SBN

CompTIA Network+ Domain #3: Network Operations

Introduction

The CompTIA Network+ certification can help bring your career to the next level and is a strong professional asset to have on your side. To earn this certification, you have to pass the Network+ certification exam. This exam is comprised of five different domains of knowledge that certification candidates will need to master.

This article will detail Domain 3.0, Network Operations, complete with its different objectives and what you will need to cover. This article should not serve as your sole means of preparing for the Network+ certification exam, but rather as a general review or an outline foundation.

Network Operations Outline

The following subtopics can be expected to be tested in the Network Operations section of the Network+ exam:

  1. Use of appropriate diagrams and documentation to manage the network
  2. Compare and contrast disaster recovery and business continuity concepts
  3. Common scanning, patching and monitoring processes and expected outputs
  4. Use of scenario-specific remote access methods
  5. Policies and best practices

Use of Appropriate Diagrams and Documentation to Manage the Network

The most important thing to remember about this subtopic is that as important as having physical diagrams of your network is, properly documenting network specifics (such as wiring and other physical details) is even more important.

Diagram Symbols

There are several different symbols you will need to know – in both scratch and finish forms. These symbols are used to convey to others information about the network. You will need to know symbols for hubs, switches, routers, wireless access points and firewalls to name just a few.

Standard Operating Procedures

Candidates will need to be familiar with the concepts of standard operating procedure, or SOP. SOP documentation will define different actions, who is responsible for what action in a given situation and what the individual should do in the situation, (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/oQR2mrhG3ss/