CompTIA A+ Core 1 | Domain 2.0: Networking

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/2468

flashcard set

Earn XP

Description and Tags

2.1 Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes. 2.2 Compare and contrast common networking hardware. 2.3 Compare and contrast protocols for wireless networking. 2.4 Summarize services provided by networked hosts. 2.5 Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks. 2.6 Compare and contrast common network configuration concepts. 2.7 Compare and contrast Internet connection types, network types, and their features. 2.8 Given a scenario, use networking tools.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

2469 Terms

1
New cards

FTP Port Number

TCP 20, 21

2
New cards

SSH (Secure Shell)

Cryptographic network protocol for operating network services securely over an unsecured network.

3
New cards

SSH Port Number

TCP 22

4
New cards

Telnet

A network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines

5
New cards

Telnet port

TCP 23

6
New cards

True or False: Telnet is not encrypted.

True

7
New cards

DNS (Domain Name System)

Convert name in browsers into something for the network such as an IP address.

8
New cards

DNS port number

UDP/TCP 53

9
New cards

HTTP (Hypertext Transfer Protocol)

Protocol for how computers and servers communicate; Used to display webpages

10
New cards

HTTPS (Hypertext Transfer Protocol Secure)

An encrypted version of HTTP.

11
New cards

HTTP Port Number

TCP 80

12
New cards

HTTPS port number

TCP 443

13
New cards

RDP (Remote Desktop Protocol)

Share a desktop screen from a remote location. On many Windows versions. Can connect to an entire desktop or just an application.

14
New cards

RDP port number

TCP 3389

15
New cards

SMB (Server Message Block)

Protocol used by Microsoft windows. Used to transfer files or share printers between windows systems.Allows for direct SMB communication over IP protocol

16
New cards

SMB Also Known As

CIFS (Common Internet File System)

17
New cards

NetBIOS (Network Basic Input/Output System)

Older version of windows that use this inside of a UDP or TCP packet to transfer files or share printers between windows

18
New cards

NetBIOS Port Number

UDP 137, 138 TCP 139

19
New cards

SMB Port Number

TCP 445

20
New cards

AFP (Apple Filing Protocol)

Apple's version of Window's SMB.

21
New cards

AFP Port Number

TCP 548 (used for file services)

22
New cards

DHCP (Dynamic Host Configuration Protocol)

Automated configuration of IP Address, subnet mask, and other options.

23
New cards

DHCP Port Number

UDP 67, 68

24
New cards

LDAP (Lightweight Directory Access Protocol)

Store and retrieve info in a network directory.

25
New cards

LDAP Port Number

TCP 389

26
New cards

SNMP (Simple Network Management Protocol)

Gathers statistics from network devices.
- v1 uses structured tables in non-encrypted form.
- v2 allowed for bulk transfer of data and also in clear text.
- v3 provides message authentication, integrity and encryption

27
New cards

SNMP Port Number

UDP 161, 162

28
New cards

TCP (Transmission Control Protocol)

A protocol that has a formal process when you start the communication and a formal process when you end the communication. Guaranteed delivery of each packet

29
New cards

UDP (User Datagram Protocol)

Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism.

30
New cards

TCP & UDP Ports

-can be any number between 0-65,535
-most servers use non-ephemeral port numbers (isn't always the case)
-port numbers are for communication, not security
-service port numbers need to be well known

31
New cards

TCP Handshakes

SYN, SYN/ACK, ACK

32
New cards

TCP Flow Control

Receiver controls sender, so sender won't overflow receiver's buffer by transmitting too much, too fast

33
New cards

FTPS (File Transfer Protocol Secure)

An extension of FTP that uses SSL or TLS encrypt FTP traffic.

34
New cards

FTPS Ports

TCP 989 & 990

35
New cards

DHCP Also Known As

bootp, or Bootstrap Protocol

36
New cards

DHCP process (DORA)

Discover, Offer, Request, Acknowledge

37
New cards

OSI Layer 4

The Transport layer breaks data down into manageable chunks. TCP & UDP operate at the Transport layer.

38
New cards

Ethernet Frame

A term referring to an Ethernet data link header and trailer, plus the data encapsulated between the header and trailer.

39
New cards

Non-ephemeral ports

Permanent ports / well known. Usually on a server or service.
0 - 1023

40
New cards

Ephemeral ports

Temporary ports used in real time by clients. 1024-65,535.

41
New cards

SLP (Service Location Protocol)

A protocol used by Apple Filing Protocol (AFP) to view the list of available devices.

42
New cards

SLP (Service Location Protocol) Port

TCP & UDP 427 (list of available devices)

43
New cards

DoD Model

Process/Application layer, Host-to-Host layer, Internet layer, Network Access layer

44
New cards

What protocols in the TCP/IP suite operate at the process/application layer of the DoD model?

Telnet, FTP, LPD, SNMP, TFTP, SMTP, NFS, HTTP

45
New cards

Internet Layer Protocols

Internet Protocol (IP), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP), Reverse Address Resolution Protocol (RARP), Proxy ARP

46
New cards

ICMP (Internet Control Message Protocol)

A core protocol in the TCP/IP suite that notifies the sender that something has gone wrong in the transmission process and that packets were not delivered.

47
New cards

Address Resolution Protocol (ARP)

Part of the TCP/IP protocol for determining the MAC address based on the IP address.

48
New cards

RARP (Reverse Address Resolution Protocol)

Resolves MAC addresses to IP addresses

49
New cards

TCP vs UDP

TCP is a connection oriented protocol where UDP isn't. TCP is suitable for connections the require high reliability and transmission time is less critical. TCP establishes a connection with counterpart where UDP doesn't have any guarantee that the packets sent made it to the destination. TCP uses error checking, where UDP does not. TCP uses sequencing (putting frames in the right order) where UDP does not.

50
New cards

FTP (File Transfer Protocol)

20, 21

51
New cards

SSH (Secure Shell)

22

52
New cards

Telnet

23

53
New cards

SMTP (Simple Mail Transfer Protocol)

25

54
New cards

DNS

53

55
New cards

DHCP (Dynamic Host Configuration Protocol)

67, 68 UDP

56
New cards

TFTP (Trivial File Transfer Protocol)

UDP 69

57
New cards

HTTP (Hypertext Transfer Protocol)

80

58
New cards

POP3

110

59
New cards

NetBIOS/NetBT (Network Basic Input/Output System)

137-139

60
New cards

IMAP4

143

61
New cards

SNMP (Simple Network Management Protocol)

UDP 161

62
New cards

LDAP (Lightweight Directory Access Protocol)

TCP 389

63
New cards

HTTPS (Hypertext Transfer Protocol Secure)

443

64
New cards

SMB/CIFS

445

65
New cards

RDP (Remote Desktop Protocol)

3389

66
New cards

Port 20/21—File Transfer Protocol (FTP)

Both a protocol and application, lets you copy files, list and manipulate directories, and view file contents.

Provides insecure file transfers

Downside is it's unsecure. Use alternatives for secure file transfers. Transmits usernames and passwords in plain text, meaning no encryption. Don't use same password for FTP servers as other important services.

67
New cards

Port 22: Secure Shell (SSH)

Provides secure remote control of another machine using a text-based environment such as a command shell

Connection-oriented protocol that can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files., using encryption

Best known for its use as a remote login capability

RWE: Change configuration of my web server, I can login from my house in Puerto Rico to my file server in California over the internet

68
New cards

Port 23 (Telnet)

Provides insecure remote control of another machine using a text-based environment

Used to provide bidirectional interactive text-oriented communication using virtual terminal connections (convoluted way of saying it provides us remote access via the command prompt)

Similar to SSH, has been around forever, but is unsecure like FTP.

69
New cards

Port 25: Simple Mail Transfer Protocol (SMTP)

Designed to send only, considered a "push" protocol. Email client locates its email server by querying the DNS server for a mail exchange (MX) record. Once located, this protocol pushes the message to the email server, which will then process the message for delivery.

70
New cards

Port 53: (DNS) Domain name system

Resolve host names to IP addresses

71
New cards

URL (Uniform Resource Locator)

A location or address identifying where documents can be found on the Internet; a Web address

72
New cards

Port 67/68—Dynamic Host Configuration Protocol (DHCP)

Dynamically assigns IP addresses and other IP configuration information; subnet mask, default gateway, and the DNS server, to network clients.

73
New cards

Port 69: Trivial File Transfer Protocol (TFTP)

Similar to FTP, only simpler and faster. No authentication required, UDP (connectionless), 5 commands vs 70, and it's primary use is transmitting configurations to and from network devices.

74
New cards

Port 80 (Hypertext Transfer Protocol)

Foundation of data communication for the worldwide web and is used for insecure web browsing

Manages communication between a web server and a client but is not secure and has been supplanted by HTTPS.

75
New cards

Port 110 Post Office Protocol (POP3)

Used for receiving incoming emails, was the preferred protocol for downloading email. Has been replaced by IMAP4.

Uses a "store and forward method of communication". So if somebody sends you an email, it will go to your email server where it will wait until you're ready to receive it.

76
New cards

Port 137/139 - Network Basic Input/Output System (NetBIOS)/NetBIOS over TCP/IP (NetBT)

Used for file or printer sharing in a Windows network, conducting name querying, sending of data, and other functions

Application programming interface (API) that allows computers to communicate with each other over the network. Works in Layer 5 of the OSI model. Because of this, it needs to work with anohter network protocol to handle the functions of Layer 4 and below.

77
New cards

NetBIOS (Network Basic Input/Output System)

Protocol that operates at the Session layer of the OSI seven-layer model. This protocol creates and manages connections based on the names of the computers involved.

78
New cards

Port 143 - Internet Mail Access Protocol (IMAP)

A newer method of retrieving incoming emails which improves upon the older POP3

Secure protocol designed to download email.

Advantages over POP3 include:
works in connected and disconnected modes, allows storage on the server, allows multiple clients to be simultaneously connected to the same inbox.

79
New cards

Port 161-162 - Simple Network Management Protocol (SNMP)

Used to collect data about network devices and monitor their status, including devices such as routers, switches, VoIP phones

Gathers and manages network performance information.

80
New cards

Port 389 - Lightweight Directory Access Protocol (LDAP)

Open vendor-neutral industry standard for accessing and maintaining distributed directory information services for your network

Active Directory in Windows but it's not JUST AD in Windows. AD is microsoft's proprietary version of LDAP

Delivery services protocol based on the X.500 standard. Designed to access information stored in an information directory typically called...?

81
New cards

Port 445 - Server Message Block (SMB)

Used for Windows file and printer sharing services, operating a lot with NetBIOS. NetBIOS does the authentication over port 139 and then SMB will handle the actual passing out of those files

Provides share access to files, printers, and other network resources. in a Windows based network

82
New cards

Common Internet File System (CIFS)

A method for accessing data in Windows networks. CIFS is a public version of Server Message Block (SMB) that was invented by Microsoft.

83
New cards

Port 3389 - Remote Desktop Protocol (RDP)

Provides graphical remote control of another client or server

Allows users to connect to remote computers and run programs on them.

84
New cards

connectionless protocol

A type of Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery of data.

Audio/video streaming, DHCP, and TFTP

85
New cards

connection-oriented protocol

A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data.

SSH, HTTP, or HTTPS? Why do we require connection-oriented protocols here? Because with SSH, we are doing two-way remote control with a remote server or wks. If we want to reboot the server, if we are using ssh, we know that command got there.

86
New cards

TCP (Transmission Control Protocol)

A connection-oriented,
reliable data transmission
communication service that operates
at the transport layer of the OSI
model. TCP is part of the TCP/IP
suite. Features flow control.

Connection-oriented protocols are HTTPS and SSH.

87
New cards

UDP (User Datagram Protocol)

Protocol that operates instead of TCP in applications where delivery speed is important and quality can be sacrificed. DHCP and TFTP.

Unreliable and it transmits segments called datagrams

Great for streaming because the constant three-way handshake is not occuring

Connectionless, unreliable delivery with no error recovery or flow control

88
New cards

Service Location Protocol (SLP)

Port 427

protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network. This is an alternative protocol to LDAP in newer networks.

89
New cards

Network Time Protocol (NTP)

Port 123, Networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.

90
New cards

System Logging Protocol (Syslog)

Port 514
Used to send logging data back to a centralized server

91
New cards

Well Known Ports

Ports 0 to 1023 are considered well-known and are assigned by the Internet Assigned Numbers Authority (IANA)

92
New cards

Registered Ports

Ports 1024 to 49151 are considered registered and are usually assigned to proprietary protocols

Have to be used by vendors for their own proprietary protocols and each vendor is going to register them with IANA prior to using them

93
New cards

Dynamic or Private Ports

Ports 49152-65535 can be used by any application without being registered with IANA

Usually used by your client whenever it picks a random high number port for its application

Commonly used for gaming, instant messaging, and chat

94
New cards

Port 22 - Secure File Transfer Protocol (SFTP)

Provides secure file transfers and operates on the exact same port we use for SSH because all we are doing is tunneling the FTP protocol

95
New cards

Port 443 Hypertext Transfer Protocol - Secure (HTTPS)

Used as a secure and encrypted version of web browsing, providing browsing over an encrypted tunnel. This tunnel can either use a Secure Socket Layer (SSL) or Transport Layer Security (TLS) to operate.

96
New cards

Three Way Handshake (TCP)

A three-step process in which Transport layer protocols establish a connection between nodes. The three steps are: Node A issues a SYN packet to node B, node B responds with SYN-ACK, and node A responds with ACK.

97
New cards

Port

Different path or road that data can travel down to get to different places.

98
New cards

TCP (Transmission Control Protocol)

Secure, reliable connection

Makes sure that the data gets to where it needs to be

99
New cards

UDP (User Datagram Protocol)

Connectionless.

Not guaranteed that the data is going to make it.

100
New cards

Connectionless Protocols

"I start talking. I don't even check if Bob's on the other end"

Ex. DHCP and TFTP