congestion Avoidance
■ Newly arriving packets would be discarded if the device’s output queue
fills to capacity
■ Random Early Detection (RED) is used to prevent this from occurring
● As the queue fills, the possibility of a discard increases until it
reaches 100%
● If at 100%, all traffic of that type is dropped
● RED instead drops packets from selected queues based on
defined limits
■ If TCP traffic, it will be retransmitted
■ If UDP, it will simply be dropped
○ Policing and Shaping
■ Policing
● Typically discards packets that exceed a configured rate limit
(speed limit)
● Dropped packets result in retransmissions
● Recommended for higher-speed interfaces
■ Shaping
● Buffers (delays) traffic exceeding configured rate
● Recommended for slower-speed interfaces
Network Policies
Objective 3.2: Explain the purpose of organizational documents and policies
222
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● IT Governance
○ Used to provide a comprehensive security management framework for the
organization
■ Policies
■ Standards
■ Baselines
■ Guidelines
■ Procedures
● Policy
○ Defines the role of security inside of an organization and establishes the desired
end state for that security program
■ Organizational
■ System-specific
■ Issue-specific
● Organizational
○ Provides framework to meet the business goals and define the roles,
responsibilities, and terms associated with it
● System-specific
○ Addresses the security of a specific technology, application, network, or
computer system
223
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Issue-specific
○ Addresses a specific security issue such as email privacy, employee termination
procedures, or other specific issues
● Standard
○ Implements a policy in an organization
● Baseline
○ Creates a reference point in network architecture and design
● Guideline
○ Recommended action that allows for exceptions and allowances in unique
situations
● Procedure
○ Detailed step-by-step instructions created to ensure personnel can perform a
given task or series of actions
● Planning
○ Involves the planning and requirement analysis for a given
system, including architecture outlining and risk
identification
● Design
225
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
226
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ A set of rules that restricts the ways in which a network resource may be
used and sets guidelines on how it should be used
○ Bring Your Own Device (BYOD) Policy
■ Allows employees to access enterprise networks and systems using their
personal mobile devices
■ Create a segmented network where the BYOD devices can connect to
○ Remote Access Policy
■ A document which outlines and defines acceptable methods of remotely
connecting to the internal network
○ Onboarding Policy
■ A documented policy that describes all the requirements for integrating a
new hire into the company and its cultures
○ Offboarding Policy
■ A documented policy that covers all the steps to successfully part ways
with an employee who’s leaving the company
○ Security Policy
■ A document that outlines how to protect the organization’s systems,
networks, and data from threats
○ Data Loss Prevention Policy
■ A document defining how organizations can share and protect data
■ Data loss prevention policy minimizes accidental or malicious data loss
■ Set proper thresholds for your DLP policy
● Common Agreements
○ Non-Disclosure Agreement (NDA)
■ Defines what data is confidential and cannot be shared outside of that
relationship
227
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
228
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
Network Management
Objectives:
● 3.1 - Given a scenario, use the appropriate statistics and sensors to ensure network
availability
● 3.2 - Explain the purpose of organizational documents and policies
● Network Management
○ The process of administering and managing computer networks
● Common Documentation
○ Physical Network Diagram
■ Shows the actual physical arrangement of the components that make up
the network
○ Logical Network Diagram
■ Illustrates the flow of data across a network and shows how devices
communicate with each other
○ Wiring Diagram
■ Labels which cables are connected to which ports
○ Radio Frequency (Wireless) Site Survey
■ Planning and designing a wireless network to deliver the required
wireless solution
○ Wired Site Survey
■ Determines if a site has the right amount of power, space, and cooling to
support a new upgrade or installation
○ Audit and Assessment Report
■ Delivered after a formal assessment has been conducted
229
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Performance Metrics
○ Network Performance Monitoring
■ Monitors the performance from the end user’s workstation to the final
destination they are trying to reach
● Latency
○ Time that it takes for data to reach its destination across a
network
○ High latency slows down overall network performance
● Bandwidth
○ Maximum rate of data transfer across a given network
● Throughput
230
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Sensors
○ Monitors a device’s temperature, CPU usage, and memory, which could indicate
if it is operating properly or is about to fail
○ Minor Temperature Threshold
■ Used to set off an alarm when a rise in temperature is detected but
hasn’t reached dangerous levels yet
○ Major Temperature Threshold
■ Used to set off an alarm when temperature reaches dangerous
conditions
● 5-40% CPU utilization
○ Misconfigured network
○ Network under attack
■ Minor
■ Severe
■ Critical
● 40%
○ Normal conditions
● 60-70%
○ Busier times
● Layer 3 80%
231
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Peak times
● NetFlow Data
○ Full Packet Capture
■ Used to capture the entire packet, including the header and the payload
for all traffic entering and leaving a network
○ Flow Analysis
■ Relies on a flow collector to record the metadata and statistics about
network traffic rather than recording each frame
■ Highlights trends and patterns
○ NetFlow
■ Defines a particular traffic flow based on the different packets that share
the same characteristics
● Protocol interface
● IP version/type
● Source/destination IP
● Source/destination port
● IP service type
○ Zeek
■ Passively monitors a network like a sniffer, but only logs full packet
capture data of potential interest
■ Performs normalization of the data and stores it as a tab-delimited or
JSON-formatted text files
232
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Interface Statistics
○ Link State
■ Communicates whether a given interface has a cable connected to it and
a valid protocol to use for communication
○ Drop
■ Used to count the number of packets that have been dropped
○ Flush
■ Used to count Selective Packet Discards (SPD) that have occurred
○ Selective Packet Discards (SPD)
■ Drops low priority packets when the CPU is too busy so it can save
capacity for higher priority packets as a form of QoS
○ Runt
■ An Ethernet frame that is less than 64 bytes in size
○ Giant
■ Any Ethernet frame that exceeds the 802.3 frame size of 1518 bytes
○ Throttle
■ Occurs when the interface fails to buffer the incoming packets
○ CRC
■ Number of packets received that failed the cyclic redundancy checksum,
or CRC check upon receipt
○ Frame
233
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Used to count the number of packets where a CRC error and a non-
integer number of octets was received
○ Overrun
■ Used to count how often the interface was unable to receive traffic due
to an insufficient hardware buffer
○ Ignored
■ Used to count the number of packets that the interface ignored since the
hardware interface was low on internal buffers
○ Underrun
■ Number of times the sender has operated faster than the router can
handle, causing buffers or dropped packets
○ Babble
■ Used to count any frames that are transmitted and are larger than 1518
bytes
○ Late Collision
■ Used to count the number of collisions that occur after the interface has
started transmitting its frame
○ Deferred
■ Used to count the number of frames that were transmitted successfully
after waiting because the media was busy
○ Output Buffer Failure
■ Number of times a packet was not output from the output hold queue
because of a shortage of shared memory
○ Output Buffer Swapped Out
■ Number of packets stored in main memory when the queue is full
● Environmental Sensors
234
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Environmental monitoring
■ Network devices operate between 50 and 90 ºF
■ Maintain a humidity range of 40-60%
● Cool
● At the right humidity
● Receives clean power
● Flood-free
235
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
236
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Cable Review
○ Coaxial
■ 100 Mbps, 500 meters
○ Coaxial Twinaxial
■ 10 Gbps, 5 meters
■ 100 Gbps, 7 meters
237
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
238
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Crossover Cable
○ Connects two Ethernet network devices directly, such as
two computers without a switch or a router in between
● Power Over Ethernet (or PoE)
○ Passes electric power over twisted pair Ethernet cable to
powered devices
○ PoE provides 15.4 to 60 watts of power using two twisted
pairs, and between 60-100 watts of power using all four
● Cabling Tools
○ Snips or Cutters
■ Used to simply cut a piece of cable off a larger spool or run of cable
■ Looks a lot like a pair of scissors, but uses stronger blades to cut twisted
copper cables, coaxial, cables, or even larger cable bundles
○ Cable Strippers
■ Strips the end of the cable to prepare it the attachment of a RJ-45 or
other type of connector
○ Cable Crimper
■ Used to attach the connector to the end of the cable
■ support both RJ-45 and RJ-11 connectors
■ If you are working with coaxial cables, then you will need a cable crimper
that supports an RG-6 or RG-59 connector
○ Cable Tester
■ Verifies continuity for each wire in the cable to ensure there are no
breaks
■ Verifies the pinouts of the connectors
239
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
240
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Occur when the wire from one pair is split away from the
other and crosses over a wire in an adjacent pair
○ Cable Certifier
■ Used with an existing cable to determine its Category or data throughput
○ Multimeter
■ Checks the voltage or the amperage or the resistance of a copper cable
■ Used to verify if a cable is broken or not
■ Used to check coaxial cables to ensure there is no cuts or breaks in the
middle of a patch cable, or test power sources or power cords
○ Punch-Down Tool
■ Used to terminate wires on a punch-down block, stripping off the
insulation
■ Used with 66 block or 110 block, network jacks, and patch panels
○ Toner Generator/Probe
■ Allows technicians to generate a tone at one end of a connection and use
the probe to audibly detect the wire pair connected to the tone
generator
■ Often called a “Fox and Hound”
■ Fox is a tone generator
■ Hound is a toner probe
○ Loopback Adapter
■ Connects transmit pins (or fibers) to receive pins (or fiber) to test a
network interface
● Ethernet Pinout
○ Pins 1 to 3 (Tx+ to Rx+)
○ Pins 2 to 6 (Tx- to Rx-)
● Fiber
241
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Noise
● Additional electrical or radio frequency noise in the areas where
your network cables are operating
○ Use the proper cables for the physical environment you
are operating in
○ Shorten the distance
○ Use an amplifier or repeater
243
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Clean and polish both ends of fiber cable and connectors or switch to a
cable with higher quality
○ Interference
■ Occurs when multiple cables in the same frequency band are operating in
close proximity to each other
■ Use high quality twisted pair cables or higher category rated cables
■ Plan cable runs to operate in parallel to any high power cables
○ Decibel (dB) Loss
■ Measures the amount of signal deterioration we are experiencing on a
given connection
● Copper
○ decrease in voltage
● Fiber
○ amount of lost light
■ Bad port
244
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Ethernet Issues
○ Duplex Mismatch
245
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ When one device thinks the connection is full duplex and the other thinks
it is half duplex
■ Ensure both devices are configured to auto negotiate the connection
properly
246
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Bandwidth
○ Theoretical speed of data going across the network
● Throughput
○ Actual speed of data on the network
247
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Wireless Considerations
○ Vertical Antenna
■ Radio frequency waves extend outward in all directions away from the
antenna and the wireless access point at an equal power level
○ Dipole Antenna
■ Produces radio frequency waves extending outward in two directions
○ Yagi Antenna
■ A unidirectional antenna that sends the radio frequency waves in only
one direction
○ Parabolic Grid Antenna
■ Allows the radio waves to be transmitted in only one direction over a
longer distance than a Yagi antenna
■ Choose a parabolic or Yagi antenna for site-to-site connections
■ For indoor use, you are more likely to use omnidirectional and
unidirectional antennas
○ Polarization
■ The orientation of the electric field (or transmission) from the antenna
■ Most Wi-Fi networks use vertical polarization
○ Channel Utilization
■ A statistic or measure of the amount of airtime utilization that occurs for
a particular frequency or channel
■ Keep channel utilization under 30% to have a faster wireless network
■ Access points and clients form a single broadcast domain when they
operate on the same channel
○ Multipath Reception
■ Occurs when the transmitted signal bounces off walls and other physical
objects and then is redirected to the receiver
● Client Disassociation
○ Idle Timeout
■ Occurs when there’s no traffic within 300 seconds
■ Send a keep alive packet every few minutes to
remain connected
○ Session Timeout
■ Occurs when there’s no traffic within 1800 seconds
○ Wireless Network Change
■ Occurs whenever the wireless local area network is
changed
○ Manual Deletion
■ Occurs whenever a client is removed by an
administrator
○ Authentication Timeout
■ Occurs when the authentication or key exchange
process fails to finish in time
○ Access Point Radio Reset
■ Occurs when a change is made to the wireless
network
○ Deauthentication Attack
■ A common wireless attack used by hackers to disassociate wireless clients
and make them attempt to reconnect to the access point
251
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Incorrect Configurations
○ Wrong SSID
■ Service Set Identifier (SSID)
● Natural language name used to identify a wireless network in an
802.11 network
○ Incorrect passphrase
■ Passphrase/Pre-Shared Key
● Used to encrypt and decrypt data sent and received by a wireless
network
○ Encryption mismatch
■ Occurs when the client and the access point are using different
encryption types
● WEP – RC4
● WPA – TKIP
● WPA2 – AES
■ To fix this, attempt to reinstall the drivers for your wireless adapter
● Change protocol type
● Disable antivirus tools
● Reinstall drivers
253
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Software Tools
○ Wireless Analyzer
■ Ensures you have the proper coverage and helps prevent overlap
between wireless access point coverage zones and channels
○ Protocol Analyzer
■ Used to capture and analyze signals and data traffic over a
communication channel
○ Packet Capturing Tool
■ Used to capture packets running over a network connection in real time
and then save them for later analysis
● Ethereal
● Protocol expert
● Netasyst
● Network analyzer
● Observer
● LanHound
254
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● EtherPeek
● tcpdump
● WinDump
● PRTG network monitor
● SolarWinds
● NetworkMiner
○ Bandwidth Speed Test
■ Verifies the real-world throughput from a client device all the way out to
the Internet and back
○ Port Scanner
■ Determines which ports are open on a network
○ iPerf
■ Gathers an active measurement of the maximum achievable bandwidth
on an IP-based network
○ NetFlow Analyzer
■ Performs monitoring, troubleshooting and in-depth inspection,
interpretation, and synthesis of traffic flow data
○ Trivial File Transfer Protocol (TFTP)
■ Protocol for exchanging files between two TCP/IP machines
○ TFTP Server
■ Used for simple file transfers on a network and boot-loading of remote
devices
○ Terminal Emulator
■ Allows a host computer to access another computer through a command-
line interface or a graphical one using either Telnet or SSH
■ Always use SSH instead of Telnet
● Other terminal emulators:
255
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Cmder
○ ZOC
○ Mintty
● If you are working on a Linux client:
○ GNOME
○ Konsole
○ xterm
● If you are working on an OS X client:
○ iTerm2
○ MacTerm
○ Kitty
○ IP Scanner
■ Used to search for and detect IP addresses and other information related
to devices on the network
■ Any router or firewall that is in the path of the transmission from the
client to the destination
● If cannot ping google.com
○ ping 8.8.8.8
● If cannot ping 8.8.8.8
○ ping default gateway
● If cannot ping default gateway
○ ping local client’s IP address
● If cannot ping local IP address
○ ping local host of 127.0.0.1
257
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
■ Used to query the DNS to provide the mapping between domain names
and IP addresses or other DNS records
■ In Windows, use set q=mx to search for mail exchange records
■ In Linux, use set type=mx to search for mail exchange records
○ dig
■ Used to conduct queries against DNS nameservers and is only available
for Linux, Unix, and OS X systems by default
○ hostname
■ Used to display the hostname portion of the full computer name for a
given system
● Juniper
○ show configuration
● PoE+ 802.3at Sidewinder
○ cf config
● Cisco
○ show route
● Juniper
○ show route
● PoE+ 802.3at Sidewinder
○ cf route status
○ show interface
■ Displays statistics for the network interfaces on the device
○ show config
■ Displays the current system configuration on the screen
○ show route
■ Displays the current state of the routing table on the device
260
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
261
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Collision
■ Occurs when two hosts on the network transmit at the same time which
causes the signals to combine on the network medium
■ Collisions occur in both wired and wireless networks
○ Collision Domain
■ Network segment where simultaneous data transmissions collide with
one another
■ Use any Layer 2 device to break apart collision domains
● Turn off auto negotiation
● Hardcode lower speed
● Change to half-duplex
○ Broadcast Storm
■ Occurs when a network system is overwhelmed by continuous multicast
or broadcast traffic
● Layer 2
○ FF:FF:FF:FF:FF:FF
● Layer 3
○ 255.255.255.255
○ Broadcast Domain
■ A logical division of computer network where all nodes can reach each
other by broadcast at the data link layer
■ Layer 2 devices will not break up a broadcast domain
● Too large singular broadcast domain
○ Use a router to break up subnets into separate broadcast
domains
● Large volume of DHCP requests
○ Discover
262
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Offer
○ Request
○ Acknowledge
● Loops are created in the switching environment
○ Enable Bridge Protocol Data Units (BPDU) on managed
switches
○ Enforce a maximum number of MAC addresses per port
○ Break up large broadcast domains into smaller domains
using routers and Layer 3 switches
● Duplicate Addresses
○ MAC Address
■ Used to uniquely identify a network interface card on a given network
● D2:51:F1:3A:34:65
○ Vendor code: D2:51:F1
○ Unique Value: 3A:34:65
■ MAC addresses are only used in your Layer 2 networks
■ Logical Domain Manager
■ Listens to multicast messages on a network and keeps track of the MAC
addresses being used
■ Enable port security on your switches
○ Duplicate IP Address/ IP Address Conflict
■ Occurs when another computer on the same network has an identical IP
to another workstation or server on the same network
● Static IP address issue
● DHCP server issue
263
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● Routing Issues
○ Multicast Flooding
■ No specific host is associated with the multicast MAC address in the CAM
table of the switch
○ Asymmetrical Routing
■ Network packets leave via one path and return via a different path
■ Routing issues cause issues with dropped packet flows
○ Missing Routes
■ When a router cannot reach a destination because there is a missing
route in the routing table
● Loops
○ Switching/Bridge Loop
■ Switching loops are usually an issue with how STP is configured
○ Routing Loop
264
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Split Horizon
■ Routing configuration that stops a route from being advertised back in
the direction from which it came
● ip split-horizon
● no ip split-horizon
○ Route Poisoning
■ Increasing a router’s metric to an infinitely high number after detecting
one of its connected routes has failed
○ Hold-Down Timer
■ Prevents bad routes from being restored and passed to other routers by
accident
● Hold-down period
● 180 seconds (3 minutes)
■ Statically-created routes are given a metric of 1 by default
● DHCP Issues
○ Dynamic Host Configuration Protocol (DHCP)
■ Automatically assigns an IP address, subnet mask, default gateway, and
DNS server’s IP address to a client when it joins a network
○ Rogue DHCP Server
265
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
266
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ Make sure you check your configuration and that there is proper routing setup
between the VLANs, because this is the number one cause of issues when you're
dealing with VLANs that won’t communicate
■ IP Address
● Occur when you have an incorrect IP address, subnet mask,
gateway, or DNS server IP address assigned to a client
■ Subnet mask
■ Default gateway IP
■ DNS Server IP
● Make sure you have a working DNS server and the IP is properly
entered on the client
● Firewall Issues
○ Firewall
■ Network security device that monitors and filters incoming and outgoing
network traffic based upon established rule sets
○ Host-Based Firewall
■ Runs on an individual computer or device connected to the network to
protect that one device
○ Network-Based Firewall
■ Deployed in line with the network traffic flow to monitor and filter
incoming and outgoing network traffic based on established rule sets
● Access to protected resources from unprotected networks is not
working
● Access to unprotected resources from protected networks is not
working
● Access to the firewall and its configurations is not working
267
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
268
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
● DNS problems
○ High CPU usage increases latency, jitter, and packet loss
○ Use a cable tester for twisted pair connections or a fiber light meter for fiber
optic connections
● Other Issues
○ Low optical link budgets
■ Optical Link Budget is a calculation that considers all the anticipated
losses along the length of a fiber optic connection
● Reduced transmission
● Slow connection speeds
● Connection downtime
○ 0.25 dB per km for a standard fiber optic cable
○ Calculate optical link budget by using power budget minus
the loss over the fiber cable’s distance
○ Certificate issues
269
https://www.DionTraining.com
CompTIA Network+
(N10-008) Study Notes
○ BYOD challenges
■ Bring Your Own Device (BYOD) policies allows a user to bring their own
smartphones, laptops, and other devices to work and use them on the
organization’s network
● Decrease in Capital Expenditures
● Increase in Operational Expenditures
○ Hardware failures
270
https://www.DionTraining.com