CompTIA Network+ N10-009 Last Minute Cram Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/376

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

377 Terms

1
New cards

OSI Reference Model

A conceptual framework used to understand network interactions in seven layers.

2
New cards

Networking Appliances

Devices used in a network to manage, direct, and facilitate communication.

3
New cards

Cloud Concepts

The principles and technologies that enable the delivery of computing services over the internet.

4
New cards

Common Ports

Standardized communication endpoints used by various protocols in networking.

5
New cards

Transmission Media

The physical pathways through which data is transmitted in a network.

6
New cards

Network Topologies

The arrangement of different elements (links, nodes, etc.) in a computer network.

7
New cards

IPv4 Network Addressing

The method of assigning unique identifiers to devices on a network using 32-bit addresses.

8
New cards

Routing Technologies

Methods and devices used to determine the best path for data to travel across a network.

9
New cards

Switching Technologies

Techniques used to direct data packets between devices on the same network.

10
New cards

Wireless Devices

Devices that connect to a network without physical cables, using radio waves or infrared signals.

11
New cards

Disaster Recovery Concepts

Strategies and processes for recovering from network failures or disasters.

12
New cards

Network Security Concepts

Fundamental principles aimed at protecting network integrity, confidentiality, and availability.

13
New cards

Types of Attacks

Various methods used by malicious actors to compromise network security.

14
New cards

Network Security Features

Tools and techniques implemented to safeguard networks against threats.

15
New cards

Open Systems Interconnection (OSI) Model

A conceptual framework used to understand network interactions in seven layers.

16
New cards

Layer 1 - Physical

Responsible for the physical transmission of data over network media, dealing with hardware aspects including cables and switches.

17
New cards

Layer 2 - Data Link

Responsible for node-to-node data transfer and error detection and correction in the physical layer.

18
New cards

Media Access Control (MAC) layer

A sublayer of the Data Link Layer that manages protocol access to the physical network medium.

19
New cards

Logical Link Control (LLC) layer

The upper sublayer of the Data Link Layer that provides multiplexing mechanisms for multiple network protocols to coexist.

20
New cards

Layer 3 - Network

Responsible for logical addressing and routing of packets across different networks.

21
New cards

Layer 4 - Transport

Responsible for providing reliable, transparent transfer of data between end systems.

22
New cards

Framing of data packets

The process handled by the Data Link Layer that includes addressing.

23
New cards

Routing protocols

Protocols that determine the best path for data transmission from the source to the destination.

24
New cards

Packet forwarding

The management of routing through intermediate routers in the Network Layer.

25
New cards

Error correction

Mechanisms in the Transport Layer that ensure complete data transfer.

26
New cards

Flow control

A mechanism in the Transport Layer that manages the rate of data transmission.

27
New cards

Segmentation/de-segmentation of data

Processes in the Transport Layer that break down and reassemble data for transmission.

28
New cards

Interoperability

The ability to work across diverse network technologies and protocols facilitated by the OSI model.

29
New cards

Standardization

The establishment of common standards for devices and media to connect and transmit raw bits.

30
New cards

Network congestion

A condition in the Network Layer where the demand for network resources exceeds the available capacity.

31
New cards

Packet filtering

The process of controlling the flow of packets based on predetermined security rules.

32
New cards

Physical Layer

The OSI model layer that defines the standards for devices and media to connect and transmit raw bits.

33
New cards

Data Link Layer

The OSI model layer that establishes, maintains, and terminates connections between two physically connected devices.

34
New cards

Network Layer

The OSI model layer that manages packet forwarding and routing through different networks.

35
New cards

Transport Layer

The OSI model layer responsible for reliable data transfer and error correction.

36
New cards

Layer 5 - Session

The OSI model's Layer 5, known as the Session Layer, manages the setup, maintenance, and termination of sessions between presentation layer entities.

37
New cards

Session Layer

This layer establishes, manages, and terminates the connections between the local and remote applications.

38
New cards

Session Layer Functions

It provides mechanisms for controlling the dialog between the two end systems, either half-duplex or full-duplex.

39
New cards

Layer 6 - Presentation

The OSI model's Layer 6, known as the Presentation Layer, is responsible for the translation, encryption, and compression of data between the application and network formats.

40
New cards

Presentation Layer

This layer ensures that data is presented in a usable format and mediates between the data formats and protocols used by the network and the applications.

41
New cards

Presentation Layer Functions

It acts as a translator, providing data encryption and compression services to ensure secure and efficient data transfer.

42
New cards

Layer 7 - Application

The OSI model's Layer 7, known as the Application Layer, serves as the interface between the user and the network services.

43
New cards

Application Layer

This layer facilitates the end-user processes and applications to access network services.

44
New cards

Application Layer Protocols

It defines protocols for various network services like file transfers, email, and web browsing, ensuring seamless communication between software applications and the network.

45
New cards

Physical Appliances

Physical appliances are dedicated hardware devices focused on specific network functions, offering high performance and reliability but at a higher cost and with space requirements.

46
New cards

Virtual Appliances

Virtual appliances are software-based solutions that run on virtual machines, providing similar functionalities with greater flexibility, scalability, and cost efficiency, but potentially at the expense of raw performance.

47
New cards

Router

A router operates at the network layer of the OSI model, directing data packets between different networks based on IP addresses.

48
New cards

Router Functions

Routers use routing tables to determine the best path for forwarding packets to their destination, connecting multiple networks together, such as a local network to the Internet.

49
New cards

Router Security Features

Routers also provide network security features like firewalls and VPN support.

50
New cards

Layer 2 Switch

A Layer 2 switch operates at the data link layer of the OSI model, forwarding data based on MAC addresses.

51
New cards

Layer 2 Switch Functions

It creates separate collision domains for each port, improving network efficiency by reducing collisions.

52
New cards

Layer 2 Switch Usage

Layer 2 switches are used to connect devices within the same network or VLAN.

53
New cards

Layer 3 Capable Switch

A Layer 3 capable switch, also known as a multilayer switch, operates at both the data link layer and the network layer.

54
New cards

Layer 3 Switch Functions

It can perform routing functions, forwarding data based on IP addresses, in addition to switching functions.

55
New cards

Layer 3 Switch Benefits

This enables the switch to interconnect different subnets or VLANs within the same device, facilitating efficient network segmentation and routing.

56
New cards

Firewall

A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

57
New cards

Firewall Purpose

Firewalls are crucial for establishing a barrier between secure internal networks and untrusted external networks, such as the internet, and can be hardware-based, software-based, or a combination of both.

58
New cards

IPS/IDS Device

An IPS/IDS device monitors network and/or system activities for malicious activities or policy violations.

59
New cards

IDS vs IPS

An IDS passively monitors and alerts system administrators of suspicious activity, whereas an IPS actively blocks or prevents such activities based on detected anomalies, signatures, and policies to protect the network from threats.

60
New cards

Load Balancer

A load balancer distributes incoming network traffic across multiple servers to ensure no single server becomes overwhelmed, improving the reliability and availability of applications.

61
New cards

Proxy Server

A proxy server acts as an intermediary between a user's device and the internet, receiving requests from clients, forwarding them to the relevant server, and returning the server's response to the client.

62
New cards

Network-Attached Storage

NAS is a dedicated file storage device connected to a network, allowing multiple users and client devices to retrieve and store data from a centralized location.

63
New cards

Storage Area Network (SAN)

A Storage Area Network (SAN) is a dedicated, high-speed network that provides access to consolidated, block-level data storage.

64
New cards

Access Point

An access point (AP) is a networking device that allows wireless devices to connect to a wired network using Wi-Fi or related standards.

65
New cards

Wireless LAN Controller (WLC)

A Wireless LAN Controller manages wireless access points in a network, centralizing control of the wireless LAN (WLAN).

66
New cards

Content Delivery Network (CDN)

A globally distributed network of proxy servers and data centers designed to deliver internet content rapidly to users.

67
New cards

Virtual Private Network (VPN)

A Virtual Private Network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such as the internet.

68
New cards

Quality of Service (QoS)

Quality of Service (QoS) refers to the set of technologies and policies used to manage and prioritize network traffic to ensure the performance of critical applications and services.

69
New cards

Time to Live (TTL)

Time to Live (TTL) is a field in the header of IP packets that specifies the maximum time or number of hops a packet is allowed to traverse before being discarded by a router.

70
New cards

Network Traffic Optimization

Load balancers make decisions based on IP addresses, TCP/UDP ports, or application-level content to optimize resource use, maximize throughput, minimize response time, and avoid overload of any single resource.

71
New cards

Content Caching

Proxy servers can provide additional functionality such as content caching, access control, and filtering, enhancing security and performance.

72
New cards

File-Based Protocols

NAS systems support a variety of file-based protocols such as NFS, SMB/CIFS, and AFP.

73
New cards

Data Management

SANs are designed to handle large volumes of data transfers, improving the availability and performance of applications by offloading storage functions and direct access to multiple storage devices.

74
New cards

Wireless Coverage Extension

APs extend the wireless coverage of a network and can manage multiple connections simultaneously, providing network access to wireless devices within their range.

75
New cards

Wireless Network Management

WLCs simplify the deployment and management of wireless networks, including configuration, security policies, and managing guest access.

76
New cards

Latency Reduction

CDNs cache content like web pages, videos, and images in multiple locations around the world to reduce latency and improve access speed for users regardless of their location.

77
New cards

Secure Data Transmission

VPNs are used to establish secure connections between remote users or remote sites and an organization's private network.

78
New cards

Traffic Prioritization

QoS assigns different priorities to different types of traffic, ensuring that essential services like voice and video communications are given higher priority over less critical data.

79
New cards

User Experience Enhancement

QoS helps in reducing latency, jitter, and packet loss, enhancing the overall user experience in networks with limited bandwidth.

80
New cards

TTL

Helps prevent packets from looping indefinitely in the network, with each router decrementing the TTL value by one until it reaches zero, at which point the packet is dropped.

81
New cards

Network Functions Virtualization (NFV)

Involves the decoupling of network functions from hardware devices and running them as software instances on virtual machines or containers.

82
New cards

NFV in Cloud Computing

Allows for flexible deployment and management of networking services like firewalls, load balancers, and intrusion detection systems.

83
New cards

Benefits of NFV

Reduces the need for dedicated hardware and enables dynamic scaling and management, which enhances resource utilization and reduces costs.

84
New cards

Virtual Private Cloud (VPC)

An isolated network space within a public cloud designed to provide a similar level of segmentation, control, and security as a private data center.

85
New cards

VPC User Control

Users can define their own IP address range, configure subnets, route tables, and network gateways.

86
New cards

Network Security Groups

Used to control inbound and outbound traffic to cloud resources within a VPC.

87
New cards

Function of Network Security Groups

Act as a virtual firewall for associated instances to control traffic based on rules that specify allowed or denied ports, protocols, and source/destination IP addresses.

88
New cards

Network Security Lists

Used for managing and securing network traffic in a cloud environment, providing stateful or stateless traffic filtering on a subnet level.

89
New cards

Cloud Gateways

Serve as intermediary devices or services that connect cloud environments with different networks, including private data centers or other cloud services.

90
New cards

Function of Cloud Gateways

Facilitate communication, data transfer, and management between disparate environments, ensuring secure and efficient access to cloud resources.

91
New cards

Internet Gateway

Serves as a bridge between a company's VPC and the internet, enabling internet access for the resources within the VPC.

92
New cards

NAT Gateway

Allows instances in a private subnet to connect to the internet while preventing the internet from initiating a connection with those instances.

93
New cards

Purpose of NAT Gateway

Crucial for instances that require outbound internet access but do not need inbound internet connections.

94
New cards

Cloud Connectivity Options

Refer to the various methods through which data and applications can connect to and interact with cloud environments.

95
New cards

VPN Usage

Used to establish secure connections between remote users or remote sites and an organization's private network.

96
New cards

Private-Direct Connection to Cloud Provider

A dedicated network link between an organization's on-premises infrastructure and a cloud service provider's data center.

97
New cards

Direct Connection

This direct connection bypasses the public internet, offering more reliable, secure, and faster connectivity for accessing cloud services.

98
New cards

Deployment Models

Deployment models in networking and cloud computing refer to the specific configurations and environments in which technology services and infrastructure are implemented.

99
New cards

Public Deployment Model

A public deployment model provides services over the Internet to multiple customers or the general public, where infrastructure and resources are owned and operated by the service provider.

100
New cards

Private Deployment Model

A private deployment model is dedicated to a single organization and can be hosted on-premises or by a third-party provider.