CompTIA A+ Core 1: Networking

?
  • Created by: M4N7Y_97
  • Created on: 10-11-20 00:51
This protocol is used for file transfers, though it is unsecured.
FTP
1 of 37
This protocol is used for secure remote connectivity for configuration.
SSH
2 of 37
Protocol is used for name resolution.
DNS
3 of 37
This protocol is for automatic address distribution on a network.
DHCP
4 of 37
This is known as a connectionless protocol for sending data.
UDP
5 of 37
This is a layer 3 device responsible for bringing networks together so data can flow.
Router
6 of 37
This is traditionally a layer 2 device and allows VLANs to be created.
Switch
7 of 37
This device filters traffic coming into and out of a network
Firewall
8 of 37
These devices take the signal from a provider, usually an ISP, and convert that signal to a usable signal in your home or small office.
Modem
9 of 37
This is a layer 1 device that has no place in todays modern networks.
Hub
10 of 37
This is a security zone where we place public facing services but still under our control.
DMZ
11 of 37
This is good if you want to run services inside your network but don't have a public IP address to the device
Port Forwarding
12 of 37
This takes private IP addressing and translates to public IP addressing and vice versa, depending on traffic flow.
NAT
13 of 37
This is a way of network administrators deciding which traffic flowing through the network devices gets precedence over the other traffic
QoS
14 of 37
This Wireless standard had data rates similar to gigabit ethernet.
802.11ac
15 of 37
These are computers with a lot of storage space and can support multiple protocols.
File Server
16 of 37
This server can work on your behalf and hide your presence on the internet.
Proxy Server
17 of 37
Proving you are who you say you are is the job of the server.
Authentication Server
18 of 37
If you are looking fir a one stop shop security device, this might fit the need.
UTM
19 of 37
This is a security device used to alert admins of abnormal activity on a network segment or host system.
IDS
20 of 37
What type of address uses layer 3 of the OSI model and for routing traffic?
IP
21 of 37
IPv4 is how may bits long?
32
22 of 37
IPv6 is how many bits long?
128
23 of 37
If the system cannot reach a DHCP server or doesn't have a static IP address set, what type of address will windows get?
APIPA
24 of 37
What is the term used for the device that allows you to get outside your local area network?
Gateway
25 of 37
These are logical networks used to segment data on the same physical equipment.
VLAN
26 of 37
This type of Internet is one of, if not the most popular forms of internet services available
Cable
27 of 37
This type of internet connection is becoming the fatstes growing types offering speeds over 1Gb.
Fiber
28 of 37
This is what we call the network located in your SOHO.
LAN
29 of 37
This type of network usually spans around cities and typically ran by local government or utility company.
MAN
30 of 37
If you need to span distances using wireless, this type of setup might help
WMN
31 of 37
This is a communication standards for simultaneous digital transmission of voice, video, data and other network services over the traditional circuits of the public switched telephone network , not really used that much today for broadband.
ISDN
32 of 37
This type of tool is used to attach ends to un unshielded pair.
Crimper
33 of 37
We can use this to Hardware test for our NIC on our devices
Loopback Plug
34 of 37
We can use this tool to make sure the pins line up on each end like they are supposed to when making a cable.
Cable Tester
35 of 37
This tool allows admins to securely connect an UTP cable to a network rack device.
Punchdown
36 of 37
This software tool lets admins and security analyst to see the wireless saturation in an area.
WIFI Analyzer
37 of 37

Other cards in this set

Card 2

Front

This protocol is used for secure remote connectivity for configuration.

Back

SSH

Card 3

Front

Protocol is used for name resolution.

Back

Preview of the front of card 3

Card 4

Front

This protocol is for automatic address distribution on a network.

Back

Preview of the front of card 4

Card 5

Front

This is known as a connectionless protocol for sending data.

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Networking resources »