Preview

NT1210 Final Exam Review

Satisfactory Essays
Open Document
Open Document
726 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT1210 Final Exam Review
Final Exam Review
Using Table 10-1, review default port numbers used commonly with TCP and UDP purposes
HTTP TCP Port 80 – used by web browsers and web servers
Telnet TCP Port 23 – used for terminal emulation
SSH TCP Port 22 – used for secure terminal emulation
FTP TCP Port 20, 21 – used for file transfer
DNS UDP Port 53 – used for name resolution
SMTP TCP Port 25 – used to send and receive email
POP3 TCP Port 110 – another email protocol
IMAP TCP Port 143 – another email protocol
SSL TCP Port 443 – used to encrypt data for secure transactions
SNMP UDP Port 161, 162 – used to manage TCP/IP networks
TCP – Transmission Control Protocol
UDP – User Datagram Protocol
IPv4 32 bits, IPv6 128 bits
Bring sub-netting sheet for use during exam
Byte = 8 bits
Truth Table 0 AND 0 = False (0) / 1 AND 0 False (0) / 1 AND 1 True (1)
Truth Table
Parentheses in mathematical equations = do that FIRST
Node on a network = device
Which LAN topology has single point of failure = Star
Which WAN topology has single point of failure = Hub and Spoke
Recognize parts of web address that are the protocol, web page and domain name
Basic to every networking standard = agreed upon set of rules for communication, standard means they are documented
TCP divided into layers for better troubleshooting
OSI layer responsible for encryption and compression = Presentation Layer (Layer 6)
Network encoding scheme = set of rules that define how to change the pattern of the waveforms of energy to represent binary 0’s and 1’s (how it is transmitted and interpreted by both nodes)
What causes full duplex to transmit and receive simultaneously = 2 pairs of wires, 1 pair for transmit, one for receive
Max distance for UTP = 100 meters
Standard for Ethernet 802.3
Standard for Wireless 802.11
Ethernet Bit Rate – speed of cables used in the Ethernet network
What pairs of UTP are used for transmit and receive = 3/6 receive, ½ transmit
Site Survey to determine where AP should be placed

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1230 Unit 10 Assignment

    • 409 Words
    • 2 Pages

    The company I choose is a small IT company. The company offers all the big major companies technical support. They have to backup client information, finical records, and employee’s information. The company would use the GFS scheme for backing up their information. The GFS scheme comes with a full month backup which is stored offsite, and a weekly and daily backup that is kept onsite as well as offsite. The weekly and daily backups are kept onsite for 30 days then are reused and recycled daily and weekly at the offsite location. The monthly backup that is secured offsite is kept for 3 years depending on the client. Presently for the…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Over the last week the market has saw December corn futures fall $.08 on the heels of the Monday USDA report. The September report confirmed what most analysts have predicted for the last several weeks; there will almost certainly be a massive corn crop this season. The general consensus this week is that corn will continue to decrease throughout the harvest season. Kevin McNew of Grain Hedge believes if there is a late winter rally coming it will be “a game of small moves,”. I decided that it would be beneficial to calculate how much per bushel I need to make my break-even point. As a result of using the Missouri Extension numbers for average yield and average cost per acre I found that the minimum break-even price per bushel comes in at about…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6. FULL-DUPLEX: A system in which signals may be transmitted in two directions at the same time.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Analysis 2

    • 195 Words
    • 1 Page

    What I can think of to return the computer to an operational state is troubling a video problem. It maybe relating to the graphic card and the program that may run with it. The graphics adapter may either be corrupted or installed wrong under a different version. For example if the graphic is supposed to be run on a x64 based window 7 instead of a x86 version.…

    • 195 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Analysis 2

    • 235 Words
    • 1 Page

    The problem in the given scenario for the user is that the new driver installed to be compatible with the graphics adapter was not downloaded correctly or was incomplete. This is what causes the secondary malfunctions with the screen. When he was seeing the wavy lines it meant that the driver needed to be updated to use the new graphics adapter. He then checked the device manager and saw that it could be updated. He did so and restarted the computer afterwards. As it started he began hearing the noises because the driver was not downloaded correctly. And he then lost the display and could not diagnose the issue properly.…

    • 235 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1310 midterm

    • 1089 Words
    • 6 Pages

    a. Near end cross talk, Far end Cross Talk, Equal Level Far end cross talk. Alien cross talk…

    • 1089 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Vaughan-Nichols, S. (2013, January 30). How to fix the UPnP security holes | ZDNet. Retrieved from http://www.zdnet.com/how-to-fix-the-upnp-security-holes-7000010584/…

    • 1578 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1210 Lab 5

    • 1862 Words
    • 7 Pages

    What does the numeric prefix before BASE in the Ethernet standards define? Use your textbook and the Internet to research your answer. What does the inclusion of a postfix of -T imply?…

    • 1862 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. A live system gives you a chance to preview Fedora without installing it. It does not write/install to hard disks.…

    • 516 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nt1210 Chapter 1 Summary

    • 696 Words
    • 3 Pages

    The purpose of system programs is that system programs can be thought of as bundles of useful system calls. They provide basic functionality to users so that users do not need to write their own programs to solve common problems.…

    • 696 Words
    • 3 Pages
    Better Essays
  • Good Essays

    unit 2 labs

    • 465 Words
    • 2 Pages

    1. A network device is usually built in to the computer. A peripheral device is a device connected to the computer…

    • 465 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 3 Ntc 362

    • 664 Words
    • 3 Pages

    Unless Patton Fuller Community Hospital has an agreement between the two communicating parties information may get lost or un-communicated. This agreement is called the protocol. Communications protocols usually have a number of parts, Handshake, encoding method, compressions methods, packet / frame structure, and addressing.. This is why protocols are often defined by standards bodies, but some protocols SSL can be used widely even though they are not specifically from a standards body. A protocol must be implemented to enable effective, efficient communication by using a set of rules. Protocols are also described as hardware or software components that carry out the OSI model guidelines for transferring information on a network…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ShortAnswer

    • 544 Words
    • 2 Pages

    A Network Protocol Rules of Network Protocol include guidelines that regulate the following characteristics of a network: access method, allowed physical topologies, types of cabling, and speed of data transfer. Some…

    • 544 Words
    • 2 Pages
    Good Essays