Rays Hot Sauce Network + Flashcards

Pass The First Time

1
Q

What do loose or missing terminators from a bus network

A

disrupt data transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the easiest network topology to expand in terms of the number of devices connected to the network

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What network topology offers better fault tolerance than other topologies because of the redundant connections

A

Mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the wireless network topologies

A

mesh, ad hoc, and infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ad Hoc Topology

A

The ad hoc, or unmanaged, network design does not use an AP. All wireless devices connect directly to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infrastructure Wireless Network

A

Devices use a wireless AP to connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hybrid Topology

A

Refers to the combination of wireless and wired networks. For Network+ exam, however, the term hybrid most likely refers to the combination of physical networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LAN

A

Local Area Network. The backbone of most internal networks, keeping devices connected within a limited area like a home, school, or office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WLAN

A

Wireless Local Area Network give you that sweet, sweet freedom from cables. Perfect for sprawling homes or offices with lots of mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WAN

A

Wide Area Network is the big boss of networks, spanning large distances, often country-wide or even across continents. It’s how different LANs or WLANs connect and communicate. The backbone of the internet, really. From local gaming to global connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAN

A

Metropolitan Area Network bridges the gap between LANs and WANs, covering entire cities or large campuses. Think of universities connecting all their campuses in one big network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAN

A

Campus Area Network covers multiple buildings within a limited area, like a university campus. The unsung hero of education networks, keeping students and faculty connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SAN

A

Storage Area Network is all about massive data storage, connecting multiple storage devices to servers. Perfect for organizations with huge amounts of data needing fast, efficient access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PAN

A

Personal Area Network keeps things super close. It’s all about connecting personal devices within an individual’s workspace, like your smartwatch syncing with your phone. It’s like having your own mini network bubble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Z-wave

A

is a wireless mesh networking technology designed for smart home devices. It allows devices like smart lights, thermostats, and security systems to communicate with each other seamlessly. Developed by Zensys in 1999, Z-Wave operates in the 800-900 MHz frequency range and is known for its low-energy consumption and long-range capabilities. It’s a big player in the IoT (Internet of Things, making it easier to create interconnected smart homes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ant+

A

Advanced and Adaptive Network Technology is a low-energy wireless protocol designed to collect and transfer sensor data. It’s commonly used in fitness gadgets like heart rate monitors, power meters, and activity trackers. ANT+ allows devices from different manufacturers to communicate with each other seamlessly, making it easy to mix and match products. It’s similar to Bluetooth Low Energy but specifically optimized for sensor networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IR

A

Infrared Networking: This is a wireless communication technology that uses infrared light to transfer data between devices. It’s typically used for short-range communication, like remote controls, printers, and some smartphones
Incident Response (IR): In cybersecurity, incident response refers to the processes and systems an organization uses to detect, investigate, and respond to cybersecurity threats and breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RFID

A

Radio Frequency Identification uses electromagnetic fields to automatically identify and track tags attached to objects. It’s like a more sophisticated version of barcodes. You see it in key cards, inventory management, pet microchips, and even in passports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CSMA/CA

A

Carrier Sense Multiple Access with Collision Avoidance is a network protocol that tries to avoid collisions before they happen, rather than dealing with them afterward. It listens to the channel first (carrier sense), then if it’s clear, it proceeds to send data. If not, it waits for a bit. It’s mainly used in wireless networks (like Wi-Fi) to improve efficiency and data flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FHSS

A

Frequency Hopping Spread Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DSSS

A

Direct Sequence Spread Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

802.11

A

2.4 GHz, 1 to 2 Mbps, 20 ft indoor range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

802.11a

A

5 GHz, Up to 54 Mbps, 20 to 75 ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

802.11b

A

2.4 GHz, up to 11 Mbps, Up to 150 ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

802.11g

A

2.4 GHz, up to 54 Mbps, up to 150 ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

802.11n

A

2.4 GHz & 5 GHz, up to 600 Mbps, 175+ ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

802.11ac

A

5 GHz, Up to 1.3 Gbps, 115+ ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Device: Hub
OSI layer: ?

A

Physical (Layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Device: Wireless Bridge
OSI layer: ?

A

Data Link (Layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Device: Switch
OSI layer: ?

A

Data Link (Layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Device: Managed Switch
OSI layer: ?

A

Network (Layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Device: Router
OSI layer: ?

A

Network (Layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Device: NIC
OSI layer: ?

A

Data Link (Layer 2)

34
Q

Device: Wireless Access Point (AP)
OSI layer: ?

A

Data Link (Layer 2)

35
Q

Class A

A

Range 1 to 126, Networks 126; Hosts per Network 16,777,214

36
Q

Class B

A

128 to 191, Networks 16,384, Hosts per Network 65,534

37
Q

Class C

A

192 to 223, Networks 2,097,152, Hosts per Network 254

38
Q

Class D

A

224 to 239

39
Q

Class E

A

240 to 255

40
Q

Class A default subnet mask

A

255.0.0.0

41
Q

Class B subnet mask

A

255.255.0,0

42
Q

Class C subnet mask

A

255.255.255.0

43
Q

Class A: Private IP address ranges and their corresponding default subnet mask

A

10.0.0.0 to 10.255.255.255

44
Q

Class B: Private IP address ranges and their corresponding default subnet mask

A

172.16.0.0 to 172.31.255.255

45
Q

Class C: Private IP address ranger and their corresponding default subnet mask

A

192.168.0.0 to 192.168.255.255

46
Q

Connection-oriented protocols

A

Such as TCP can accommodate lost or dropped packets by asking the sending device to retransmit them. They can do this because they wait for all the packets in a message to be received before considering the transmission complete. On the sending end, connection-oriented protocols also assume that a lack of acknowledgement is sufficient reason to retransmit.

47
Q

What level of the OSI does IP operate

A

Network Layer

48
Q

What level of the OSI does TCP operate

A

Transport Layer

49
Q

FTP

A

FTP (File Transfer Protocol) is a standard network protocol used to transfer files between a client and server over the internet or a local network. It’s one of the oldest protocols used for file transfer and operates on a client-server model.
Key Points about FTP:
Ports: Typically uses TCP ports 20 and 21.
Commands: Involves simple commands like PUT (to upload files) and GET (to download files).
Modes: Can operate in active or passive mode to handle different network configurations.
Security: By default, FTP transfers data in plaintext, making it vulnerable to interception. For secure transfers, variants like SFTP (SSH File Transfer Protocol) or FTPS (FTP Secure) are recommended.
APPLICATION LAYER

50
Q

TFTP

A

TFTP (Trivial File Transfer Protocol) is a simplified version of FTP used for transferring files between devices on a network.
Key Characteristics:
Ports: Typically uses UDP port 69.
Simplicity: Designed to be easy to implement with minimal protocol overhead.
No Authentication: Lacks built-in authentication and encryption, making it less secure.
Use Cases: Commonly used for transferring firmware, boot files, and configurations to network devices.
Security Considerations:
Vulnerability: Because it lacks authentication and encryption, TFTP is vulnerable to interception and spoofing.
Environment: Best suited for secure, isolated, or internal networks.
**Application layer protocol that uses UDP, which is a connectionless transport layer protocol. For this, TFTP is called a connectionless file transfer method

51
Q

HTTP

A

HTTP (HyperText Transfer Protocol) is the foundation of data communication for the World Wide Web.
Key Points:
Port: Uses TCP port 80 by default.
Client-Server Model: Clients send requests to servers, which return responses (e.g., HTML documents, images).
Stateless Protocol: Each request-response pair is independent, with no memory of previous interactions.
Methods: Common HTTP methods include GET (retrieve data), POST (submit data), PUT (update data), and DELETE (remove data).
Security:
Plaintext: HTTP transmits data in plaintext, making it vulnerable to interception.
HTTPS: For secure communications, HTTP can be combined with SSL/TLS to form HTTPS, encrypting data in transit and protecting against eavesdropping and man-in-the-middle attacks.
** A connection-oriented protocol that uses TCP as a transport protocol. By default, it operates at port 80

52
Q

POP3 and IMAP

A

Can be used to download, or pull, email from a server, but they cannot be used to send mail. That function is left to SMTP, which can both send and receive. Also remember, POP3 uses port 110 and IMAP4 uses port 143

53
Q

Telnet

A

Telnet is a network protocol used to provide a command-line interface for communication with a remote device or server.
Key Points:
Ports: Typically uses TCP port 23.
Functionality: Allows users to remotely access and manage devices, servers, and network equipment.
Plaintext Transmission: Data, including usernames and passwords, is transmitted in plaintext, making it vulnerable to interception.
Use Case: Often used for configuration and troubleshooting of network devices.
Security:
Insecure: Due to plaintext transmission, Telnet is considered insecure for sensitive tasks.
Alternatives: SSH (Secure Shell) is recommended for secure remote access, as it encrypts data and provides better security.
**Used to access UNIX and Linux systems. Telnet uses port 23 and is insecure.

54
Q

SSH

A

SSH (Secure Shell) is a protocol that provides secure, encrypted communication over a network, offering a secure alternative to Telnet.
Key Points:
Ports: Typically uses TCP port 22.
Encryption: SSH encrypts data, protecting it from eavesdropping and tampering.
Authentication: Supports various authentication methods, including passwords and public key authentication.
Features: Includes secure file transfer (SFTP), remote command execution, and tunneling.
Why Use SSH:
Security: Protects sensitive information and login credentials.
Versatility
**Uses port 22 and is a more secure alternative to Telnet

55
Q

NTP

A

NTP (Network Time Protocol) is a protocol used to synchronize the clocks of computers over a network.
Key Points:
Ports: Typically uses UDP port 123.
Time Synchronization: Ensures that all devices on a network have the same accurate time.
Hierarchy: Operates in a hierarchy of time sources, with primary servers at the top providing time to secondary servers, which in turn provide time to clients.
Accuracy: Can synchronize time within milliseconds over a local area network and within tens of milliseconds over the internet.
Why Use NTP:
Consistency: Ensures that timestamps on data and logs are consistent across all devices.
Security: Helps in maintaining accurate time for security protocols, certificates, and logs.
**Used for time synchronization and is implemented over UDP port 123

56
Q

LDAP

A

LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage directory information services over a network.
Key Points:
Ports: Typically uses TCP and UDP port 389. For secure communication (LDAPS), it uses port 636.
Functionality: Facilitates querying and modifying directory services like Active Directory, which store user credentials, organizational hierarchies, and other directory-based information.
Hierarchical Structure: Organizes data in a tree structure, making it easy to search and manage large sets of information.
Why Use LDAP:
Centralized Authentication: Provides a centralized way to manage user authentication and authorization across various applications and services.
Scalability: Efficiently handles large volumes of data and supports complex queries.
Flexibility: Works with various directory services, including OpenLDAP and Microsoft Active Directory.
Using LDAP can greatly simplify user management and improve security by centralizing authentication processes.
**Uses port 389, and LDAPS (secure LDAP) uses port 636

57
Q

SNMP

A

SNMP (Simple Network Management Protocol) is a protocol used for managing devices on IP networks.
Key Points:
Ports: Typically uses UDP ports 161 for general communication and 162 for receiving traps (alerts).
Functionality: Allows network administrators to monitor network performance, detect faults, and configure network devices like routers, switches, and servers.
Components:
SNMP Manager: The system used to control and monitor the activities of network devices.
SNMP Agent: Software on the managed device that reports information to the SNMP manager.
Management Information Base (MIB): A database used for managing the entities in a network device.
Why Use SNMP:
Centralized Management: Provides a unified way to monitor and manage network devices.
Real-Time Alerts: Can send alerts (traps) for specific events, allowing for quick response to network issues.
Scalability: Efficiently handles large and complex networks with various devices.
**Uses port 161. It is a protocol that facilitates network management functionality. It is not, in itself, a network management system (NMS), simply the protocol that makes NMS possible

58
Q

SNMP GET

A

A request sent by the SNMP manager to the managed device. Performing the GET command retrieves one or more values from the managed device

59
Q

SNMP TRAPS

A

The TRAPS command is initiated by agents. TRAPS is a signal sent to the manager by the agent when events occur

60
Q

SNMP Walk

A

is a simple way to set up the collection of information from your routers, switches or other SNMP enabled devices

61
Q

MIBS

A

Management Information Bases
SNMP uses databases of information called MIBs to define what parameters are accessible, which of the parameters are read-only, and which can be set. MIBs are available for thousands of devices and services, covering every imaginable need

62
Q

Difference between SNMPv2 and SNMPv3

A

You
Difference between SMPv2 SNMPv3
Copilot
SNMPv2 and SNMPv3 are both versions of the Simple Network Management Protocol, but they differ significantly in terms of security and functionality:
SNMPv2:
Security: Uses a community-based security model, which is less secure as it relies on simple passwords (community strings) for authentication1
Encryption: Does not support encryption, meaning data is sent in plaintext and can be intercepted2
Authentication: Uses community strings for authentication, which are shared between the manager and the agent2
Message Integrity: Lacks message integrity checks, making it vulnerable to data tampering2
SNMPv3:
Security: Implements a user-based security model, providing more robust security features2
Encryption: Supports encryption to ensure data confidentiality during transmission2
Authentication: Supports multiple authentication protocols (e.g., MD5, SHA) and provides message integrity checks2
Access Control: Allows for user-based access control, giving administrators the ability to define specific access rights for different users or groups2
Overall, SNMPv3 is considered more secure and robust compared to SNMPv2, making it the preferred choice for managing and monitoring network devices in a secure manner2

63
Q

SIP

A

SIP (Session Initiation Protocol) is a signaling protocol used to initiate, maintain, and terminate real-time communication sessions in voice, video, and messaging applications.
Key Points:
Ports: Commonly uses TCP/UDP port 5060 for unencrypted signals and port 5061 for encrypted signals (SIPS).
Functionality: Establishes, modifies, and terminates sessions such as voice calls, video calls, and instant messaging.
Components:
User Agents: Endpoints in the network (e.g., IP phones, softphones).
Proxy Servers: Route SIP requests to the appropriate destinations.
Registrar Servers: Handle the registration of user locations.
Redirect Servers: Direct SIP requests to other servers.
Why Use SIP:
Flexibility: Supports a wide range of real-time communication services.
Interoperability: Works with various devices and platforms, ensuring broad compatibility.
Scalability: Suitable for both small-scale deployments and large enterprise networks.
** Operates at the application layer of the OSI model and is used to maintain a multimedia session. SIP uses ports 5060 and 5061

64
Q

Well-known port

A

Identifies the ports ranging from 0 to 1023. When CompTIA says to “identify the well-known port,” this is what it refers to

65
Q

ARP

A

ARP (Address Resolution Protocol) is a protocol used to map an IP address to a physical MAC (Media Access Control) address in a local area network.
Key Points:
Functionality: ARP translates IP addresses to MAC addresses, which are necessary for network communication within the same subnet.
Process:
ARP Request: When a device wants to communicate with another device on the same network, it broadcasts an ARP request asking, “Who has this IP address?”
ARP Reply: The device with the corresponding IP address responds with its MAC address.
Use Case:
Local Network Communication: ARP is essential for devices to communicate on a local network, ensuring that data packets are correctly delivered to the intended recipient.
Security Considerations:
ARP Spoofing: Attackers can exploit ARP by sending false ARP replies, linking their MAC address to a valid IP address. This can lead to man-in-the-middle attacks.
Mitigation: Use dynamic ARP inspection (DAI) and implement network security measures to prevent ARP spoofing.
**ARP links IP addressing to Ethernet addressing (MAC addressing)

66
Q

Identify the difference between DNS and DDNS

A

One of the problems with DNS is that, despite all its automatic resolution capabilities, entries and changes to those entries must be manually performed. A strategy to solve this problem is to use Dynamic DNS (DDNS), a newer system that enables hosts to be dynamically registered with the DNS sever. By making changes in real-time to hostnames, addresses, and related information, there is less likelihood of not finding a server or site that has been recently added or changed

67
Q

FQDN

A

Fully qualified domain name
The domain name, along with any subdomains, is called fully qualified domain name because it includes all the components from the top of the DNS namespace to the host.
Many people refer to DNS as resolving FQDNs to IP addresses. An example of an FQDN is www.comptia.org, where www is the host, comptia is the second-level domain, and .org is the top-level domain

68
Q

A

A

IPv4
Stores information for IPv4 (32-bit) addresses. It is most commonly used to map hostnames to an IP address for a host

69
Q

MX

A

Mail Exchange
Stores information about where mail for the domain should be delivered

70
Q

AAAA

A

Stores information for IPv6 (128-bit) addresses. It is most commonly used to map hostnames to an IP address for a host

71
Q

CNAME

A

Canonical Name
Stores additional hostnames, or aliases, for hosts in the domain. A CNAME specifies an alias or nickname for a canonical hostname record in a Domain Name Service (DNS)

72
Q

NS

A

Name Sever
Stores information that identifies the name servers in the domain that store information for that domain

73
Q

SRV

A

Service Locator
This is a generalized service location record, used for newer protocols instead of creating protocol-specific records such as MX

74
Q

TXT

A

Text
This field was originally created to carry human-readable text in a DNS record, but that purpose has long since passed. Today, it is more common that it holds machine-readable data, such as SPF (Sender Policy Framework), and DKIM (DomainKeys Identified Mail)

75
Q

PTR

A

Pointer
A pointer to the canonical name, which is used to perform a reverse DNS lookup, in which case the name is returned when the query originates with an IP address

76
Q

SOA

A

Start of Authority
A record of information containing data on DNS zones and other DNS records. A DNS zone is the part of a domain for which an individual DNS server is responsible. Each zone contains a single SOA record

77
Q

Most common DNS zone

A

The forward lookup zone, which allows DNS clients to obtain information such as IP addresses that correspond to DNS domain names. Remember that a reverse lookup zone maps from IP addresses back to DNS domain names

78
Q

DHCP is a ? dependent service

A

Protocol-dependent service
Not a platform dependent. This means that you can use, for instance, a Linux DHCP server for a network with Windows clients or with Linux clients. Although the DHCP server offerings in the various network operating systems might slightly differ, the basic functionality is the same across the board. Likewise, the client configuration for DHCP servers running on a different operating system platform is the same as for DHCP servers running on the same base operating system platform

79
Q

What ports do DHCP operate on

A

Ports 67 and 68

80
Q

Know that DHCP can provide DNS suffixes to clients

A

In DNS, suffixes define the DNS servers to be used and the order in which to use them. DHCP settings can push a domain suffix search list to DNS clients. When such a list is specifically given to a client, the client uses only that list for name resolution. With Linux clients, this can occur by specifying entries in the resolve.conf file

81
Q

Know that an IP helper can do more than a DHCP relay agent

A

One level above