Comptia A+ 220-801 Chapter 7 Flashcards

1
Q

is a set of rules that govern communications, much like a language in human terms. pg 311

A

protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the most popular network protocol in use today, thanks mostly to the rise of the Internet. Pg 312

A

Transmission Control Protocol/Internet Protocol (TCP/IP) suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many Layers does the DoD model have compared to the OSI Model? pg 312

A

four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 Layers of the DoD model? pg 312

A

Process/Application, Host to Host,internet,Network Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The majority of TCP/IP protocols on the DoD Model are located at which Layer? pg 313

A

Process/Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some of the protocols that are within the Process/Application layer? pg 313

A

Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Simple Mail Transfer Protocol (SMTP)
Post Office Protocol (POP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dynamic Host Configuration Protocol (DHCP) pg 314

A

dynamically assigns IP addresses and other IP configuration information to network clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

File Transfer Protocol (FTP) pg 314

A

is optimized to do what it says it does—transfer files. This

includes both uploading and downloading files from one host to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What two things do you need to access the FTP Site? pg 314

A

legitimate login name and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between HTTP and HTTPS? pg 315

A

HTTPS is a secure connection and HTTP isnt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a secure protocol designed to download email.pg 316

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a directory services protocol based on the X.500 standard. pg 316

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

allows users to connect to remote computers and run programs on them. pg 316

A

Remote Desktop Protocol (RDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why would someone need to use RDP? pg 316

A

Remote Desktop mobile apps allows you to use the applications on your office computer, and access your data without being in your office. IT admins can use it to remote in from another location to perform IT functions from another location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Secure File Transfer Protocol (SFTP) pg 317

A

is used when you need to transfer files over a secure, encrypted connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is another Microsoft-developed protocol. It’s used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like
FTP only with a few more options. pg 317

A

Server Message Block (SMB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

gathers and manages network performance

information. pg 317

A

Simple Network Management Protocol (SNMP)

18
Q

can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files.

A

Secure Shell (SSH)

19
Q

Which port Numbers does FTP use?

A

20,21

20
Q

What port number does HTTPS and HTTP use?

A

443,80

21
Q

Where can you find a complete list of registered port numbers?

A

www.iana.org

22
Q

An IPv4 address has how many bits in its hierarchical address that identifies a host on the network.

A

32-bit

23
Q

What are the two components that make up an IP Address? pg 322

A

the network ID and the host ID

24
Q

Computers are able to differentiate where the network ID ends and the host address begins through the use of a? pg 322

A

subnet mask.

25
Q

What type of business would use a Class A network?

A

Class A Class A networks are defined as those with the first bit set as 0 (decimal values from 0 to 127) and are designed for very large networks.

26
Q

What is the subnet mask of a Class B Network? pg 323

A

255.255.0.0

27
Q

Whats the difference between Static IP and Dynamic IP? pg 324

A

When a device is assigned a static IP address, it does not change. The device always has the same IP address.

Most devices use dynamic IP addresses, which are assigned by the network when they connect. These IP addresses are temporary, and can change over time.

28
Q

is a TCP/IP standard used to automatically configure IP-based hosts that are unable to reach a DHCP server. pg 326

A

Automatic Private IP Addressing (APIPA)

29
Q
What is  the  first octet range in a class A network? 
 pg 325
A

1 to 126

30
Q

What is the first octet range in a class B network? pg 325

A

128 to 191

31
Q

What is the first octet range in a class C network? pg 325

A

192 to 223

32
Q

Private IP addresses will be in one of three ranges:

A

10.0.0.0/8, 172.16.0.0/16, or 192.168.0.0/16.

33
Q

what is Class E IPv4 used for and what is the First Octet Range?

A

Reserved for testing/240–255

34
Q

what is Class D IPv4 used for and what is the First Octet Range?

A

Reserved for multicast (sending messages to multiple systems) 224–239

35
Q

what is Class C IPv4 used for and what is the First Octet Range?

A

For smaller networks with fewer hosts/192–223

36
Q

what is Class B IPv4 used for and what is the First Octet Range

A

For medium-sized networks/128–191

37
Q

what is Class A IPv4 used for and what is the First Octet Range

A

For very large networks; 127 reserved for the loopback address/1–127

38
Q

What are Two critical TCP/IP services you need to be aware of ?

A

Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS).

39
Q

A DHCP server can be configured to automatically provide IP configuration information to clients. The following configuration information is typically provided:

A

IP address
Subnet mask
Default gateway (the “door” to the outside world)
DNS server address

40
Q

Occasionally, you might visit a website that uses HTTPS and get a pop-up error message saying that the certificate has expired or could not be validated. This is most likely a case of the certificate legitimately expiring. What could be the issue with this warning?

A

certificate is expired or possibly a Trojan virus.