Use IAM, MFA, SSO, RADIUS, LDAP, SAML, TACACS+, and least-privilege language correctly in network-access scenarios.
Identity questions in Network+ are usually access-boundary questions. CompTIA is not asking whether you recognize a few acronyms in isolation. It is asking whether you know which identity system belongs on the user path, which belongs on the administrator path, and how authorization should stay narrower than authentication alone.
TACACS+: An AAA protocol commonly used for administrative access to network devices with strong command authorization support.
Least privilege: Giving users or devices only the permissions they need and nothing broader.
The strongest answers usually depend on one of these distinctions:
| Term | What it is strongest for |
|---|---|
| MFA | strengthening identity proof during authentication |
| SSO | reducing repeated logins across related services |
| RADIUS | centralized AAA, often for network access and remote user authentication |
| TACACS+ | centralized AAA with strong fit for device administration and command control |
| LDAP | directory lookups and identity information, not a complete security answer by itself |
| SAML | federated identity assertions between systems |
flowchart LR
A["User or admin requests access"] --> B["Authentication"]
B --> C["Authorization or role decision"]
C --> D["Accounting and logging"]
What to notice:
AAA is a sequence, not just a vocabulary setWhen Network+ uses AAA language, the real question is often:
That is why MFA can improve authentication while still not answering the authorization problem, and why SSO can improve convenience without proving least privilege by itself.
1User Wi-Fi access
2 -> authenticate to network
3 -> receive policy / role
4 -> reach only approved resources
5
6Switch administrator access
7 -> authenticate to management plane
8 -> authorize allowed commands
9 -> log the admin action
What to notice:
1Admin login:
2- authenticate with MFA
3- authorize only network-admin role
4- log command activity centrally
What to notice:
A network team wants centralized authentication for switch administrators, command-level authorization, and detailed logging of admin activity. Remote user VPN access is already handled elsewhere. Which answer is the strongest fit for the admin path?
A. LDAP only, because directory lookup solves both authorization and accounting by itself
B. TACACS+, because the scenario is specifically about device administration with command control and accounting
C. SSO, because convenience is the main security goal
D. NAT, because admin traffic needs a translated address
Best answer: B
Why: The clue is not general user identity. It is administrator control on network devices. TACACS+ is a stronger fit than a generic directory-only answer when authorization granularity and accounting are part of the requirement.
Continue with 4.6 Network Segmentation for Guest, BYOD, IoT & OT if identity and boundary design are starting to connect cleanly.