comptia networkr+ Flashcards

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the RSSI values and ranges?

A

High Signal Strength: -30 dB to -50 dB, Medium Signal Strength: -51 dB to -70 dB, Low Signal Strength: -71 dB to -90 dB, Very Low Signal Strength: -91 dB to -100 dB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List the types of Wireless Network Interface Cards (NICs) and their key characteristics.

A

802.11a: 5 GHz, Up to 54 Mbps; 802.11b: 2.4 GHz, Up to 11 Mbps; 802.11g: 2.4 GHz, Up to 54 Mbps; 802.11n: 2.4 GHz and 5 GHz, Up to 600 Mbps; 802.11ac: 5 GHz, Up to 3.47 Gbps; 802.11ad: 60 GHz, Up to 7 Gbps; 802.11ax (Wi-Fi 6): 2.4 GHz and 5 GHz, Up to 9.6 Gbps; 802.11ay: 60 GHz, Up to 20 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the encryption protocols used for WEP, WPA, and WPA2?

A

WEP: RC4; WPA: TKIP; WPA2: AES (can also support TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the importance of aligning wireless protocols with encryption protocols?

A

Wireless protocols need to align with the encryption protocol; otherwise, there will be no connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens if you enter the wrong SSID while manually configuring a wireless network?

A

Entering the wrong SSID will result in the device being unable to connect to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the definition and purpose of RPO (Recovery Point Objective)?

A

RPO (Recovery Point Objective) is a metric used in disaster recovery and business continuity planning, representing the maximum acceptable amount of data loss measured in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the Syslog severity levels and their meanings.

A

0 (Emergency): System is unusable; 1 (Alert): Immediate action needed; 2 (Critical): Critical condition; 3 (Error): Error condition; 4 (Warning): Warning condition; 5 (Notice): Significant but normal condition; 6 (Informational): Informational messages; 7 (Debug): Debugging messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the mnemonic for Syslog severity levels?

A

Every Awesome Chef Enjoys Waffles, Not Instant Doughnuts: Emergency, Alert, Critical, Error, Warning, Notice, Informational, Debug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the Server Message Block (SMB) protocol and its port numbers.

A

A network file sharing protocol that runs on top of the NetBIOS architecture in Windows environments. Port Numbers: 139 and 445.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the Network Time Protocol (NTP) and its port number.

A

A networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. Port Number: 123.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the Internet Message Access Protocol (IMAP) and its port number.

A

An Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. Port Number: 143.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the System Logging Protocol (Syslog) and its port number.

A

A standard message format for monitoring network devices, allowing network devices to send notification messages to a logging server. Port Number: 514.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Rapid Elasticity in cloud computing?

A

Allows users to automatically request additional space in the cloud or other services. Provisioning can be seamless for the client or user, enabling services to be scaled up without installing new hardware. Enables dynamic scaling of resources to meet demand efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Resource Pooling in cloud computing?

A

Allows a virtual environment to allocate memory and processing capacity for VMs. Multiple clients share the same physical resources, with allocation based on demand. Allows efficient sharing and allocation of resources among multiple users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Metered Service in cloud computing?

A

Services are charged based on actual usage of resources, such as hourly or monthly billing. Examples include pay-per-use or a-la-carte services. Users are billed based on their consumption of resources.

17
Q

What is a Measured Service in cloud computing?

A

Cloud providers measure or monitor the provision of services for various reasons, including billing and effective resource use. Ensures resource usage is tracked for billing and efficiency.

18
Q

What are Private IP addresses and their purpose?

A

Reserved for internal use within a network, not routable on the public Internet. Allows devices within a local network to communicate without using public IP addresses.

19
Q

What is Network Address Translation (NAT) and its purpose?

A

Translates private IP addresses to a public IP address and vice versa. Enables multiple devices to access the Internet using a single public IP address.

20
Q

What is Automatic Private IP Addressing (APIPA) and its purpose?

A

Automatically assigns a private IP address when a DHCP server is unavailable. Allows devices to communicate within a local network even if the DHCP server is down.

21
Q

What is Classless IP Addressing and its purpose?

A

Allows for the creation of subnets that are not restricted by classful boundaries. Provides more efficient and flexible use of IP addresses.

22
Q

What is Teredo and its purpose?

A

Transition technology that enables IPv6 connectivity for devices on an IPv4 network. Allows IPv6-capable hosts to communicate over the IPv4 Internet.

23
Q

Describe the Ring Topology.

A

Nodes are connected in a closed-loop configuration. Commonly used in wide area networks as an FDDI ring, providing redundancy and preventing collisions.

24
Q

Describe the FDDI Ring Topology.

A

Fiber Distributed Data Interface ring, allows for communication up to 120 miles, uses counter-rotating token rings for redundancy.

25
Q

Describe the Mesh Topology.

A

Each node is connected directly to every other node, providing high redundancy and reliability but is expensive to build and maintain.

26
Q

Describe the Star Topology.

A

All nodes are connected to a central node, typically a switch or hub. Most popular in local area networks due to ease of setup and maintenance.

27
Q

Describe the Bus Topology.

A

Uses a single cable (backbone) to connect all nodes. Simple but can lead to congestion and collisions.

28
Q

What is Physical Hardware in virtualization?

A

The bottom layer in a virtualized environment, sitting beneath the hypervisor and controlling access to guest operating systems. It is the actual physical machine.

29
Q

What is a Hypervisor in virtualization?

A

A program used to run and manage one or more virtual machines on a computer. It sits between the physical hardware and the guest operating systems.

30
Q

What is a Host Operating System in virtualization?

A

The operating system running on the physical hardware that hosts the hypervisor. In a Type 2 hypervisor setup, the host OS is present.

31
Q

What is a Guest Operating System in virtualization?

A

The operating systems that run on virtual machines managed by the hypervisor. These are the virtualized environments.

32
Q

What is the RST (Reset) flag in TCP?

A

Used to abruptly terminate a connection when there is an issue or if the connection should not have existed.

33
Q

What is the FIN (Finish) flag in TCP?

A

Used to request the termination of a connection, allowing systems to release reserved resources.

34
Q

What is the SYN (Synchronization) flag in TCP?

A

Used to initiate a TCP connection and establish a three-way handshake.

35
Q

What is the ACK (Acknowledgment) flag in TCP?

A

Used to acknowledge the receipt of a packet and complete the three-way handshake.