CompTIA CH.1 Study Guide
Your company has developed a new mobile application that uses specific TCP ports, and they apply to have them formally approved and entered into IANA's database. Which port range will your company's mobile app be assigned to?
1024-49151
The OSI model consists of ______ layers, while the TCP/IP protocol stack is composed of ______ layers. (Choose two.)
7,4
Which layer in the TCP/IP protocol stack is concerned with routing and logical addressing?
The internet layer of the TCP/IP protocol stack (which maps to the OSI's network layer) is responsible for routing and logical addressing.
You are trying to explain the layers of the OSI model to a colleague. Which two layers deal with logical and physical addressing? (Choose two.)
The network layer handles logical (IP) addressing, and the data link layer handles hardware or physical addressing.
Which layer of the OSI model is tasked with carrying electrical impulses across media?
The physical layer is only concerned with electrical impulses.
Which of the following layers is concerned with changing the format of data into something that the layer above it and the layer below it can understand?
The presentation layer is concerned with changing the format data into something that the layer above it and below it can understand.
You are looking at a network traffic log and see TCP connections that use the SYN, SYN/ACK, and ACK flag set. What type of communication is this?
This traffic is characteristic of a TCP three-way handshake.
Which of the following transport layer protocols is not concerned with connection establishment, error correction, or flow control?
User Datagram Protocol (UDP).
Which of the following terms describes the process of adding a header to a protocol data unity (PDU)?
Encapsulation
As a junior-level network technician, you are asked to build a simple network, connecting just a few hosts together. None of them are dedicated servers, and they are all equal in the network in terms of function. They also must each have their own security requirements, such as usernames and passwords, that aren't shared between them. What is the best network to design that meets these requirements?
A peer-to-peer network, which is a decentralized model, meets all of the requirements for the network you must design.
Your server is pushing app notifications to your iOS devices, but you receive some messages back that indicate that the notifications failed for various reasons. Which protocol would have sent those failure notifications back to your server?
APNS Feedback allows the server sending the APNs to receive notices of failed notification delivery.
Which of the following mobile devices would you expect to use TCP port 2195 for its updates?
Apple iPhone. TCP port 2195 is used by Apple Push Notifications Service (APNS).
You have configured an FTP server to listen on a non-standard port, TCP port 3135. When you try to test the connection using FTP client software from another host, the connection fails. Assuming there's no other problem with the connection to the server, what should you do to complete the configuration so that clients can connect to the new FTP service on the correct port?
Configure the client software to connect using TCP port 3135. If the default port is changed on the listening service, the client must be configured to use the new port as its destination connection port.
Which of the following protocols provides for automatic assignment of IP addressing information to network hosts?
DHCP provides for automatic assignment of IP addressing information to network hosts.
All of the following are protocols that are routinely used over SSL to provide enhanced security EXCEPT:
DNS is not routinely used over SSL to provide enhanced security.
DNS uses which of the following port and protocol combinations?
DNS uses both TCP and UDP ports 53.
Which layer of the OSI model has two sublayers?
Data Link Layer (LLC, MAC)
You manage a small office network where everyone has their own password assigned for their workstation. In order to access any shared resources on another person's machine, the password for that particular user account is required. What type of network is in this office?
Decentralized
What are the characteristics of a Server Routing Protocol (SRP)?
Developed and used for BlackBerry devices. Uses TCP port 4101 Uses TCP ports 3101 and 3200
You are having issues with several clients not being able to connect to the network and discover that they are not receiving IP addressing information automatically. Which protocol should you examine to ensure that it is functioning correctly on the network?
Dynamic Host Configuration Protocol (DHCP)
You are trying to minimize the number of protocols used on the network that don't communicate securely. Which one of the following protocols should you review for switching to a secure alternative?
FTP, like telnet, is unencrypted, so this is not a secure way of passing either data or authentication credentials.
Which of the following statements best describes a Media Access Control (MAC) address?
It is a 12-digit, 48-bit hexadecimal number.
Which of the following describes a network architecture that has several layered pieces of a network application, including a client component, a middle-ware processing component, and a back-end relational database?
Multi-tier
Which of the following describes the method that IGMP uses to communicate to other hosts?
Multicasting
Which of the following terms describes how data is reffered to at each level of the OSI model?
Protocol Data Unit (PDU)
Which of the following connectors is commonly used for the twisted-pair wired copper media in Ethernet networks?
RJ-45
You are reviewing your network logs and see a high amount of traffic using TCP port 3389. What kind of connections could account for this traffic?
Remote connections to Windows hosts.
Which of the following protocols offers some level of encryption and authentication for network traffic that uses it?
SSH offers secure authentication mechanisms and also encrypts the communications session used between two hosts.
Which TCP flag is first sent during the three-way handshake process bewteen hosts?
SYN
In the following Media Access Control (MAC) address, what do the first six hexadecimal digits represent? 5C:26:0A:3C:2c:38
The first six digits (5C:26:0A) denote the Organizationally Unique Identifier (OUI) for the manufacturer of the card.
You are looking at a network log file that shows communications between a client and a web server. You see that two ports were in use during the communication session, port 50123 and port 80. Which port would be the source and which port the destination when the client is sending a request to the web server? (Choose two.)
Source port:50123, Destination port: 80. Web traffic (HTTP) uses port 80 by default, and in this case, the client is sending a request, so it is the source sending destination.
Which protocol at the Transport layer of the OSI model is concerned with-connection-oriented service and guaranteed data delivery?
TCP
Which two ports are valid for Simple Mail Transfer Protocol (SMTP) and Alternate SMTP? (Choose two.)
TCP port 25 and TCP port 587.
You are teaching a class on the OSI model, and one of the students has a question about how the TCP/IP protocol stack maps to the OSI model. Which of the following best describes the mapping of the TCP/IP layers to the OSI model layers?
TCP/IP is a four-layer stack that maps well to the OSI seven layer model.
Which of the following layers of the OSI model use data as their Protocol Data Units (PDU)?
The application, presentation, and session layers all use the term data to represent thier PDUs. The data link layer uses frames, the network layer uses packets, and the transport layer uses segments for TCP datagrams for UDP.