Professional Documents
Culture Documents
Sumitup: A Complete Summary For Our N10-004 Practice Test
Sumitup: A Complete Summary For Our N10-004 Practice Test
Sumitup: A Complete Summary For Our N10-004 Practice Test
A rapid review tool for the day before you take the exam.
Copyright ©2009 MeasureUp. All Rights Reserved
2 SumITUp | A Complete Summary for Our N10-004 Practice Test
Network Technologies
Explain the function of common networking protocols
• ICMP is used to report errors and send messages about packet delivery
• ARP is used to resolve the MAC hardware addresses from the IP addresses of networked devices
• UDP is used to provide connectionless packet delivery services
• SMTP is used to transfer e-mail messages and attachments between e-mail servers
• SNMP is used to provide a network management console with information about network devices and enable a
network management console to control network devices
• POP3 is an e-mail retrieval protocol that is used to deliver e-mail messages from e-mail servers to e-mail clients
• FTP is used to transfer files between FTP clients and servers
• TCP is a connection-oriented protocol that provides reliable packet transmission
• IP operates at the Internet layer and is responsible for addressing, routing, fragmenting, and reassembling
packets
• HTTP sends data in clear text between a Web browser and a Web server
Given a scenario, evaluate the proper use of the following addressing technologies and
addressing schemes
• A private network address can be used for network communication across the local network, but the address
cannot be used and is not recognized on the Internet
• APIPA is used to assign addresses to Windows computers that are configured for dynamic addressing but do not
have access to a valid DHCP server
• NAT is used to enable hosts with a private IP address to access resources on the Internet
• DHCP provides for automatic IP address assignment, but you must install and configure a DHCP server or a
router (or other network server) that also acts as a DHCP server
- Because OSPF is a link-state routing protocol, it considers network bandwidth and traffic levels rather
than just the number of hops between links
• RIP is a dynamic distance-vector routing protocol, which means that routes are determined based primarily on
the number of hops (intervening routers) to the destination
• IS-IS can be used to pass route information and control routing on an IPv6 network
- IS-IS is a dynamic link-state routing protocol, which means that IS-IS routers can compensate for
changes in network conditions
- The network is in a steady state, and packets are being routed along optimal path
- In this state, network communications are at an optimum level
• A distance-vector routing protocol determine routes based on the least number of hops to a destination
• A link state routing protocol considers the number of hops, but it also considers bandwidth and traffic levels for
each of the hops when determining a path
• WPA uses an encryption that is inherently more powerful than that used with WEP
- Unlike the plastics used to clad most common cables, the cladding used for plenum-rated cable,
typically Teflon, is not flammable and does not release toxic fumes when heated
• RG-58 cable has a maximum bandwidth of 10 megabits per second (Mbps) and a maximum segment length of
607 feet
• 10GBaseT implementations require CAT 6 or CAT 6e cabling
• CAT 5 and CAT 5e are required for 100BaseT and 1000BaseT Ethernet
• CAT 3 cable supports a maximum bandwidth of 16 Mbps and is commonly used in voice applications and to wire
10BaseT Ethernet networks
• STP has twisted copper wires encased in a metal sheath
- The metal sheath protects the wires from outside interference, such as EMI
- A patch cable is used to configure modular patch panels or to connect to network communication
devices such as hubs or switches
- An ISDN BRI includes two B-channels (each supporting 64 Kbps) that can carry data, voice and other
services
- The ISDN BRI also includes one 16 Kbps D-channel that carries control and signaling information
• Bandwidth for T1 in the United States is 1.536 Mbps for concurrent upload and download
• T3 bandwidth in the United States is up to 44.736 Mpbs
• 10GBaseSR is a short range implementation over multi-mode fiber cable supporting a maximum range of 82 m
• 10GBaseLR is typically rated as having a 10 km range over single mode fiber cable, but has been used at up to
25 km without data loss
• 1000BaseT provide a 1 GB bandwidth and can be deployed on an existing 100BaseT copper cable with a
maximum cable segment length of 100 m
• 1000BaseCX requires two pairs of 100-ohm STP cable with a maximum cable length of 25 m
- In most situations, you would also use IPSec to encrypt the VPN traffic to provide a secure end-to-end
communication path
- VLAN membership is typically managed through either user name or the device's MAC address
• A 110 block is a punchdown block used as the termination point for communication cable
- A 110 block is certified for use with Cat 5 cabling and high-speed data communication applications
Network Devices
Install, configure and differentiate between common network devices
• A repeater is used to extend the length of a network segment by simply amplifying the data signal
• A hub is a central connection device for a star topology network
• A switch is a more advanced central connection device than a hub
• A bridge is used to connect two segments in the same subnet
• A router connects different subnets into an internetwork and directs traffic to the correct destination
• A firewall is a device that filters traffic into and out of a network
Network Management
Explain the function of each layer of the OSI model
• Layer 7 - Application layer - Provides applications and users with access to network resources and includes
implementation of protocols like FTP and SMTP
• Layer 6 - Presentation layer - Provides data translation and encryption, which includes implementations such as
serializing objects or data structures into XML
• Layer 5 - Session layer - Responsible for establishing, maintaining, and terminating communication sessions
between hosts
- Network security devices, such as IPSec endpoints, are implemented at this layer
• Layer 3 - Network layer - Enables the implementation of logical host addresses such as network addresses,
which is a requirement for a routable protocol
• Layer 2 - Data Link layer - Provides for physical data transfer between hosts
- The MAC physical address is implemented at this layer
- Devices such as bridges are also implemented at this layer
• Layer 1 - Physical layer - Defines the physical network, including cable plant, connection, signal strength, and so
forth
- Repeaters and hubs are implemented at this layer
• Domain structure, including trust relationships, is documented as part of the logical network diagram
Given a scenario, troubleshoot common connectivity issues and select an appropriate solution
• Attenuation is the loss of signal strength over distance
• If the default gateway is misconfigured, the computer is unable to reach destinations outside of the local subnet
• If a computer is configured with the wrong IP address or subnet mask, it will not be recognized as part of the
subnet and not be able to communicate with local computers
Network Tools
Given a scenario, select the appropriate command line interface tool and interpret the output to
verify functionality
• Tracert is a Windows utility that traces the route (the path taken through the network) between the local and
remote host and returns any failures
• The netstat command provides connection information, protocol statistics, and listening port use
• The nbtstat command is used to retrieve NetBIOS over TCP/IP protocol statistics information for local and
remote computers
• You can use the ipconfig command to retrieve IP address information and manage TCP/IP network interfaces on
a computer running Windows
• Ping is a troubleshooting utility used to test communication with a remote host or, using the loopback address, to
test the local TCP/IP protocol stack
• A multimeter can be used to test cable termination and, in some cases, cable continuity
• A toner probe, which is actually a simple signal generator, is used to test cable continuity by injecting a tone
signal on the cable so that you can listen for a cable fault
• You should use a butt set, also known as a linesman's handset, when checking for a dial tone on a line
• An OTDR is specifically designed to test fiber optic cable
- It can provide the estimated cable length and attenuation and can be used to locate cable faults
- It works by sending light pulses and evaluating the reflected light
Network Security
Explain the function of hardware and software security devices
• An IDS is a passive device that monitors and logs network activity and can send an alert if anomalous activity is
detected
• An IPS is similar to an IDS, but an IPS is an active system designed to react to network conditions and try to take
appropriate actions in response, such as reconfiguring a firewall to block detected traffic
• A firewall can be configured to filter network traffic, such as by source, protocol, or port
• A host-based firewall is implemented through software running on the host computer
• Social engineering attacks are attacks that involve direct interaction with the target
- You can minimize the impact of social engineering attacks through user education and enforced policies
and procedures
Acronyms
Acronym Definition
Acronym Definition
Acronym Definition