Browse CompTIA Certification Guides

Study Core Network Services for Network+ (N10-009)

Work through DHCP, SLAAC, DNS, NTP, PTP, and NTS as the operational services that keep modern networks usable.

Core service questions are dependency questions. When DHCP, DNS, or time services break, users often describe the symptom as a “network problem” even though the physical path might still be fine. CompTIA is testing whether you can identify which service is missing or misbehaving before you start changing switches and routers.

SLAAC: Stateless address autoconfiguration, an IPv6 method for hosts to build their own addresses from router advertisements.

NTS: Network Time Security, a way to protect NTP-based time synchronization with stronger trust.

What CompTIA is really testing

The strongest answers usually come from separating:

  • addressing service from naming service
  • local path from upstream dependency
  • time sync from ordinary reachability
  • IPv4 host assignment from IPv6 host assignment

The service dependency chain

    flowchart LR
	  A["Client joins network"] --> B["Gets address info"]
	  B --> C["Gets default gateway"]
	  C --> D["Resolves names"]
	  D --> E["Uses apps and remote services"]
	  B --> F["Gets correct time"]
	  F --> E

What to notice:

  • DHCP or SLAAC helps the client participate on the network
  • DNS helps the client find named resources
  • time services support logging, certificates, and some authentication workflows
  • when one dependency is wrong, the user may still say “the internet is broken”

Keep these services distinct

Service Core role Typical symptom when broken
DHCP assigns IPv4 settings such as IP, mask, gateway, DNS client gets no valid lease or falls back incorrectly
SLAAC helps build IPv6 addressing from router advertisements IPv6 addressing behaves unexpectedly or incompletely
DNS translates names to addresses name lookups fail while direct IP access may still work
NTP / PTP / NTS keep time aligned across systems auth, logs, certificates, or timing-sensitive apps behave badly

A practical client-check example

1IPv4 Address: 192.168.50.44
2Subnet Mask: 255.255.255.0
3Default Gateway: 192.168.50.1
4DNS Server: 192.168.50.10

What to notice:

  • a correct-looking lease does not prove DNS is correct
  • a working local lease does not prove the gateway is reachable
  • service troubleshooting starts by asking which dependency is actually failing

Common traps

  • blaming DNS when the host never got a valid address or gateway
  • blaming routing when only name resolution is failing
  • forgetting that time sync affects more than clocks on the wall
  • treating IPv6 host assignment like IPv4 DHCP only

What strong answers usually do

  • decide whether the host has address, path, name resolution, and time alignment
  • separate service failure from forwarding failure
  • use direct-IP tests and name-based tests intentionally
  • remember that a host can be partly functional while one dependency is still broken

Quiz

Loading quiz…

Harder scenario question

A user reports that an internal application fails by hostname, but they can still reach the same server by IP address. Their workstation has a valid IPv4 address, subnet mask, and default gateway. Other users in the same VLAN can browse external sites normally. Which conclusion is strongest first?

A. The trunk carrying the user VLAN is probably missing B. The problem points first to name-resolution behavior rather than to basic addressing or local path failure C. The switch port is definitely in the wrong VLAN D. The user must have an APIPA address

Best answer: B

Why: The host already has valid addressing and direct IP reachability works. That separates service dependency from path failure and points first toward DNS or another naming issue rather than toward VLAN or DHCP failure.

Continue with 3.8 Access, Remote Management & Management Planes when the service-dependency chain feels clear.