13.5. Exam Essentials

Know two ways you can filter traffic using an access control list

Access control lists can filter traffic by IP address or MAC address.

Know which protocols can be used for tunneling and encryption of data

Tunneling and encryption protocols include SSL, VPN, L2TP, PPTP, and IPSec.

Know which services allow you to remotely access computers across a network

Remote-access services and protocols include RAS, RDP, PPP, PPPoE, VNC, and ICA.

Know different user-authentication protocols used on networks

User-authentication protocols and systems include PKI, Kerberos, RADIUS, TACACS+, 802.1x, CHAP, MS-CHAP, and EAP.

Get CompTIA Network+® Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.