CompTIA Network+ (N10-009)

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/575

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

576 Terms

1
New cards

Transmission Control Protocol (TCP)

Reliable way to send segments across networks. Two way information.

A fundamental protocol within the Internet protocol suite that consists of is set of rules that govern the exchange of data

2
New cards

The way hand shake

SYN, SYN-ACK, ACK.

3
New cards

User Diagram Protocol (UDP)

Connectionless protocol. Unreliable.

4
New cards

TCP Data

Segments

5
New cards

UDP data

Datagram

6
New cards

Layer 4 Data Type

segments

7
New cards

UDP is useful for

Audio and video

8
New cards

Windowing

Allows the clients to adjust data in each segment

9
New cards

Buffering

Occurs when devices allocate memory to store segments if bandwidth is not readily available.

10
New cards

Layer 4 devices

TCP and UDP

WAN accelerators

Load balancers

Firewalls (blocking ports and firewalls)

11
New cards

Session layer

Keeps conversation separate to prevent intermingling data

12
New cards

Set up session

Checking user credentials and assigning numbers to sessions to help identify them.

13
New cards

Maintain session

Data transfers back and forth across the network

14
New cards

Tear down session

Ending of a session after the transfer is done or when the other party disconnects.

15
New cards

Layer 5 devices

H.323

NetBIOS

16
New cards

H.323

Used to set up, maintain, and tear down voice and video connections.

17
New cards

RTP (Real-time Transport Protocol)

Streaming Audio or video. Two way format like phone call or FaceTime.

18
New cards

NetBIOS

Used to share files over a network.

19
New cards

Presentation Layer

Formats the data to be exchanged and secures that data with proper encryption.

20
New cards

Data formatting or encryption

Layer 6 (presentation)

21
New cards

Data formatting

Dara is formatted by the computer to have compatibility between different devices.

22
New cards

American Standard Code for Information Interchange (ASCII)

Text-based language to use.

23
New cards

GIF, JPEG, and PNG

A type of Data format

24
New cards

Encryption

Used to scramble the data in transit to keep it secure from prying eyes and provide data confidentiality.

25
New cards

TLS (Transport Layer Security)

A security protocol that uses certificates and public key cryptography for mutual authentication and data encryption over a TCP/IP connection.

26
New cards

Layer 6 things

Scripting languages

Standard text

Pictures

Movie files

Encryption algorithms

27
New cards

Application Layer (Layer 7)

Provides application level services where users communicate with the computer (file transfer, network transfer)

28
New cards

Application services

Unites communicating components from more than one network application.

29
New cards

Service advertisement

Sending out of announcements to other devices on the network to state the service they offer.

30
New cards

Email application

Web browsing

Domain name service

File transfer protocol

Remote access

Layer 7

31
New cards

Physical Layer (Layer 1)

Where transmission of bits across the network occurs and includes physical and electrical network characteristics.

32
New cards

Physical layer data

bits

33
New cards

Transmission Modulation

If it changes during the clock cycle, then a 1 is represented (otherwise, a 0 is represented)

34
New cards

True or false: cables are also part of the physical layer

True

35
New cards

Cross over cable flips transmission

True

36
New cards

Straight through cable flips transmission

False

37
New cards

Asynchronous

Uses start and stop bits to indicate when transmissions occur from the sender to the receiver.

38
New cards

Synchronous

Uses a reference clock to coordinate the transmission by both sender and receiver.

39
New cards

Broadband

Devices bandwidth into separate channels

40
New cards

Baseband

Uses all available frequencies on a medium(cable) to transmit data.

41
New cards

Time Division Multiplexing (TDM)

each session takes a turns using time slots, to share the medium between all users.

42
New cards

Statistical Time Division Multiplexing (STDM)

Dynamically allocates the time slots in an as needed basis.

43
New cards

Frequency Division Multiplexing (FDM)

Divides the medium into channels based on frequencies and each session is transmitted over a different channel.

44
New cards

Multiplexing

Enables simultaneous usage of a baseband connection by multiple users

45
New cards

Fiber optic

Ethernet cable

Coaxial cable

Bluetooth

Wi-fi

NFC

Hubs

Access points

Media converters.

Layer one devices

46
New cards

True or false: Layer one devices essentially repeat and pass along what is received

True

47
New cards

Data Link Layer (Layer 2)

Packages data into frames and transmits those frames on the network.

48
New cards

Datalink layer data type

Frames.

49
New cards

Media Access Control (MAC)

Physical addressing system of a device which operated on a logical topology.

50
New cards

Each letter of a MAC address is how many bits

4 bits.

51
New cards

First 24-bits of a MAC address(6 digits)

Vendor code

52
New cards

The last 24 bits of the MAC address.

Unique value

53
New cards

Logical link control (LLC)

Provides connection services and allows acknowledgement of receipt of receipt of messages.

54
New cards

Isochronous

Network devices use a common reference clock source and create time slots for transmission.

55
New cards

Network interface cards

Bridges

Switches

Layer 2 data link layer

56
New cards

Packet Switching

Data is devices into packets and then forwarded.

57
New cards

Circuit switching

Dedicated communication link is established between two devices.

58
New cards

Message switching

Data is devices into messages which may be stored and then forwarded.

59
New cards

Route Discovery and Selection

Manually configured as a static route or dynamically through a routing protocol.

60
New cards

Connection services

Augment layer 2 connection services to improve reliability.

61
New cards

Internet Control Message Protocol (ICMP)

Sends error messages and operational information to an IP destination.

62
New cards

Routers

Multi layer switches

IPV4/IPV6

ICMP

Layer 3

63
New cards

Encapsulation

The process of putting headers (and trailers) around some data.

64
New cards

Protocol Data Unit (PDU)

A single unit of information transmitted in a computer network

65
New cards

SYN(synchronization)

Used to synchronize connection during the three way handshake.

66
New cards

ACK (acknowledgment)

Used during the three way handshake, but also used to acknowledge the successful receipt of packets.

67
New cards

FIN (Finished)

Used to tear down the virtual connection created using the three way handshake and the SYN flag.

68
New cards

RST(Reset)

Used when a client or server receives a packet that it was not expecting during the current connection.

69
New cards

PSH (Push)

Used to ensure data is given priority and it processed at the sending or receiving ends.

70
New cards

URG(urgent)

Similar to PSH and identified incoming data as urgent.

71
New cards

TCP has a 20 bite header

True

72
New cards

UDP has a 29 byte header

False it has an 8 byte header.

73
New cards

EtherType

Used to indicate which protocol is encapsulated in the payload of a frame.

74
New cards

Wireshark

Packet analyzer than can pull apart some network traffic and show different layers of the OSI model

75
New cards

Port

A virtual entry/exit point for communications used by software applications to exchange information.

A logical opening in a computer that represents a service or application.

76
New cards

Protocol

A set of rules and conventions for data exchange between network devices.

77
New cards

Well-known port numbers

0-1023

78
New cards

Registered Port Numbers

1024-49151

79
New cards

Ephemeral ports

Short-lived temporary ports which are opened for just a small period of time from a predefined range of ports.

80
New cards

True or false: TCP uses a three-way handshake to establish a connection.

True

81
New cards

Windowing

Occurs by allowing the receiver to specify the amount of data it can handle at a time

82
New cards

TCP uses packetization, acknowledgment and error checking to ensure data integrity

True

83
New cards

User Datagram Protocol (UDP)

A communication protocol used across the Internet for especially time sensitive transmission.

84
New cards

Internet control message protocol (ICMP)

Integral part of the Internet protocol suite which is a set of networking protocols used on the Internet.

85
New cards

What does an ICMP message consist of

Type, code, and checksum.

86
New cards

ICMP flood attack

Type of attack that involves overwhelming a target machine with a large number of ICMP echo request packets. (Aka ping packets)

87
New cards

distributed denial-of-service (DDoS) attack

Where the attacker usually uses a network of compromised computers (called a botnet) to generate a significant amount of traffic.

88
New cards

Ping of death

attack that exploits a vulnerability that existed in older, unpatched systems where the attacker sends malformed or oversized packets using the ICMP protocol.

89
New cards

Port 80

Hypertext Transfer Protocol (HTTP)

90
New cards

Hypertext Transfer Protocol (HTTP)

An application layer protocol that enables plain text communication between clients and servers.

91
New cards

Port 443

Hypertext Transfer Protocol Secure (HTTPS)

92
New cards

Difference between HTTP and HTTPS

Security and encryption, default usage, and search engine optimization (SEO) and trust.

93
New cards

True or false: Port 443 with SSL/TLS encryption for HTTPS provides more security than HTTP

True

94
New cards

What type of communication is SMTP, POP3, and IMAP

Email communication.

95
New cards

Simple Mail Transfer Protocol (SMTP)

Standard protocol used for sending emails across the Internet and operates over Port 25

96
New cards

SMTP Port

Port 25

97
New cards

SMTPS

Port 465 and port 587

98
New cards

Post Office Protocol version 3 (POP3)

Used to retrieve emails from a remote server to a local client over port 110

99
New cards

POP3

Port 110

100
New cards

Internet Message Access Protocol(IMAP)

Operates over Port 143 and allows users to manage emails directly on the email server.