Official CompTIA Network+

0.0(0)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/677

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

678 Terms

1
New cards

What is Layer 1 of OSI Model?

Physical Layer

2
New cards

What is Layer 2 of OSI Model?

Data Link Layer

3
New cards

What is Layer 3 of OSI Model?

Network Layer

4
New cards

What is Layer 4 of OSI Model?

Transport Layer

5
New cards

What is Layer 5 of OSI Model?

Session

6
New cards

What is Layer 6 of the OSI Model?

Presentation Layer

7
New cards

What is Layer 7 of OSI Model?

Application Layer

8
New cards

What is the Physical Layer ? (OSI Model)

  • The physics of the network

    • Signalling, cabling, connectors

    • This layer isn’t about protocols

  • "You have a physical layer problem”

    • Fix your cabling, punch-downs, etc.

    • Run loopback tests, test/replace cables, swap adapter cards

9
New cards

What is the Data Link Layer ? (OSI Model)

  • The basic network “language”

    • The foundation of communication at the data link layer

  • Data Link Control (DLC) Protocols

    • MAC (Media Access Control) address on Ethernet

  • The “switching” layer

10
New cards

What is the Network Layer ? (OSI Model)

  • The “routing” layer

  • Internet Protocol (IP)

  • Fragments frames to traverse different networks

11
New cards

What is the Transport Layer ? (OSI Model)

  • The “post office” layer

    • Parcels and letters

  • TCP and UDP

12
New cards

What is the Session Layer ? (OSI Model)

Communication management between devices

  • Start, stop, restart

Control protocols, tunnelling protocols

13
New cards

What is the Application Layer ? (OSI Model)

  • The layer we see

  • HTTP, FTP, DNS, POP3

14
New cards

Physical Layer 1 (Real-world to OSI model)

Cables, fiber, and the signal itself

  • Electrical Signals

15
New cards

Data Link Layer 2 (Real-world to OSI model)

Frame, MAC address, Extended Unique Identifier (EUI-48, EUI-64), Switch

  • Ethernet

16
New cards

Network Layer 3 (Real-world to OSI model)

IP Adress, Router, Packet

  • IP Encapsulation

17
New cards

Transport Layer 4 (Real-world to OSI model)

TCP segment, UDP datagram

  • TCP Encapsulation

18
New cards

Session Layer 5 (Real-world to OSI model)

Control protocols, tunnelling protocols

  • Link the presentation to the transport

19
New cards

Presentation Layer 6 (Real-world to OSI model)

Application encryption (SSL/TLS)

  • SSL Encryption

20
New cards

Application Layer 7 (Real-world to OSI model)

Your eyes

  • https://mail.google.com

21
New cards

Router

Routes traffic between IP subnets

  • OSI layer 3 device

  • Routers inside of switches sometimes called “layer 3 switches”

  • Layer 2 = Switch

  • Layer 3 = Router

Often connects diverse network types

  • LAN, WAN, copper, fiber

22
New cards

Switch

Bridging done in hardware

  • Application-specific integrated circuit (ASIC)

An OSI layer 2 device

  • Forwards traffic based on data link address

Many ports and features

  • The core of an enterprise network

  • May provide Power over Ethernet (PoE)

Multilayer switch

  • Includes layer 3 (routing) functionality

23
New cards

Firewalls

Filter traffic by port number or applicaiton

  • Traditional vs NGFW

Encrypt traffic

  • VPN between sites

Most firewalls can be layer 3 devices (routers)

  • Often sits on the ingress/egress of the network

  • Network Address Translation

  • Dynamic Routing

24
New cards

IDS and IPS

Watch network traffic

25
New cards

Intrusions (IDS and IPS)

  • Exploits against operating systems, applications, etc.

  • Buffer overflows, cross-site scripting, other vulnerabilities

26
New cards

Detection vs Prevention (IDS and IPS)

  • Detection - Alarm or alert

  • Prevention - Stop it before it gets into the network

27
New cards

Balancing the load

Distribute the load

  • Multiple servers

  • Invisible to the end-user

Large-scale implementations

  • Web server farms, database farms

Fault tolerance

  • Server outages have no effect

  • Very fast convergence

28
New cards

Load Balancer

Configurable load

  • Manage across servers

TCP offload

  • Protocol overhead

SSL offload

  • Encryption/Decryption

Caching

  • Fast response

Prioritization

  • QoS

Content Switching

  • Application-centric balancing

29
New cards

Proxies

  • Sits between the users and the external network

  • Receives the user requests and sends the request on their behalf (the proxy)

  • Useful for caching information, access control, URL filtering, content scanning

  • Applications may need to know how to use the proxy (explicit)

  • Some proxies are invisible (transparent)

30
New cards

Network Attached Storage (NAS)

  • Connect to a shared storage device across the network

  • File-level access

31
New cards

Storage Area Network (SAN)

  • Looks and feels like a locals torage device

    • Block level access

  • Very efficient reading and writing

32
New cards

NAS and SAN require lots of…

BANDWIDTH

  • May use an isolated network and high-speed network technologies

33
New cards

Access point (AP)

Not a wireless router

  • A wireless router is a router and an access point is a single device

Is a bridge

  • Extends the wired network onto the wireless network

  • OSI layer 2 device

34
New cards

Wireless networks everywhere

Wireless networking is pervasive

  • And you probably don’t just have a single access point

Your access points may not even be in the same building

  • One (or more) at every remote site

Configurations may change at any moment

  • Access policy, security policies, AP configs

The network should be invisible to your users

  • Seamless network access, regardless of role

35
New cards

Wireless LAN controllers

  • Centralized management of access points

    • A single “pane of glass”

  • Deploy new access points

  • Performance and security monitoring

  • Configure and deploy changes to all sites

  • Report and access point use

  • Usually a proprietary system

    • The wireless controller is paired with the access points

36
New cards

Networking Functions

There’s a lot happening behind the scenes

  • Many networking functions are part of the infrastructure

Access to important data

  • From anywhere in the world

Remote access

  • Secure network communication

Traffic management

  • Prioritize the important applications

Protocol support

  • Maintain uptime and availability

37
New cards

Content Delivery Network (CDN)

It takes time to get data from one place to another

  • Speed up the process

Geographically distributed caching servers

  • duplicate the data

  • Users get the data from a local server

You’re using one right now

  • Used on many websites

  • Invisible to the end user

38
New cards

Virtual Private Network (VPN)

Secure private data traversing a public network

  • Encrypted communication on an insecure medium

Concentrator / head-end

  • Encryption/decryption access device

  • Often integrated into a firewall

Many deployment options

  • Specialized cryptographic hardware

  • Software-based options available

Often used with client software

  • Sometimes built into the OS

39
New cards

Quality of Service (QoS)

  • Traffic shaping, packet shaping

  • Control by bandwidth usage or data rates

  • Set important applications to have higher priorities and other apps

  • Mange the QoS

    • Routers, switches, firewalls, ____ devices

40
New cards

Time to live (TTL)

How long should data be available?

  • Not all systems or protocols are self-regulating

  • We sometimes need to tell a system when to stop

Create a timer

  • Wait until traversing a number of hops, or wait until a certain amount of time elapses

  • Then stop (or drop)

Many different uses

  • Drop a packet caught in a loop

  • Clear a cache

41
New cards

Routing loops

Router A thinks the next hop is to Router B

  • Router B thinks the next hop is to router A

  • And repeat

Easy to misconfigure

  • Especially with static routing

This can’t go on forever

  • TTL is used to stop the loop

42
New cards

IP (Internet Protocol)

Loops could cause a packet to live forever

  • Drop the packet after a certain number of hops

Each pass through a router is a hop

  • Default TTL for macOS/Linux is 64 hops

  • Default TTL for Windows is 128 hops

The router decreases TTL by 1

  • A TTL of zero is dropped by the router

43
New cards

DNS (Domain Name System)

DNS Lookups

A device caches the lookup for a certain amount of time

  • How long? TTL seconds long.

44
New cards

Designing the cloud

On demand computing power

  • Click a button

Elasticity

  • Scale up or down as needed

Applications also scale

  • Scalability for large implementations

  • Access from anywhere

Multi tenancy

  • Many different clients are using the same cloud infrastructure

45
New cards

Virtual Networks

Server farm with 100 individual computers

  • It’s a big farm

All servers are connected with enterprise switches and routers

  • With redundancy

Migrate 100 physical servers to one physical server

  • With 100 virtual servers inside

What happens to the network?

46
New cards

Network function virtualization (NFV)

Replace physical network devices with virtual versions

  • Manage from the hypervisor

Same functionality as a physical device

  • Routing, switching, load balancing, firewalls, etc.

Quickly and easily deploy network functions

  • Click and deploy from the hypervisor

Many different deployment options

  • Virtual machine, container, fault tolerance, etc.

47
New cards

Virtual Private Cloud (VPC)

A pool of resources created in public cloud

48
New cards

VPC (Connecting to the cloud)

Common to create many VPCs

  • Many different application clouds

Connect VPCs with a transit gateway

  • And users to the VPCs

  • A “cloud router”

Now make it secure

  • VPCs are commonly on different IP subnets

  • Connecting to the cloud is often through a VPN

49
New cards

VPN (Connecting to the cloud)

Site-to-site VPN through the Internet

50
New cards

Virtual Private Cloud Gateway / Internet gateway (Connecting to the cloud)

  • Connects users on the Internet

51
New cards

VPC NAT gateway

  • Network address translation

  • Private cloud subnets connect to external resources

  • External resources cannot access the private cloud

52
New cards

VPC Endpoint (Connecting to the cloud)

Direct connection between the cloud provider networks

53
New cards

Security groups and lists

A firewall for the cloud

  • Control inbound and outbound traffic flows

Layer 4 port number

  • TCP or UDP port

Layer 3 address

  • Individual addresses

  • CIDR block notation

  • IPv4 or IPv6

54
New cards

Network Security List

Assign a security rule to a entire IP subnet

  • Applies to all devices in the subnet

Very Broad

  • Can become difficult to manage

  • Not all devices in a subnet have the same security posture

More granularity may be needed

  • Broad rules may not provide the right level of security

55
New cards

Network security group

Assign a security rule to a specific virtual NIC (VNIC)

  • Applies to specific devices and network connections

More granular than networks security lists

  • Different rules for devices in the same IP subnet

Better control and granularity

  • The best practice for the cloud security rules

56
New cards

Public (Cloud Deployment Models)

Available to everyone over the internet

57
New cards

Private (Cloud Deployment Models)

Your own virtualized local data center

58
New cards

Hybrid (Cloud Deployment Models)

A mix of both public and private

59
New cards

Software as a service (SaaS)

On demand software

  • No local installation

  • Why manage your own email distribution? Or Payroll?

Central management of data and applications

  • Your data is out there

A complete application offering

  • No development work required

  • Google Mail, Office 365

60
New cards

Infrastructure as a Service (Iaas)

Sometimes called as Hardware as a Service (Haas)

  • Outsource your equipment

You’re still responsible for the management

  • And for the security

Your data is out there but more within your control

Web server providers

61
New cards

Platform as a Service (PaaS)

No servers, no software, no maintenance team, no HVAC

  • Someone else handles the platform, you handle the development

You don’t have direct control of the data, people, or infrastructure

  • Trained security professionals are watching your stuff

  • Choose carefully

Put the building blocks together

  • Develop your app from what’s available on the platform

  • SalesForce.com

62
New cards

A series of moving vans (Understanding IP)

Efficiently move large amounts of data

  • Use a shipping truck

The network topology is the road

  • Ethernet, DSL, cable system

The truck is the Internet Protocol (IP)

  • We’ve designed the roads for this truck

The boxes hold your data

  • Boxes of TCP and UDP

Inside the boxes are more things

  • Application information r

63
New cards

TCP and UDP

Transported inside of IP

  • Encapsulated by the IP protocol

Two ways to move data from place to place

  • Different features for different applications

OSI Layer 4

  • The transport layer

Multiplexing

  • Use many different applications at the same time

  • TCP and UDP

64
New cards

TCP (Transmission Control Protocol)

Connection-oriented

  • A formal connection setup and close

“Reliable” delivery

  • Recovery from errors

  • Can manage out-of-order messages or retransmissions

Flow control

  • The receiver can manage how much data is sent

65
New cards

UDP (User Datagram Protocol)

Connectionless

  • No formal open or close to the connection

“Unreliable” delivery

  • No error recovery

  • No reordering of data or retransmissions

No flow control

  • Sender determines the amount of data transmitted

66
New cards

Speedy Delivery

The IP delivery truck delivers from one (IP) adress to another (IP) address

  • Every house has an address, every computer has an IP address

Boxes arrive at the house / IP address

  • Where do the boxes go?

  • Each box has a room name

Port is written on the outside of the box

  • Drop the box into the right room

67
New cards

Lots of Ports

IPv4 sockets

  • Server IP address, protocol, server application port number

  • Client IP address, protocol, client port number

Non-ephemeral-ports - permanent port numbers

  • Ports 0 through 1,023

  • Usually on a server or service

Ephemeral ports - temporary port numbers

  • Ports 1,024 through 65,535

68
New cards

Port Numbers

  • TCP and UDP ports can be any number between 0 and 65,535

  • Most servers (services) use non-ephemeral (not temporary) port numbers

    • This isn’t always the case

    • It’s just a number

  • Port numbers are for communication, not security

  • Service port numbers need to be “well known”

  • TCP port numbers aren’t the same as UDP port numbers

69
New cards

FTP (File transfer protocol)

Transfers files between systems

  • Generic file transfer method

  • Not specific to an operating system

tcp/20 (activate mode data), tcp/21 (control)

  • Authenticates with a username and password

Full-featured functionality

  • List, add, delete, etc.

70
New cards

SSH (Secure Shell)

  • Text-based console communication

  • Encrypted communication link - tcp/22

71
New cards

SFTP (Secure FTP)

Generic file transfer with security

  • Encrypted network communication

Uses the SSH File Transfer Protocol

  • tcp/22

Provides file system functionality

  • Resuming interrupted transfers, directory listings, remote file removal

Uses SSH (port 22)

  • SSH isn’t just for console communication

72
New cards

Telnet

Telecommunication Network

  • tcp/23

Console access

  • Similar functionality to SSH

In-the-clear communication

  • Not the best choice for production systems

73
New cards

SMTP (Simple Mail Transfer Protocol)

Server to server email transfer

  • tcp/25 (using plaintext)

  • tcp/587 (using TLS encryption)

Also used to send mail from a device to a mail server

  • Commonly configured on mobile devices and email clients

Other protocols are used for clients to receive email

  • IMAP, POP3

74
New cards

DNS (Domain Name System)

Converts names to IP addresses

These are very critical resources

  • Usually multiple DNS servers are in production

75
New cards

DHCP (Dynamic Host Configuration Protocol)

Automated configuration of IP address, subnet mask and other options

  • udp/67,udp/68

  • Requires a _____ server

  • Server, appliance, integrated into a SOHO router, etc.

Dynamic/pooled

  • IP addresses are assigned in real-time from a pool

  • Each system is given a lease, must renew at set intervals

DHCP serervation

  • Addresses are assigned by MAC address in the DHCP server

  • Quickly manage addresses from one location

76
New cards

TFTP (Trivial File Transfer Protocol)

Port Number

  • udp/69

Very simple file transfer application

  • Read files and write files

No authentication

  • Not used on highly secure systems

Useful when starting a system

  • Transfer configuration files

  • Quick and easy

77
New cards

HTTP and HTTPS

Hypertext Transfer Protocol

  • Communication in the browser

  • and by other applications

In the clear or encrypted

  • SSL (Secure Sockets Layer) or TLS (Transport Layer Security)

78
New cards

NTP (Network Time Protocol)

Switches, routers, firewalls, servers, workstations

  • Every device has its own clock

  • udp/123

Synchronizing the clocks becomes critical

  • Local files, authentication information, outage details

Automatic updates

  • No flashing 12:00 lights

Flexible

  • you control how clocks are updated

Very accurate

  • Accuracy is better than 1 millisecond on a local network

79
New cards

SNMP (Simple Network Management Protocol) s*

Gather statistics from network devices

  • udp/161

80
New cards

v1 - the original (SNMP)

  • structured tables

  • In-the-clear

81
New cards

v2 - a good step ahead (SNMP)

  • Data type enhancements

  • Bulk transfers

  • Still in-the-clear

82
New cards

v3 - A secure standard (SNMP)

  • Message integrity

  • Authentication

  • Encryption

83
New cards

SNMP traps

automatic alert messages sent by a device (like a router or switch) to a network management system to report a problem or important event, such as a failure or status change, without being asked

84
New cards

LDAP (Lightweight Directory Access Protocol)

  • tcp/389

  • Store and retrieve information in a network directory

85
New cards

LDAPS (LDAP Secure)

  • A non-standard implementation of LDAP over SSL

  • tcp/636

86
New cards

SMB (Sever Message Block)

Protocol used by Microsoft Windows

  • File sharing, printer sharing

  • Also called CIFS (Common Internet File System)

Integrated into the operating system

  • Access rights integration across systems

  • File sharing publishing

  • File locking

Direct over tcp/445 (NetBIOS - less)

  • Direct ___ communication over TCP

87
New cards

Syslog

Standard for message logging

  • Diverse systems, consolidated log

  • udp/514

Usually a central log collector

  • Integrated into the SIEM

  • Security Information and Event Manager

You’re going to need a lot of disk space

  • No, more, More than that.

  • Data storage from many devices over an extended timeframe

88
New cards

Databases

Collection of information

  • Many different types of data

  • One common method to sroe and query

Structured Query Language (SQL)

  • A standard language across database servers

Microsoft SQL Server

  • MS-SQL (Microsoft SQL)

  • tcp/1433

89
New cards

RDP (Remote Desktop Protocol)

Share a desktop from a remote location over tcp/3389

  • Connect to an entire desktop or just an application

Remote Desktop Services on many Windows versions

  • Clients for Windows, MacOS, Linux, Unix, iPhone, and others

90
New cards

SIP (Session Initiation Protocol)

Voice over IP (VoIP) signaling

  • tcp/5060 and tcp/5061

Setup and manage VoIP sessions

  • Call, ring, play busy signal, hang up

Extend voice communication

  • Video conferencing

  • Instant messaging

  • File transfer

  • etc.

91
New cards

ICMP (Internet Control Message Protocol)

“Text messaging” for your network devices

Another protocol carried by IP

  • Not sued for data trasnfer

Devices can request and reply to administrative requests

  • Hey, are you there? / Yes, I’m right here

Devices can send messages when things don’t go well

  • That network you’re trying to reach is not reachable from here

  • Your time-to-live expired, just letting you know

92
New cards

GRE (Generic Routing Encapsulation)

The “tunnel” between two endpoints

Encapsulate traffic inside of IP

  • Two endpoints appear to be directly connected to each-other

  • No built-in encryption

93
New cards

VPNs (Virtual Private Networks)

Encrypted (private) data traversing a public network

Concentrator

  • Encryption/decryption access device

  • Often integrated into a firewall

Many deployment options

  • Specialized cryptographic hardware

  • Software-based options available

94
New cards

Site-to-site VPN

Always-on

  • Or almost always

Firewalls often act as VPN concentrators

  • Probably already have firewalls in place

95
New cards

IPSec (Internet Protocol Security)

Security for OSI Layer 3

  • Authentication and encryption for every packet

Confidentiality and integrity/anti-replay

  • Encryption and packet signing

Very standardized

  • Common to use multi-vendor implementations

Two core IPSec protocols

  • Authentication Header (AH)

  • Encapsulation Security Payload (ESP)

96
New cards

Internet Key Exchange (IKE)

Agree on encryption/decryption keys

  • Without sending the key across the network

  • Builds a Security Association (SA)

97
New cards

Phase II (IKE)

  • Coordinate ciphers and key sizes

  • Negotiate an inbound and outbound SA for IPsec

98
New cards

Phase I (IKE)

  • Use Diffie-Hellman to create a shared secret key

  • udp/500

  • ISAKMP (Internet Security Association and Key Management Protocol)

99
New cards

Authentication Header (AH)

Hash of the packet and a shared key

  • MD5, SHA-1, or SHA-2 are common

  • Adds the AH to the packet header

100
New cards

Encapsulating Security Payload (ESP)

Encrypts the packet

  • MD5, SHA-1, or SHA-2 for hash, and 3DES or AES for encryption

  • Adds a header, a trailer, and an Integrity Check Value