CompTIA Network+ PowerCert Certification Course N10-009 2026

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/381

flashcard set

Earn XP

Description and Tags

Generated using the notes I took on PowerCert Animated Video's CompTIA Network+ Full Certification Course Module by Module. Have been went over by hand, so theres no pointless flashcards.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

382 Terms

1
New cards

ping

A command used to troubleshoot networking issues, checking connectivity to a website or server.

2
New cards

tracert

A command that tracks the route taken by packets across an IP network, recording each hop in milliseconds.

3
New cards

nslookup

A command that looks up DNS information and resolves domain names to their corresponding IP addresses.

4
New cards

ARP (Address Resolution Protocol)

A command that is used to resolve IP addresses to MAC (physical) addresses.

5
New cards

netstat

A command that displays current network connections and open ports on a computer.

6
New cards

ipconfig

A command thatdisplays the TCP/IP network configuration, helping to identify issues related to DHCP, DNS, and more.

7
New cards

tcpdump

A command-line packet analyzer that captures and analyzes network traffic.

8
New cards

NMAP

An open-source tool for network analysis and security audits.

9
New cards

LLDP (Link Layer Discovery Protocol) / CDP (Cisco Discovery Protocol)

A Layer 2 protocol that discovers devices on a network, providing information about the devices.

10
New cards

Speed Test

A tool that measures internet connection speed, including download speed, upload speed, and lag.

11
New cards

Cable Tester

A device used to confirm continuity and cabling arrangement of custom network cables.

12
New cards

Tone Generator / Fox and Hound

Tools used to trace cables and locate breakpoints by sending signals down the cable.

13
New cards

Wi-Fi Analyzer

A tool for analyzing and improving wireless network performance by measuring signal strength.

14
New cards

Visual Fault Locator

A tool that emits a red laser light to identify problems in fiber optic cables.

15
New cards

Network Tap

A device that allows network monitoring by getting in the path of network packets.

16
New cards

show command

A Cisco command tool to display various network settings and device configurations.

17
New cards

show mac-address-table

A Cisco command tool that shows the MAC address table from a device on a Cisco switch.

18
New cards

show route

A Cisco command tool that displays the routing table of a network device such as a router.

19
New cards

show interface

A Cisco command tool that displays information about network interfaces, their status, and speed.

20
New cards

show config

A Cisco command tool thats used to display the current configuration of a network device.

21
New cards

show arp

A Cisco command tool that displays the ARP cache on a device.

22
New cards

show vlan

A Cisco command tool that shows information about the configured VLANs on a switch.

23
New cards

show power

A Cisco command tool that displays information related to the power consumption of a device.

24
New cards

Congestion

Occurs when a shared resource is at capacity.

25
New cards

Contention

Occurs when too many devices access the same resource.

26
New cards

Bottlenecking

A point on a network where data flow is hindered, causing a data traffic jam.

27
New cards

Bandwidth

The maximum amount of data that can be sent over a network connection in a given time.

28
New cards

Latency / Lag

The time it takes for a network to respond to a user's action, measured in milliseconds.

29
New cards

Packet Loss

Occurs when one or more data packets do not arrive at their destination during transmission.

30
New cards

Jitter

The variation in time when data packets arrive at their destination.

31
New cards

Channel Overlap

Occurs when multiple wireless networks in the same area cause interference and slow speeds.

32
New cards

Signal Degradation

Happens when a wireless signal weakens and becomes corrupted during transmission.

33
New cards

Client Disassociation

Occurs when the user gets unexpectedly disconnected from the Wi-Fi signal.

34
New cards

Insufficient Wireless Coverage

Can occur due to router placement, obstacles, interference, or old technology.

35
New cards

Roaming Misconfiguration

Occurs when wireless access points are not configured correctly.

36
New cards

Device Hardening

The practice of securing a network or device by decreasing the chances of an attack and increasing defenses against cyber threats.

37
New cards

Network Access Control (NAC)

A security method that allows only authorized users and devices to access resources on a network, enforcing policies such as posture checks.

38
New cards

Access Control List (ACL)

A security feature used on a firewall that contains a list of rules about what can access the network.

39
New cards

IP Filtering

With regards to a ACL, this is a method that can allow or block specific IP addresses from accessing the network.

40
New cards

URL Filtering

With regards to a ACL, this is a method that can allow or block specific website URLs from being accessed.

41
New cards

Content Filtering

With regards to a ACL, this is a method that can block harmful content from being accessed on the network.

42
New cards

Trusted Zone

A network zone with high security that requires authorization for resource access.

43
New cards

Untrusted Zone

A network zone with low security and increased risk, typically represented by the internet.

44
New cards

Screened Subnet / Demilitarized Zone (DMZ)

A separate subnet before the firewall that improves security by housing public servers, while more secure resources remain behind the firewall.

45
New cards

Distributed Denial of Service (DDOS)

A cyber-attack on a specific server or network, intended to disrupt its normal operation.

46
New cards

VLAN Hopping

An attack where a hacker attempts to access VLANs they are not authorized to access.

47
New cards

MAC Flooding

An attack that overwhelms a switch by flooding its MAC address table with fraudulent entries.

48
New cards

ARP Spoofing

An attack where a device impersonates another device to intercept and steal data.

49
New cards

DNS Poisoning / DNS Spoofing

An attack that changes DNS data to redirect users to harmful websites.

50
New cards

Rogue DHCP Server

An unauthorized DHCP server that can interfere with network security and duplicate IP addresses.

51
New cards

Rogue AP

A malicious wireless access point placed on a secure network to steal user data.

52
New cards

Evil Twin Attack

An attack where a rogue AP broadcasts the same SSID as a legitimate AP.

53
New cards

Dumpster Diving

An attack that involves retrieving discarded items to find sensitive information.

54
New cards

Shoulder Surfing

Obtaining personal information by watching someone enter credentials.

55
New cards

Phishing

A type of internet fraud where criminals impersonate a legitimate entity to steal private information.

56
New cards

Malware

Malicious software intended to damage or exploit systems; includes viruses, trojans, worms, ransomware, and spyware.

57
New cards

Tailgating

A physical security breach where someone follows an authorized person into a secure area.

58
New cards

Domain Name System (DNS)

A system that resolves domain names to IP addresses.

59
New cards

Root Server

With regards to DNS, this is the server that accepts a domain name and forwards it to the best domain server.

60
New cards

Authoritative Name Server

With regards to DNS, this is the Server responsible for knowing everything about a domain.

61
New cards

Type A Record

DNS record type that resolves domain names to IPv4 addresses.

62
New cards

Time To Live (TTL)

A value that indicates how long a DNS record is valid until the next update.

63
New cards

Type AAAA Record

DNS record type that resolves domain names to IPv6 addresses.

64
New cards

Canonical Name (CNAME) Record

DNS record type that resolves a domain or subdomain to another domain name.

65
New cards

Mail Exchange (MX) Record

DNS record type used to specify the email server responsible for receiving email for a domain.

66
New cards

Name Server (NS) Record

DNS record type that provides the name of the authoritative name server within a domain.

67
New cards

Pointer Record (PTR)

DNS record type that resolves IP addresses to domain names, used for email verification.

68
New cards

Text Record (TXT)

DNS record type used to store miscellaneous information about a domain, often for spam prevention.

69
New cards

DNSSEC (Domain Name System Security Extensions)

A set of cryptographic protocols that add digital signatures to DNS records to secure them.

70
New cards

DNS over HTTPS (DoH)

A protocol that encrypts DNS queries using HTTPS for privacy.

71
New cards

DNS over TLS (DoT)

A protocol that improves privacy against main-in-the-middle attacks by encrypting DNS queries and preventing eavesdropping.

72
New cards

Forward Zone

A DNS Zone that resolves domain names to IP addresses.

73
New cards

Reverse Zone

A DNS Zone that resolves IP addresses to domain names.

74
New cards

Network Time Protocol (NTP)

Internet standard used to synchronize clocks of computers with a master clock.

75
New cards

Network Time Security

Enhancement of NTP to ensure secure communication for time synchronization.

76
New cards

Domain Server

With regards to DNS, this is the server that stores DNS records and responds to queries.

77
New cards

Virtual Private Network (VPN)

Establishes a secure and reliable network connection over an unsecure network such as the internet.

78
New cards

Site-to-site VPN

Connects two offices in different geographical locations to share data over the internet.

79
New cards

Client-to-site VPN

Securely connects a single computer to a remote network.

80
New cards

Full Tunneling

All data is sent through the VPN, providing high performance but adding latency.

81
New cards

Split Tunneling

A portion of the data is sent through the VPN while other traffic bypasses it, offering speed but less security.

82
New cards

Clientless VPN

Allows users to connect to a remote network without installing specific software.

83
New cards

Secure Shell (SSH)

Command-line interface for safely accessing and managing network devices.

84
New cards

Graphical User Interface (GUI)

User-friendly interface for connecting and managing network settings.

85
New cards

Application Programming Interface (API)

Links software applications for seamless data exchange.

86
New cards

Console Connection

Physical connection using a serial cable for direct command line access.

87
New cards

Jump Box / Jump Host / Jump Server

Computer that allows secure access to other servers or networks in a limited security zone.

88
New cards

In-Band Management

Uses the same network infrastructure for network management through SSH.

89
New cards

Out-Of-Band Management

Network management through a direct connection to the device using its console port.

90
New cards

Spanning Tree Protocol (STP)

A network protocol designed to prevent broadcast loops in Ethernet networks by blocking certain ports on switches.

91
New cards

Broadcast Storm

A condition caused by broadcast loops that occurs when multiple switches continually send broadcast frames, rendering the network inoperable.

92
New cards

Bridge Protocol Data Units (BPDU)

Messages exchanged by switches containing information about the bridge ID and the topology of the network.

93
New cards

Root Bridge

The switch with the lowest Bridge Protocol Data Unit (BPDU) that serves as the central point of the spanning tree.

94
New cards

Root Port

The port on a non-root switch that forwards traffic towards the root bridge and is determined by the lowest path cost.

95
New cards

Bridge ID (BID)

An identifier comprising a priority number, VLAN ID, and MAC address, used to establish the root bridge.

96
New cards

Designated Port

The port on a network switch that has the best path to the root bridge and is responsible for forwarding traffic towards that bridge. It is designated for the specific network segment.

97
New cards

Encryption

Method to make data unreadable by scrambling it using encryption algorithms.

98
New cards

Public Key Infrastructure (PKI)

A system that ensures users are who they claim to be, using digital certificates and public key cryptography.

99
New cards

Certificate Authority (CA)

A part of PKI. An entity that issues digital certificates and whose certificates are trusted by default by browsers and systems.

100
New cards

Self-Assigned Certificates

A part of PKI. Certificates that are not automatically trusted, requiring manual acceptance by the user.