Vous êtes sur la page 1sur 4

Protocol Name Description OSI Layer Description

Telnet Telnet Allows sessions to be opened on a Network (Layer 3) Provides mechanisms for the routing of data between
remote host. devices across single or multiple network segments.
SSH Secure Shell Allows secure sessions to be opened on Handles the discovery of destination systems and

The Network+ Cram Sheet a remote host. addressing.


ICMP Internet Control Message Used on IP-based networks for error Data link (Layer 2) Has two distinct sublayers: link layer control (LLC) and
Protocol reporting, flow control, and route testing. media access control (MAC). Performs error detection
and handling for the transmitted signals. Defines the
This Cram Sheet contains the distilled key facts about the CompTIA Network+ exam. Review ARP Address Resolution Protocol Resolves IP addresses to MAC
method by which the medium is accessed. Defines
this information as the last thing you do before you enter the testing center, paying special addresses to enable communication
hardware addressing through the MAC sublayer.
attention to those areas in which you think you need the most review. You can transfer any of between devices.
Physical (Layer 1) Defines the network’s physical structure. Defines voltage/
these facts from your head onto a blank sheet of paper immediately before you begin the exam. RARP Reverse Address Resolution Resolves MAC addresses to IP
signal rates and the physical connection methods. Defines
Protocol addresses.
Networking Concepts the physical topology.
NTP Network Time Protocol Used to communicate time
synchronization information between u A topology refers to a network’s physical and logical layout. A network’s physical topol-
Table 1  Port Assignments for Commonly Used Protocols
devices. ogy refers to the actual layout of the computer cables and other network devices. A
Protocol Port Assignment Protocol Port Assignment SCP Secure Copy Protocol Allows files to be copied securely network’s logical topology refers to the way in which the network appears to the devices
FTP 20, 21 NTP 123 between two systems. Uses Secure that use it.
SSH 22 IMAP4 143 Shell (SSH) technology to provide u A local-area network (LAN) is a data network that is restricted to a single geographic
encryption services. location and typically encompasses a relatively small area, such as an office building or
SFTP 22 SNMP 161 school. The function of the LAN is to interconnect workstation computers and devices for
LDAP Lightweight Directory Access A protocol used to access and query
Telnet 23 LDAP 389 Protocol directory services systems such as the purpose of sharing files and resources.
SMTP 25 HTTPS 443 Microsoft Active Directory. u A wide-area network (WAN) is a network that spans more than one geographic loca-
DNS 53 SMB 445 IGMP Internet Group Management Provides a mechanism for systems tion, often connecting separated LANs. WANs are slower than LANs and often require
Protocol within the same multicast group to additional and costly hardware, such as routers, dedicated leased lines, and complicated
DHCP 67, 68 LDAPS 636
register and communicate with each implementation procedures.
TFTP 69 H.323 1720
other. u The role of the client computer in the client/server model is to request the data from the
HTTP 80 RDP 3389 server and present that data to the users.
DNS Domain Name System/Service Resolves hostnames to IP addresses.
POP3 110 SIP 5060, 5061 u Documentation should also include diagrams of the physical and logical network design.
DHCP Dynamic Host Configuration Automatically assigns TCP/IP
Protocol information. The physical topology refers to how a network is physically constructed—how it looks.
Table 2  TCP/IP Suite Selected Summary u Wireless networks typically are implemented using one of two wireless topologies: infra-
SNMP Simple Network Management Used in network management systems
Protocol Name Description Protocol to monitor network-attached devices for structure (managed, wireless topology) or ad hoc (unmanaged, wireless topology).
conditions that may need attention from u The term hybrid topology also can refer to the combination of wireless and wired net-
IP Internet Protocol A connectionless protocol used to move
an administrator. works, but often just refers to the combination of physical networks.
data around a network.
TLS Transport Layer Security A security protocol designed to ensure u IEEE 802.11 wireless systems communicate with each other using radio frequency sig-
TCP Transmission Control Protocol A connection-oriented protocol that
privacy between communicating client/ nals in the band between 2.4GHz and 2.5GHz or 5.0GHz. Of those in the 2.4 to 2.5 range,
offers flow control, sequencing, and
server applications. neighboring channels are 5MHz apart. Applying two channels that allow the maximum
retransmission of dropped packets.
channel separation decreases the amount of channel crosstalk and provides a noticeable
UDP User Datagram Protocol A connectionless alternative to TCP SIP Session Initiation Protocol An application-layer protocol designed
performance increase over networks with minimal channel separation.
used for applications that do not require to establish and maintain multimedia
sessions such as Internet telephony u 802.11 standards include a, b, g, n, and ac. The standards are created and maintained by
the functions offered by TCP. the IEEE.
calls.
FTP File Transfer Protocol A protocol for uploading and u A number of technologies are associated with the Internet of Things (IoT) in direct and
downloading files to and from a remote RTP Real-time Transport Protocol The Internet-standard protocol for the
transport of real-time data. indirect ways, including Z-Wave, Ant+, Bluetooth, NFC, IR, RFID, and 802.11.
host. Also accommodates basic file-
management tasks. u The bus network topology is also known as a linear bus because the computers in such
Table 3  Summary of the OSI Model a network are linked using a single cable called a trunk or backbone. If a terminator on a
SFTP Secure File Transfer Protocol A protocol for securely uploading and bus network is loose, data communications might be disrupted. Any other break in the
downloading files to and from a remote OSI Layer Description
cable will cause the entire network segment to fail.
host. Based on SSH security. Application (Layer 7) Provides access to the network for applications and certain
u In a star configuration, all devices on the network connect to a central device, and this
TFTP Trivial File Transfer Protocol A file transfer protocol that does not end-user functions. Displays incoming information and prepares
central device creates a single point of failure on the network.
have the security or error checking of outgoing information for network access.
u The wired mesh topology requires each computer on the network to be individually
FTP. TFTP uses UDP as a transport Presentation (Layer 6) Converts data from the application layer into a format that can connected to every other device. This configuration provides maximum reliability and
protocol and therefore is connectionless. be sent over the network. Converts data from the session layer redundancy for the network.
SMTP Simple Mail Transfer Protocol A mechanism for transporting email into a format that the application layer can understand. Encrypts
and decrypts data. Provides compression and decompression u A
wireless infrastructure network uses a centralized device known as a wireless access
across networks.
functionality. point (AP). Ad hoc wireless topologies are a peer-to-peer configuration and do not use a
HTTP Hypertext Transfer Protocol A protocol for retrieving files from a web wireless access point.
server. Session (Layer 5) Synchronizes the data exchange between applications on
HTTPS Hypertext Transfer Protocol A secure protocol for retrieving files separate devices. Handles error detection and notification to the Table 4  IPv4 Private Address Ranges
Secure from a web server. peer layer on the other device.
Transport (Layer 4) Establishes, maintains, and breaks connections between two Class Address Range Default Subnet Mask
POP3/IMAP4 Post Office Protocol version Used to retrieve email from the server
3/Internet Message Access on which it is stored. Can be used only devices. Determines the ordering and priorities of data. Performs A 10.0.0.0 to 10.255.255.255 255.0.0.0
Protocol version 4 to retrieve mail. IMAP and POP cannot error checking and verification and handles retransmissions if B 172.16.0.0 to 172.31.255.255 255.255.0.0
be used to send mail. necessary.
C 192.168.0.0 to 192.168.255.255 255.255.255.0

9780789758750_Dulaney_tearcard_6_panel_2 cards_REV.indd 1 12/15/17 12:51 PM



u
A MAC address is a 6-byte hexadecimal address that allows a device to be uniquely
u
Distance-vector routing protocols operate by having each router send updates about all the Device Description Key Points
identified on the network. A MAC address combines numbers and the letters A to F. An other routers it knows about to the routers directly connected to it. Modem Provides serial Modems modulate the digital signal into
example of a MAC address is 00:D0:59:09:07:51.
u
When you want the best of both worlds, distance-vector and link-state, you can turn to a communication analog at the sending end and perform the

u
A Class A TCP/IP address uses only the first octet to represent the network portion, a hybrid protocol. A popular hybrid protocol is the Border Gateway Protocol (BGP). capabilities across reverse function at the receiving end.
Class B address uses two octets, and a Class C address uses three octets.
u
Default gateways are the means by which a device can access hosts on other networks for phone lines

u
Class A addresses span from 1 to 126, with a default subnet mask of 255.0.0.0. which it does not have a specifically configured route. Firewall Provides controlled Firewalls can be hardware or software

u
Class B addresses span from 128 to 191, with a default subnet mask of 255.255.0.0.
u
The NIST (National Institute of Standards and Technology) defines three cloud computing data access between based. They are an essential part of a

u
Class C addresses span from 192 to 223, with a default subnet mask of 255.255.255.0. service models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure networks network’s security strategy.
as a Service (IaaS). Multilayer switch Functions as a switch or Operates on Layers 2 and 3 of the OSI

u
The 127 network ID is reserved for the IPv4 local loopback.

u
Network Address Translation (NAT) translates private network addresses into public

u
The NIST defines possible cloud delivery models: private, public, and hybrid. router model as a switch and can perform router
network addresses.
u
Power over Ethernet (PoE) is a technology that allows electrical power to be transmitted over functionality.
twisted-pair Ethernet cable. The power is transferred, along with data, to provide power to Content switch Forwards data by Content switches can identify and forward

u
Subnetting is a process in which parts of the host ID portion of an IP address are used to
remote devices. These devices may include remote switches, wireless access points, Voice application data by its port and application.
create more network IDs.
over IP (VoIP) equipment, and more. PoE+ is the IEEE 802.3at updated standard to the original Load balancer Distributes network load Load balancing increases redundancy and

u
Automatic Private IP Addressing (APIPA) is a system used on Windows to automatically 802.3af PoE standard. performance by distributing the load to
self-assign an IP address in the 169.x.x.x range in the absence of a DHCP server.

u
802.3 defines the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) media multiple servers.

u
In a network that does not use Dynamic Host Configuration Protocol (DHCP), you need to access method that is used in Ethernet networks. This is the most popular networking Packet shaper Manages network The shaper monitors and controls bandwidth
watch for duplicate IP addresses that prevent a user from logging on to the network. standard used today. bandwidth usage.

u
Domain Name Service (DNS) resolves hostnames to IP addresses. DNS record
u
An antenna’s strength is its gain value. VPN Increases remote- Establishes a secure connection (tunnel)
types include A, AAA, TXT, SRV, MX, CNAME, NS, and PTR. Dynamic DNS (DDNS)
automatically updates DNS information, often in real time. concentrator access security between the sending and receiving network
Table 6  Comparing Omnidirectional and Unidirectional Antennas
devices.

u
Port Address Translation (PAT) is a variation on NAT in which all systems on the LAN
Characteristic Omnidirectional Unidirectional Advantage/Disadvantage
are translated into the same IP address but with different port number assignments. Access point Used to create a Uses the wireless infrastructure network
Destination Network Address Translation (DNAT) is used to publish a private network Wireless area General coverage Focused Omnidirectional allows wireless LAN and to mode to provide a connection point between
service to a publicly available IP address. Although the term varies by vendor, SNAT is a coverage area coverage area. 360-degree coverage, giving extend a wired network WLANs and a wired Ethernet LAN.
proprietary extension of NAT. it a wide coverage area. HIDS Host-based intrusion Monitors the host, analyzes data, and

u
6to4 is a tunneling technology that enables IPv6 packets to be transmitted over an IPv4 Unidirectional provides a detection identifies intrusion attempts.
network without having to create a complex tunnel. It is often used during the transition targeted path for signals to IDS/IPS Detects and prevents Monitors the network and attempts to detect/
period when a network is being updated and is not intended to be a permanent solution. travel. intrusions prevent intrusion attempts.
Its counterpart is 4to6. Wireless Limited Long point-to- Omnidirectional antennas

u
Teredo gives full IPv6 connectivity for IPv6-capable hosts, which are on the IPv4 Internet transmission point range. provide a 360-degree
u
An intrusion detection system (IDS) can detect malware or other dangerous traffic that may
but lack direct native connection to an IPv6 network. Teredo can do this from behind range coverage pattern and, as pass undetected by the firewall. Most IDSs can detect potentially dangerous content by its
NAT devices (such as home routers). One of the most popular Teredo implementations a result, far less range. signature.
is Miredo; it is a client designed to allow full IPv6 connectivity to systems that are strictly Unidirectional antennas focus
u
An intrusion prevention system (IPS) is a network device that continually scans the network,
IPv4 based. the wireless transmission; this looking for inappropriate activity. It can shut down any potential threats.
focus enables greater range.

u
Unshielded twisted-pair (UTP) cabling is classified by category. Categories 5/5e and 6/6a offer
Table 5  Comparing IPv4 and IPv6 Wireless Restricted The Omnidirectional antennas are transmission distances of 100 meters.
coverage unidirectional limited to their circular pattern
u
Virtualization makes it possible to take a single physical device and make it appear as if it is a
Address Feature IPv4 Address IPv6 Address shaping wireless range range. Unidirectional antennas number of standalone entities.
Loopback address 127.0.0.1 0:0:0:0:0:0:0:1 (::1) can be increased can be adjusted to define a
and decreased. specific pattern, wider or more
u
Two methods of virtualization implementation use a hypervisor: Type I (known as bare metal)
Networkwide addresses IPv4 public address Global unicast IPv6 addresses and Type II (known as hosted). Type I is independent of the operating system and boots before
ranges focused.
the OS; Type II is dependent on the operating system and cannot boot until the OS is up, and
Private network 10.0.0.0 Site-local address ranges
u
Multiuser multiple input, multiple output (MUMIMO) is an enhancement over the original MIMO it needs the OS to stay up so that it can operate.
addresses
172.16.0.0
(FEC0::) technology. It allows antennas to be spread over a multitude of independent access points.
u
The machine on which virtualization software is running is known as a host; the virtual
machines (VMs) themselves are known as guests.
192.168.0.0
Infrastructure
u
A virtual switch works the same as a physical switch but allows multiple switches to exist on
Autoconfigured IPv4 automatic private IP Link-local addresses of FE80:: the same host, saving the implementation of additional hardware.
addresses addressing (169.254.0.0) prefix
Table 7  Network Devices Summary
u
A virtual firewall (VF) is either a network firewall service or an appliance running entirely within

u
Quality of service (QoS) allows administrators to predict bandwidth use, monitor that use, the virtualized environment. Regardless of the implementation, a virtual firewall serves the
and control it to ensure that bandwidth is available to applications that need it. Device Description Key Points same purpose as a physical one: packet filtering and monitoring. The firewall can also run in a
Hub Connects devices on A hub does not perform any tasks besides guest OS VM.

u
A router that uses a link-state protocol differs from a router that uses a distance-vector
protocol because it builds a map of the entire network and then holds that map in an Ethernet twisted-pair signal regeneration. It simply forwards data
u
In a virtual environment, shared storage can be done on storage-area network (SAN), network-
memory. Link-state protocols include Open Shortest Path First (OSPF) and Intermediate network to all nodes connected to it. attached storage (NAS), and so on; the virtual machine sees only a “physical disk.” With
System-to-Intermediate System (IS-IS). Switch Connects devices on a A switch forwards data to its destination by clustered storage, you can use multiple devices to increase performance.

u
Hops are the means by which distance-vector routing protocols determine the shortest twisted-pair network using the MAC address embedded in each
u
Switches introduce microsegmentation, by which each connected system effectively operates
way to reach a given destination. Each router constitutes one hop, so if a router is four packet. It forwards data only to nodes that on its own dedicated network connection.
hops away from another router, there are three routers, or hops, between itself and the need to receive it.
destination. Router Connects networks A router uses the software-configured

u
Routing Information Protocol version 2 (RIPv2) is a distance-vector routing protocol used network address to make forwarding
for TCP/IP. decisions.

u
The route add command adds a static route to the routing table. The route add
command with the -p switch makes the static route persistent.

9780789758750_Dulaney_tearcard_6_panel_2 cards_REV.indd 2 12/15/17 12:51 PM


Table 10  Comparing WAN Technologies
Network Operations
WAN Speed Supported Switching Key Characteristics
u A virtual private network (VPN) extends a LAN by establishing a remote connection,
Technology Media Method a connection tunnel, using a public network such as the Internet. Common VPN
Used implementations include site-to-site/client-to-site.
The Network+ Cram Sheet Continued ISDN BRI: 64 Kbps
to 128 Kbps
Copper/
fiber-optic
Can be used
for circuit-
ISDN can be used to
transmit all types of

u Point-to-Point Protocol over Ethernet (PPPoE) is a protocol used to connect multiple
network users on an Ethernet local area network to a remote site through a common
switching traffic, including voice, device.
Table 8  Comparison of Switching Methods PRI: 64 Kbps
or packet- video, and data. Basic
u The logical network refers to the direction in which data flows on the network within the
to 1.5 Mbps
switching Rate Interface (BRI) uses physical topology. The logical diagram is not intended to focus on the network hardware
Switching Pros Cons Key Features
connections 2B+D channels; Primary but rather on how data flows through that hardware.
Method Rate Interface (PRI)
Packet switching Packets can Packets can become The two types of uses 23B+D channels.
u Keeping and reviewing baselines is an essential part of the administrator’s role.
be routed lost while taking packet switching B channels are 64 Kbps.
u On diagrams, it is not enough to show that there is an intermediate distribution frame
around network alternative routes to the are datagram ISDN uses the public (IDF) and/or main distribution frame (MDF) in your building. You need to thoroughly
congestion. destination. Messages and virtual circuit. network and requires dial- document any and every freestanding or wall-mounted rack and the cables running
Packet switching are divided into packets Datagram packets are in access. between them and the end user devices.
makes efficient that contain source and independently sent T-carrier (T1, T1: 1.544 Copper/ Circuit T-carrier is used to create
u Port locations should be carefully recorded and included in network documentation.
use of network destination information. and can take different T3) Mbps fiber-optic switching point-to-point network SNMP can be used directly to map ports on switches and other devices; it is much
bandwidth. paths throughout connections for private easier, however, to use software applications that incorporate SNMP and use it to create
the network. Virtual T3: 44.736 ready-to-use documentation.
networks.
circuit uses a logical Mbps

u Onboarding mobile device is the set of procedures they go through to get ready to join
connection between ATM 1.544 Mbps Copper/ Cell switching ATM uses fixed cells that the network (scanning for viruses, adding certain apps, and so forth).
the source and to 622 Mbps fiber-optic are 53 bytes long.
destination device.
u Offboarding is the process of removing company-owned resources when they are no
Frame Relay 56 Kbps to Copper/ PVCs and Frame Relay is a packet- longer needed (often done with a wipe or factory reset).
Circuit switching Offers a Dedicated channels can Offers the capability 1.544 Mbps fiber-optic SVCs oriented protocol, and
dedicated cause delays because of storing messages
u Network policies dictate network rules and provide guidelines for network conduct.
it uses variable-length
transmission a channel is unavailable temporarily to reduce Policies are often updated and reviewed and are changed to reflect changes to the
packets.
channel that is until one side network congestion. network and perhaps changes in business requirements.
SONET/OCx 51.8 Mbps to Fiber-optic — SONET defines
u Organizing and completing the initial set of network documentation is a huge task, but it
reserved until it is disconnects. Uses a 2.4 Gbps synchronous data transfer
disconnected. dedicated physical link is just the beginning. Administrators must constantly update all documentation to keep it
over optical cable. from becoming obsolete.
between the sending
and receiving devices.
u Hot, warm, and cold sites are designed to provide alternative locations for network
Table 11  Twisted-Pair Cable Categories
operations if a disaster occurs.

u
Shaping by application: Administrators can control traffic based on the types of network traffic Category Common Application
u Security policies define what controls are required to implement and maintain the security
and assign that category a bandwidth limit. of systems, users, and networks. Acceptable use policies (AUPs) describe how the
3 16 Mbps

u
Internet Small Computer System Interface (iSCSI) allows SCSI commands to be sent over IP employees in an organization can use company systems and resources—both software
networks to SCSI devices. 5 100 Mbps and hardware.

u
Fibre Channel is widely used for high-speed fiber networking and has become common in 5e 1000 Mbps
u The cornerstone of every disaster recovery strategy is the preservation and recoverability
enterprise SANs. 6 10/100/1000 Mbps plus 10 Gbps of data.

u
F-type connectors are used with coaxial cable, most commonly to connect cable modems and 6a 10 Gbps and beyond networking
u A snapshot is an image of the state of a system at a particular point in time—an
TVs. F-type connectors are a screw-type connector. 7 High-speed networking instantaneous copy of the system.

u
ST, FC, SC, LC, and MT-RJ connectors are associated with fiber cabling. ST and FC
u When you design a fault-tolerant system, your planning should definitely include
connectors offer a twist-type attachment, and SC, LC, and MT-RJ connectors are push-on.
u
568A and 568B are telecommunications standards from the Telecommunications Industry uninterruptible power supplies (UPSs). A UPS serves many functions and is a major part

u
RJ-45 connectors are used with UTP cables and are associated with networking applications. Association (TIA) and the Electronic Industries Association (EIA) that specify the pin of server consideration and implementation.
RJ-11 connectors are used with telephone cables. RJ-48C connectors are used for T1 and arrangements for the RJ-45 connectors on UTP or STP cables. The number 568 refers to the
u Business continuity is primarily concerned with the processes, policies, and methods that
ISDN termination. order in which the wires within the cable are terminated and attached to the connector. Often an organization follows to minimize the impact of a system failure, network failure, or the
referred to as T568A and T568B (for termination standard), they are quite similar; the difference

u
Plenum-rated cables are used to run cabling through walls or ceilings.
is the order in which the pins are terminated. The signal is the same for both. Both are used for
failure of any key component needed for operation.

u
The horizontal cabling extends from the telecommunications outlet, or network outlet patch cords in an Ethernet network.
u Mean time between failures (MTBF) is the measurement of the anticipated or predicted
with RJ-45 connectors, at the client end. It includes all cable from that outlet to the incidence of failure of a system or component between inherent failures.
telecommunication room to the horizontal cross-connect.

u Proxy servers typically are part of a firewall system. They have become so integrated with

u Mean time to recovery (MTTR) is the measurement of how long it takes to repair a system
firewalls that the distinction between the two can sometimes be lost.

u
Vertical cable, or backbone cable, refers to the media used to connect telecommunication

u Half-duplex mode enables each device to both transmit and receive, but only one of these
or component after a failure occurs.
rooms, server rooms, and remote locations and offices.
u Port scanners are a software-based utility. They are a security tool designed to search a
processes can occur at a time.
network host for open ports on a TCP/IP-based network.
Table 9  Selected ADSL Speeds
u Full-duplex mode enables devices to receive and transmit simultaneously.

u Performance tests are about network functioning today. Load tests look forward to see

u A firewall is considered a logical security measure and is one of the cornerstone concepts of whether performance may be hindered in the future by growth or other changes to the
DSL Variation Upload Speed Download Speed network security. Firewalls can be host or network based and can provide application/context- network.
ADSL 1 Mbps 3 Mbps driven detection.

u In-band network device management is local management (the most common method),
ADSL2 1.3 Mbps 12 Mbps
u At its most basic, a firewall is a device that has more than one network interface and manages and out-of-band management is done remotely.
ADSL2+ 1.4 Mbps 24 Mbps the flow of network traffic between those interfaces.

u In a full backup, all data is backed up. Full backups do not use the archive bit, but they

u A network’s demarcation point refers to the connection point between the Internet service do clear it.
provider’s (ISP) part of the network and the customer’s portion of the network.

9780789758750_Dulaney_tearcard_6_panel_2 cards_REV.indd 3 12/15/17 12:51 PM



u Incremental backups back up all data that has changed since the last full or incremental
Network Troubleshooting and Tools
u
Data signals might also be subjected to crosstalk, which occurs when signals from two cables,
backup. They use and clear the archive bit. or from wires within a single cable, interfere with each other.

u Remote Desktop Protocol (RDP) is a low-bandwidth protocol used to send mouse
Table 12  Network Troubleshooting Methodology
u
The weakening of data signals as they traverse the media is called attenuation.
movements, keystrokes, and bitmap images of the screen on the server to the client
computer during Remote Desktop Connections.

u
A straight-through cable is used to connect systems to the switch or hub using the medium-
Steps Actions Considerations dependent interface crossed (MDI-X) ports.
Identify the problem. Gather information.
u
A T1 crossover cable is used to connect two T1 CSU/DSU devices in a back-to-back
Network Security configuration.
Duplicate the problem, if

u Terminal Access Controller Access Control System+ (TACACS+) is a security protocol possible.
u
When you have two dissimilar types of network media, a media converter is used to allow
designed to provide centralized validation of users who are attempting to gain access to Question users. them to connect.
a router or network access server (NAS).
Identify symptoms.
u
When it comes to wireless, distance from the AP is one of the first things to check when

u Remote Authentication Dial-In User Service (RADIUS) is a security standard that uses a troubleshooting AP coverage.
Determine whether anything has
client/server model to authenticate remote network users.
changed.
u
Data rate refers to the theoretical maximum of a wireless standard, such as 100 Mbps.

u Spanning Tree Protocol (STP) is designed to prevent routing loops from occurring. STP is Throughput refers to the actual speeds achieved after all implementation and interference
Approach multiple problems factors.
used with network bridges and switches. With the help of spanning-tree algorithm (STA),
individually.
STP avoids or eliminates loops on a Layer 2 bridge. It is defined as IEEE 802.1D and the
u Protocol analyzers can be hardware or software based. Their primary function is to analyze
more recent Rapid Spanning Tree (802.1w). Establish a theory of probable Question the obvious. network protocols such as Transfer Control Protocol (TCP), User Datagram Protocol (UDP),

u Virtual LANs (VLANs) are used for network segmentation. 802.1Q is the Institute cause. Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and more.
of Electrical and Electronics Engineers (IEEE) specification developed to ensure Consider multiple approaches. Top-to-bottom/bottom-
u A time-domain reflectometer (TDR) is a device used to send a signal through a particular
interoperability of VLAN technologies from the various vendors. to-top OSI model medium to check the cable’s continuity.

u VLAN trunking is the application of trunking to the virtual LAN—now common with Divide and conquer
u An optical time-domain reflectometer (OTDR) performs the same basic function as a wire
routers, firewalls, VMware hosts, and wireless access points. VLAN trunking provides a Test the theory to determine After theory is confirmed, media tester, but on optical media.
simple and cheap way to offer a nearly unlimited number of virtual network connections. cause. determine next steps to resolve
u Packet sniffers are either a hardware device or software that eavesdrops on transmissions that
The requirements are only that the switch, the network adapter, and the OS drivers all problem. are traveling throughout the network.
support VLANs. If theory is not confirmed,
u Throughput testers identify the rate of data delivery over a communication channel.

u The VLAN Trunking Protocol (VTP) is a proprietary protocol from Cisco. reestablish new theory or
u Punchdown tools are used to attach twisted-pair network cable to connectors within a patch

u A honeypot is a computer that has been designated as a target for computer attacks. escalate. panel. Specifically, they connect twisted-pair wires to the insulation displacement connector

u A demilitarized zone (DMZ) is part of a network on which you place servers that must be Establish a plan of action (IDC).
accessible by sources both outside and inside your network. to resolve the problem and
u Cable certifiers are used to test cables such as CAT6 and CAT6a and verify they meet

u An access control list (ACL) typically refers to specific access permissions assigned to identify potential effects. specifications for frequency and speed.
an object or device on the network. For example, using Media Access Control (MAC) Implement the solution or
u A wire crimper is a tool that you use to attach media connectors to the ends of cables.
address filtering wireless routers can be configured to restrict who can and cannot escalate as necessary.
access the router based on the MAC address.
u Wire strippers come in a variety of shapes and sizes. Some are specifically designed to strip
Verify full system functionality the outer sheathing from coaxial cable, and others are designed to work with UTP cable. Wire

u When a port is blocked, you disable the capability for traffic to pass through that port, and, if applicable, implement snips are used to cleanly cut the cable.
thereby filtering that traffic. preventative measures.

u Temperature monitors keep track of the temperature in wiring closets and server rooms.

u To create secure data transmissions, IPsec uses two separate protocols: Authentication Document findings, actions,
Header (AH) and Encapsulating Security Payload (ESP). and outcomes.

u The Remote Desktop Protocol (RDP) allows client systems to access and run applications
on a remote system, using that system’s resources. Only the user interface, keystrokes,
u
The netstat -a command can be used on a Windows-based system to see the status of
and mouse movements are transferred between the client and server computers. ports.

u Authentication refers to the mechanisms used to verify the identity of the computer or
u
You can ping the local loopback adapter by using the command ping 127.0.0.1. If this
user attempting to access a particular resource. This includes passwords and biometrics. command is successful, you know that the TCP/IP suite is installed correctly on your system

u Authorization is the method used to determine whether an authenticated user has access and is functioning.
to a particular resource. This is commonly determined through group association—a
u
In Windows, the tracert command reports how long it takes to reach each router in the
particular group may have a specific level of security clearance. path. It’s a useful tool for isolating bottlenecks in a network. The traceroute command

u Accounting refers to the tracking mechanisms used to keep a record of events on a performs the same task on UNIX and Linux systems.
system.
u
Address Resolution Protocol (ARP) is the part of the TCP/IP suite whose function is to resolve

u U
ser authentication methods include multifactor authentication, two-factor IP addresses to MAC addresses.
authentication, and single sign-on.
u
netstat is used to view both inbound and outbound TCP/IP network connections.

u Kerberos is one part of a strategic security solution that provides secure authentication
u
nbtstat is used to display protocol and statistical information for NetBIOS over TCP/IP
services to users, applications, and network devices. It eliminates the insecurities caused connections.
by passwords being stored or transmitted across the network.
u
ipconfig shows the IP configuration information for all NICs installed in a system.

u A public key is a nonsecret key that forms half of a cryptographic key pair that is used
u
ipconfig /all is used to display detailed TCP/IP configuration information.
with a public key algorithm. The public key is freely given to all potential receivers.
u
ipconfig /renew is used on Windows operating systems to renew the system’s DHCP

u A private key is the secret half of a cryptographic key pair that is used with a public key information.
algorithm. The private part of the public key cryptography system is never transmitted
u
When looking for client connectivity problems using ipconfig, you should ensure that the
over a network. gateway is set correctly.

u A certificate is a digitally signed statement that associates the credentials of a public key
u
The ifconfig command is the Linux equivalent of the ipconfig command.
to the identity of the person, device, or service that holds the corresponding private key.

u
The nslookup command is a TCP/IP diagnostic tool used to troubleshoot DNS problems.

u U
nsecure protocols include Telnet, HTTP, SLIP, FTP, Trivial FTP (TFTP), and Simple
Network Management Protocol version 1/2 (SNMPv1/v2).

u
Many factors cause electromagnetic interference (EMI), including computer monitors and
fluorescent lighting fixtures.

u Physical security controls include mantraps, video monitoring, proximity readers/key fob,
keypad/cipher locks, biometrics, and security guards.

u
Copper-based media is prone to EMI, whereas fiber-optic cable is immune to it.

9780789758750_Dulaney_tearcard_6_panel_2 cards_REV.indd 4 12/15/17 12:51 PM

Vous aimerez peut-être aussi