Network+ Chapter 6 Flashcards Preview

Network + N10-006 > Network+ Chapter 6 > Flashcards

Flashcards in Network+ Chapter 6 Deck (25):
1

The DoD model is basically a condensed version of the OSI model; it’s composed of four, instead of seven, layers:
Ch 6 Pg 158

1) Process/Application layer
2) Host-to-Host layer
3) Internet layer
4) Network Access layer

2

is the protocol that actually lets you transfer files across an IP network, and it can accomplish this between any two machines that are using it. Ch 6 Pg 160

File Transfer Protocol (FTP)

3

What has replaced Telnet? Ch 6 Pg 160

Secure Shell (SSH)

4

is the stripped-down, stock version of FTP, but it’s
the protocol of choice if you know exactly what you want and where to find it—plus it’s easy to use, and it’s fast
Ch 6 Pg 161

Trivial File Transfer Protocol (TFTP)

5

Whats the difference between TFTP vs FTP?

Ch 6 Pg 161

1)TFTP has no directory-browsing abilities;
2)It can do nothing but send and receive files.
3)Sends much smaller data blocks than FTP
4)no authentication as with FTP, so it’s insecure.
5)Few sites support it because of the inherent security risks.

6

is a hugely popular signaling protocol used to construct
and deconstruct multimedia communication sessions for many things like voice and video calls, videoconferencing, streaming multimedia distribution, instant messaging, presence information, and online games over the Internet.

Ch 6 Pg 163

Session Initiation Protocol (SIP)

7

describes a packet-formatting standard for delivering
audio and video over the Internet. Ch 6 Pg 163

Real-time Transport Protocol (RTP)

8

what is Real-time Transport Protocol (RTP) used for today?

Ch 6 Pg 163

It’s commonly employed for streaming media, videoconferencing, and push-to-talk systems—all things that make it a de facto standard in Voice
over IP (VoIP) industries.

9

collects and manipulates valuable network
information. It gathers data by polling the devices on the network from a management station
at fixed or random intervals, requiring them to disclose certain information. Ch 6 Pg 163

Simple Network Management Protocol (SNMP)

10

SNMP receives something called a baseline. What is the definition of baseline?

Ch 6 Pg 163

a report delimiting the operational traits of a healthy network. This protocol can also stand as a watchdog over the network, quickly notifying managers of any sudden turn of events.

11

works in conjunction with other synchronization utilities to ensure that all computers on a given network agree on the time. Ch 6 Pg 164

Network Time Protocol (NTP)

12

is the TCP/IP protocol used for managing
IP multicast sessions. It accomplishes this by sending out unique messages over the network to reveal the multicast-group landscape and to find out which hosts belong to which multicast group. Ch 6 Pg 165

Internet Group Management Protocol (IGMP)

13

T or F The IP address range for APIPA is 169.254.0.1 through 169.254.255.254 and The client also configures
itself with a default class B subnet mask of 255.255.0.0.

Ch 6 Pg 172

True

14

What are the (UDP)Port numbers for SNMP, TFPT, DNS, BOOTPS/DHCP

Ch 6 Pg 172

SNMP 161
TFTP 69
DNS 53
BOOTPS/DHCP 67,68

15

works at the Network layer and is used by IP
for many different services. ICMP is a management protocol and messaging service provider
for IP. Its messages are carried as IP packets.
Ch 6 Pg 190

Internet Control Message Protocol (ICMP)

16

ICMP packets have the following characteristics:
Ch 6 Pg 190

1) They can provide hosts with information about network problems.
2)They are encapsulated within IP datagrams.

17

finds the hardware address of a host from a known IP address. Ch 6 Pg 192

Reverse Address Resolution Protocol (ARP)

18

discovers the identity of the IP address for diskless machines by sending out a packet that includes its MAC address and a request for the IP address assigned to that MAC address.

Address Resolution Protocol (RARP)

Lammle, Todd (2015-04-24). CompTIA Network+ Study Guide: Exam N10-006 (Comptia Network + Study Guide Authorized Courseware) (p. 193). Wiley. Kindle Edition.

19

True or False Both Ping and Traceroute (also just called Trace, and Microsoft Windows uses tracert) allow you to verify address configurations in your internetwork.

Ch 6 Pg 191

True

20

uses ICMP echo request and reply messages to check the physical and logical connectivity of machines on an internetwork.

Ch 6 Pg 191

Ping

21

If a router's memory buffer for receiving incoming datagrams is full, it will use ICMP to send out this message until the congestion abates.

Ch 6 Pg 190

Buffer Full

22

Internet Control Message Protocol (ICMP) works at which OSI layer?

Ch 6 Pg 190

the Network Layer

23

ICMP packets have the following characteristics:

Ch 6 Pg 190

They can provide hosts with information about network problems.

They are encapsulated within IP datagrams.

24

If you were to compare User Datagram Protocol (UDP) with TCP, the former is basically the scaled-down economy model that's sometimes referred to this?

thin protocol

25

What is the port # for (SSH) Secure Shell?

Secure Shell (25)