Uploaded by Alexandra

A+ supplemental guide

advertisement
A + Supplemental Guide
V0822
By studying the information found in this document,
you will be better prepared for the exam.
The four topics that will be covered hereafter are as follows:
1.
2.
3.
4.
Port numbers and protocols
Windows commands
UNIX/LINUX commands
RAID (Redundant Array of Independent Disks)
1. PORT NUMBERS & PROTOCOLS
The purpose of protocols: Protocols are a set of rules and procedures that allow two computers to
communicate over a network. Examples include HTTP, DNS, and FTP. Each protocol has its own rules and
unique purpose.
The purpose of port numbers: When two computers communicate, they will tag their messages with port
numbers. The numbers indicate what protocol is being used and allow any computer to have multiple
conversations simultaneously (aka multiplexing).
PORT #
PROTOCOL
DEFINITION / FUNCTION
20/21
FTP
22
SSH
23
TELNET
25
SMTP
53
DNS
67/68
DHCP
69
80
110
TFTP
HTTP
POP
File Transfer Protocol. Used to reliably transfer large files. Port 20 for data, 21
for authentication and file browsing.
Secure Shell. Provides an encrypted tunnel to access a remote devices
command prompt. Secure!
Provides access to a remote devices command prompt, but does not have any
encryption. Very insecure!
Simple Mail Transfer Protocol. Used to send emails to an email server, or mail
between servers. Not encrypted by default.
Domain Name System. Used to look up domain names like www.example.com
and find out what IP address they are using.
Dynamic Host Configuration Protocol. Used to assign dynamic IP addresses to
computers when they first join the network.
Trivial File Transfer Protocol. Similar to FTP, but only suitable for small files. It
does NOT offer encryption or any form of authentication.
Hypertext Transfer Protocol. Used to retrieve/view websites. No encryption.
123
NTP
137-139
NBT
143
IMAP
161/162
SNMP
443
HTTPS
445
SMB
993
IMAPS
995
POPS
3389
RDP
Post Office Protocol. Used to download emails from an email server, not for
sending. No encryption.
Network Time Protocol. Used to synchronize the time configured on the
computers across a network.
Net BIOS. Used by computers to identify other systems by name on a single
network and to send/share files between devices. Can’t operate over the
internet by itself.
Internet Message Access Protocol. Used to view an email that exists on an
email server. An alternative to POP. No encryption.
Simple Network Management Protocol. Used to send logs over a network and
to remotely manage network hardware. Only V3 is secure.
The encrypted version of HTTP. It is encrypted through SSL or TLS. It requires
the use of certificates on the web server.
Server Message Block. Much like Netbios, but more advanced. Operates
through IP addresses, so it can provide Netbios functions over the internet.
The encrypted version of IMAP. It is encrypted through SSL or TLS. It requires
the use of certificates on the email server.
The encrypted version of POP. It is encrypted through SSL or TLS. It requires
the use of certificates on the email server.
The Remote Desktop Protocol. Native to Windows, it allows one user to access
another computer’s desktop (GUI/graphical user interface) remotely.
Encrypted.
2. WINDOWS COMMANDS
COMMAND
PING X
where X, the target, is an IP
address or fully qualified
name, like
www.example.com
TRACERT X
Where X, the target, is an IP
address or fully qualified
name, like
www.example.com
IPCONFIG
NSLOOKUP X
Where X is a fully qualified
name or IP address
Suggestion: Try them out on your own! You can
reach the command prompt by searching for “cmd”.
FUNCTION
Used to test connectivity TO and FROM a target device. The source computer
sends out an “echo request” to the target, who will reply back with an “echo
reply” if they received the message. If the source receives an echo reply, this
confirms bi-directional communication over the network. Also, if you ping by
name, it will allow you to see if DNS is working.
Used to show all of the routers/servers between you (the source) and the target
(destination). This is similar to PING but now you can see all of the routers along
the way. This helps troubleshoot if there is a problem between two points.
By itself, this command shows you your current IP address, network mask, and
default gateway (the router that connects you to other networks or the internet).
Add any of the following to the end of Ipconfig to get different results:
/ALL - shows all basic info, plus MAC address, IP lease time, and DNS/DHCP
servers.
/RELEASE - gives the IP address BACK to the DHCP server
/RENEW - asks DHCP for a refresh on the IP lease time
/DISPLAYDNS - shows all DNS info in our cache
/FLUSHDNS - clears all DNS info in our cache
If you enter a name, such as www.google.com, you will perform a forward
lookup/query on port 53 through DNS, and receive an IP address as a result.
If you enter an IP address, such as 8.8.8.8, you will perform a reverse
lookup/query on port 53 through DNS, and receive a fully qualified name as a
result.
Netstat
Short for Network Statistics. This will show you all of your active network
connections. If you use any of the following commands after netstat, it will give
you more information:
-a (short for ALL) now it will show you open ports that aren’t even being used,
usually called listening ports.
-n now it will show all the IP addresses instead of only names.
-o now it will show what processes opened this connection. This function requires
admin privileges.
NBTstat
Short for Network Bios Statistics. This will show you information about users and
groups that have been seen on the local network, communicating through
netbios.
Bootrec /fixmbt
This command is only used in the recovery command prompted when a hard
drive has a corrupted boot record. The command is short for “fix the master
boot”. You will need this if the Windows OS can’t be found on the hard drive
due to a corrupted boot record.
3. UNIX/LINUX COMMANDS
UNIX COMMANDS ARE CASE SENTITIVE BY DEFAULT
COMMAND
FUNCTION
ls
List. It will display a list of all files in the current folder, or in the target folder if specified.
For example, “ls /record/finance/*.xls” would list all of the files that end in .XLS, within the
finance folder, inside of the record folder.
pwd
Print Working Directory. It will show you what folder you are currently in.
cd
Change Directory. This allows you to change to whatever directory you specify. (This also
works in Windows!)
cp
Copy. This command copies a file. Proper syntax is “cp [file to be copied] [destination].”
mv
Move. This command moves one or more files or directories from one location to another.
Proper syntax is mv [options] [source] [destination].
rm
Remove. This deletes the specified files or folders.
grep
passwd
A very versatile searching utility, Grep can search any plain-text data set for a specific
“regular expression” which is a fancy way of saying search for a predefined string of
characters. Syntax is grep [options] [pattern] [file name].
Example: grep “find_this_pattern” file123. This would display any line in document “file
123” that contained “find_this_pattern”.
Password. This command is used to change a user’s password.
sudo
Superuser Do. This command would be put in front of any command that we want to
execute with superuser (elevated/restricted) privileges. Most systems will request a
password be entered and checked before proceeding.
chmod
Change Modes. This command is used to change the permissions on an object (file).
chown
Change Owner. This command assigns a new owner to an object (file) and this includes
granting all of the permissions/privileges that would be associated with ownership.
Requires root permissions to use, so it should be proceeded by sudo.
ps
Processes. Displays a list of all currently running process (programs/services) for the user.
kill
Sends a signal to a running process, to by default, terminate (close). However, kill can be
used to send other instructions if done properly!
ifconfig
Interface Configure. Similar to ipconfig in Windows, it shows the current configuration of
the network interface card.
cat
Concatenate. Reads a file and prints contents to the screen.
dig
Domain Information Groper. Similar to nslookup in windows, it can be used to
communicate with a DNS server.
4. RAID (Redundant Array of Independent Disks)
Two things are true of all hard drives. They have a maximum read and write speed, and they will inevitably fail.
When faced with this truth, system designers will often combine hard drives together to increase performance
(faster read/write) and or provide redundancy. There are five raid configurations worth knowing for this exam.
RAID ZERO
How it is performed: Data is “striped” across all of the
drives in the array. If you used two drives, half of the file
would be on one drive, half would be on the other.
Minimum number of disks: TWO
Calculating the size: Add them all together.
Benefits: Speed and space, but not redundancy.
Fault tolerance: none (zero). If any disk fails,
all data is lost and unrecoverable.
RAID ONE
Minimum number of disks: TWO
How it is performed: Data is “mirrored” across all of the
drives in the array. If you used two drives, any data that is
put on one drive will be copied (mirrored) onto the other.
Benefits: fault tolerance (redundancy).
RAID FIVE
Calculating the size: The size of only the
smallest disk in the array.
Fault tolerance: One of the disks can fail and
everything can keep on running.
Benefits: Speed and fault tolerance (redundancy).
Minimum number of disks: THREE
Calculating the size: Add them all together
and subtract one drive from the total.
Fault tolerance: One of the disks can fail. As a
result, the remaining two disks will be slow
until the missing drive is replaced.
RAID SIX
Minimum number of disks: FOUR
How it is performed: Data is “striped” across two drives,
and the third drive will hold a parity bit. The parity bit is
like the answer to a math question that allows any one of
the drives to fail and be replaced later.
How it is performed: Data is “striped” across two drives,
and the other two drives will hold a parity bit. The parity
bits are like the answer to a math question that allows any
two of the four drives to fail and be replaced later.
Calculating the size: Add them all together
and subtract two drives from the total.
Benefits: Speed, and more redundancy than RAID 5.
Fault tolerance: Two of the disks can fail. As a
result, the remaining two working disks will be
very slow until the missing ones are replaced.
RAID TEN (nested)
Minimum number of disks: FOUR
How it is performed: Data striped across two drives, and
then mirrored (copied) to the other two. This is known as
RAID nesting, as we are basically performing RAID 0 and
then RAID 1.
Benefits: Speed of RAID 0 and the redundancy of RAID 1.
Calculating the size: Add them all together
and divide in half.
Fault tolerance: one or two, depending on
which drives fail.
Download