Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CompTIA Net+ N10-008

Network+ N10-008

Open Systems Interconnection (OSI) reference model Assigns network and hardware components and functions at seven discrete layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
At which OSI layer is the concept of a port number introduced? Transport.
At which layer of the OSI model is no header encapsulation applied? Physical.
What component performs signal amplification to extend the maximum allowable distance for a media type? A repeater.
Which OSI layer packages bits of data from the Physical layer into frames? Data Link.
True or False? The Session layer is responsible for passing data to the Network layer at the lower bound and the Presentation layer at the upper bound. False. The Session layer is between the Transport and Presentation layers.
File Transfer Protocol (FTP) (Port) Ports 20 and 21
Secure Shell (SSH)(Port) Ports 22
Secure File Transfer Protocol (SFTP) (Used for) A.K.A Secure Copy Protocol (SCP) It simply transfers Files securely using SSH
Telnet (Port) Port 23
Simple Mail Transfer Protocol (SMTP) used to send emails from one email server until the final SMTP server is reached. POP3 or IMAP (V4) takes over to deliver the email message. Port 25 | 587 | 465
Domain Name System (DNS) (Port) TCP/UDP Port 53
Dynamic Host Configuration Protocol (DHCP) (Port and what it does) UDP port 67 and 68 used for centrally managed and automatically-assigned IP configurations to endpoint. (Efficient method to distribute random or reserved address configurations to client request Ports: 67 and 68 UPD
Trivial File Transfer Protocol (TFTP)(Port and what it does) UDP Port 69
Hypertext Transfer Protocol Secure (HTTPS) (Port) TCP port 443
Hypertext Transfer Protocol (HTTP)(Port and what it does) TCP Port 80 -uses PKI (public Key Infrastructure) to assign digital certificates, which encrypts and authenticates procedures from a web browser to a web server
Post Office Protocol v3 (POP3) (Port and what it does) TCP Port 995 -Transfers the email to the device that requested it; it does not keep a copy
Post Office Protocol v3 Secure (POP3S) (Port and what it does) TCP Port 995 Also uses TLS or SSL for security and encryption
Internet Message Access Protocol (IMAP) (Port and what it does) TCP Port 143 -emails are kept in the Cloud -Will sync status information across all of your devices
Internet Message Access Protocol Secure (IMAPS) V4 (Port and what it does) TCP Port 993 Also uses TLS or SSL for security and encryption
Network Time Protocol (NTP) (Port) UDP Port 123
Simple Network Management Protocol (SNMP) V3 (Port) UDP Ports 161 and 162
Lightweight Directory Access Protocol (LDAP) (Port) TCP/UDP Port 389
Secure Socket Layer (SSL) no longer used
Transport Layer Security (TLS) replaces SSL for security protocols for data transfers
Transmission Control Protocol (TCP) is the core data transmission protocol that uses a three-way handshake to initiate connections and a connection termination process
Serve Message Block (SMB) (Port) TCP Port 445 and 139
Lightweight Directory Access Protocol Secure (LDAPs) (Port) port 636
Remote Desktop Protocol (RDP) (port) Port 3389
Session Initiation Protocol (SIP) (Port) Port 5060 \ 5061
H.323 (Port) port 1720 another protocol when dealing with SIP
What is a Personal Area Network (PAN) is a close-range network link between a variety of devices. For example, two smart phones connected to each other via Bluetooth are creating a PAN.
True or false? The WAN port on a SOHO router is connected to the LAN ports by an internal switch. False-the LAN ports and access point are connected by a switch. The WAN port is separate. Packets must be routed between the LAN and WAN segments.
What type of address is used by the switch to forward transmissions to the appropriate host? A media access control (MAC) address. This is a layer 2 address. It is also referred to as a hardware or physical address.
True or false? The DHCP server in the SOHO router assigns an IP address to the WAN interface automatically. False-the DHCP server in the SOHO router assigns IP addresses to the hosts on the local network. The WAN address is likely to be assigned by DHCP, but a DHCP server is managed by the access provider.
What function or service prevents an Internet host from accessing servers on the LAN without authorization? The firewall.
How is the decimal value 12 expressed in hex? C (this might be written 0xC for clarity). Values above 9 are expressed as letters (10=A, 11=B, 12=C).
How is the decimal value 171 expressed in hex? 0xAB. To work this out, divide 171 by 16 (144) and write the remainder (11) as the least significant hex digit (B). Note that the quotient 10 (the integer part of the sum, where 171/16=10.6875) is less than 16. Convert the quotient to hex (10=A) to derive the second hex digit and complete the conversion.
Addressing Unique identifier for a network node, such as a MAC address, IPv4 address, or IPv6 address.
Encapsulation A method by which protocols build data packets by adding headers and trailers to existing data.
physical layer -Lowest layer of the OSI model providing for the transmission and receipt of data bits from node to node. This includes the network medium and mechanical and electrical specifications for using the media. -Signaling, Cabling, Connections
data link layer -OSI model layer responsible for transferring data between nodes. -Data link Control Protocol (DLC) - MAC (Media Access Control) address on the Ethernet - The "Switching" Layer - Ethernet, ATM, MPLS, PPP, STP
network layer -OSI model layer responsible for logical network addressing and forwarding. -Routing layer -Fragments frames to traverse different network -IP, ICMP, NAT, RIP, OSPF
router An intermediate system working at the Network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types.
transport layer -OSI model layer responsible for ensuring reliable data delivery. "Post Office" - Transmission Control Protocol (TCP) -User Datagram Protocol (UDP)
session layer -OSI model layer that provides services for applications that need to exchange multiple messages (dialog control). -Communication Management between devices -Control Protocols, Tunneling protocols - Half-duplex, Full duplex -NetBIOS, RPC, SMB, Sockets
presentation layer -OSI model layer that transforms data between the formats used by the network and applications. -Character encoding -application Encryption -Often combined with the application layer -SSL, SSH, Compression, Encryption and Decryption, Encoding
application layer -OSI model layer providing support to applications requiring network services (file transfer, printing, email, databases, and so on). -Is where Protocol resides. -Is when configuring firewalls and proxies -DHCP, DNS, FTP, SMTP, HTTP, POP3
local area network (LAN) Network scope restricted to a single geographic location and owned/managed by a single organization
Small office/home office (SOHO) Typically used to refer to network devices designed for small-scale LAN
wide area networks (WAN) Network scope that spans a large geographical area, incorporating more than one site and often a mix of different media types and protocols plus the use of public telecommunications networks.
public switched telephone network (PSTN) Global network connecting national telecommunications systems.
A network engineer is analyzing a specific network protocol. Which of the following are the principal functions of a network protocol? (Select all that apply.) 1. Addressing 2. Encapsulation 3. Network layer 4. Presentation Addressing Encapsulation
A communications engineer notices that every time it rains the signal becomes very degraded. Which layer of the OSI model is the engineer most likely troubleshooting? 1. Physical 2. Data Link 3. Transport 4. Application Physical
A networking engineer is troubleshooting issues with a router. At which layer of the OSI model is the engineer troubleshooting? 1. Data link 2. Transport 3. Network 4. Session Network
A systems administrator wants to ensure that port numbers are being appropriately assigned for each type of network application. What layer of the OSI model should the administrator be reviewing to ensure these actions are taken? 1. Network 2. Transport 3. Session 4. Application Transport
An application developer is attempting to troubleshoot issues with ASCII conversion for their application. At which layer of the OSI model are they troubleshooting? 1. Application 2. Session 3. Data link 4. Presentation Presentation
Which networking component would connect to a SOHO router, operating at the first layer of the OSI model? 1. Wireless Access Point 2. RJ-45 ports 3. WAN port 4. Internal bridge WAN port
A network administrator configures a SOHO router for a small business. Which zone and IP address information is configured on the router for proper functionality for users to access all internal resources and the Internet? 1. Zone: private Internal IP range 192.168.51.0/24 Zone: public External IP 209.0.113.1 2. Zone: public Internal IP range 149.167.1.0/24 Zone: private External IP 20.0.11.1 3. Zone: private Internal IP range 182.168.19.0/24 Zone: public External IP 188.4.11.1 1. Zone: private Internal IP range 192.168.51.0/24 Zone: public External IP 209.0.113.1
A systems engineer configures IP addresses for a SOHO router. In doing so, the engineer uses calculations to determine addresses for two subnets. Which value does the engineer determine the binary value of 1010 relates to in hexadecimal? 1. A 2. 0 3. FF 4. 10 A
A junior IT technician configures a purchased private computer network for a small bakery. The placement of a SOHO router within the building is which of the following? 1. IXP 2. PSTN 3. CPE 4. IANA CPE
A security engineer implements port security on a hardware firewall. Which OSI model layer identifies the application ports to configure? 1. Layer 1 2. Layer 2 3. Layer 3 4. Layer 4 Layer 4
What Layer on the TCP/IP model deals with logical packets? 1. Network Access Layer 2. Application 3. Internet 4. Network Internet Comments: The Internet Layer on the TCP/IP model deals with logical packets (IP packets).
layer 2 PDU Frames
Layer 3 PDU Packets
Layer 4 PDU Segment
Layer 1 PDU Bit
Layer 5, 6, and 7 PDU Data
To midgait broadcast storms what protocol is used STP (Spanning tree protocol)
CHAP Challenge Handshake Authentication Protocol
CHAP is used to as Authentication tool
What is a Default Gateway used for? is used to exit/get out of a network
what does a DHCP Sever address do Assign IP addresses to your network
Which 2 solutions provide AAA services Radius and TACACS+
AAA stand for Authentication, Authorization and Accounting
DNS record A? is for IPV4 Address
DNS Record MX? Is for Mail Server
MX Mail exchanged
DNS Record AAAA? is For IPV6 address
DNS record CNAME? is for the name of the domain (i.e. www.google.com)
PAN Personal Area Network
TCP Transmission Control Protocol
TLS Transport Layer Security
SSL Secure Socket Layer
IEEE 802.1x Is for LAN Security
IEEE 802.11 is for wireless LANs
IEEE 802.3 refers to the standard of Ethernet
IEEE 802.1q is used for private VLANs
Layer 7 -Application
Layer 6 -Presentation
Layer 5 -Session
Layer 4 - Transport
Layer 3 -Networking
Layer 2 -Data Link
Layer 1 -Physical layer
CAT5 Application: Fast Ethernet Speed: 100 Mbps Distance: 100 meters/328 ft.
CAT5e Application: Gigabit Ethernet Speed: 1Gbps Distance: 100 meters/328 ft.
CAT6 Application: Gigabit Ethernet Speed: 1Gbps (10 Gbps) Distance: 100 meters (55meters)
CAT6a Application: Gigabit Ethernet Speed: 1and 10 Gbps Distance: 100 meters/328 ft.
CAT7 Application: Gigabit Ethernet Speed: 1 and 10 Gbps Distance: 100 meters/328 ft.
CAT8 Application: Gigabit Ethernet Speed: 25 and 40 Gbps Distance: 30 meters/98 ft.
RG-59 Application: Legacy internet, Legacy Cable TV Termination: 75 Ohms Cable type: Coaxial
RG-6 Application: CATV, Satellite, Cable TV, Broadband, Internet Termination: 75 Ohms Cable type: Coaxial
TIA 568A Green first SG,G,SO,B,SB,O,SB,B
TIA 568B Orange first SO,O,SG,B,SB,G,SB,B
RJ-11 -Most common of telephone to wall jack -Used to connect Analog signal from ISP to a modem/Router to Facilitate a DSL connection
RJ45 -Most common twisted pair connector used within LANs for short distance -is used to interconnect computers/hosts within Ethernet networks
BNC -Bayonet Neil-Concelman connectors are used with coaxial cabling
F-type F-type connector is another connector used with coaxial cabling, Originally designed to be threated. but changed to use ridges for friction to hold in place
TCP Transfer Control Protocol
UDP User Datagram Protocol
SMB Server Message Block
Sever Message Block (SMB) (Port) TCP Port 445
LDAPS Lightweight Directory Access Protocol Secure
Lightweight Directory Access Protocol Secure (LDAPS) (used for) is a set of rules to communicate with a directory service regardless of the vendor, adds security to the communication
RDP Remote Desktop Protocol
PSTN public switched telephone network
PAN Personal Area Network
SIP Session Initiation Protocol
TCP Transmission Control Protocol
TLS Transport Layer Security
SSL Secure Socket Layer
SNMP Simple Network Management Protocol
NTP Network Time Protocol
IMAPS Internet Message Access Protocol Secure
IMAP Internet Message Access Protocol
POP3S Post Office Protocol v3 Secure
POP3 Post Office Protocol v3
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol Secure
TFTP Trivial File Transfer Protocol
DHCP Dynamic Host Configuration Protocol
DNS Domain Name System
SMTP Simple Mail Transfer Protocol
SFTP Secure File Transfer Protocol
SSH Secure Shell
FTP File Transfer Protocol
Application (what is done) The layer on which we see Google Mail, Twitter, Facebook, etc.
Presentation (what is done) Encoding and encryption (SSL/TLS)
Session (what is done) -Communication between devices (Control Protocols, tunneling protocols)
Transport (what is done) -The "post office" layer (TCP Segment, UDP Datagram)
Network (what is done) -The "routing" layer (Ip address, router, packet)
Datalink (what is done) -The "switching" layer (frame, MAC Address, Switch)
Physical (what is done) -(cable, NIC, hub)
Session Initiation Protocol (SIP) (Used for) Used in VoIP and other real-time multimedia communications to initiate a connection, establish security, and take a connection down when done
Sever Message Block (SMB) (used for) is for windows file and printer sharing
Secure Shell (SSH) (used for) To securely remote into a computer and transfer data
Secure File Transfer Protocol (SFTP) (port) port 22
Telnet (used for) Unsecure due to communication done in cleartext. mostly used from a CLI
Network time protocol (NTP) (used for) Used to synchronize all network device's system clock
Domine System Name (DNS) (used for) used to turn website names to Ip address
PDU Protocol Data Unit
Created by: andrickson84
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards