Network+ Chapter 6 Flashcards
The DoD model is basically a condensed version of the OSI model; it’s composed of four, instead of seven, layers:
Ch 6 Pg 158
1) Process/Application layer
2) Host-to-Host layer
3) Internet layer
4) Network Access layer
is the protocol that actually lets you transfer files across an IP network, and it can accomplish this between any two machines that are using it. Ch 6 Pg 160
File Transfer Protocol (FTP)
What has replaced Telnet? Ch 6 Pg 160
Secure Shell (SSH)
is the stripped-down, stock version of FTP, but it’s
the protocol of choice if you know exactly what you want and where to find it—plus it’s easy to use, and it’s fast
Ch 6 Pg 161
Trivial File Transfer Protocol (TFTP)
Whats the difference between TFTP vs FTP?
Ch 6 Pg 161
1) TFTP has no directory-browsing abilities;
2) It can do nothing but send and receive files.
3) Sends much smaller data blocks than FTP
4) no authentication as with FTP, so it’s insecure.
5) Few sites support it because of the inherent security risks.
is a hugely popular signaling protocol used to construct
and deconstruct multimedia communication sessions for many things like voice and video calls, videoconferencing, streaming multimedia distribution, instant messaging, presence information, and online games over the Internet.
Ch 6 Pg 163
Session Initiation Protocol (SIP)
describes a packet-formatting standard for delivering
audio and video over the Internet. Ch 6 Pg 163
Real-time Transport Protocol (RTP)
what is Real-time Transport Protocol (RTP) used for today?
Ch 6 Pg 163
It’s commonly employed for streaming media, videoconferencing, and push-to-talk systems—all things that make it a de facto standard in Voice over IP (VoIP) industries.
collects and manipulates valuable network
information. It gathers data by polling the devices on the network from a management station
at fixed or random intervals, requiring them to disclose certain information. Ch 6 Pg 163
Simple Network Management Protocol (SNMP)
SNMP receives something called a baseline. What is the definition of baseline?
Ch 6 Pg 163
a report delimiting the operational traits of a healthy network. This protocol can also stand as a watchdog over the network, quickly notifying managers of any sudden turn of events.
works in conjunction with other synchronization utilities to ensure that all computers on a given network agree on the time. Ch 6 Pg 164
Network Time Protocol (NTP)
is the TCP/IP protocol used for managing
IP multicast sessions. It accomplishes this by sending out unique messages over the network to reveal the multicast-group landscape and to find out which hosts belong to which multicast group. Ch 6 Pg 165
Internet Group Management Protocol (IGMP)
T or F The IP address range for APIPA is 169.254.0.1 through 169.254.255.254 and The client also configures itself with a default class B subnet mask of 255.255.0.0.
Ch 6 Pg 172
True
What are the (UDP)Port numbers for SNMP, TFPT, DNS, BOOTPS/DHCP
Ch 6 Pg 172
SNMP 161
TFTP 69
DNS 53
BOOTPS/DHCP 67,68
works at the Network layer and is used by IP
for many different services. ICMP is a management protocol and messaging service provider
for IP. Its messages are carried as IP packets.
Ch 6 Pg 190
Internet Control Message Protocol (ICMP)
ICMP packets have the following characteristics:
Ch 6 Pg 190
1) They can provide hosts with information about network problems.
2) They are encapsulated within IP datagrams.
finds the hardware address of a host from a known IP address. Ch 6 Pg 192
Reverse Address Resolution Protocol (ARP)
discovers the identity of the IP address for diskless machines by sending out a packet that includes its MAC address and a request for the IP address assigned to that MAC address.
Address Resolution Protocol (RARP)
Lammle, Todd (2015-04-24). CompTIA Network+ Study Guide: Exam N10-006 (Comptia Network + Study Guide Authorized Courseware) (p. 193). Wiley. Kindle Edition.
True or False Both Ping and Traceroute (also just called Trace, and Microsoft Windows uses tracert) allow you to verify address configurations in your internetwork.
Ch 6 Pg 191
True
uses ICMP echo request and reply messages to check the physical and logical connectivity of machines on an internetwork.
Ch 6 Pg 191
Ping
If a router’s memory buffer for receiving incoming datagrams is full, it will use ICMP to send out this message until the congestion abates.
Ch 6 Pg 190
Buffer Full
Internet Control Message Protocol (ICMP) works at which OSI layer?
Ch 6 Pg 190
the Network Layer
ICMP packets have the following characteristics:
Ch 6 Pg 190
They can provide hosts with information about network problems.
They are encapsulated within IP datagrams.
If you were to compare User Datagram Protocol (UDP) with TCP, the former is basically the scaled-down economy model that’s sometimes referred to this?
thin protocol
What is the port # for (SSH) Secure Shell?
Secure Shell (25)