📱 New iOS App — CertFlash: CompTIA flashcards built for exam day. Get it on the App Store ↗
CompTIA Network+ · N10-009 · Quick Reference

CompTIA Network+ Cheat Sheet

Every port number, OSI model layer, subnetting reference, routing protocol, wireless standard, and key acronym you need for the N10-009 exam — all in one place.

SF
Sean Fogarty CompTIA A+ Certified · Network+ in progress
📋 Jump to section
🔢 OSI Model

The OSI model is one of the most tested topics on Network+. Know every layer number, name, what it does, and at least two protocols or devices that operate at each layer.

Layer 7
Application
HTTP, HTTPS, FTP, SMTP, DNS, DHCP, SNMP — user-facing protocols
Layer 6
Presentation
Encryption, compression, encoding — SSL/TLS, JPEG, ASCII, Unicode
Layer 5
Session
Opens, maintains, closes sessions — NetBIOS, RPC, SQL sessions
Layer 4
Transport
TCP (reliable, connection-oriented), UDP (fast, connectionless) — port numbers live here
Layer 3
Network
IP addressing, routing — routers, Layer 3 switches, IP, ICMP, OSPF, BGP
Layer 2
Data Link
MAC addresses, frames, switching — switches, bridges, ARP, Ethernet, Wi-Fi
Layer 1
Physical
Bits, cables, signals — hubs, repeaters, cables, connectors, voltages
⚡ OSI memory tricks

Layers 7→1: "All People Seem To Need Data Processing" (Application, Presentation, Session, Transport, Network, Data Link, Physical)

Layers 1→7: "Please Do Not Throw Sausage Pizza Away"

Key device associations: Hub = Layer 1 · Switch = Layer 2 · Router = Layer 3 · Firewall = Layer 3/4 · Load balancer = Layer 4/7

🔌 Port Numbers

Memorise every port below — Network+ tests these directly and in scenario questions where you must identify a blocked service from its port number.

PortProtocolServiceNotes
20TCPFTP DataActive FTP data transfer
21TCPFTP ControlFTP commands and control channel
22TCPSSHSecure remote access — encrypted replacement for Telnet
23TCPTelnetUnencrypted remote access — deprecated, insecure
25TCPSMTPSends email between mail servers
53TCP/UDPDNSUDP for queries, TCP for zone transfers
67/68UDPDHCP67 = server, 68 = client
69UDPTFTPTrivial FTP — no auth, used for booting and config files
80TCPHTTPUnencrypted web traffic
110TCPPOP3Downloads email to device, deletes from server
119TCPNNTPNetwork News Transfer Protocol — Usenet
123UDPNTPNetwork Time Protocol — clock synchronisation
137–139TCP/UDPNetBIOSLegacy Windows name resolution and file sharing
143TCPIMAPEmail stays on server, synced to devices
161/162UDPSNMP161 = queries, 162 = traps (alerts)
389TCP/UDPLDAPDirectory services — Active Directory queries
443TCPHTTPSEncrypted web traffic (TLS)
445TCPSMBWindows file sharing, Active Directory
465/587TCPSMTP (Secure)587 = STARTTLS (preferred), 465 = SMTPS
514UDPSyslogSystem log messages — network device logging
636TCPLDAPSLDAP over SSL — encrypted directory queries
993TCPIMAPSIMAP over SSL — encrypted email retrieval
995TCPPOP3SPOP3 over SSL — encrypted email download
1433TCPMS SQLMicrosoft SQL Server
1723TCPPPTPLegacy VPN — insecure, deprecated
3306TCPMySQLMySQL database
3389TCPRDPRemote Desktop Protocol — Windows remote access
5060/5061TCP/UDPSIPSession Initiation Protocol — VoIP signalling
🧮 Subnetting Quick Reference

The most tested calculation topic on Network+. Know the subnet mask, number of hosts, and network increment for each CIDR prefix from /24 to /30.

Formula: Usable hosts = 2^(host bits) − 2  ·  Network bits + host bits = 32

CIDRSubnet MaskHosts per SubnetIncrementSubnets from /24
/24255.255.255.0254N/A1
/25255.255.255.1281261282
/26255.255.255.19262644
/27255.255.255.22430328
/28255.255.255.240141616
/29255.255.255.2486832
/30255.255.255.2522464
/16255.255.0.065,534
/8255.0.0.016,777,214
Private IP address ranges (RFC 1918)
10.0.0.0/8       → 10.0.0.0 – 10.255.255.255      (Class A — large enterprises)
172.16.0.0/12    → 172.16.0.0 – 172.31.255.255   (Class B — medium networks)
192.168.0.0/16   → 192.168.0.0 – 192.168.255.255 (Class C — home/small office)

Special ranges:
127.0.0.0/8      → Loopback — 127.0.0.1 = localhost, tests local TCP/IP stack
169.254.0.0/16   APIPA — self-assigned when DHCP fails (link-local)
📡 Key Protocols & Standards
ProtocolFull NameWhat it does
TCPTransmission Control ProtocolReliable, connection-oriented, three-way handshake (SYN, SYN-ACK, ACK)
UDPUser Datagram ProtocolFast, connectionless, no guarantee of delivery — streaming, DNS, VoIP
IPInternet ProtocolLogical addressing and routing at Layer 3
ICMPInternet Control Message ProtocolError messages and diagnostics — used by ping and traceroute
ARPAddress Resolution ProtocolResolves IP addresses to MAC addresses on a local network
DNSDomain Name SystemResolves hostnames to IP addresses — "phonebook of the internet"
DHCPDynamic Host Configuration ProtocolAutomatically assigns IP, subnet mask, gateway, and DNS to devices
NATNetwork Address TranslationTranslates private IPs to a public IP for internet access
SNMPSimple Network Management ProtocolMonitors and manages network devices — v3 adds encryption
NTPNetwork Time ProtocolSynchronises clocks across network devices — UDP port 123
STPSpanning Tree ProtocolPrevents switching loops by blocking redundant paths
802.1QVLAN Tagging StandardTags Ethernet frames with VLAN ID for trunk links between switches
802.1XPort-Based Access ControlAuthenticates devices before allowing network access — uses RADIUS
🗺️ Routing Protocols
ProtocolTypeAlgorithmMetricKey fact
RIP v2IGP / Distance VectorBellman-FordHop count (max 15)Simple, slow convergence — 15 hops = unreachable
OSPFIGP / Link StateDijkstra (SPF)Cost (bandwidth)Most common interior routing — fast convergence, scalable
EIGRPIGP / HybridDUALBandwidth + delayCisco proprietary — combines distance vector and link state traits
BGPEGP / Path VectorBest path selectionAS path attributesRoutes traffic between autonomous systems — the internet's routing protocol
⚡ Routing exam shortcuts

IGP = Interior Gateway Protocol — routes within one organisation (RIP, OSPF, EIGRP)

EGP = Exterior Gateway Protocol — routes between organisations/ISPs (BGP)

Distance vector = knows direction and distance to destinations (RIP). Link state = knows the full network map (OSPF). Path vector = knows the full path including autonomous systems (BGP).

📶 Wireless Standards
StandardWi-Fi NameFrequencyMax SpeedKey feature
802.11aWi-Fi 15 GHz54 MbpsFirst 5 GHz standard — less interference
802.11bWi-Fi 22.4 GHz11 MbpsFirst widely adopted Wi-Fi standard
802.11gWi-Fi 32.4 GHz54 MbpsBackward compatible with 802.11b
802.11nWi-Fi 42.4 / 5 GHz600 MbpsFirst dual-band — introduced MIMO
802.11acWi-Fi 55 GHz3.5 GbpsMU-MIMO, beamforming — enterprise standard
802.11axWi-Fi 6/6E2.4 / 5 / 6 GHz9.6 GbpsOFDMA — most efficient in dense environments
Wireless security protocols
WEP      → Broken — RC4 cipher, crackable in minutes. Never use.
WPA      → Deprecated — TKIP encryption, vulnerabilities exist
WPA2     → Current standard — AES-CCMP encryption
            Personal (PSK) = shared password | Enterprise (802.1X) = RADIUS auth
WPA3     → Latest — SAE replaces PSK handshake, forward secrecy
            Required on Wi-Fi 6 certified devices
🔒 Network Security
TermWhat it does
FirewallFilters traffic based on rules — stateless (packet filtering) or stateful (tracks connections)
IDSIntrusion Detection System — monitors and alerts on suspicious traffic, does not block
IPSIntrusion Prevention System — monitors and actively blocks suspicious traffic inline
DMZDemilitarised zone — network segment between internal and external networks for public-facing servers
VPNEncrypted tunnel over public internet — IPsec for site-to-site, SSL/TLS VPN for remote access
ACLAccess Control List — ordered list of permit/deny rules applied to router interfaces
NACNetwork Access Control — verifies device compliance before granting network access
VLANVirtual LAN — logical network segments on the same physical switch, isolates broadcast domains
AAAAuthentication, Authorisation, Accounting — RADIUS and TACACS+ implement AAA for network access
RADIUSCentrally authenticates network access — encrypts password only, UDP ports 1812/1813
TACACS+Cisco AAA protocol — encrypts entire packet, separates auth/authz/accounting, TCP port 49
🔧 Troubleshooting Tools & Commands
Essential troubleshooting commands
ping          → Tests ICMP connectivity to a host — basic reachability test
tracert/traceroute → Shows each hop to a destination — identifies where traffic fails
ipconfig      → Shows IP, subnet, gateway (Windows) — /all shows DNS, MAC
ifconfig/ip a → Shows network interface info (Linux/macOS)
nslookup      → Queries DNS — tests name resolution
netstat       → Shows active connections and listening ports
arp -a        → Shows ARP cache — IP to MAC mappings
nmap          → Network scanner — discovers hosts and open ports
route print   → Shows local routing table (Windows)
pathping      → Combines ping and tracert — shows packet loss per hop (Windows)
CompTIA 7-step troubleshooting methodology
1. Identify the problem          → Gather information, question users, identify symptoms
2. Establish a theory            → Question the obvious, consider multiple causes
3. Test the theory               → Confirm or deny — if denied, establish new theory
4. Establish a plan of action    → Consider effects, create plan to resolve
5. Implement the solution        → Apply fix, escalate if needed
6. Verify full system functionality → Confirm fix works, check for side effects
7. Document findings             → Record what happened, what fixed it, preventive measures
📖 Key Acronyms

Network+ loves acronym-heavy questions. If you can't expand an acronym instantly you'll lose time on the exam.

AcronymStands forOne-line description
APIPAAutomatic Private IP Addressing169.254.x.x — self-assigned when DHCP fails
CIDRClassless Inter-Domain RoutingIP addressing notation using prefix length (e.g. /24)
CSMA/CDCarrier Sense Multiple Access / Collision DetectionWired Ethernet collision-handling method
CSMA/CACarrier Sense Multiple Access / Collision AvoidanceWireless collision avoidance — used in 802.11
FQDNFully Qualified Domain NameComplete domain name — www.example.com
MTBFMean Time Between FailuresAverage time a device runs before failing
MTTRMean Time To RepairAverage time to restore a failed device
QoSQuality of ServicePrioritises certain traffic types — VoIP, video
SLAService Level AgreementContractual uptime and performance guarantees
SDNSoftware-Defined NetworkingSeparates control plane from data plane — centralised management
MPLSMultiprotocol Label SwitchingWAN technology using labels to route traffic efficiently
PoEPower over EthernetDelivers electrical power over Ethernet cable — IP phones, APs
STPSpanning Tree ProtocolPrevents Layer 2 loops in switched networks
LACPLink Aggregation Control ProtocolCombines multiple physical links into one logical link (802.3ad)
VXLANVirtual Extensible LANExtends VLANs across Layer 3 networks — used in cloud/data centres

Ready to pass Network+?

The N10-009 study guide, Dion Training practice exams, and Professor Messer's free course.

See Network+ Resources →

Want weekly study tips for CompTIA?

Join candidates getting study tips, resource picks, and exam-day advice for A+, Network+, and Security+.

Related Articles

SF
Written by
Sean Fogarty
CompTIA A+ Certified · Network+ in progress

I built IT Study Hub while studying for the CompTIA A+, because most free resources either gave you bullet points with no context or were clearly written to rank on Google rather than to help anyone actually learn. Every article here is written to answer the question a studying candidate actually has — not just “what is this term?” but “how does this work, when does it matter, and how will it show up on the exam?”

More about this site →