CompTIA A+ (Anki) 3 Flashcards
_ are issued with pre-configured private IP addresses
can login using a browser with default connections
when configuring it, physically connect to the router using a laptop or desktop
-an IP address should be assigned by default similar to same network
-if not given one configure manually to the same network
Routers
Enable __
enables devices to automatically announce their presence to other devices on the network
eg. printers
Universal Plug and Play
Configure __
specifies that a particular request coming from the internet should be directed to a specific computer on the network
port forwarding
Every device on a network needs an __ to communicate
IP address
Every IP address has 2 sections, they are __
The division between the two is determined by the subnet mask
Network ID and Host ID
The __ is a value that works in conjuction with the IP address
determines the size of the network or number of hosts that can be accommodated on that network
subnet mask
The __ is the IP address of the router
Allows the host device to access the internet
Not required if you only want hosts to communicate on the internal network
default gateway
IoT
Internet of Things
\_\_ are the various household devices that will communicate over TCP/IP thermostat security system lights entertainment system electronic appliances vehicles
IoT
DSL
Digital Subscriber Line
RDP uses port
3839
HDD
Hard Disk Drive
SMB uses port
445
SLP uses port
427
__ utiilize existing phone lines
supplied by ISP using phone jack RJ-11 connector
Computer or router connects to the modem with a standard ethernet cable RJ-45 connector
Does no interfere with phone service as they operate on different frequencies
DSL Modem
The advantages of \_\_ are much faster than dial-up Bandwidth is not shared Reliable -Generally as reliable as phone service
DSL
The disadvantages of {{c1::DSL}} are may not be available in certain areas -rural areas in particular More hardware may be required -splitters or filters More expensive than dial-up An older building with older wiring may not support DSL Speeds
DSL
__ uses a cable modem
utilizes existing cable tv lines
supplied by ISP and connects to the cable tv jack (coaxial connector)
Computer or router connects to the modem with a standard ethernet cable (RJ-45 connector)
Does not interfere with cable tv service
Cable
The advantages of \_\_ are generally faster than DSL -speeds up to 400 Mbps Does not require the use of a phone or splitter Reiable -Generally as reliable as tv service
cable
The disadvantages of __ are
May not be available in certain rural areas usually rural
more expensive than dial-up
overall bandwitdth is shared with other users in your segment
-advertised speeds not guaranteed
-may slow during peak periods
security
-all users in your segments are on a LAN: possible to see other systems
cable
__ protects internal network
Prevent attackers on the internet from accessing your internal resources
Prevent your internal computers from accessing undesirable content on the Internet
Filters packets passing through the firewall based on defined rules
Firewall
The two types of __ are network-based and host-based
firewalls
__ firewall
generally a stand-alone network hardware device
desigened to protect the entire network
Network-based
Configuring a __
Operate based on defined rules
-default deny - blocks all traffic
-default allow - allows all traffic
Rules to override the default state are based on IP address Port number Domain name Any combination of above
Packets that match the criteria of the rule are allowed or blocked, depending on the type of rule
firewall
__ is If a client on the internal network issues a request over a specific port, the firewall expects traffic to return to that client over the same port
creates a temporary rule to allow that traffic in the return direction
Port triggering
__ Uses two firewalls to create a separate network between the internal LAN and the Internet
Allows for systems that need to be exposed to the internet to be isolated from you LAN
Systems in it can be accessed from either direction without exposing other systems in the internal LAN
Demilitarized Zone (DMZ)
QoS
Quality of Service
__ is a network strategy that allows fo r
managment of network traffic to maintain a desired level of performance
prioritization of traffic based on which applications or services demand more bandwitdth
More common in larger networks
-Main 5 issues that are addressed are
Delay
Dropped packets
Errors
Jitter
Sequence
QoS
can address
Delay - usually the result of congestion
Dropped packets - often results in delay as dropped packets need to be transmitted
Errors - usually the result of corrupted packets
Jitter - a variation of delays in the packet stream
Sequence - packets arriving out of order, affects real-time communications such as VoIP or video conferencing
Administrators can set priorities on the type of service to allocate more bandwidth where its needed
QoS
is a wireless standard that provides bandwitdth up to 54 Mbps
Operates at radio frequencies between 5.725 GHz and 5.850 GHz
High frequency make it difficult to penetrate walls and other obstructions
Also referred to as “Wi-Fi 2”
Commonly found on business networks
802.11a
the pros of __ are
fast maximum speed
regulated frequencies
-helps prevent signal interference from other devices
802.11a
The cons of \_\_ are higher cost than 802.11b -(b) is typically used in home setups shorter signal -easily obstructed
802.11a
The pros of __ are
lower cost compared to 802.11a
good signal range
not easily obstructed
802.11b
The cons of __ are slower maximum speed
unregulated frequency - may interfere with home appliances
802.11b
emerged on the market in 2002
comines the best of both 802.11a and 802.11b
supports bandwitdth up to 54 Mbps
Achieves greater range using 2.4 Ghz frequency
backward compatible with 802.11b
802.11g
the pros of __ are
fast maximum speed
good signal range
not easily obstructed
802.11g
The cons of __ are
costs more than 802.11b
unregulated frequency - may interfere with appliances
802.11g
is also referred to as wireless N
Utilizes multiple wireless signals and antennas
-improves bandwidth
offers better range due to increased signal intensity
backward compatible with 802.11b/g
802.11n
The pros of \_\_ are fastest maximum speed best signal range resilient to signal interference eg. outisde sources
802.11n
The cons of are
costs more than 802.11g
may interfere with nearby 802.11b/g-based networks
-due to the use of multiple signals
802.11n
is the latest generation of Wi-fi signaling utilizes dual band wireless technology supports simultaneous connections 2.4 Ghz 5 Ghz Bacwards compatible with 802.11b/g/n on 2.4 Ghz 802.11a on 5 GHz
802.11ac
The pros of \_\_ are improved bandwitdh more flexibility -simultaneous connection support backward compatibility
802.11ac
The cons of __ are
increased cost
prone to interference when using 2.4 GHz frequency
802.11ac
The pros of __ Ghz are
larger coverage area than 5 GHz
Can penetrate solid objects
eg. walls and floors
2.4
the cons of __ GHz are
lower data rate
susceptible to interference
-more devices use the 2.4 GHz frequency
2.4
the range of __ GHz is divided up into fourteen channels in total defined for use by Wi-Fi 802.11 depending on the country, not all channels are allowed
2.4
__ operates in the 2.4 GHz frequency band across 79 channels
common in cell phones and wireless PC and audio equipment
ex. headsets
speakers
keyboards
bluetooth
__ devices can send and receive data wirelessly without relying on wifi latest (version 5) has a range of up to 400 meters
bluetooth
the pros of _ are low power consumption relatively secure versatility (allows for wireless communications between a number of different devices) developer-friendly format
bluetooth
the cons of _ are connections issues devidces can be inconsistent during the pairing process, possible from interference obstructions other transmissions
bluetooth
is a form of contactless communication commonly used in devices such as smartphones tablets User simply waves device over the compatible device to send information range is very limited
NFC
The pros of _ are
convenient
seamless (just need to store the data in phone)
supported by major vendors
devices do not need to be paired (they just need to be within range of each other)
NFC
The cons of \_\_ are cost may be too expensive for companies to adopt security technology is not free from risk
NFC
uses and embedded chip and antenna to transmit and recieve data via radio waves Technology is used to track vehicles airline passenger baggage pets also in credit cards
RFID
The pros of _ are Operates under a global standard (maintained and updated regularly) -improved efficiency and security Scanning -scan multiple items -No line-of-sight limitations Speed -scan in milliseconds
RFID
The cons of _ are
scanning issues
-may have difficulty scanning through items such as metal
-can result in tag collision with too many items
Security
-privacy concerns
-side-channel attacks
RFID
RFID
Radio Frequency Identification
are common communication protocol found in smart home devices and other IoT devices
Open standard ideal for low-data rate and low-power application
based on IEEE 802.15 specification
Operates on 2.4 GHz, 900 MHz, and 868 MHz frequencies
Enables implementations from different manufacturers to work together
Zigbee
_ is a wireless communications protocol uses a mesh networking topology found in smart homes Products include lighting controls security systems thermostats window locks
Z-Wave
introduced faster data-transmission speeds compared to 1G and 2G
Enabled Internett access and video calling for mobile phones (was very low quality)
Estimated maximum speed of around 2 Mbps
3G
supports mobile web acess that also includes gaming services HD mobile tv video conferencing Most current cell phones support it
4G
LTE
Long Term Evolution
replaced previous 4G networks benefits higher bandwidth faster connection speeds -VoIP -Multimedia streaming
LTE
is the latest iteration of cellular technology
Offers improved speed and responsiveness
-data transfer rates as high as 20 Gbps
-1 ms or lower latency
5G
__ GHz is generally able to carry farther than 5 GHz
2.4
802.11a operates over the _ GHz frequency
5
The 2.4 GHz band is divided up into _ channels when using bluetooths devices
79
is a client/server model
Delivers web-based content over Hypertext Transfer Protocol (HTTP)
Eg. web servers include
Apache (open source platform that runs on UNIX or LINUX)
Internet Information Server (IIS) (Microsoft Proprietary Platform)
NGINX (open source and runs on about any operating system)
Web Server
are a client/server model
Responsible for the central storage and management of data files
Files can be accessed by computers on the same network
File Servers
The two types of files servers are
dedicated and non-dedicated
servers provide faster data access
Offer more storage capacity
-Typically used for enterprise applications
eg. network attached storage (NAS)
Dedicated
server is any computer on the network that hosts shared files
A file server that provides other services
Non-dedicated
servers are used to manage print requests and provide clients with printer queue status information
Commonly used in both
-Large enterprise networks
single dedicated computer that can manage hundreds of printers
-Small or home networks
Dedicated system hosts the printer
Network device (SOHO routers)
The pros of _ servers are easy to add client systems and printers No restrictions eg. can add unlimited client systems Administration eg. easily manage print queues
The cons of _ servers lack of support for multifunction printers
Users may not be able to confirm print status
Port compatibility issues and limitations
servers are used to automatically provide and assign IP addresses and other networking information
Relies on the DHCP to respond to clients queries
DHCP
In the DHCP discovery process, _ is used by client to locate available DHCP servers
Discover
In the DHCP Discovery Process _ informs client that service and configuration is available
Offer
In the DHCP discovery process, _ is used to request network configuration data, including an IP address
request
In the DHCP discovery process, _ is networking configuration data is sent to client
ACK
scopes are what you configure on the server
they represent a valid range of IP addresses that are available for assignment
Configured on the DHCP server to specify the available IP addresses that can be allocated to clients
Configure scope to allow or deny clients from IP addresses
-Filter based on
name
MAC address
Operating system
DHCP
servers maintain a directory of domain names
Names are translated to their corresponding IP address
Domain names are much easier to remember than an IP address
Similar to a phonebook, a central registry is used to gather information from all servers across teh internet
Internet service providers regularly get updated DNS information from registry
DNS
In DNS records, Address mapping record (A) specifies the _ address for a given host
IP
In DNS records, IP Version 6 address record (AAAA) specifies an _ address for a given host
IPv6
In DNS records, Canonical Name records (CNAME) maps one _ name to another
domain
In DNS Records __ specifies mail exchange server for DNM domain name
Used by SMTP protocol to route email
Mail exchanger record (MX)
In DNS Records, __ specifies an authoritative name server
Name Server records (NS)
In DNS Records, __ is used to look up domain names based on an IP address
Reverse Lookup Pointer records (PTR)
AFP uses port
548
servers are systems that will access some other server, usually an internet website, but on behalf of a client. It enables caching, filtering, and security.
Proxy
Proxy servers can also be _ servers which means any user can submit a request through the proxy server
The proxy server can go out on the internet or intranet to the origin servers where the content resides and retrieve whatever content was requested. The content engine hangs on to the data so that if another user requests the exact same site then that content resides on the proxy server and it does not have to go out on the internet at all. This results in greater security and much greater performance because the site requested by the second user comes back essentially at LAN speeds not at internet speeds
caching
_ caching device just caches content. It does no do filtering or anything else
Typically have larger caches
Dedicated
_ servers can also perform content filtering
The can examine the content and determine which content is good and which content is bad
All HTTP request go through it so it so it might be the only device allowed to connect to the firewall
This means that clients cannot directly connect to external networks or the internet
Everything has to go through the it, it makes a single point of filtering and security
Certain domains can be filtered out like social media sites while people are at work
Proxy
_ servers are responsible for sending and recieving e-mail on behalf of clients
Types of _ server applications include exchange, exim, and sendmail
is the process of determining that someone or something is true, genuine, or valid
(prove to me that you are who you claim to be or that this is what it claims to be)
systems may be as simple as requiring username and password
Oters may require additional security information such as
security token
biometric verification
smart card
Authentication
_ server is used to facilitate authentication of an entity attempting to access a network
Authentication
The types of _ server are dedicated server ethernet switch access point network access server
authentication
_ enables network devices to send event messages to a central logging server
eg. network appliances may send event information via messages to be logged on the server
Most network devices can send messages such as routers or switches
Windows-based servers do not support it natively
-require a third party tool to collect information to be forwarded to the server
Syslog
_ servers components include Syslog lister -used to gather syslog data send over UDP port 515 Database -stores syslog data for quick retrieval Management software -filter and view important log messages -Generate alerts and notifications
Syslog