CompTIA Network+ Exam Review

5.0(1)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/439

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

440 Terms

1
New cards

Exam Overview

knowt flashcard image
2
New cards

Clients

Devices that users use to access the network (e.g., workstations, laptops, tablets)

3
New cards

Servers

Provide resources to the network (e.g., email servers, file servers)

4
New cards

Hubs

Older technology connecting devices but not commonly used due to limitations

5
New cards

Switches

Smarter hubs that ensure security and efficient bandwidth utilization

6
New cards

Wireless Access points (WAPs)

Enable wireless devices to connect to a wired network using radio frequency waves

7
New cards

Routers

Connect different networks, make intelligent forwarding decisions based on IP addresses

8
New cards

Firewalls

Security barrier between internal network and the internet, monitor and control traffic

9
New cards

Load Balancers

Distribute network/application traffic across servers, preventing bottlenecks

10
New cards

Proxy Servers

Act as intermediaries between user devices and the internet, enhancing security and privacy

11
New cards

Intrusion Detection System (IDS)

Detect unauthorized access or anomalies

12
New cards

Intrusion Prevention System (IPS)

Detect and take action to prevent intrusion

13
New cards

Controllers

Manage flow control in software-defined networking (SDN), offering flexibility and efficiency

14
New cards

Network-attached Storage (NAS) Devices

Dedicated file storage systems providing data access to authorized clients

15
New cards

Storage Area Networks (SANs)

High-speed networks for consolidated block-level data storage, enhancing accessibility

16
New cards

Media

Physical materials for data transmission (e.g., copper cables, fiber optic cables)

17
New cards

Wide Area Network (WAN) Links

Connect networks over large areas (e.g., between cities), essential for global connectivity

18
New cards

Key Takeaway

Understanding these network components is crucial for efficient and secure data transmission in information technology, aiding in network design, management, problem-solving, and security implementation

19
New cards

Client/Server Model

■ Utilizes a dedicated server for centralized access to files, scanners, printers, and resources

■ Easy administration and backup due to a central server

20
New cards

Benefits to Client/Server Model

● Centralized administration

● Easier management

● Better scalability

21
New cards

Drawbacks to Client/Server model

● Higher cost

● Requires dedicated hardware and specialized skillset

22
New cards

Peer-to-Peer Model

■ Direct sharing of resources among peers (laptops, desktops)

■ Difficult administration and backup due to dispersed files on different machines

Drawbacks

● Redundancy

● Complex management

● Scalability issues

■ Usefulfor low-cost setups, exemplified by Napster a decade ago

23
New cards

Benefits to Peer-to-Peer Model

● Low-cost

● No specialized infrastructure or hardware

24
New cards

Drawbacks to Peer-to-Peer Model

● Decentralized management

● Poor scalability for large networks

25
New cards

Personal Area Network (PAN)

■ Smallest network type

■ Covers about 10 feet or less

■ Examples are Bluetooth and USB

■ Connection within arm's reach

26
New cards

Local Area Network (LAN)

■ Common in office buildings

■ Limited distance

● Up to 100 meters

● CAT5 cabling

■ Can use WiFi (IEEE 802.11) or Ethernet (IEEE 802.3)

■ Examples include Office, school, and home

27
New cards

Campus Area Network (CAN)

■ Building-centric LAN

■ Spans numerous buildings in an area

■ Covers several miles

■ Examples are College campuses, business parks, military bases

28
New cards

Metropolitan Area Network (MAN)

■ Connects locations across the entire city

■ Larger than CAN ● Up to 25 miles

■ Examples are City departments, multiple campuses in a city

29
New cards

Wide Area Network (WAN)

■ Connects geographically disparate internal networks

■ Large geographic coverage

● Across states, countries, or globally

■ Can consist of lease lines or VPNs.

■ Examples are Internet, private connections between offices across the country

30
New cards

Important Standards

knowt flashcard image
31
New cards

Network Topology

■ Refers to the arrangement of elements in a computer network

■ Includes links, nodes, clients, and servers

32
New cards

Diagram Types

■ Physical Topology

● Describes physical cabling and device connections

● Represents real-world layout using floorplans

■ Logical Topology

● Describes how data flows in the network

● Focuses on the logical connection rather than physical placement

33
New cards

Point-to-Point Topology

● Direct connection between two devices

● Simple, reliable for small-scale connections

● Not scalable

● Used in WAN connections for remote offices

34
New cards

Ring Topology

● Circular data path with each device connected to two others

● Unidirectional flow prevents collisions

● Creates a single point of failure situation unless there are redundant connections for failover

● Common in FDDI (Fiber Distributed Data Interface) for long-distance fiber optic networks.

35
New cards

Bus Topology

knowt flashcard image
36
New cards

Star Topology

knowt flashcard image
37
New cards

Hub-and-Spoke Topology

knowt flashcard image
38
New cards

Mesh Topology

knowt flashcard image
39
New cards

Infrastructure Mode

knowt flashcard image
40
New cards

Ad Hoc Mode

knowt flashcard image
41
New cards

Wireless Mesh

■ Use Cases for Wireless Mesh

● Post-disaster scenarios

● Humanitarian assistance missions

● Combining microwave, satellite, cellular, and Wi-Fi for reliable and redundant networks

○ Satellite for long distances

○ Microwaves for medium ranges

○ Wireless for short distances

<p>■ Use Cases for Wireless Mesh </p><p>● Post-disaster scenarios </p><p>● Humanitarian assistance missions </p><p>● Combining microwave, satellite, cellular, and Wi-Fi for reliable and redundant networks </p><p>○ Satellite for long distances </p><p>○ Microwaves for medium ranges </p><p>○ Wireless for short distances</p>
42
New cards

Datacenter

Any facility composed of networked computers and storage that businesses and other organizations use to organize, process, store, and disseminate large amounts of data

43
New cards

Core Layer

● Houses high-performance routers, merging geographically separated networks

● Backbone of the network

44
New cards

Distribution/Aggregation Layer

● Provides boundary definition through access lists and filters

● Defines policies for the network at large

45
New cards

Access/Edge Layer

● Connects endpoint devices using regular switches

● Used to ensure the packets are converted to frames and delivered to the correct end point devices

46
New cards

Collapsed Core

● Network architecture where the core and distribution layers are merged into a single layer

● Creates a two-tiered core

● Simplified architecture for medium to small datacenters

● May not be suitable for larger and more complex networks

47
New cards

Spine and Leaf Architecture

knowt flashcard image
48
New cards

North-South Traffic

● Traffic that enters (Southbound traffic) or leaves (North traffic) data center from a system outside

49
New cards

East-West Traffic

● Dataflow within a datacenter

● Example: In a spine and leaf architecture, all data flow between servers is considered east-west traffic

● Prevalent with SDN, virtualization, and converged networks

50
New cards

Open Systems Interconnect Model (OSI)

■ Developed in 1977 by the International Organization for Standardization

■ OSI is a reference model

● Used to categorize the functions of a network

● Useful for troubleshooting

51
New cards

Layers

knowt flashcard image
52
New cards

Names of data as it flows through the OSI model

knowt flashcard image
53
New cards

Layer 1 (Physical)

■ First layer of the OSI model where transmission of bits across the network occurs and includes physical and electrical network characteristics

■ Data type occurs as bits

● Binary bits represented as a series of 1s and 0s

<p>■ First layer of the OSI model where transmission of bits across the network occurs and includes physical and electrical network characteristics </p><p>■ Data type occurs as bits </p><p>● Binary bits represented as a series of 1s and 0s</p>
54
New cards

Transition Modulation

■ Switching between levels to represent 1 or 0

● Copper Wire (Cat5/Cat6) – Uses voltage (0V for 0, +5V/-5V for 1)

● Fiber Optic Cable– Uses light (on for 1, off for 0)

55
New cards

Connector Standards

■ RJ-45Connector– Used in CAT5/CAT6 cables

■ Wiring Standards

● TIA/EIA-568A

● TIA/EIA-568B

■ Crossover cables– TIA/EIA-568A on one end, and TIA/EIA-568B on the other end

■ Straight-through cables– TIA/EIA-568B on both ends

56
New cards

Asynchronous Communication

● Start and stop bits for out-of-sync data transmission

57
New cards

Synchronous Communication

● Real-time communication using a common time source

58
New cards

Broadband

● Divides bandwidth into separate channels (e.g., cable TV)

59
New cards

Baseband

● Uses all frequency of the cable all the time (e.g., telephone)

60
New cards

Multiplexing

■ Involves taking some limited amount of resource and using it more efficiently

● Allows multiple people to use a baseband connection at the same time

61
New cards

Time Division Multiplexing (TDM)

● Allocates dedicated time slots

62
New cards

Statistical Time Division Multiplexing (StatTDM)

● Dynamically allocates time slots based on when people need it

63
New cards

Frequency Division Multiplexing (FDM)

● Divides the medium into channels

64
New cards

Data Link Layer (Layer 2)

■ Responsible for packaging bits from Layer 1 into frames and transmitting them across the network
■ Performs error detection and correction, identifies devices using MAC addresses, and provides flow control

<p>■ Responsible for packaging bits from Layer 1 into frames and transmitting them across the network <br>■ Performs error detection and correction, identifies devices using MAC addresses, and provides flow control</p>
65
New cards

MAC Address (Media Access Control Address)

■ A means for identifying a device physically and allowing it to operate on a logical topology ■ A unique 48-bit physical addressing system is assigned to every network interface card (NIC) produced

● Written in hexadecimal numbers

● First 24 bits– identify the manufacturer

● Remaining 24 bits– identify the specific device

■ Crucial for logical topology– identifying devices on the network

66
New cards

Logical Link Control (LLC)

■ Provides connection services and acknowledges message receipt, ensuring controlled data flow

■ Most basic form offl ow control

● Limits data sent by a sender and prevents receiver overwhelm

■ Uses a checksum to detect corrupted data frames

67
New cards

Layer 3 (Network Layer)

■ Concerned with routing and forwarding traffic using logical addresses

<p>■ Concerned with routing and forwarding traffic using logical addresses</p>
68
New cards

IP Variants - common logical addressing schemes

knowt flashcard image
69
New cards

Packet Switching (Routing)

● Data is divided into packets and then forwarded

● Most commonly used method

70
New cards

Circuit Switching

● A dedicated communication link is established between two devices

71
New cards

Message Switching

● Data is divided into messages which may be stored and then forwarded

72
New cards

Route Discovery and Selection

knowt flashcard image
73
New cards

Connection Services at Layer 3

Augment Layer 2 services

■ Involves flow control

● Prevents sender from overwhelming the receiver

74
New cards

Packet reordering

● Ensures data packets arrive and are reassembled in the correct order

75
New cards

Internet Control Message Protocol (ICMP)

knowt flashcard image
76
New cards

Layer 4 (Transport Layer)

■ Dividing line between the upper layers and the lower layers of the OSI model

■ Upper Layers

● Transport

● Session

● Presentation

● Application

<p>■ Dividing line between the upper layers and the lower layers of the OSI model </p><p>■ Upper Layers </p><p>● Transport </p><p>● Session </p><p>● Presentation </p><p>● Application</p>
77
New cards

Segments

■ Data Type in Transport Layer

78
New cards

TCP (Transmission Control Protocol)

● Connection-oriented protocol that is a reliable way to transport segments across the network

● With acknowledgement

● Uses Three-Way Handshake

○ SYN–synchronization

○ SYN-ACK–synchronization- acknowledgement

○ ACK–acknowledgement

● Windowing for flow control

● Used for all network data that needs to be assured to get to its final destination

Segment–datatype for TCP

79
New cards

UDP (User Datagram Protocol)

● A connectionless protocol that is an unreliable way to transport segments (datagram)

● Used for audio and visual streaming

● No three-way handshake and less overhead

● No acknowledgment or retransmission
Datagram–datatype for UDP

80
New cards

Windowing

■ Allows clients to adjust the amount of data in each segment during transmission

■ Optimize throughput and bandwidth

■ Open or close window based on retransmissions

81
New cards

Buffering

■ Occurs when devices allocate memory to store segments if bandwidth is not readily available

■ Buffer

● Temporary storage for segments

■ Prevents overflow by clearing segments

82
New cards

Layer 5 (Session Layer)

■ Manages sessions, ensuring separate conversations to prevent data intermingling

<p>■ Manages sessions, ensuring separate conversations to prevent data intermingling</p>
83
New cards

Setting Up Session

■ Checking of user credentials and assigning numbers to sessions to help identify

84
New cards

Maintaining Session

■ Continuous data transfer between parties

■ If connection breaks, it will require re-establishment

■ Includes acknowledgement of data

85
New cards

Tearing Down a Session

■ Ending a session once communication goals are achieved

■ Mutual agreement or one party disconnects

86
New cards

Layer 6 (Presentation Layer)

■ Responsible for formatting data for exchange and securing it through encryption

87
New cards

Data Formatting

knowt flashcard image
88
New cards

Encryption

Using to scramble data in transit to keep it secure and provide data confidentiality

89
New cards

Transport Layer Security (TLS)

● Ensures secure data transfer

● Creates an encrypted tunnel, protecting sensitive information

90
New cards

Control how ASCII Text is displayed on the screen

● HTML

● XML

● PHP

● JavaScript

91
New cards

Different ways of displaying text using ones and zeros

● ASCII

● Unicode

● EBCDIC

92
New cards

Different graphical representations of 1s and 0s

● GIFs

● JPEGs

● TIFFs

● SVGs

● PNGS

93
New cards

1s and 0s formatted to create watchable videos

● MP4s

● MPEGs

● MOV

94
New cards

Scrambles data to provide confidentiality and security during transit and storage

● TLS

● SSL(Secure Sockets Layer)

95
New cards

Layer 7 (Application Layer)

■ Provides application-level services where users communicate with the computer

■ Focus on lower-level applications

● File transfer

● Network transfer

96
New cards

Application Services

knowt flashcard image
97
New cards

Service Advertisement

■ Applications send announcements to other devices on the network

■ Devices advertise the services they offer

● Printers and file servers managed by Active Directory

● Self-advertising devices like wireless printers

98
New cards

Email Applications (Layer 7 Protocols)

● POP3

● IMAP

● SMTP

99
New cards

Web Browsing (Layer 7 Protocol)

● HTTPS

● HTTP

100
New cards

Layer 7 Protocol (DNS)

Domain Name Services