Comptia Net+ - Module 1

0.0(0)
studied byStudied by 1 person
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

flashcard set

Earn XP

Description and Tags

from textbook

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

What is a Network?

A group of computers and other devices (like printers) that are connected by some type of transmission media. From 2 computers connected by a cable to the Internet with billions of computers and devices.

2
New cards

Compare physical topology and logical topology

Physical topology refers to a networks hardware and how computers, other devices, cables and radio signals work together to form the physical network,

while logical topology refers to how the software controls access to network resources (including how users/software’s initially gain access to network) and how those resources (applications and databases) are shared on the network

3
New cards

Compare the differences between a client-server network model and a peer-to-peer network model.

in a client-server network, the security, access, and resources are managed by 1 or more network operating systems (NOS) as long as they have similar NOS’s installed

in a peer-to-peer network model, the administration, resources, and security are managed by each host/node in the peer-to-peer network

4
New cards

What are the pros and cons of using peer-to-peer networks?

Pros

  • simple to configure and usually cheaper to set up and maintain than other types of networks

Cons

  • not scalable or practical when the network has more than 15 computers (hosts) and not secure enough

5
New cards

In a Windows domain, what is the role of AD (active directory)?

to be the centralized directory database that contains user account information and security for the entire group of computers.

6
New cards

What process does AD DS (active directory domain services) manage?

AD DS manages the process where each user that has their own domain-level account that is assigned by the network admin, from a local account to Microsoft account that gets its’ resources with Microsoft cloud, can sign into any computer on the network to get access to resources the AD allows.

7
New cards

What is the NOS (network operating system) responsible for?

(examples are windows server 2019, Ubuntu server, or red hat enterprise Linux)

  • managing data and other resources for clients

  • ensuring that only authorized users access the network

  • controlling what types of files a user can open and read

  • restricting when and from where users can access the network

  • dictating which rules computers will use to communicate

  • in some situations, supplying applications and data files to clients

8
New cards

Even though servers that have NOS require more memory, processing power and storage capacity in a client-server network, what are the advantages it has over peer-to-peer?

  • user accounts and passwords to the network are assigned in one place

  • access to multiple shared resources (data files or printers) can be centrally granted to a single user or group of users

  • problems on the network can be monitored, diagnosed, and often fixed from one location

  • client-server networks are more scalable than p2p networks and is easier to add users and devices to a client-server network

9
New cards

What are the aka’s of client-server network models?

  • client-server architecture

  • client-server topology

10
New cards

Which of the following is part of a network’s physical topology?

a) a networks server’s operating system

b) a printer plugged into a nearby desktop computer

c) password for the wireless network

d) file permission settings on a desktop computer

b) a printer plugged into a nearby desktop computer

11
New cards

Which of the following is an advantage of P2P file sharing?

a) scalable

b) centrally controlled

c) secure

d) inexpensive

d) inexpensive

12
New cards

What group must clients join to access network resources in a client-server network?

a) work group

b) domain

c) peer group

d) RAID

b) domain

13
New cards

Which of the following is a secure protocol?

a) FTP

b) HTTP

c) Telnet

d) SSH

d) SSH

14
New cards

What is an example of an open source DBMS

a) MySQL

b) Microsoft SQL Server

c) TCP/IP suite

d) oracle database

a) MySQL

15
New cards

Which of these protocols could not be used to access a server in a nearby building?

a) Telnet

b) RDP

c) TLS

d) SSH

c) TLS

16
New cards

When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?

a) bus topology

b) mesh topology

c) star topology

d) ring topology

c) star topology

17
New cards

Which networking device is best for connecting your network printer to three computers?

a) switch

b) hub

c) router

d) file server

a) switch

18
New cards

Which network types can your smartphone use?

a) WAN

b) LAN

c) PAN

d) WAN & LAN

e) WAN, LAN & PAN

e) WAN, LAN & PAN

19
New cards

At what OSI layer does your browser’s web page request its journey through the OSI layers?

a) application layer

b) network layer

c) data link layer

d) physical layer

a) application layer

20
New cards

Which layer hold the address of the target application running on the destination computer?

a) application layer

b) transport layer

c) network layer

d) data link layer

b) transport layer

21
New cards

Which OSI layer adds both a header and a trailer?

a) transport layer

b) network layer

c) data link layer

d) physical layer

c) data link layer

22
New cards

Which fire suppression level provides the most targeted protection?

a) desk level

b) rack lever

c) building level

d) room level

b) rack lever

23
New cards

What is the minimum amount of ESD required to damage sensitive electronic equipment?

a) 1,500 volts

b) 800 volts

c) 10 volts

d) 2 volts

c) 10 volts

24
New cards

What should you do after making a plan to solve a problem and carry out your plan?

a) document your work

b) find out what has recently changed

c) test your theory

d) verify functionality

d) verify functionality

25
New cards

While exploring the problem and developing a theory about the cause, where can you go to get information on similar problems your coworkers have faced in the past?

a) safety data sheet

b) knowledge base

c) troubleshooting ticket in the call tracking system

d) instruction manual

b) knowledge base

26
New cards

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?

a) HTTPS

b) TLS

c) HTTP

d) SSL

a) HTTPS

27
New cards

Which 2 encryption protocols might be used to provide secure transmissions for email services?

a) http and https

b) ssl and tls

c) ftp and sftp

d) ssh and rdp

b) ssl and tls

28
New cards

Which of the following applications could be used to run a website from a server?

a) hypertext transfer protocol

b) filezilla

c) microsoft exchange server

d) nginx

d) nginx

29
New cards

As you’re working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you’re having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?

a) identify the problem

b) test the theory to determine the cause

c) establish a plan of action to resolve the problem and identify potential effects

d) document findings, actions, outcomes, and lessons learned

a) identify the problem

30
New cards

In the event of a fire, the most appropriate failure policy is a ______ policy

a) power-off

b) fail-close

c) fail-open

d) shutdown

c) fail-open

31
New cards

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?

a) hub-and -spoke

b) ring

c) hybrid

d) peer-to-peer

d) peer-to-peer

32
New cards

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

a) client-server

b) mesh

c) hub-and-spoke

d) star

d) star

33
New cards

You need to access customer records in a database as you’re planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?

a) ftp

b) sql

c) smtp

d) tls

b) sql

34
New cards

Which of the following is an application layer protocol?

a) ip

b) rdp

c) tcp

d) apache

b) rdp

35
New cards

What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?

active directory

36
New cards

What is the fundamental distinction between a layer 2 switch and a router?

a layer 2 switch belongs only to its local network,

and router belongs to 2 or more networks

37
New cards

What is the fundamental distinction between a node and a host?

a host is an endpoint device that hosts or accesses a resource on the network,

and a node is any computer or device that can be addressed on the network

38
New cards

What is the fundamental distinction between a MAN and a WAN?

MAN covers smaller, more defined geographical area,

and a WAN covers a large geographical area

39
New cards

List 2 protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?

TCP (transmission control protocol) and UDP (user datagram protocol)

the port addresses the receiving application

40
New cards

At the network layer, which type of address is used to identify the receiving host?

ip address

41
New cards

At the data link layer, which type of network address is used to identify the receiving node?

physical address, MAC address, hardware address, or data link layer address

42
New cards

A computer is unable to access the network. When you check the LED lights near the computer’s network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?

physical

the data link layer and physical layer

43
New cards

A user complains that their computer cannot access email, although the computer can access websites. At which layer of the OSI model should you begin troubleshooting this problem and why?

application layer because all email protocols (smtp, pop3, imap4) function at this layer

44
New cards

While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won’t even solve the problem. What should you do next in the troubleshooting process?

escalate the problem