Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Network+ N10-008

        Help!  

Open Systems Interconnection (OSI) reference model   Assigns network and hardware components and functions at seven discrete layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.  
🗑
At which OSI layer is the concept of a port number introduced?   Transport.  
🗑
At which layer of the OSI model is no header encapsulation applied?   Physical.  
🗑
What component performs signal amplification to extend the maximum allowable distance for a media type?   A repeater.  
🗑
Which OSI layer packages bits of data from the Physical layer into frames?   Data Link.  
🗑
True or False? The Session layer is responsible for passing data to the Network layer at the lower bound and the Presentation layer at the upper bound.   False. The Session layer is between the Transport and Presentation layers.  
🗑
File Transfer Protocol (FTP) (Port)   Ports 20 and 21  
🗑
Secure Shell (SSH)(Port)   Ports 22  
🗑
Secure File Transfer Protocol (SFTP) (Used for)   A.K.A Secure Copy Protocol (SCP) It simply transfers Files securely using SSH  
🗑
Telnet (Port)   Port 23  
🗑
Simple Mail Transfer Protocol (SMTP)   used to send emails from one email server until the final SMTP server is reached. POP3 or IMAP (V4) takes over to deliver the email message. Port 25 | 587 | 465  
🗑
Domain Name System (DNS) (Port)   TCP/UDP Port 53  
🗑
Dynamic Host Configuration Protocol (DHCP) (Port and what it does)   UDP port 67 and 68 used for centrally managed and automatically-assigned IP configurations to endpoint. (Efficient method to distribute random or reserved address configurations to client request Ports: 67 and 68 UPD  
🗑
Trivial File Transfer Protocol (TFTP)(Port and what it does)   UDP Port 69  
🗑
Hypertext Transfer Protocol Secure (HTTPS) (Port)   TCP port 443  
🗑
Hypertext Transfer Protocol (HTTP)(Port and what it does)   TCP Port 80 -uses PKI (public Key Infrastructure) to assign digital certificates, which encrypts and authenticates procedures from a web browser to a web server  
🗑
Post Office Protocol v3 (POP3) (Port and what it does)   TCP Port 995 -Transfers the email to the device that requested it; it does not keep a copy  
🗑
Post Office Protocol v3 Secure (POP3S) (Port and what it does)   TCP Port 995 Also uses TLS or SSL for security and encryption  
🗑
Internet Message Access Protocol (IMAP) (Port and what it does)   TCP Port 143 -emails are kept in the Cloud -Will sync status information across all of your devices  
🗑
Internet Message Access Protocol Secure (IMAPS) V4 (Port and what it does)   TCP Port 993 Also uses TLS or SSL for security and encryption  
🗑
Network Time Protocol (NTP) (Port)   UDP Port 123  
🗑
Simple Network Management Protocol (SNMP) V3 (Port)   UDP Ports 161 and 162  
🗑
Lightweight Directory Access Protocol (LDAP) (Port)   TCP/UDP Port 389  
🗑
Secure Socket Layer (SSL)   no longer used  
🗑
Transport Layer Security (TLS)   replaces SSL for security protocols for data transfers  
🗑
Transmission Control Protocol (TCP)   is the core data transmission protocol that uses a three-way handshake to initiate connections and a connection termination process  
🗑
Serve Message Block (SMB) (Port)   TCP Port 445 and 139  
🗑
Lightweight Directory Access Protocol Secure (LDAPs) (Port)   port 636  
🗑
Remote Desktop Protocol (RDP) (port)   Port 3389  
🗑
Session Initiation Protocol (SIP) (Port)   Port 5060 \ 5061  
🗑
H.323 (Port)   port 1720 another protocol when dealing with SIP  
🗑
What is a Personal Area Network (PAN)   is a close-range network link between a variety of devices. For example, two smart phones connected to each other via Bluetooth are creating a PAN.  
🗑
True or false? The WAN port on a SOHO router is connected to the LAN ports by an internal switch.   False-the LAN ports and access point are connected by a switch. The WAN port is separate. Packets must be routed between the LAN and WAN segments.  
🗑
What type of address is used by the switch to forward transmissions to the appropriate host?   A media access control (MAC) address. This is a layer 2 address. It is also referred to as a hardware or physical address.  
🗑
True or false? The DHCP server in the SOHO router assigns an IP address to the WAN interface automatically.   False-the DHCP server in the SOHO router assigns IP addresses to the hosts on the local network. The WAN address is likely to be assigned by DHCP, but a DHCP server is managed by the access provider.  
🗑
What function or service prevents an Internet host from accessing servers on the LAN without authorization?   The firewall.  
🗑
How is the decimal value 12 expressed in hex?   C (this might be written 0xC for clarity). Values above 9 are expressed as letters (10=A, 11=B, 12=C).  
🗑
How is the decimal value 171 expressed in hex?   0xAB. To work this out, divide 171 by 16 (144) and write the remainder (11) as the least significant hex digit (B). Note that the quotient 10 (the integer part of the sum, where 171/16=10.6875) is less than 16. Convert the quotient to hex (10=A) to derive the second hex digit and complete the conversion.  
🗑
Addressing   Unique identifier for a network node, such as a MAC address, IPv4 address, or IPv6 address.  
🗑
Encapsulation   A method by which protocols build data packets by adding headers and trailers to existing data.  
🗑
physical layer   -Lowest layer of the OSI model providing for the transmission and receipt of data bits from node to node. This includes the network medium and mechanical and electrical specifications for using the media. -Signaling, Cabling, Connections  
🗑
data link layer   -OSI model layer responsible for transferring data between nodes. -Data link Control Protocol (DLC) - MAC (Media Access Control) address on the Ethernet - The "Switching" Layer - Ethernet, ATM, MPLS, PPP, STP  
🗑
network layer   -OSI model layer responsible for logical network addressing and forwarding. -Routing layer -Fragments frames to traverse different network -IP, ICMP, NAT, RIP, OSPF  
🗑
router   An intermediate system working at the Network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types.  
🗑
transport layer   -OSI model layer responsible for ensuring reliable data delivery. "Post Office" - Transmission Control Protocol (TCP) -User Datagram Protocol (UDP)  
🗑
session layer   -OSI model layer that provides services for applications that need to exchange multiple messages (dialog control). -Communication Management between devices -Control Protocols, Tunneling protocols - Half-duplex, Full duplex -NetBIOS, RPC, SMB, Sockets  
🗑
presentation layer   -OSI model layer that transforms data between the formats used by the network and applications. -Character encoding -application Encryption -Often combined with the application layer -SSL, SSH, Compression, Encryption and Decryption, Encoding  
🗑
application layer   -OSI model layer providing support to applications requiring network services (file transfer, printing, email, databases, and so on). -Is where Protocol resides. -Is when configuring firewalls and proxies -DHCP, DNS, FTP, SMTP, HTTP, POP3  
🗑
local area network (LAN)   Network scope restricted to a single geographic location and owned/managed by a single organization  
🗑
Small office/home office (SOHO)   Typically used to refer to network devices designed for small-scale LAN  
🗑
wide area networks (WAN)   Network scope that spans a large geographical area, incorporating more than one site and often a mix of different media types and protocols plus the use of public telecommunications networks.  
🗑
public switched telephone network (PSTN)   Global network connecting national telecommunications systems.  
🗑
A network engineer is analyzing a specific network protocol. Which of the following are the principal functions of a network protocol? (Select all that apply.) 1. Addressing 2. Encapsulation 3. Network layer 4. Presentation   Addressing Encapsulation  
🗑
A communications engineer notices that every time it rains the signal becomes very degraded. Which layer of the OSI model is the engineer most likely troubleshooting? 1. Physical 2. Data Link 3. Transport 4. Application   Physical  
🗑
A networking engineer is troubleshooting issues with a router. At which layer of the OSI model is the engineer troubleshooting? 1. Data link 2. Transport 3. Network 4. Session   Network  
🗑
A systems administrator wants to ensure that port numbers are being appropriately assigned for each type of network application. What layer of the OSI model should the administrator be reviewing to ensure these actions are taken? 1. Network 2. Transport 3. Session 4. Application   Transport  
🗑
An application developer is attempting to troubleshoot issues with ASCII conversion for their application. At which layer of the OSI model are they troubleshooting? 1. Application 2. Session 3. Data link 4. Presentation   Presentation  
🗑
Which networking component would connect to a SOHO router, operating at the first layer of the OSI model? 1. Wireless Access Point 2. RJ-45 ports 3. WAN port 4. Internal bridge   WAN port  
🗑
A network administrator configures a SOHO router for a small business. Which zone and IP address information is configured on the router for proper functionality for users to access all internal resources and the Internet? 1. Zone: private Internal IP range 192.168.51.0/24 Zone: public External IP 209.0.113.1 2. Zone: public Internal IP range 149.167.1.0/24 Zone: private External IP 20.0.11.1 3. Zone: private Internal IP range 182.168.19.0/24 Zone: public External IP 188.4.11.1   1. Zone: private Internal IP range 192.168.51.0/24 Zone: public External IP 209.0.113.1  
🗑
A systems engineer configures IP addresses for a SOHO router. In doing so, the engineer uses calculations to determine addresses for two subnets. Which value does the engineer determine the binary value of 1010 relates to in hexadecimal? 1. A 2. 0 3. FF 4. 10   A  
🗑
A junior IT technician configures a purchased private computer network for a small bakery. The placement of a SOHO router within the building is which of the following? 1. IXP 2. PSTN 3. CPE 4. IANA   CPE  
🗑
A security engineer implements port security on a hardware firewall. Which OSI model layer identifies the application ports to configure? 1. Layer 1 2. Layer 2 3. Layer 3 4. Layer 4   Layer 4  
🗑
What Layer on the TCP/IP model deals with logical packets? 1. Network Access Layer 2. Application 3. Internet 4. Network   Internet Comments: The Internet Layer on the TCP/IP model deals with logical packets (IP packets).  
🗑
layer 2 PDU   Frames  
🗑
Layer 3 PDU   Packets  
🗑
Layer 4 PDU   Segment  
🗑
Layer 1 PDU   Bit  
🗑
Layer 5, 6, and 7 PDU   Data  
🗑
To midgait broadcast storms what protocol is used   STP (Spanning tree protocol)  
🗑
CHAP   Challenge Handshake Authentication Protocol  
🗑
CHAP is used to   as Authentication tool  
🗑
What is a Default Gateway used for?   is used to exit/get out of a network  
🗑
what does a DHCP Sever address do   Assign IP addresses to your network  
🗑
Which 2 solutions provide AAA services   Radius and TACACS+  
🗑
AAA stand for   Authentication, Authorization and Accounting  
🗑
DNS record A?   is for IPV4 Address  
🗑
DNS Record MX?   Is for Mail Server  
🗑
MX   Mail exchanged  
🗑
DNS Record AAAA?   is For IPV6 address  
🗑
DNS record CNAME?   is for the name of the domain (i.e. www.google.com)  
🗑
PAN   Personal Area Network  
🗑
TCP   Transmission Control Protocol  
🗑
TLS   Transport Layer Security  
🗑
SSL   Secure Socket Layer  
🗑
IEEE 802.1x   Is for LAN Security  
🗑
IEEE 802.11   is for wireless LANs  
🗑
IEEE 802.3   refers to the standard of Ethernet  
🗑
IEEE 802.1q   is used for private VLANs  
🗑
Layer 7   -Application  
🗑
Layer 6   -Presentation  
🗑
Layer 5   -Session  
🗑
Layer 4   - Transport  
🗑
Layer 3   -Networking  
🗑
Layer 2   -Data Link  
🗑
Layer 1   -Physical layer  
🗑
CAT5   Application: Fast Ethernet Speed: 100 Mbps Distance: 100 meters/328 ft.  
🗑
CAT5e   Application: Gigabit Ethernet Speed: 1Gbps Distance: 100 meters/328 ft.  
🗑
CAT6   Application: Gigabit Ethernet Speed: 1Gbps (10 Gbps) Distance: 100 meters (55meters)  
🗑
CAT6a   Application: Gigabit Ethernet Speed: 1and 10 Gbps Distance: 100 meters/328 ft.  
🗑
CAT7   Application: Gigabit Ethernet Speed: 1 and 10 Gbps Distance: 100 meters/328 ft.  
🗑
CAT8   Application: Gigabit Ethernet Speed: 25 and 40 Gbps Distance: 30 meters/98 ft.  
🗑
RG-59   Application: Legacy internet, Legacy Cable TV Termination: 75 Ohms Cable type: Coaxial  
🗑
RG-6   Application: CATV, Satellite, Cable TV, Broadband, Internet Termination: 75 Ohms Cable type: Coaxial  
🗑
TIA 568A   Green first SG,G,SO,B,SB,O,SB,B  
🗑
TIA 568B   Orange first SO,O,SG,B,SB,G,SB,B  
🗑
RJ-11   -Most common of telephone to wall jack -Used to connect Analog signal from ISP to a modem/Router to Facilitate a DSL connection  
🗑
RJ45   -Most common twisted pair connector used within LANs for short distance -is used to interconnect computers/hosts within Ethernet networks  
🗑
BNC   -Bayonet Neil-Concelman connectors are used with coaxial cabling  
🗑
F-type   F-type connector is another connector used with coaxial cabling, Originally designed to be threated. but changed to use ridges for friction to hold in place  
🗑
TCP   Transfer Control Protocol  
🗑
UDP   User Datagram Protocol  
🗑
SMB   Server Message Block  
🗑
Sever Message Block (SMB) (Port)   TCP Port 445  
🗑
LDAPS   Lightweight Directory Access Protocol Secure  
🗑
Lightweight Directory Access Protocol Secure (LDAPS) (used for)   is a set of rules to communicate with a directory service regardless of the vendor, adds security to the communication  
🗑
RDP   Remote Desktop Protocol  
🗑
PSTN   public switched telephone network  
🗑
PAN   Personal Area Network  
🗑
SIP   Session Initiation Protocol  
🗑
TCP   Transmission Control Protocol  
🗑
TLS   Transport Layer Security  
🗑
SSL   Secure Socket Layer  
🗑
SNMP   Simple Network Management Protocol  
🗑
NTP   Network Time Protocol  
🗑
IMAPS   Internet Message Access Protocol Secure  
🗑
IMAP   Internet Message Access Protocol  
🗑
POP3S   Post Office Protocol v3 Secure  
🗑
POP3   Post Office Protocol v3  
🗑
HTTP   Hypertext Transfer Protocol  
🗑
HTTPS   Hypertext Transfer Protocol Secure  
🗑
TFTP   Trivial File Transfer Protocol  
🗑
DHCP   Dynamic Host Configuration Protocol  
🗑
DNS   Domain Name System  
🗑
SMTP   Simple Mail Transfer Protocol  
🗑
SFTP   Secure File Transfer Protocol  
🗑
SSH   Secure Shell  
🗑
FTP   File Transfer Protocol  
🗑
Application (what is done)   The layer on which we see Google Mail, Twitter, Facebook, etc.  
🗑
Presentation (what is done)   Encoding and encryption (SSL/TLS)  
🗑
Session (what is done)   -Communication between devices (Control Protocols, tunneling protocols)  
🗑
Transport (what is done)   -The "post office" layer (TCP Segment, UDP Datagram)  
🗑
Network (what is done)   -The "routing" layer (Ip address, router, packet)  
🗑
Datalink (what is done)   -The "switching" layer (frame, MAC Address, Switch)  
🗑
Physical (what is done)   -(cable, NIC, hub)  
🗑
Session Initiation Protocol (SIP) (Used for)   Used in VoIP and other real-time multimedia communications to initiate a connection, establish security, and take a connection down when done  
🗑
Sever Message Block (SMB) (used for)   is for windows file and printer sharing  
🗑
Secure Shell (SSH) (used for)   To securely remote into a computer and transfer data  
🗑
Secure File Transfer Protocol (SFTP) (port)   port 22  
🗑
Telnet (used for)   Unsecure due to communication done in cleartext. mostly used from a CLI  
🗑
Network time protocol (NTP) (used for)   Used to synchronize all network device's system clock  
🗑
Domine System Name (DNS) (used for)   used to turn website names to Ip address  
🗑
PDU   Protocol Data Unit  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: andrickson84
Popular Computers sets