CompTIA Network+ Cheat Sheet
CompTIA Network+ Cheat Sheet
You’ll need to answer at most 90 questions in this 90-minute examination and complete a
survey after it ends. The passing score is 720 on a scale of 100–900.
\
The latest CompTIA Security+ exam code is N10-008, available from September 2021 to
sometime in 2024. The exam objectives (domains) are as follows:
\
CompTIA Network+ Exam Domains
Domains
This Net+ cheat sheet arranges concepts according to our Total Seminars Network+ course
subtopics. Diagrams put concepts into a visual form and tables compartmentalize
information. Here’s a key to finding items by domain:
Ethernet Basics
Recognizing the Ethernet naming syntax (10Base5, 100Base5, 1000Base5, 10Broad5,
10BaseT, etc.) is crucial to the Network+ exam.
Ethernet Standards
Familiarize yourself with 1000Base and 10GBase types (names, distances, node numbers,
cable types, etc.).
TCP/IP Basics
Review additional information on IPv4 on your own.
Routing
Review router-related abbreviations below.
\ TCP/IP Applications
Remember to check out our Common Ports Cheat Sheet.
Network Naming
Network administrators cannot skip this section.
Domain Concept Elaboration
#nf DNS Domain Name System
#nf SOA Start of authority
#nf A/AAAA DNS record for IPv4/IPv6
#nf CNAME Canonical name or alias
#nf MX Mail exchange
#nf PTR Pointer record
Securing TCP/IP
Review key network security acronyms here.
Switch Features
The definition for VLAN (virtual local area network) is in the section Integrating Networked
Devices.
IPv6
Here are IPv6 concepts for quick learning:
Domain Concept Elaboration
#nf #ni NDP Neighbor Discovery Protocol
#nf #ni IPv6 address 128-bit hexadecimal
number, e.g.,
2001:7120:0000:8001:
0000:0000:0000:1F10
#nf #ni IPv6 loopback ::1 (unicast)
#nf VLSM Variable-length subnet mask
WAN Connectivity
Review additional information on WAN construction by yourself.
\
#nf WDM/BWDM Bidirectional wavelength
division multiplexing
#nf DWDM Dense wavelength division
multiplexing
#nf MPLS Multiprotocol Label
Switching
Wireless Networking
The ubiquity of mobile devices makes mastering wireless networking a necessity.
Types:
● Public
● Private
● Community
● Hybrid
\ #nf Hypervisor Type 1 Bare or native metal
#nf Hypervisor Type 2 App-like VM on the
operating system
#nf IaaS Infrastructure as a Service
#nf PaaS Platform as a Service
#nf SaaS Software as a Service
#nf DaaS Desktop as a Service
#nf VDI Virtual desktop
infrastructure
#nf IaC Infrastructure as Code
#nf vSwitch Virtual switch
#nf VPC Virtual private cloud
#nf NFV Network function
virtualization
#nf SDN Software-defined networking
Data Centers
The prevalence of cloud computing makes learning about data centers a necessity.
Network Operations
Network operations cover the actions needed to protect a network and its associated
organization. Two main risks are security and business.
Domain Concept Elaboration
#no #ns NDA Nondisclosure Agreement
#no #ns MOU Memorandum of
Understanding
#no #ns #nf MSA Multi-Source Agreement
#no #ns SLA Service Level Agreement
#no #ns BYOD Bring Your Own Device
#no #ns SOW Statement of Work
#ns Incident response ● Forensics
● First responder
● Secure the area
● Document the scene
● Collect evidence
● Chain of custody
● Forensics report
● Legal hold
● Electronic discovery
(e-discovery)
#no RPO Recovery point objective
#no RTO Recovery time objective
#no MTTR Mean time to repair
#no MTTF Mean time to failure
#no MTBF Mean time between failures
#no BCP Business continuity plan
#no #nt AUP Acceptable use policy
#no #nt MDM Mobile Device Manager
#no #nt COBO Corporate-owned, business
only
\ #no #nt COPE Corporate-owned,
personally enabled
#no #nt CYOD Choose your own device
Protecting Networks
This is a vital section, especially if you intend to embark on a career in cyber security.
Tools:
● Ettercap
● Wireshark
● tcpdump
#ns Spoofing Digital misrepresentation
● MAC
● IP
● VLAN
#ni #ns DTP Cisco Dynamic Trunking
Protocol
#ns ITAD IT asset disposal
#ns DNS poisoning Exploit known DNS
vulnerabilities
#ns URL hijacking/typosquatting Target URL typos
#ns Replay attack Intercept data and replay
later
#ns Downgrade attack Force a network channel to
switch to an unprotected or
less secure data
transmission standard
#ns Session hijacking Seize control of a user’s
browsing session to gain
access
#no #ns Brute-force attack Trying character
\ combinations
#no #ns Dictionary attack Using lists of probable
passwords
#ni #ns VLAN hopping Attacker can move from one
VLAN to another
#ns CVE Common vulnerabilities and
exposure: publicly disclosed
list of security flaws
#ns CNA CVE Numbering Authority
#ns Zero-day Flaw discovered by third
party sooner than vendor
#ni #ns DAI Cisco Dynamic ARP
Inspection
#ni #ns RA Router Advertisement
#ni #ns Control plane policing Use QoS to stop Denial-of-
Service attacks
#ni #nt #ns Firewall Filter for network traffic
- Hardware/software
- Stateful/stateless
- Network-based/host-
based
- Context-/application-
aware
#ni #nt UTM Unified threat management
#ni ACL Access control list
#ni DPI Deep-packet inspection
#ns Virus Run on a computer without
the user’s knowledge.
Network Monitoring
Monitoring a network helps nip problems in the bud.
\
Technical Troubleshooting Best Practice Methodology (borrowed from our A+ Cheat Sheet)
Conclusion
We hope this quick review Network+ cheat sheet helps your learning or career journey.
Check out our other articles on networking, strictly exam-related test taking tips, and
Network+ accelerated certification training programs, which include supplemental sample
tests and chapter-end test questions. No matter where you go next, we wish you all the best.