19 9780789759818 app c
Transcript of 19 9780789759818 app c
Appendix C
Memory Tables
Chapter 1Table 1-3 Characteristics, Benefits, and drawbacks of a Star Topology
Characteristics Benefits Drawbacks
Devices have independent connections back to a central device (for example, a hub or a switch).
More cable is required for a star topology, as opposed to bus or ring topologies because each device requires its own cable to connect back to the central device.
Star topologies are commonly used with Ethernet technologies (described in Chapter 4).
Installation can take longer for a star topology, as opposed to a bus or ring topology, because more cable runs that must be installed.
Table 1-4 Characteristics, Benefits, and drawbacks of a Hub-and-Spoke WAn Topology
Characteristics Benefits Drawbacks
Each remote site (that is, a spoke) connects back to a main site (that is, the hub) via a WAN link.
Suboptimal routes must be used between remote sites because all intersite communication must travel via the main site.
Communication between two remote sites travels through the hub site.
Because all remote sites converge on the main site, this hub site potentially becomes a single point of failure.
— — Because each remote site is reachable by only a single WAN link, the hub-and-spoke topology lacks redundancy.
4 CompTiA network+ n10-007 Cert Guide
Table 1-5 Characteristics, Benefits, and drawbacks of a Full-Mesh WAn Topology
Characteristics Benefits Drawbacks
Every site has a direct WAN connection to every other site.
A full-mesh network can be difficult and expensive to scale, because the addition of one new site requires a new WAN link between the new site and every other existing site.
The number of required WAN connections can be calculated with the formula w = n * (n – 1) / 2, where w = the number of WAN links and n = the number of sites. For example, a network with 10 sites would require 45 WAN connections to form a fully meshed network: 45 = 10 * (10 – 1) / 2.
— —
Table 1-6 Characteristics, Benefits, and drawbacks of a partial-Mesh Topology
Characteristics Benefits Drawbacks
Selected sites (that is, sites with frequent intersite communication) are interconnected via direct links, whereas sites that have less-frequent communication can communicate via another site.
A partial-mesh topology is less fault tolerant than a full-mesh topology.
Appendix C: Memory Tables 5
Characteristics Benefits Drawbacks
A partial-mesh topology uses fewer links than a full-mesh topology and more links than a hub-and-spoke topology for interconnecting the same number of sites.
A partial-mesh topology is more expensive than a hub-and-spoke topology.
Table 1-7 Characteristics, Benefits, and drawbacks of a Client/Server network
Characteristics Benefits Drawbacks
Client devices (for example, PCs) share a common set of resources (for example, file or print resources) located on one or more dedicated servers.
Because multiple clients might rely on a single server for their resources, the single server can become a single point of failure in the network.
Resource sharing is made possible via dedicated server hardware and network operating systems.
Client/server networks can cost more than peer-to-peer networks. For example, client/server networks might need the purchase of dedicated server hardware and a network OS with an appropriate number of licenses.
Table 1-8 Characteristics, Benefits, and drawbacks of a peer-to-peer network
Characteristics Benefits Drawbacks
Client devices (for example, PCs) share their resources (for example, file and printer resources) with other client devices.
Scalability is limited because of the increased administration burden of managing multiple clients.
Resource sharing is made available through the clients’ operating systems.
Performance might be less than that seen in a client/server network because the devices providing network resources might be performing other tasks not related to resource sharing (for example, word processing).
6 CompTiA network+ n10-007 Cert Guide
Chapter 2Table 2-1 Application Layer protocols/Applications
Protocol Description TCP Port UDP Port
DHCP Dynamic Host Configuration Protocol: Dynamically assigns IP address information (for example, IP address, subnet mask, DNS server’s IP address, and default gateway’s IP address) to a network device
DNS Domain Name System: Resolves domain names to corresponding IP addresses
FTP File Transfer Protocol: Transfers files with a remote host (typically requires authentication of user credentials)
H.323 A signaling protocol that provides multimedia communications over a network
HTTP Hypertext Transfer Protocol: Retrieves content from a web server
HTTPS Hypertext Transfer Protocol Secure: Used to securely retrieve content from a web server
IMAP Internet Message Access Protocol: Retrieves email from an email server
IMAP4 Internet Message Access Protocol Version 4: Retrieves email from an email server
LDAP Lightweight Directory Access Protocol: Provides directory services (for example, a user directory that includes username, password, email, and phone number information) to network clients
LDAPS Lightweight Directory Access Protocol over SSH: A secured version of LDAP
MGCP Media Gateway Control Protocol: Used as a call control and communication protocol for Voice over IP networks
NetBIOS Network Basic Input/Output System: Provides network communication services for LANs that use NetBIOS
NNTP Network News Transport Protocol: Supports the posting and reading of articles on Usenet news servers
NTP Network Time Protocol: Used by a network device to synchronize its clock with a time server (NTP server)
POP3 Post Office Protocol Version 3: Retrieves email from an email server
Appendix C: Memory Tables 7
Protocol Description TCP Port UDP Port
RDP Remote Desktop Protocol: A Microsoft protocol that allows a user to view and control the desktop of a remote computer
rsh Remote Shell: Allows commands to be executed on a computer from a remote user
RTP Real-time Transport Protocol: Used for delivering media-based data (such as Voice over IP) through the network
RTSP Real-Time Streaming Protocol: Communicates with a media server (for example, a video server) and controls the playback of the server’s media files
SCP Secure Copy: Provides a secure file-transfer service over an SSH connection and offers a file’s original date and time information, which is not available with FTP
SFTP Secure FTP: Provides FTP file-transfer service over an SSH connection
SIP Session Initiation Protocol: Used to create and end sessions for one or more media connections, including Voice over IP calls
SMB Server Message Block: Used to share files, printers, and other network resources
SMTP Simple Mail Transfer Protocol: Used for sending email
SNMP Simple Network Management Protocol: Used to monitor and manage network devices
SNMP Trap
Simple Network Management Protocol Trap: A notification sent from an SNMP agent to an SNMP manager
SNTP Simple Network Time Protocol: Supports time synchronization among network devices, similar to Network Time Protocol (NTP), although SNTP uses a less complex algorithm in its calculation and is slightly less accurate than NTP
SSH Secure Shell: Used to securely connect to a remote host (typically via a terminal emulator)
Telnet Telnet: Used to connect to a remote host (typically via a terminal emulator)
TFTP Trivial File Transfer Protocol: Transfers files with a remote host (does not require authentication of user credentials)
8 CompTiA network+ n10-007 Cert Guide
Chapter 3Table 3-1 network infrastructure device Characteristics
Device Number of Collision Domains Possible
Number of Broadcast Domains Possible
OSI Layer of Operation
Hub
Bridge
Switch
Multilayer switch
Router
Table 3-2 Common dnS Record Types
Record Type Description
A
AAAA
CNAME
MX
NS
PTR
SOA
SRV
TXT
Appendix C: Memory Tables 9
Table 3-3 Voip network elements
Protocol/Device Description
IP phone
Call agent
Gateway
PBX
Analog phone
SIP
RTP
Chapter 4Table 4-1 ethernet Bandwidth Capacities
Ethernet Type Bandwidth Capacity
Standard Ethernet
Fast Ethernet
Gigabit Ethernet
10 CompTiA network+ n10-007 Cert Guide
Ethernet Type Bandwidth Capacity
10-Gigabit Ethernet
100-Gigabit Ethernet
Table 4-2 Types of ethernet
Ethernet Standard Media Type Bandwidth Capacity
Distance Limitation
10BASE5 500 m
10BASE2 185 m
10BASE-T 100 m
100BASE-TX 100 m
100BASE-FX 2 km
1000BASE-T 100 m
1000BASE-TX 100 m
1000BASE-LX 5 km
1000BASE-LH 10 km
1000BASE-ZX 70 km
10GBASE-SR 26 m–400 m
10GBASE-LR 10 km–25 km
10GBASE-ER 40 km
10GBASE-SW 300 m
10GBASE-LW 10 km
10GBASE-EW 40 km
10GBASE-T 100 m
100GBASE-SR10 125 m
100GBASE-LR4 10 km
100GBASE-ER4 40 km
Appendix C: Memory Tables 11
Table 4-3 STp port Types
Port Type Description
Root port
Designated port
Nondesignated port
Chapter 5Table 5-1 Binary Conversion Table
Table 5-19 ip Address Classes
Address Class Value in First Octet Classful Mask (Dotted Decimal)
Classful Mask (Prefix Notation)
Class A /8
Class B /16
Class C /24
Class D — —Class E — —
Table 5-20 private ip networks
Address Class Address Range Default Subnet Mask
Class A 255.0.0.0
Class B 255.255.0.0
Class B 255.255.0.0
Class C 255.255.255.0
12 CompTiA network+ n10-007 Cert Guide
Table 5-22 dotted-decimal and prefix-notation Representations for ipv4 Subnets
Dotted-Decimal Notation Prefix Notation
255.0.0.0
255.128.0.0
255.192.0.0
255.224.0.0
255.240.0.0
255.248.0.0
255.252.0.0
255.254.0.0
255.255.0.0
255.255.128.0
255.255.192.0
255.255.224.0
255.255.240.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252
Appendix C: Memory Tables 13
Table 5-24 number of Subnets Created by a Specified number of Borrowed Bits
Borrowed Bits Number of Subnets Created (2s, Where s Is the Number of Borrowed Bits)
0
1
2
3
4
5
6
7
8
9
10
11
12
Table 5-25 number of Supported Hosts Given a Specified number of Host Bits
Host Bits Number of Supported Hosts (2h–2, Where h Is the Number of Host Bits)
2
3
4
5
6
7
8
9
10
11
12
14 CompTiA network+ n10-007 Cert Guide
Chapter 6Table 6-1 Administrative distance
Routing Information Source Administrative Distance
Directly connected network
Statically configured network
EIGRP
OSPF
RIP
External EIGRP
Unknown of unbelievable
Table 6-2 names of nAT ip Addresses
NAT IP Address Definition
Inside local
Inside global
Outside local
Outside global
Chapter 7Table 7-1 Typical WAn data Rates
WAN Technology Typical Available Bandwidth
Frame Relay
T1
T3
E1
E3
ATM
SONET
Appendix C: Memory Tables 15
Table 7-2 Common pOTS Terms
Term Definition
Telco
Local loop
Central office (CO)
Tip and ring
Demarc
Smart jack
Table 7-3 iSdn network Reference points and elements
Term Definition
R reference point
S/T reference point
16 CompTiA network+ n10-007 Cert Guide
Term Definition
U reference point
Terminal adapter (TA)
Terminal endpoint 1 (TE1)
Terminal endpoint 2 (TE2)
Network termination 1 (NT1)
Table 7-5 MpLS network elements
Element Description
CPE
CE
ELSR
PE
LSR
P
Appendix C: Memory Tables 17
Chapter 8Table 8-3 Characteristics of 802.11 Standards
Standard Band Max. Bandwidth Transmission Method
Max. Range
802.11 DSSS or FHSS
802.11a OFDM
802.11b DSSS
802.11g OFDM or DSSS
802.11n OFDM
802.11ac OFDM
Chapter 9Table 9-1 Three Categories of Quality issues
Issue Description
Delay
Jitter
Drops
18 CompTiA network+ n10-007 Cert Guide
Table 9-2 Three Categories of QoS Mechanisms
Issue Description
Best effort
Integrated Services (IntServ)
Differentiated services (DiffServ)
Chapter 10Table 10-2 parameters for the Windows ipconfig Command
Parameter Purpose
/all
/release and /release6
/renew and /renew6
Table 10-5 parameters for the Windows ping Command
Parameter Purpose
-t
-n count
Appendix C: Memory Tables 19
Parameter Purpose
-f
-i TTL
-S srcaddr
target_name
Table 10-6 parameters for the Windows route Command
Parameter Purpose
-f
-p
command
destination
mask netmask
gateway
metric metric
if interface
20 CompTiA network+ n10-007 Cert Guide
Chapter 11Table 11-1 Components of an SnMpv1 and SnMpv2c network-Management Solution
Component Description
SNMP manager
SNMP agent
Management Information Base (MIB)
Table 11-2 Security Models and Security Levels Supported by Cisco iOS
Security Model Security Level Authentication Strategy Encryption Type
SNMPv1 Community string None
SNMPv2c Community string None
SNMPv3 Username None
SNMPv3 MD5 or SHA None
SNMPv3 MD5 or SHA CBC-DES (DES-56)
Table 11-3 Syslog Severity Levels
Level Name Description
0 The most severe error conditions, which render the system unusable
1 Conditions requiring immediate attention
2 A less-severe condition, as compared to alerts, that should be addressed to prevent an interruption of service
3 Notifications about error conditions within the system that do not render the system unusable
4 Notifications that specific operations failed to complete successfully
5 Non-error notifications that alert an administrator about state changes within a system
Appendix C: Memory Tables 21
Level Name Description
6 Detailed information about the normal operation of a system
7 Highly detailed information (for example, information about individual packets) that is typically used for troubleshooting purposes
Chapter 12Table 12-1 Confidentiality Attack Tactics
Tactic Description
Packet capture
Ping sweep and port scan
Dumpster diving
Electromagnetic interference (EMI) interception
22 CompTiA network+ n10-007 Cert Guide
Tactic Description
Wiretapping
Man-in-the-middle (MitM)
Social engineering
Sending information over overt channels
Sending information over covert channels
Malware
Appendix C: Memory Tables 23
Tactic Description
FTP bounce
Phishing
Table 12-2 Remote-Access Security Methods
Method Description
RAS
RDP
PPPoE
PPP
24 CompTiA network+ n10-007 Cert Guide
Method Description
ICA
SSH
Kerberos
AAA
RADIUS
TACACS+
NAC
IEEE 802.1X
Appendix C: Memory Tables 25
Method Description
CHAP
MS-CHAP
EAP
Two-factor authentication
Multifactor authentication
Single sign-on
Local authentication
LDAP
Captive portal
26 CompTiA network+ n10-007 Cert Guide
Table 12-3 iKev1 Modes
Mode Description
Main mode
Aggressive mode
Quick mode
Table 12-4 examples of Vpn protocols
Protocol Description
SSL
L2TP
Appendix C: Memory Tables 27
Protocol Description
L2F
PPTP
TLS
Chapter 14Table 14-1 Steps to diagnose a problem
Step Description
Because a typical problem report lacks sufficient information to give a troubleshooter insight into a problem’s underlying cause, the troubleshooter should collect additional information, perhaps using network maintenance tools or interviewing impacted users.
Testing to see if you can duplicate the problem is often a key step in problem diagnosis.
Although it can be difficult to gather information from your end users, this is often critical in correctly pinpointing the exact problem. Oftentimes, finding out user actions prior to the problem is critical.
What are the actual symptoms the problem has created.
Perhaps your end users will provide valuable clues if they accurately indicate what changes they might have made to systems.
Unfortunately, you might discover there are multiple issues. Be sure to approach each one individually.
28 CompTiA network+ n10-007 Cert Guide
Table 14-2 Common Layer 1 Troubleshooting issues
Issue Description
Bad cables or connectors
Bad port
Opens and shorts
Splitting pairs in a cable
dB loss
Transposed Tx/Rx leads
Cable placement
Appendix C: Memory Tables 29
Issue Description
Distance limitations exceeded
Crosstalk
Speed/duplex mismatch
Table 14-3 Common Layer 2 Troubleshooting issues
Issue Description
Power failure
Bad module
30 CompTiA network+ n10-007 Cert Guide
Issue Description
Layer 2 loop
Port configuration
VLAN configuration
Table 14-4 Common Layer 3 Troubleshooting issues
Issue Description
Mismatched MTU
Incorrect subnet mask
Incorrect default gateway
Duplicate IP address
Appendix C: Memory Tables 31
Issue Description
Incorrect DNS configuration
Duplicate MAC address
Expired IP address
Exhausted DHCP scope
Rogue DHCP server
Untrusted SSL certificate
Incorrect time
Blocked TCP/UDP ports
32 CompTiA network+ n10-007 Cert Guide
Issue Description
Incorrect host-based firewall settings
Incorrect ACL settings
Unresponsive service
Table 14-5 Common Wireless Troubleshooting issues
Issue Description
RFI
Signal strength
Misconfiguration of wireless parameters