13.5. Exam Essentials
Know two ways you can filter traffic using an access control list
Access control lists can filter traffic by IP address or MAC address.
Know which protocols can be used for tunneling and encryption of data
Tunneling and encryption protocols include SSL, VPN, L2TP, PPTP, and IPSec.
Know which services allow you to remotely access computers across a network
Remote-access services and protocols include RAS, RDP, PPP, PPPoE, VNC, and ICA.
Know different user-authentication protocols used on networks
User-authentication protocols and systems include PKI, Kerberos, RADIUS, TACACS+, 802.1x, CHAP, MS-CHAP, and EAP.
Get CompTIA Network+® Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.