Question
click below
click below
Question
Normal Size Small Size show me how
220-801 Networking
Question | Answer |
---|---|
Port Number: FTP | 21 Control 20 Data Transfer (standard / passive mode) |
Port Number: SSH | 22 |
Port Number: SSH Port Forwarding | 22 |
Port Number: Telnet | 23 |
Port Number: SMTP | 25 |
Port Number: DNS | 53 |
Port Number: TFTP | 69 |
Port Number: RDP | 3389 |
Port Number: HTTP | 80 |
Port Number: POP | 110 |
Port Number: IMAP | 143 |
Port Number: HTTPS | 443 |
Port Number: SSL | 443 |
Port Number: SMTPS | 465 |
Port Number: IMAPS | 993 |
Port Number: POP3S | 995 |
Class A first octet range | 1 to 126 |
Class B first octet range | 128 to 191 |
Class C first octet range | 192 to 223 |
Private IP address ranges | 10.0.0.0 - 10.255.255.255 172.16.0.1 - 172.31.255.255 192.168.0.0 - 192.168.255.255 |
Port Number: SFTP | 22 by default (default port for SSH) |
Well known port range | 0 to 1023 |
Registered port range | 1024 to 49,151 |
Dynamic port range | 49,152 to 65,535 |
Maximum Transmission Speed: CAT3 | 10 Mbps |
Maximum Transmission Speed: CAT5 | 100 Mbps |
Maximum Transmission Speed: CAT5e | 1000 Mbps |
Maximum Transmission Speed: CAT6 | 10 Gbps |
This type of ISDN uses two 64-Kbps channels providing a maximum speed of 128 Kbps. Mainly used by homes and small businesses. It also has a 16-Kbps signal control channel. | BRI (Basic Rate Interface) |
This type of ISDN connection uses 23 64-kbps data channels and one 64-kbps control channel. | PRI (Primary Rate Interface) In the US, this is a T1 and provides approx. 1.5 Mbps. |
Range of Bluetooth Class 1 | 100 meters (328 feet) |
Range of Bluetooth Class 2 | 10 meters (33 feet) |
Range of Bluetooth Class 3 | 5 meters (16 feet) |
SC | Fiber optic cable connector. Short for square connector |
LC | Fiber optip cable connector. SHort for Lucent Connector. It's a miniaturized SC connector and is popular in new installations. |
ST | Straight tip fiber optic connector. Connector is round. |
Originally used with cable TV connections and efficient when transmitting analog signals. It was used in some early networks but can transmit only a limited amount of data. Uses BNC connectorrs. | RG-59 |
Has a larger center conductor and additional shielding. Has become the standard used with cable/satellite TV because it is more efficient when transmitting digital signals. Networks still on coaxial cable today would use this. F-type screw on connector. | RG-6 |
Cable Type Identifier: 2, 5, C | Indicates coaxial cable. Example: 10Base2 |
Cable Type Identifier: T | Inidcates twisted pair cable |
Network Topology: Multiple devices connected to a central device (switch, hub). | Star |
Network Topology: Multiple devices connected to each other in a logical line. Ends must be terminated to prevent signals from bouncing endlessly. If one device becomes disconnected to there is a break in the line, all devices will lose connectivity. | Bus |
Network Topology: All devices logically configured in a single circle or ring. Data travels around the rung to different devices. | Ring |
A type of token ring topology that uses fiber optic cable and two rings. The second ring provides a redundant path that can be used if the first path fails. | Fiber Distributed Data Interface (FDDI) |
Many ring networks added this device. Computers were still in a logical ring, however if a computer failed, this device sensed the failure did not allow the ring to be passed to the failed device. | Multistation Access Unit (MAU) |
Network Topology: Each device has a direct connections with all other computers in the network. Very redundant and rare due to high expense to implement. | Mesh |
Network Topology:A combination of any two or more topologies. | Hybrid |
Protocol used within a network to encrypt traffic. This protocol uses port 22. | Secure Shell (SSH) |
Protocol commonly used to encrypt web traffic. Uses port 443 by default, but may use other ports depending on the protocol being encrypted. | Secure Sockets Layer (SSL) |
Designated replacement for SSL. Can be used anywhere SSL is used. | Transport Layer Security (TLS) |
This protocol is used to send e-mail from a user's computer to the mail server. | SMTP (Simple Mail Transfer Protocol) - Think of 'SM' for send mail. |
This protocol is used to receive e-mail from a mail server. When this protocol is used, e-mail is generally deleted from the server as it is downloaded. | POP3 (Post Office Protocol) - Think of messages popping off the e-mail server. |
This protocol is used to receive e-mail from a mail server. Server retains messages as they are downloaded. Additional capabilities include organazing e-mail into folders and search. | IMAP (Internet Message Access Protocol) |
Protocol used to transfer files over the network, primarily Windows networks. Uses NetBIOS over TCP with ports 137, 138 & 139 by default. If used directly over TCP port 445. | Server Message Block (SMB) |
Multicast address range | 224.0.0.1 - 255.255.255.254 |
Used to identify the network ID with an IPv6 Address | Prefix (ex. /48) |
IPv6 Loopback address | String of zeros, with a one at the end. Expressed as ::1 |
Wireless Protocols: Max Speed, Frequency and Range for 802.11a | 54 Mbps, 5.0 GHz, lowest range of all wireless standards (30m / 100ft) |
Wireless Protocols: Max Speed, Frequency, and Range for 802.11b | 11 Mbps, 2.4 GHz, medium range (35m / 115ft) |
Wireless Protocols: Max Speed, Frequency, and Range for 802.11g | 54 Mbps, 2.4 GHz, medium range (38m / 125ft) |
Wireless Protocols: Max Speed, Frequency and Range for 802.11n | 600 Mbps (300 Mbps common) 2.4 Ghz or 5.0 GHz, highest range (70m / 230ft) |
Type of encryption used with WPA. Designed to make WPA more secure than WEP while using existing hardware (may require firmware update) | Temporal Key Integrity Protocol (TKIP) |
Type of encryption used with WPA2. Provides stronger security than WEP or WPA. This standard is also used in other IT applications for data encryption. | Advanced Encryption Standard (AES) |
Command Line Tool: Shows network statistics, including a list of inbound and outbound connections for a system. | Netstat |
Command Line Tool: Shows statistics for NetBIOS. | Nbtstat |
Command Line Tool: Used to map drives to remote shares. | Net Use |