CompTIA Network+ (N10-009) (Concise) (Personal) (Continuously Editing)

5.0(1)
Studied by 10 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/320

flashcard set

Earn XP

Description and Tags

Personal flash cards based on what I got wrong and need to study more. I frequently edit and update them to try to get only Net+ Necessary info while being concise (15-20 words max). Terms and definitions largely based on DionTraining's Udemy exams

Last updated 2:57 AM on 4/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

321 Terms

1
New cards

Network Baseline

  • Documented measurement of normal network performance & traffic

  • Used to detect abnormalities, misconfigurations, or security incidents

2
New cards

Infrastructure (Wi-Fi Mode)

  • Uses central access point (AP/router)

  • Connects multiple devices through AP

  • Provides internet/network access

  • Opposite of ad hoc (no central device)

3
New cards

SFP Module

  • Small Form-factor Pluggable transceiver

  • Inserts into switch/router port

  • Converts electrical to optical signals

  • Requires matching TX/RX for link

4
New cards

Bluejacking

  • Bluetooth attack sending unsolicited messages

  • Targets nearby Bluetooth-enabled devices

  • Can exploit weak device configurations

5
New cards

Smurf Attack

  • DDoS using ICMP echo requests

  • Spoofed source IP = victim

  • Sent to broadcast address, amplifies traffic

6
New cards

Multiplexing

  • Combines multiple signals into one medium

  • Maximizes bandwidth utilization

7
New cards

Key Reason to Verify Voltage Requirements

  • Main goal: ensure device matches facility voltage

  • Determines if converters/regulators are needed

  • Prevents device damage from incorrect voltage

8
New cards

Console vs SSH (Direct Access Rule)

  • Console = direct, local CLI access

  • SSH = remote CLI access over network

    • Requires connection & enabled service

  • “Direct access” questions = Console

9
New cards

Band Steering

  • Router feature for dual-band Wi-Fi (2.4GHz & 5GHz)

  • Automatically assigns devices to optimal band

  • Considers:

    • Signal strength

    • Device capability

    • Congestion

  • Improves overall wireless performance & load balancing

10
New cards

Subnet Network & Broadcast Reminder

  • Every subnet has own network ID (first IP) and broadcast IP (last IP)

  • Find separate blocks by counting up from .0

11
New cards

Data Loss Prevention (DLP) System

  • Prevents unauthorized data exfiltration

  • Controls user transferring data outside the network

  • Enforces corporate data protection policies technically

12
New cards

How to Identify a Zero-Day Attack

  • Occurs despite up-to-date AV/properly configured firewall

  • Exploits unknown software vulnerability

  • Allows unauthorized access/data exfiltration

  • No patch/signatures exist

13
New cards

Secure Access Service Edge (SASE)

  • Combines WAN & security services

  • Secures access for remote users/branch offices

  • Cloud-delivered architecture

  • Includes ZTNA & firewall as service

14
New cards

Session Initiation Protocol (SIP)

  • VoIP signaling protocol

  • Initiates, maintains, terminates sessions

  • Used for voice, video, messaging

  • Ports 5060 (unencrypted), 5061 (TLS)

15
New cards

Virtual Router Redundancy Protocol (VRRP)

  • Provides gateway redundancy

  • Multiple routers share virtual IP

  • Automatic failover to backup router

  • Improves network availability

16
New cards

Data Center Voltage (Standard)

  • 208V commonly used

  • Supports efficient power delivery

  • Higher than 120V (insufficient)

  • Lower than high-voltage industrial levels

17
New cards

Unicast vs Anycast (Exam Rule)

  • “Direct request” → unicast

  • One host to one server → unicast

  • “Nearest server” → anycast

  • Shared IP across servers → anycast

  • Anycast uses unicast delivery

18
New cards

Port Address Translation (PAT)

  • Type of NAT (NAT overload)

  • Maps multiple private IPs to one public IP

  • Port numbers differentiate connections

  • Conserves public IPs

19
New cards

Network Time Security (NTS)

  • Secures NTP time synchronization

  • Provides authentication & integrity

  • Protects against replay attacks

  • Prevents timestamp tampering

20
New cards

RADIUS vs TACACS+

  • RADIUS:

    • UDP

    • Combines AAA

    • Encrypts password only

    • User access

  • TACACS+:

    • TCP

    • Separates AAA

    • Encrypts entire packet

    • Admin access

21
New cards

AAA (Authentication, Authorization, Accounting)

  • Authentication: verify identity

  • Authorization: allow actions

  • Accounting: log activity

  • Framework used by RADIUS & TACACS+

22
New cards

RADIUS

  • AAA protocol

  • Open standard

  • UDP

  • Combines authentication & authorization

  • Encrypts password only

  • Manages user access network (like Wi-Fi or VPNs)

23
New cards

TACACS+

  • Cisco AAA protocol

  • TCP

  • Separates authentication, authorization, accounting

  • Encrypts entire packet

  • Manages admin access to network devices like routers & switches

24
New cards

Business Continuity Plan (BCP)

  • Maintains business operations

  • Covers before, during, after disaster

  • Focus on long-term continuity

25
New cards

Disaster Recovery Plan (DRP)

  • Restores systems after disaster

  • Focus on IT infrastructure recovery

  • Short-term recovery actions

26
New cards

Incident Response Plan (IRP)

  • Responds to security incidents

  • Defines detection and containment steps

  • Focus on immediate threats

27
New cards

Risk Management Plan

  • Identifies and assesses risks

  • Defines mitigation strategies

  • Focus on risk reduction

28
New cards

Cisco Discovery Protocol (CDP)

  • Layer 2 Cisco protocol

  • Discovers, identifies, & manages directly connected devices

  • Shares device & interface info

  • Used for neighbor discovery

29
New cards

CDP vs LLDP

  • CDP: Cisco only

  • LLDP: vendor-neutral

  • Both discover neighbors

  • Operate at Layer 2

30
New cards

Active Port

  • Port is enabled and operational

  • Passing network traffic

  • Shows link/activity

31
New cards

Disabled Port

  • Administratively shut down

  • Manually configured off

  • No traffic allowed

32
New cards

Blocked Port

  • Prevented from forwarding traffic

  • Used by STP to avoid loops

  • Still enabled but not forwarding

33
New cards

Suspended Port

  • Not operational due to misconfiguration

  • VLAN mismatch or invalid config

  • Does not pass traffic

34
New cards

Ping vs Traceroute

  • Ping: reachability & RTT

  • Traceroute: path & hops

  • Ping uses echo request/reply

  • Traceroute uses TTL + ICMP errors

35
New cards

Ping

  • Tests host reachability

  • Measures round-trip time (RTT)

  • Uses ICMP echo request/reply

  • Does not show path

36
New cards

Traceroute/Tracert

  • Shows path to destination

  • Identifies each hop/router

  • Uses TTL (Time-to-Live) expiration

  • Receives ICMP time exceeded messages

37
New cards

ICMP Echo

  • Echo Request = ping sent to host

  • Echo Reply = response from host

  • Used to test reachability

  • Basis of ping/ping sweeps

38
New cards

Ping Sweep

  • Sends ICMP echo requests to multiple IPs

  • Echo replies identify live hosts

  • Network reconnaissance tool

  • Mitigation: block ICMP traffic (requests/replies)

39
New cards

Anomaly-Based Alerting (Disadvantage)

  • High false positive rate

    • Can waste time on non-threats

  • Requires tuning & baseline refinement

40
New cards

Network Security Group (NSG)

  • Filters network traffic to/from resources

  • Uses rules (IP, port, protocol)

  • Applied to VMs & subnets

  • Acts like cloud firewall

41
New cards

Multihoming (multiple ISPs)

  • Network connected to multiple ISPs

  • Provides redundancy & failover

  • Can use BGP for route control

  • Improves availability of WAN connectivity

42
New cards

Verbose Trap

  • SNMP trap with multiple OIDs & values

  • Sends full device/event details

  • Uses more bandwidth

  • Provides comprehensive information

43
New cards

Granular Trap

  • SNMP trap with single OID & value

  • Sends specific event detail only

  • Uses less bandwidth

  • Limited information compared to verbose trap

44
New cards

SNMP Trap

  • Asynchronous alert from SNMP agent

  • Sent to SNMP manager

  • Indicates event or status change

  • Uses UDP port 162

45
New cards

MIB (Management Information Base)

  • Used in SNMP

  • Database of managed device objects

  • Hierarchical structure

  • Maps OIDs to readable names

46
New cards

OID (Object Identifier)

  • Unique ID for SNMP variable

  • Used to identify/manage device data

  • Organized in hierarchical tree

47
New cards

Dedicated Leased Line

  • Private WAN connection between sites

  • Dedicated bandwidth (not shared)

  • Low latency & high reliability

  • Common for site-to-site connectivity

48
New cards

Duplex Mismatch

  • Devices use different duplex settings

  • One full-duplex, one half-duplex

  • Causes collisions & CRC errors

  • Often appears under high traffic

49
New cards

DSCP (Differentiated Services Code Point)

  • QoS marking in IP header

  • Operates at OSI Layer 3

  • Used to prioritize & classify network traffic

50
New cards

CoS (Class of Service)

  • QoS marking in Ethernet frame (layer 2)

  • Classifies/Prioritizes traffic

  • Ensuring QoS for VoIP/video/data

  • Uses 802.1Q VLAN tag priority

51
New cards

VXLAN VLAN scalability solution

  • Uses 24-bit VXLAN Network Identifier (VNI)

  • ~16 million segments

  • VLANs (12 bit) limited to 4096

52
New cards

Data Center Interconnect (DCI)

  • Connects data centers together

  • Enables

    • Workload mobility

    • Replication

  • Shares resources

  • Synchronizes data

  • Best implemented with VXLANs

53
New cards

Default Route

  • Used when destination not in routing table

  • Sends traffic to default gateway (next-hop router)

  • Typically toward internet

  • IPv4: 0.0.0.0/0

  • IPv6: ::/0

54
New cards

Missing or Misconfigured Default Route (Symptoms)

  • Local subnet communication works

  • Other internal networks may work

  • Internet access fails

  • No route for unknown destinations

55
New cards

Fibre Channel (FC)

  • High-speed storage networking technology

  • Use:

    • Storage Area Networks (SANs)

  • Connects servers to storage devices

  • Reliable, low-latency data transfer

56
New cards

Ad Hoc vs Mesh Wireless Networks

  • Ad Hoc:

    • Peer-to-peer

    • Direct communication only

  • Mesh:

    • Nodes

      • Interconnect with multiple nodes

      • Relay traffic for other nodes (multi-hop routing)

57
New cards

Ad Hoc wireless network

  • Peer-to-peer wireless network

  • Direct connect between devices

  • No access point/central controller

  • Supports multiple participating devices

58
New cards

Routing Convergence Time

  • Time required for routers to agree on best paths after a topology change

    • Or the network state of convergence

59
New cards

NIDS (Network Intrusion Detection System)

  • Monitors network traffic

  • Detects:

    • Suspicious activity

    • Potential attacks

    • Policy violations

  • Alerts but doesn’t block traffic

  • Uses signatures/anomaly detection

60
New cards

Best Remediation Methods for Embedded ICS (Network-Based Compromise)

  • Segmentation (isolates ICS from main network)

  • Disable unused services (reduces attack surface)

  • Bad: Patching often ineffective (ICS updates rare/unavailable)

61
New cards

Disabling Unused Services (ICS Security)

  • Reduces exposed attack surface

  • Many ICS devices run unnecessary default services

  • Disabling limits compromise paths

62
New cards

Network Segmentation (ICS Security)

  • Isolates ICS devices from main network

  • Limits attacker lateral movement

  • Reduces exposure to network-based attacks

  • Common ICS protection strategy

63
New cards

Industrial Control System (ICS)

  • Used in manufacturing, utilities, & infrastructure

  • Often embedded devices with specialized software

  • Frequently difficult to patch/update

64
New cards

Route Poisoning

  • Distance-vector loop prevention method

  • Failed route advertised with infinite metric

  • Marks route as unreachable

  • Propagates failure information to neighbors

65
New cards

Hold-Down Timer

  • Prevents route updates for a period

  • Activated after route failure detected

  • Allows network time to converge

  • Helps prevent routing loops

66
New cards

Unicast (IP Communication)

  • One sender, one receiver

  • Standard host-to-host communication

  • Supported in IPv4 & IPv6

67
New cards

Multicast (IP Communication)

  • One sender, multiple specific receivers

  • Devices join multicast group

  • Supported in IPv4 & IPv6

68
New cards

Broadcast (IP Communication)

  • One sender, all devices on network segment

  • Used in IPv4 networks

  • Not used in IPv6

69
New cards

Anycast (IPv6 Communication)

  • One sender, nearest receiver in group

  • Multiple devices share same address

  • Router delivers packet to logically closest destination

  • Used in IPv6

70
New cards

Tx and Rx (Fiber Optics)

  • Tx (Transmit): sends optical signal

  • Rx (Receive): receives optical signal

  • Fiber links often require two separate fibers (transmit & receive)

71
New cards

ST Connector (Straight Tip)

  • Fiber connector

  • Bayonet twist-lock

  • Separate connectors for Tx & Rx

  • Common in LAN fiber installations

72
New cards

MT-RJ Connector

  • Duplex fiber connector

  • Single connector/ferrule housing Tx & Rx fibers

  • Common on switches & network devices

  • Similar size to RJ-45

73
New cards

Forward DNS Zone

  • Maps domain names to IP addresses

  • Used for normal DNS name resolution

  • Example: example.com → 192.168.1.10

74
New cards

Reverse DNS Zone

  • Maps IP addresses to domain names

  • Used for reverse lookups

  • Uses PTR records

75
New cards

Primary DNS Zone

  • Read-write DNS zone

  • Stores original DNS records

  • Accepts direct updates

76
New cards

Secondary DNS Zone

  • Read-only copy of primary zone

  • Obtained through zone transfer

  • Provides redundancy and load distribution

77
New cards

Authoritative DNS Zone

  • DNS server has authority to manage DNS records for specific domain

78
New cards

Port Security

  • Limits what devices can connect to switch interface/port

  • Based on MAC addresses

  • Disables port/sends alert if unknown device connected

79
New cards

Sticky MAC/Persistent MAC

  • Port security feature on switches

  • Enables interface to permanently retain dynamically learned MAC addresses

  • Locks authorized devices to specific ports

80
New cards

Port Mirroring/SPAN (Switched Port Analyzer)/Traffic mirroring

  • Switch duplicates traffic from source port(s)/VLANs

    • Copies to monitoring port

  • Use:

    • Packet capture

    • Traffic analysis

  • Original traffic flow unaffected

81
New cards

Spectrum Analyzer

  • Analyzes signal frequency spectrum

  • Used for RF troubleshooting

  • Identifies interference sources

  • Not used for fiber break detection

82
New cards

Optical Time Domain Reflectometer (OTDR)

  • Sends light pulses through fiber

  • Measures reflected signal loss

  • Calculates fault distance

  • Tests overall fiber integrity

83
New cards

Visual Fault Locator (VFL)

  • Uses visible laser light

  • Identifies fiber breaks

  • Detects sharp bends and micro-bends

  • Pinpoints fault location visually

84
New cards

802.1X

  • Network access control framework

  • Uses WPA-Enterprise

  • Uses EAP for authentication

  • Communicates with RADIUS

  • Authenticates users, not shared keys

85
New cards

EAP (Extensible Authentication Protocol)

  • Authentication framework

  • Used within 802.1X

  • Supports multiple authentication methods

  • Used in WPA-Enterprise environments

86
New cards

EAP-TTLS

  • EAP method using tunneled TLS

  • Creates encrypted tunnel first

  • Client authenticates inside tunnel

  • Often uses username/password

87
New cards

MSCHAPv2

  • Password-based authentication protocol

  • Often used inside EAP methods

  • Provides mutual authentication

  • Used with 802.1X environments

88
New cards

Central Repository (IaC)

  • Shared storage for configuration files

  • Enables team collaboration

  • Supports version control (e.g., Git)

  • Single source of truth

89
New cards

Configuration Management (IaC)

  • Maintains systems in desired state

  • Automates configuration enforcement

  • Detects & remediates drift

  • Manages updates across infrastructure

90
New cards

Continuous Integration (CI)

  • Automatically integrates code changes

  • Runs automated tests on commits

  • Validates changes before deployment

  • Uses shared repository workflow

91
New cards

Template-Based Configuration (IaC)

  • Uses predefined configuration templates

  • Standardizes infrastructure deployment

  • Reduces manual configuration errors

  • Promotes repeatability

92
New cards

Three-Tier Network Model

  • Each layer has own features & functionality

  • Improves scalability, reliability, & performance

  • Layers:

    • Access

    • Distribution

    • Core

93
New cards

Access Layer of 3 tier model

  • End-user connectivity

  • Controls access to network resources

  • Layer 2 switching

94
New cards

Distribution Layer of 3 tier model

  • Communication point between access & core layer

  • Routes

  • Filters traffic

  • WAN access

  • Controls access between segments

95
New cards

Core Layer of 3 tier model

  • High-speed network backbone

  • Fast packet switching

  • Provides interconnectivity between distribution layer devices

96
New cards

Rollover Cable Pinout

  • Used for PC to (e.g. router) console connections

  • Completely reversed pinout:

    • 1 → 8

    • 2 → 7

    • 3 → 6

    • 4 → 5

    • 5 → 4

    • 6 → 3

    • 7 → 2

    • 8 → 1

97
New cards

Patch Cable (Straight-Through) Pinout

  • 1 → 1

  • 2 → 2

  • 3 → 3

  • 4 → 4

  • 5 → 5

  • 6 → 6

  • 7 → 7

  • 8 → 8

T568A or T568B on both ends

98
New cards

Crossover Cable Pinout

  • Pinout crosses transmit/receive pairs:

    • 1 → 3

    • 2 → 6

    • 3 → 1

    • 6 → 2

  • 4,5,7,8 stay the same

  • One end T568A, other end T568B

99
New cards

NS (Name Server) record

  • Specifies authoritative DNS servers for a domain

  • indicates which servers are responsible for resolving that domain’s DNS records

100
New cards

TXT record

  • Stores text in DNS

  • Commonly used for SPF, DKIM, & domain verification

  • Enhances email security & ownership validation