click below
click below
Normal Size Small Size show me how
CompTIA Net+ N10-008
Network+ N10-008
Open Systems Interconnection (OSI) reference model | Assigns network and hardware components and functions at seven discrete layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. |
At which OSI layer is the concept of a port number introduced? | Transport. |
At which layer of the OSI model is no header encapsulation applied? | Physical. |
What component performs signal amplification to extend the maximum allowable distance for a media type? | A repeater. |
Which OSI layer packages bits of data from the Physical layer into frames? | Data Link. |
True or False? The Session layer is responsible for passing data to the Network layer at the lower bound and the Presentation layer at the upper bound. | False. The Session layer is between the Transport and Presentation layers. |
File Transfer Protocol (FTP) (Port) | Ports 20 and 21 |
Secure Shell (SSH)(Port) | Ports 22 |
Secure File Transfer Protocol (SFTP) (Used for) | A.K.A Secure Copy Protocol (SCP) It simply transfers Files securely using SSH |
Telnet (Port) | Port 23 |
Simple Mail Transfer Protocol (SMTP) | used to send emails from one email server until the final SMTP server is reached. POP3 or IMAP (V4) takes over to deliver the email message. Port 25 | 587 | 465 |
Domain Name System (DNS) (Port) | TCP/UDP Port 53 |
Dynamic Host Configuration Protocol (DHCP) (Port and what it does) | UDP port 67 and 68 used for centrally managed and automatically-assigned IP configurations to endpoint. (Efficient method to distribute random or reserved address configurations to client request Ports: 67 and 68 UPD |
Trivial File Transfer Protocol (TFTP)(Port and what it does) | UDP Port 69 |
Hypertext Transfer Protocol Secure (HTTPS) (Port) | TCP port 443 |
Hypertext Transfer Protocol (HTTP)(Port and what it does) | TCP Port 80 -uses PKI (public Key Infrastructure) to assign digital certificates, which encrypts and authenticates procedures from a web browser to a web server |
Post Office Protocol v3 (POP3) (Port and what it does) | TCP Port 995 -Transfers the email to the device that requested it; it does not keep a copy |
Post Office Protocol v3 Secure (POP3S) (Port and what it does) | TCP Port 995 Also uses TLS or SSL for security and encryption |
Internet Message Access Protocol (IMAP) (Port and what it does) | TCP Port 143 -emails are kept in the Cloud -Will sync status information across all of your devices |
Internet Message Access Protocol Secure (IMAPS) V4 (Port and what it does) | TCP Port 993 Also uses TLS or SSL for security and encryption |
Network Time Protocol (NTP) (Port) | UDP Port 123 |
Simple Network Management Protocol (SNMP) V3 (Port) | UDP Ports 161 and 162 |
Lightweight Directory Access Protocol (LDAP) (Port) | TCP/UDP Port 389 |
Secure Socket Layer (SSL) | no longer used |
Transport Layer Security (TLS) | replaces SSL for security protocols for data transfers |
Transmission Control Protocol (TCP) | is the core data transmission protocol that uses a three-way handshake to initiate connections and a connection termination process |
Serve Message Block (SMB) (Port) | TCP Port 445 and 139 |
Lightweight Directory Access Protocol Secure (LDAPs) (Port) | port 636 |
Remote Desktop Protocol (RDP) (port) | Port 3389 |
Session Initiation Protocol (SIP) (Port) | Port 5060 \ 5061 |
H.323 (Port) | port 1720 another protocol when dealing with SIP |
What is a Personal Area Network (PAN) | is a close-range network link between a variety of devices. For example, two smart phones connected to each other via Bluetooth are creating a PAN. |
True or false? The WAN port on a SOHO router is connected to the LAN ports by an internal switch. | False-the LAN ports and access point are connected by a switch. The WAN port is separate. Packets must be routed between the LAN and WAN segments. |
What type of address is used by the switch to forward transmissions to the appropriate host? | A media access control (MAC) address. This is a layer 2 address. It is also referred to as a hardware or physical address. |
True or false? The DHCP server in the SOHO router assigns an IP address to the WAN interface automatically. | False-the DHCP server in the SOHO router assigns IP addresses to the hosts on the local network. The WAN address is likely to be assigned by DHCP, but a DHCP server is managed by the access provider. |
What function or service prevents an Internet host from accessing servers on the LAN without authorization? | The firewall. |
How is the decimal value 12 expressed in hex? | C (this might be written 0xC for clarity). Values above 9 are expressed as letters (10=A, 11=B, 12=C). |
How is the decimal value 171 expressed in hex? | 0xAB. To work this out, divide 171 by 16 (144) and write the remainder (11) as the least significant hex digit (B). Note that the quotient 10 (the integer part of the sum, where 171/16=10.6875) is less than 16. Convert the quotient to hex (10=A) to derive the second hex digit and complete the conversion. |
Addressing | Unique identifier for a network node, such as a MAC address, IPv4 address, or IPv6 address. |
Encapsulation | A method by which protocols build data packets by adding headers and trailers to existing data. |
physical layer | -Lowest layer of the OSI model providing for the transmission and receipt of data bits from node to node. This includes the network medium and mechanical and electrical specifications for using the media. -Signaling, Cabling, Connections |
data link layer | -OSI model layer responsible for transferring data between nodes. -Data link Control Protocol (DLC) - MAC (Media Access Control) address on the Ethernet - The "Switching" Layer - Ethernet, ATM, MPLS, PPP, STP |
network layer | -OSI model layer responsible for logical network addressing and forwarding. -Routing layer -Fragments frames to traverse different network -IP, ICMP, NAT, RIP, OSPF |
router | An intermediate system working at the Network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types. |
transport layer | -OSI model layer responsible for ensuring reliable data delivery. "Post Office" - Transmission Control Protocol (TCP) -User Datagram Protocol (UDP) |
session layer | -OSI model layer that provides services for applications that need to exchange multiple messages (dialog control). -Communication Management between devices -Control Protocols, Tunneling protocols - Half-duplex, Full duplex -NetBIOS, RPC, SMB, Sockets |
presentation layer | -OSI model layer that transforms data between the formats used by the network and applications. -Character encoding -application Encryption -Often combined with the application layer -SSL, SSH, Compression, Encryption and Decryption, Encoding |
application layer | -OSI model layer providing support to applications requiring network services (file transfer, printing, email, databases, and so on). -Is where Protocol resides. -Is when configuring firewalls and proxies -DHCP, DNS, FTP, SMTP, HTTP, POP3 |
local area network (LAN) | Network scope restricted to a single geographic location and owned/managed by a single organization |
Small office/home office (SOHO) | Typically used to refer to network devices designed for small-scale LAN |
wide area networks (WAN) | Network scope that spans a large geographical area, incorporating more than one site and often a mix of different media types and protocols plus the use of public telecommunications networks. |
public switched telephone network (PSTN) | Global network connecting national telecommunications systems. |
A network engineer is analyzing a specific network protocol. Which of the following are the principal functions of a network protocol? (Select all that apply.) 1. Addressing 2. Encapsulation 3. Network layer 4. Presentation | Addressing Encapsulation |
A communications engineer notices that every time it rains the signal becomes very degraded. Which layer of the OSI model is the engineer most likely troubleshooting? 1. Physical 2. Data Link 3. Transport 4. Application | Physical |
A networking engineer is troubleshooting issues with a router. At which layer of the OSI model is the engineer troubleshooting? 1. Data link 2. Transport 3. Network 4. Session | Network |
A systems administrator wants to ensure that port numbers are being appropriately assigned for each type of network application. What layer of the OSI model should the administrator be reviewing to ensure these actions are taken? 1. Network 2. Transport 3. Session 4. Application | Transport |
An application developer is attempting to troubleshoot issues with ASCII conversion for their application. At which layer of the OSI model are they troubleshooting? 1. Application 2. Session 3. Data link 4. Presentation | Presentation |
Which networking component would connect to a SOHO router, operating at the first layer of the OSI model? 1. Wireless Access Point 2. RJ-45 ports 3. WAN port 4. Internal bridge | WAN port |
A network administrator configures a SOHO router for a small business. Which zone and IP address information is configured on the router for proper functionality for users to access all internal resources and the Internet? 1. Zone: private Internal IP range 192.168.51.0/24 Zone: public External IP 209.0.113.1 2. Zone: public Internal IP range 149.167.1.0/24 Zone: private External IP 20.0.11.1 3. Zone: private Internal IP range 182.168.19.0/24 Zone: public External IP 188.4.11.1 | 1. Zone: private Internal IP range 192.168.51.0/24 Zone: public External IP 209.0.113.1 |
A systems engineer configures IP addresses for a SOHO router. In doing so, the engineer uses calculations to determine addresses for two subnets. Which value does the engineer determine the binary value of 1010 relates to in hexadecimal? 1. A 2. 0 3. FF 4. 10 | A |
A junior IT technician configures a purchased private computer network for a small bakery. The placement of a SOHO router within the building is which of the following? 1. IXP 2. PSTN 3. CPE 4. IANA | CPE |
A security engineer implements port security on a hardware firewall. Which OSI model layer identifies the application ports to configure? 1. Layer 1 2. Layer 2 3. Layer 3 4. Layer 4 | Layer 4 |
What Layer on the TCP/IP model deals with logical packets? 1. Network Access Layer 2. Application 3. Internet 4. Network | Internet Comments: The Internet Layer on the TCP/IP model deals with logical packets (IP packets). |
layer 2 PDU | Frames |
Layer 3 PDU | Packets |
Layer 4 PDU | Segment |
Layer 1 PDU | Bit |
Layer 5, 6, and 7 PDU | Data |
To midgait broadcast storms what protocol is used | STP (Spanning tree protocol) |
CHAP | Challenge Handshake Authentication Protocol |
CHAP is used to | as Authentication tool |
What is a Default Gateway used for? | is used to exit/get out of a network |
what does a DHCP Sever address do | Assign IP addresses to your network |
Which 2 solutions provide AAA services | Radius and TACACS+ |
AAA stand for | Authentication, Authorization and Accounting |
DNS record A? | is for IPV4 Address |
DNS Record MX? | Is for Mail Server |
MX | Mail exchanged |
DNS Record AAAA? | is For IPV6 address |
DNS record CNAME? | is for the name of the domain (i.e. www.google.com) |
PAN | Personal Area Network |
TCP | Transmission Control Protocol |
TLS | Transport Layer Security |
SSL | Secure Socket Layer |
IEEE 802.1x | Is for LAN Security |
IEEE 802.11 | is for wireless LANs |
IEEE 802.3 | refers to the standard of Ethernet |
IEEE 802.1q | is used for private VLANs |
Layer 7 | -Application |
Layer 6 | -Presentation |
Layer 5 | -Session |
Layer 4 | - Transport |
Layer 3 | -Networking |
Layer 2 | -Data Link |
Layer 1 | -Physical layer |
CAT5 | Application: Fast Ethernet Speed: 100 Mbps Distance: 100 meters/328 ft. |
CAT5e | Application: Gigabit Ethernet Speed: 1Gbps Distance: 100 meters/328 ft. |
CAT6 | Application: Gigabit Ethernet Speed: 1Gbps (10 Gbps) Distance: 100 meters (55meters) |
CAT6a | Application: Gigabit Ethernet Speed: 1and 10 Gbps Distance: 100 meters/328 ft. |
CAT7 | Application: Gigabit Ethernet Speed: 1 and 10 Gbps Distance: 100 meters/328 ft. |
CAT8 | Application: Gigabit Ethernet Speed: 25 and 40 Gbps Distance: 30 meters/98 ft. |
RG-59 | Application: Legacy internet, Legacy Cable TV Termination: 75 Ohms Cable type: Coaxial |
RG-6 | Application: CATV, Satellite, Cable TV, Broadband, Internet Termination: 75 Ohms Cable type: Coaxial |
TIA 568A | Green first SG,G,SO,B,SB,O,SB,B |
TIA 568B | Orange first SO,O,SG,B,SB,G,SB,B |
RJ-11 | -Most common of telephone to wall jack -Used to connect Analog signal from ISP to a modem/Router to Facilitate a DSL connection |
RJ45 | -Most common twisted pair connector used within LANs for short distance -is used to interconnect computers/hosts within Ethernet networks |
BNC | -Bayonet Neil-Concelman connectors are used with coaxial cabling |
F-type | F-type connector is another connector used with coaxial cabling, Originally designed to be threated. but changed to use ridges for friction to hold in place |
TCP | Transfer Control Protocol |
UDP | User Datagram Protocol |
SMB | Server Message Block |
Sever Message Block (SMB) (Port) | TCP Port 445 |
LDAPS | Lightweight Directory Access Protocol Secure |
Lightweight Directory Access Protocol Secure (LDAPS) (used for) | is a set of rules to communicate with a directory service regardless of the vendor, adds security to the communication |
RDP | Remote Desktop Protocol |
PSTN | public switched telephone network |
PAN | Personal Area Network |
SIP | Session Initiation Protocol |
TCP | Transmission Control Protocol |
TLS | Transport Layer Security |
SSL | Secure Socket Layer |
SNMP | Simple Network Management Protocol |
NTP | Network Time Protocol |
IMAPS | Internet Message Access Protocol Secure |
IMAP | Internet Message Access Protocol |
POP3S | Post Office Protocol v3 Secure |
POP3 | Post Office Protocol v3 |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
TFTP | Trivial File Transfer Protocol |
DHCP | Dynamic Host Configuration Protocol |
DNS | Domain Name System |
SMTP | Simple Mail Transfer Protocol |
SFTP | Secure File Transfer Protocol |
SSH | Secure Shell |
FTP | File Transfer Protocol |
Application (what is done) | The layer on which we see Google Mail, Twitter, Facebook, etc. |
Presentation (what is done) | Encoding and encryption (SSL/TLS) |
Session (what is done) | -Communication between devices (Control Protocols, tunneling protocols) |
Transport (what is done) | -The "post office" layer (TCP Segment, UDP Datagram) |
Network (what is done) | -The "routing" layer (Ip address, router, packet) |
Datalink (what is done) | -The "switching" layer (frame, MAC Address, Switch) |
Physical (what is done) | -(cable, NIC, hub) |
Session Initiation Protocol (SIP) (Used for) | Used in VoIP and other real-time multimedia communications to initiate a connection, establish security, and take a connection down when done |
Sever Message Block (SMB) (used for) | is for windows file and printer sharing |
Secure Shell (SSH) (used for) | To securely remote into a computer and transfer data |
Secure File Transfer Protocol (SFTP) (port) | port 22 |
Telnet (used for) | Unsecure due to communication done in cleartext. mostly used from a CLI |
Network time protocol (NTP) (used for) | Used to synchronize all network device's system clock |
Domine System Name (DNS) (used for) | used to turn website names to Ip address |
PDU | Protocol Data Unit |