Book Image

CompTIA Network+ Certification Guide

By : Glen D. Singh, Rishi Latchmepersad
Book Image

CompTIA Network+ Certification Guide

By: Glen D. Singh, Rishi Latchmepersad

Overview of this book

CompTIA certified professionals have always had the upper hand in the information technology industry. This book will be your ideal guide to efficiently passing and achieving this certification. Learn from industry experts and implement their practices to resolve complex IT issues. This book revolves around networking concepts where readers will learn topics like network architecture, security, network monitoring, and troubleshooting. This book will not only prepare the readers conceptually but will also help them pass the N10-007 exam. This guide will also provide practice exercise after every chapter where readers can ensure their concepts are clear. By the end of this book, readers will leverage this guide and the included practice questions to boost their confidence in appearing for the actual certificate.
Table of Contents (17 chapters)

Vulnerabilities at the Application Layer

The Application Layer of the TCP/IP stack consists of the Application, Presentation, and Session Layers of the OSI reference model. As we learned before, whenever a computer wants to send traffic (datagrams) to the network, the creation of the Protocol Data Units (PDUs) begins at the top of the TCP/IP stack, the Application Layer:

The following are some of the application layer protocols which we should pay close attention to on our network:

  • File Transfer Protocol (FTP)
  • Telnet
  • Secure Shell (SSH)
  • Simple Mail Transfer Protocol (SMTP)
  • Domain Name System (DNS)
  • Dynamic Host Configuration Protocol (DHCP)
  • Hypertext Transfer Protocol (HTTP)

Each of these protocols was designed to provide the function it was built to do, and with a lesser focus on security. Malicious users and hackers are able to compromise both the application that utilizes...