WEST, COMPTIA NETWORK+ GUIDE TO NETWORKS
CHAPTER NO. 01: INTRODUCTION TO NETWORKING
TABLE OF CONTENTS
Applying Concepts
Activity 1-1: Explore Network Operating Systems
Review Questions
Scenario-Based Questions
Question 1-1
Question 1-2
Question 1-3
Hands-On Projects
Project 1-1: IT and Networking Certifications
Project 1-2: Create a Password Manager
Project 1-3: Apply Troubleshooting Methodology
Capstone Project
Capstone Project 1-1: Set Up a Windows Virtual Machine Using VirtualBox
Rubric for Hands-On Projects and Capstone Projects
Networking for Life Discussion 1: Defining Your Career Goals
Reflection Discussion 1: Communication Layers
Rubric for Discussion Assignments
APPLYING CONCEPTS
ACTIVITY 1-1: EXPLORE NETWORK OPERATING SYSTEMS
Estimated time: 30 minutes
Objective 1.4: Explain common networking ports, protocols, services, and traffic types.
Resources:
• Internet access
,DESCRIPTION:
It’s easier to understand what a network operating system is if you’ve observed one or two in action. For
each of the NOSs listed previously (Windows Server, Ubuntu Server, and Red Hat Enterprise Linux), use
your favorite search engine to complete the following steps:
1. Search for information about the NOS and write down a short description based on your findings.
Include a few features and advantages and identify who develops and publishes each NOS.
Answer: Responses should include a basic description of Windows Server, Ubuntu Server, and
Red Hat Enterprise Linux that covers some or all of the following points: a few main features of
each OS, the OS publisher, and advantages offered by that OS.
2. Search for images of screenshots for the NOS. What are some major elements that you notice on
these screens? How are these NOSs managed?
Answer: Responses should note whether the NOS offers GUI or CLI controls and should include
a description of tools or information shown on the screenshots of Windows Server, Ubuntu
Server, and Red Hat Enterprise Linux.
3. Find one or two introductory videos for each NOS and play the videos. What are some
similarities between each NOS? What are some of the differences?
Answer: Responses should show evidence of having viewed at least one video for each NOS and
should include two to three similarities and two to three differences comparing Windows Server,
Ubuntu Server, and Red Hat Enterprise Linux.
REVIEW QUESTIONS
1. In the client–server model, what is the primary secure protocol used for communication between
a browser and web server?
a. HTTPS
b. TLS
c. HTTP
d. SSL
Answer: a. HTTPS
Explanation: The primary protocol used by web servers and browsers (clients) is HTTP
(Hypertext Transfer Protocol). When HTTP is layered on top of an encryption protocol, such as
SSL (Secure Sockets Layer) or TLS (Transport Layer Security), the result is HTTPS (HTTP
Secure), which secures the transmission.
2. A network consists of five computers, all running Windows Professional. All the computers are
connected to a switch, which is connected to a router, which is connected to the Internet. Which
logical networking model does the network use?
a. Hub-and-spoke
b. Ring
, c. Hybrid
d. Peer-to-peer
Answer: d. Peer-to-peer
Explanation: Using a P2P (peer-to-peer) network model, the operating system of each
computer on the network is responsible for controlling access to its resources without centralized
control. The computers, called nodes or hosts on the network, form a logical group of computers
and users that share resources. The hub-and-spoke, ring, and hybrid models are all physical
topologies, not logical topologies.
3. A network consists of seven computers and a network printer, all connected directly to one
switch. Which network topology does this network use?
a. Client-server
b. Mesh
c. Hub-and-spoke
d. Star
Answer: d. Star
Explanation: In a star topology, all devices connect to one central device such as a switch. In a
mesh topology, each device connects to multiple other devices. In a hub-and-spoke topology, a
central switch connects to multiple peripheral switches that each connect to computers in their
areas. A client–server network model is a logical topology, not a physical topology.
4. Which two encryption protocols might be used to secure transmissions for email services?
a. HTTP and HTTPS
b. SSL and TLS
c. FTP and SFTP
d. SSH and RDP
Answer: b. SSL and TLS
Explanation: The email protocols SMTP, POP3, and IMAP4 are all available over SSL (Secure
Sockets Layer) or TLS (Transport Layer Security) for security. HTTP and HTTPS provide
communication between web servers and browsers. FTP and SFTP support the transfer of files
between two computers. SSH and RDP provide secure, encrypted remote access from one
computer to another.
5. What is the fundamental distinction between a layer 2 switch and a router?
a. Devices connect to a switch using a hybrid topology, while devices connect to a router
using a star topology.
b. A switch has one NIC, and a router has many NICs.
, c. A switch is a combo device with many built-in functionalities, while a router only
connects networks to each other.
d. A switch belongs to a single LAN, while a router belongs to multiple LANs.
Answer: d. A switch belongs to a single LAN, while a router belongs to multiple LANs.
Explanation: The fundamental difference between a switch and a router is that a switch belongs
only to its local network and a router belongs to two or more networks. The topology is not
determined by the device itself. Both a switch and a router have multiple NICs. A home router is
a combo device that includes router, switch, and other functions.
6. Which of the following is an application layer protocol?
a. IP
b. RDP
c. TCP
d. Apache
Answer: b. RDP
Explanation: Several protocols are used at the application layer, including HTTP (Hypertext
Transfer Protocol), SMTP (Simple Mail Transfer Protocol), POP3 (Post Office Protocol, version
3), IMAP4 (Internet Message Access Protocol, version 4), FTP (File Transfer Protocol), Telnet,
and RDP (Remote Desktop Protocol). Application layer protocols are used by applications and
system utilities. IP (Internet Protocol) is a network layer protocol. TCP (Transmission Control
Protocol) is a transport layer protocol. Apache is a web server application.
7. Which protocol functions at the transport layer of the OSI model?
a. TLS
b. IP
c. UDP
d. Wi-Fi
Answer: c. UDP
Explanation: UDP (User Datagram Protocol) is one of the two main transport-layer protocols.
TLS (Transport Layer Security) secures other protocols by adding encryption. IP (Internet
Protocol) is the principal protocol used by the network layer. Wi-Fi is a data link layer protocol
used by access points for wireless networks.
8. At the network layer, what type of address is used to identify the receiving host?
a. MAC address
b. Hardware address
c. Port number
d. IP address
Answer: d. IP address