comptia networkr+ Flashcards
Front
Back
What are the RSSI values and ranges?
High Signal Strength: -30 dB to -50 dB, Medium Signal Strength: -51 dB to -70 dB, Low Signal Strength: -71 dB to -90 dB, Very Low Signal Strength: -91 dB to -100 dB
List the types of Wireless Network Interface Cards (NICs) and their key characteristics.
802.11a: 5 GHz, Up to 54 Mbps; 802.11b: 2.4 GHz, Up to 11 Mbps; 802.11g: 2.4 GHz, Up to 54 Mbps; 802.11n: 2.4 GHz and 5 GHz, Up to 600 Mbps; 802.11ac: 5 GHz, Up to 3.47 Gbps; 802.11ad: 60 GHz, Up to 7 Gbps; 802.11ax (Wi-Fi 6): 2.4 GHz and 5 GHz, Up to 9.6 Gbps; 802.11ay: 60 GHz, Up to 20 Gbps
What are the encryption protocols used for WEP, WPA, and WPA2?
WEP: RC4; WPA: TKIP; WPA2: AES (can also support TKIP)
What is the importance of aligning wireless protocols with encryption protocols?
Wireless protocols need to align with the encryption protocol; otherwise, there will be no connection.
What happens if you enter the wrong SSID while manually configuring a wireless network?
Entering the wrong SSID will result in the device being unable to connect to the network.
What is the definition and purpose of RPO (Recovery Point Objective)?
RPO (Recovery Point Objective) is a metric used in disaster recovery and business continuity planning, representing the maximum acceptable amount of data loss measured in time.
List the Syslog severity levels and their meanings.
0 (Emergency): System is unusable; 1 (Alert): Immediate action needed; 2 (Critical): Critical condition; 3 (Error): Error condition; 4 (Warning): Warning condition; 5 (Notice): Significant but normal condition; 6 (Informational): Informational messages; 7 (Debug): Debugging messages
What is the mnemonic for Syslog severity levels?
Every Awesome Chef Enjoys Waffles, Not Instant Doughnuts: Emergency, Alert, Critical, Error, Warning, Notice, Informational, Debug
Describe the Server Message Block (SMB) protocol and its port numbers.
A network file sharing protocol that runs on top of the NetBIOS architecture in Windows environments. Port Numbers: 139 and 445.
Describe the Network Time Protocol (NTP) and its port number.
A networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. Port Number: 123.
Describe the Internet Message Access Protocol (IMAP) and its port number.
An Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. Port Number: 143.
Describe the System Logging Protocol (Syslog) and its port number.
A standard message format for monitoring network devices, allowing network devices to send notification messages to a logging server. Port Number: 514.
What is Rapid Elasticity in cloud computing?
Allows users to automatically request additional space in the cloud or other services. Provisioning can be seamless for the client or user, enabling services to be scaled up without installing new hardware. Enables dynamic scaling of resources to meet demand efficiently.
What is Resource Pooling in cloud computing?
Allows a virtual environment to allocate memory and processing capacity for VMs. Multiple clients share the same physical resources, with allocation based on demand. Allows efficient sharing and allocation of resources among multiple users.