Use this quick start guide to collect all the information about CompTIA Network+ (N10-007) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the N10-007 CompTIA Network+ exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA N+ certification exam.
The CompTIA Network+ certification is mainly targeted to those candidates who want to build their career in Networking domain. The CompTIA Certified Network+ Professional exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA N+.
CompTIA Network+ Exam Summary:
Exam Name | CompTIA Certified Network+ Professional |
Exam Code | N10-007 |
Exam Price | $348 (USD) |
Duration | 90 mins |
Number of Questions | 90 |
Passing Score | 720 / 900 |
Schedule Exam | Pearson VUE |
Sample Questions | CompTIA Network+ Sample Questions |
Practice Exam | CompTIA N10-007 Certification Practice Exam |
CompTIA N10-007 Exam Syllabus Topics:
Topic | Details |
---|---|
Networking Concepts - 23% |
|
Explain the purposes and uses of ports and protocols. |
1. Protocols and ports
2. Protocol types
3. Connection-oriented vs. connectionless
|
Explain devices, applications, protocols and services at their appropriate OSI layers.
|
1. Layer 1 – Physical 2. Layer 2 – Data link 3. Layer 3 – Network 4. Layer 4 – Transport 5. Layer 5 – Session 6. Layer 6 – Presentation 7. Layer 7 – Application |
Explain the concepts and characteristics of routing and switching. |
1. Properties of network traffic
2. Segmentation and interface properties
3. Routing
4. IPv6 concepts
5. Performance concepts
6. NAT/PAT
7. Port forwarding 8. Access control list 9. Distributed switching 10. Packet-switched vs. circuit switched network 11. Software-defined networking |
Given a scenario, configure the appropriate IP addressing components.
|
1. Private vs. public 2. Loopback and reserved 3. Default gateway 4. Virtual IP 5. Subnet mask 6. Subnetting
7. Address assignments
|
Compare and contrast the characteristics of network topologies, types and technologies.
|
1. Wired topologies
2. Wireless topologies
3. Types
4. Technologies that facilitate the Internet of Things (IoT)
|
Given a scenario, implement the appropriate wireless technologies and configurations.
|
1. 802.11 standards
2. Cellular
3. Frequencies
4. Speed and distance requirements
5. Channel bandwidth 6. Channel bonding 7. MIMO/MU-MIMO 8. Unidirectional/omnidirectiona 9. Site surveys |
Summarize cloud concepts and their purposes. |
1. Types of services
2. Cloud delivery models
3. Connectivity methods
4. Security implications/considerations 5. Relationship between local and cloud resources |
Explain the functions of network services. |
1. DNS service
2. DHCP service
3. NTP
4. IPAM |
Infrastructure - 18% |
|
Given a scenario, deploy the appropriate cabling solution. |
1. Media types
2. Plenum vs. PVC
3. Connector types
4. Transceivers
5. Termination points
6. Copper cable standards
7. Copper termination standards
8. Ethernet deployment standards
|
Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.
|
1. Firewall 2. Router 3. Switch 4. Hub 5. Bridge 6. Modems 7. Wireless access point 8. Media converter
9. Wireless range extender
10. VoIP endpoint |
Explain the purposes and use cases for advanced networking devices. |
1. Multilayer switch 2. Wireless controller 3. Load balancer
4. IDS/IPS
5. Proxy server 6. VPN concentrator 7. AAA/RADIUS server
8. UTM appliance
9. NGFW/Layer 7 firewall 10. VoIP PBX 11. VoIP gateway 12. Content filter |
Explain the purposes of virtualization and network storage technologies.
|
1. Virtual networking components
2. Network storage types
3. Connection type
4. Jumbo frame
|
Compare and contrast WAN technologies. |
1. Service type
2. Transmission mediums
3. Characteristics of service
4. Termination
|
Network Operations - 17% |
|
Given a scenario, use appropriate documentation and diagrams to manage the network.
|
1. Diagram symbols 2. Standard operating procedures/ work instructions 3. Logical vs. physical diagrams 4. Rack diagrams 5. Change management documentation 6. Wiring and port locations 7. IDF/MDF documentation 8. Labeling 9. Network configuration and performance baselines 10. Inventory management |
Compare and contrast business continuity and disaster recovery concepts.
|
1. Availability concepts
2. Recovery
3. MTTR
4. MTBF 5. SLA requirements |
Explain common scanning, monitoring and patching processes and summarize their expected outputs.
|
1. Processes
2. Event management
3. SNMP monitors
4. Metrics
|
Given a scenario, use remote access methods. |
1. VPN
2. RDP
8. Out-of-band management
|
Identify policies and best practices. |
1. Privileged user agreement 2. Password policy 3. On-boarding/off-boarding procedures 4. Licensing restrictions 5. International export controls 6. Data loss prevention 7. Remote access policies 8. Incident response policies 9. BYOD 10. AUP 11. NDA 12. System life cycle
13. Safety procedures and policies |
Network Security - 20% |
|
Summarize the purposes of physical security devices.
|
1. Detection
2. Prevention
|
Explain authentication and access controls. |
1. Authorization, authentication and accounting
2. Multifactor authentication
3. Access control
|
Given a scenario, secure a basic wireless network. |
1. WPA 2. WPA2 3. TKIP-RC4 4. CCMP-AES 5. Authentication and authorization
6. Geofencing |
Summarize common networking attacks. |
1. DoS
2. Social engineering
3. Insider threat 4. Logic bomb 5. Rogue access point 6. Evil twin 7. War-driving 8. Phishing 9. Ransomware 10. DNS poisoning 11. ARP poisoning 12. Spoofing 13. Deauthentication 14. Brute force 15. VLAN hopping 16. Man-in-the-middle 17. Exploits vs. vulnerabilities |
Given a scenario, implement network device hardening. |
1. Changing default credentials 2. Avoiding common passwords 3. Upgrading firmware 4. Patching and updates 5. File hashing 6. Disabling unnecessary services 7. Using secure protocols 8. Generating new keys 9. Disabling unused ports
|
Explain common mitigation techniques and their purposes. |
1. Signature management 2. Device hardening 3. Change native VLAN 4. Switch port protection
5. Network segmentation
6. Privileged user account
7. File integrity monitoring 8. Role separation 9. Restricting access via ACLs 10. Honeypot/honeynet 11. Penetration testing |
Network Troubleshooting and Tools - 22% |
|
Explain the network troubleshooting methodology. |
1. Identify the problem
2. Establish a theory of probable cause
3. Test the theory to determine the cause
4. Establish a plan of action to resolve the problem and identify potential effects
5. Implement the solution or escalate as necessary 6. Verify full system functionality and, if applicable, implement preventive measures 7. Document findings, actions, and outcomes |
Given a scenario, use the appropriate tool. |
1. Hardware tools
2. Software tools
|
Given a scenario, troubleshoot common wired connectivity and performance issues.
|
1. Attenuation 2. Latency 3. Jitter 4. Crosstalk 5. EMI 6. Open/short 7. Incorrect pin-out 8. Incorrect cable type 9. Bad port 10. Transceiver mismatch 11. TX/RX reverse 12. Duplex/speed mismatch 13. Damaged cables 14. Bent pins 15. Bottlenecks 16. VLAN mismatch 17. Network connection LED status indicators |
Given a scenario, troubleshoot common wireless connectivity and performance issues.
|
1. Reflection 2. Refraction 3. Absorption 4. Latency 5. Jitter 6. Attenuation 7. Incorrect antenna type 8. Interference 9. Incorrect antenna placement 10. Channel overlap 11. Overcapacity 12. Distance limitations 13. Frequency mismatch 14. Wrong SSID 15. Wrong passphrase 16. Security type mismatch 17. Power levels 18. Signal-to-noise ratio |
Given a scenario, troubleshoot common network service issues. |
1. Names not resolving 2. Incorrect gateway 3. Incorrect netmask 4. Duplicate IP addresses 5. Duplicate MAC addresses 6. Expired IP address 7. Rogue DHCP server 8. Untrusted SSL certificate 9. Incorrect time 10. Exhausted DHCP scope 11. Blocked TCP/UDP ports 12. Incorrect host-based firewall settings 13. Incorrect ACL settings 14. Unresponsive service 15. Hardware failure |
To ensure success in CompTIA N+ certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for CompTIA Network+ (N10-007) exam.