CompTIA® Inet+ Exam Cram Notes.

<--Previous Page

22. The core administrative unit in DNS is called "zone". A zone is a physical file composed of resource records that define a group of domains. A domain is a node in the DNS namespace and all sub-domains below it.

23. Telnet is used for terminal emulation that runs programs remotely.

FTP is used to transfer files.

24. To see TCP/IP configuration on a Windows 95 / 98 computer in a graphical format, use WINIPCFG. It will display your IP address, subnet mask, default gateway, hardware MAC address and other details.

To see TCP/IP configuration in a non-graphical format or on an NT machine, use IPCONFIG. It will also display the IP configuration information on an NT machine. To get more details, use IPCONFIG/ALL.

25. A valid IP address on a host / node can't start with 127; 127.X.X.X is reserved for local loop back. A valid IP address can't be larger than 255 (in any octet), The maximum allowed value is 255 in any or combination of octets. For example, is an invalid IP, since one octet exceeded the value 255. An example of valid IP is

26. TCP/IP utilities:

NBTSTAT This utility displays current NetBIOS over TCP/IP connections, and display NetBIOS name cache.

NETSTAT Displays protocol statistics and current TCP/IP connections since the server was last booted

TRACERT This command is used to determine which route a packet takes to reach its destination from source.

IPCONFIG Displays Windows IP configuration information.

NSLOOKUP This utility enables users to interact with a DNS server and display resource records.

ROUTE This command can be used to display and edit static routing tables.

27. PAP and CHAP:

  • PAP uses 2-way handshaking. Passwords are sent in clear text across the link. Therefore, PAP is to be used only when it not possible to use CHAP.
  • CHAP uses 3-way handshaking. CHAP uses Challenge/ Response method that provides protection against the password capture while authenticating the user. One should use CHAP whenever it is possible.

28. HOSTS file:HOSTS file is an ASCII file and can be edited using Notepad or any other text editor. The IP address and domain name of a proper entry in a HOSTS file looks like: Hash mark (#) is used before writing the comment in HOSTS file. The entire line after the # mark is treated as comment. You can enter any number of lines into a HOSTS file. But the number of characters that each line in a HOSTS file is limited to 255.

29. PPP & SLIP:

  • PPP offers multi protocol support, error correction and compression.
  • Multilink PPP allows multiple physical links be used to transfer information. The data passing through different physical connections form a single logical stream of data, thus increasing the effective bandwidth.
  • PPP supports Password Authentication Protocol (PAP) and, Challenge Handshake Authentication Protocol (CHAP).
  • SLIP is an older protocol and supports only TCP/IP. No error correction/ compression are offered by SLIP.

30. Some frequently occurring HTTP error messages:

1. Client side:

  • 404-not found (specified file not found on server side)
  • 401 - unauthorized

2. Server side:

  • 500 - internal server error
  • 502 - Server overloaded
  • 503 - service unavailable
  • 504 - gateway timeout

31. OSI 7 layers: The 7 layers of OSI model are:

  • The Application Layer: Application layer is responsible for identifying and establishing the availability of intended communication partner and verifying sufficient resources exist for communication. Some of the important application layer protocols are: WWW, SMTP, FTP, etc.
  • The Presentation Layer: This layer is responsible for presenting the data in standard formats. This layer is responsible for data compression, decompression, encryption, and decryption. Some Presentation Layer standards are: JPEG, MPEG, MIDI, PICT, Quick Time, TIFF.
  • The Session Layer: Session Layer is responsible for co-coordinating communication between systems/nodes. The following are some of the session layer protocols and interfaces: a) Network File System (NFS), SQL, RPC (Remote Procedure Call), X-Windows, ASP, DNA SCP.
  • The Transport Layer: The Transport Layer is responsible for multiplexing upper-layer applications, session establishment, and tearing-down of virtual circuits. This layer does "flow control" to maintain data integrity. Flow Control prevents the problem of a sending host on one side of the connection overflowing the buffers in the receiving host.
  • The Network Layer: There can be several paths to send a packet from a given source to a destination. The primary responsibility of Network layer is to send packets from the source network to the destination network using pre-determined methods. Routers work at Network layer.
  • The Data Link Layer: Data Link Layer is layer 2 of OSI reference model. This layer is divided into two sub-layers:
    • Logical Link Control (LLC) sub-layer.
    • Media Access Control (MAC) sub-layer.
    • The LLC sub-layer handles error control, flow control, framing, and MAC sub-layer addressing.
    • The MAC sub-layer is the lower of the two sub-layers of the Data Link layer. MAC sub-layer handles access to shared media, such a Token passing or Ethernet.
  • Physical Layer: The actual flow of bits takes place through Physical layer. At Physical layer, the interface between the DTE and DCE is determined. The following are some of the standard interfaces are defined at Physical layer: A> EIA/TIA-232, EIA/TIA-449, V.24, V.35, X.21, G.703, HSSI (High Speed Serial Interface).

32. FTP utility is used for transferring files between server and client. It uses TCP/IP protocol and therefore connection oriented. The ftp is a reliable (since it is connection oriented) method of data transmission.

The syntax of ftp is as below:

ftp [-v] [-n] [-I] [-d] [-g] [-s:filename] [host name].


-v Suppresses any display of server responses (verbose)

-n Prevents automatic logon when the connection with the server has been established.

-I Turns off interactive prompting during file transfers

-d Displays all ftp commands exchanged between client and server. Useful during debugging.

-g Prevents the use of wildcard characters in path and file names.

-s: filename : Specifies a text file containing ftp commands and then runs the commands within the file. This is similar to running batch file in DOS.

Hostname Specifies the host to connect to and must be the last parameter to be specified.

FTP commands:

  • To upload a single file using FTP, use the command "put",
  • To download a single file using FTP, use the command "get",
  • To upload multiple files using FTP, use the command "mput",
  • To download multiple files using FTP, use the command "mget".

33. Search Engines: By placing the phrase in double quotes, the search engine returns all the pages that contain the phrase. For example, to return all pages with the phrase 'space ship' type in the same within double quotes "space ship"; On the other hand +space +ship return all pages that contain 'space' and 'ship' not necessarily together.

34. A computer on Internet having a unique IP address is known as HOST.

35. PPTP, L2TP, and L2F:

  • PPTP: PPTP is Microsoft proprietary protocol and widely supported. PPTP supports wide range of protocols such as TCP, NetBEUI, IPX.
  • L2F: It was developed by Cisco systems and is proprietary protocol. L2F uses UDP instead of TCP for forwarding the packets through the tunnel.
  • L2TP: L2TP uses IPSec for encryption.

36. A DNS zone file contains the resource records for the part of the domain for which the zone is responsible. Some of the resource records are:

1. SOA (Start Of Authority Record): The first record in any zone file is the SOA record. The SOA file contains some general parameters such as contact e-mail of the person responsible for this zone file, the host on which zone file is maintained etc.

2. The NS Record (Name Server Record): NS Record contains the name servers for this domain. This will enable other name servers to look up names in your domain.

3. MX Record (Mail Exchange Record): MX record tells us which host processes mail for this domain.

4. Host Record (A Record): A host record is used to statically associate hosts names to IP addresses within a zone. The syntax for this is

5. <hostname> IN A <ip address of the host>


NameServer1 IN A

Here 'NameServer1' is the host name and is its ip address.

6. CNAME Record (Canonical name): These records allow you to use more than one name to point to a single Host. Using CNAME, you can host both WWW and FTP servers on the same machine.

7. Reverse Look up is useful when you want to implement security. Reverse look up ensures that the domain name is indeed the domain that it claims to be.

The correct format for Pointer record is

<ip reverse domain name> IN PTR <host name>

ex.: IN PTR

Here the IP numbers are written in backward order and is appended to the end, creating a Pointer record.

37. ARP, RARP, and BootP:

  • Since IP address is a logical address, if a packet is to be delivered to another machine, its physical address (MAC address) needs to be known. Address Resolution Protocol (ARP) is used to resolve or map a known IP address to a MAC sub-layer address to allow communication on a multi-layer access network such as the Internet.
  • Reverse ARP (RARP) is used to obtain an IP address using an RARP broadcast. RARP is used to obtain IP address from a known MAC address
  • BootP (Bootstrap Protocol): When a diskless workstation is powered on, it broadcasts a BootP request on the network. A BootP server responds with its IP address, Default gateway, etc.

38. Proxy Server:A Proxy server is primarily used in between the Web and the client machines that reside on a LAN / intranet. It serves multiple fuctions as required, including:

  • It receives the client requests for Web pages and forward the requests if necessary. If the pages are available in its cache (Don�t confuse with L1/L2 cache of CPUs!), it immediately serves the pages to the clients. This improves response times and efficient bandwidth utilization.
  • A proxy server maps the IP addresses of the clients to one or more IP addresses for accessing the Internet. This way, a Proxy can be used to save precious IP addresses available on the Internet. At least, one valid IP address is required to access the Internet for multiple clients, that are connected to the Internet through Proxy.
  • A Proxy Server can also be used to secure the clients from possible security threats from the Internet by configuring appropriately. This improves the safety of the client machines malicious attacks.

39. Cookies:A cookie is a plain text file that sends out client information to the corresponding Web server, usually when the client makes a visit to the Web server. Disabling Cookies may result in improperly loaded Web pages.

40. A multi-homed computer will have atleast two IP addresses defined. These IP addresses can be defined to a single network card or there might be more than one network card with atleast one IP address defined to each. It is important to note that there can be more than one IP address defined to a single network card.

41. Only WINS update entries dynamically. All others require records to be entered manually. Remember that DNS and HOSTS resolve FQDN names to IP addresses, whereas, LMHOSTS and WINS resolve NetBIOS names to IP addresses.

42. Browsers:

  • Configuring the browser not to show pictures enable the Web pages to load faster.
  • A correctly formatted connection to access a Web site over a secure link will have "https://".

43. News Service:

  • By installing Internet News service, you can enable all group members to exchange threaded messages.
  • NNTP is a service. Users can connect to NNTP service using client software like Microsoft Internet Mail and News through TCP/IP.

44. The port number needs to be specified if you are accessing a website at a port other than the default port, the default port number for WWW traffic is port 80. By default, the Web page request is sent to port 80 unless otherwise specified. For example, if you want to access a web page at port number 5064, the correctly formatted URL is

45. MIME specifies how non-ASCII (binary) messages such as graphics can be sent across the Internet.

46. Features supported by HTTP1.1:

1.Host headers enable a single IP address to be assigned to multiple web sites.

2.Persistent connections allow a single session between a client and server to transfer multiple objects, connected to a single resource.

3.Pipelining does not require clients to wait for a confirmation or completion of each request before sending another request.

47. Server Side Includes (SSI):Server-side include (SSI) directives instruct the Web server to insert the contents of another file into an HTML page. This is a convenient way to store information used on many pages in a single file.

48. When you enable SSL communication on your Web site, you need to install a digitally certified key on your Web server.

49. At least first and second level domain names (in this case are to be registered with InterNIC for access over Internet. Third level and below can be resolved by installing DNS server.

50. FTP site can usually be configured with the following messages. Users (clients computers) get these messages when appropriate.

  • Welcome message: When a user enters an FTP site, this message is displayed.
  • Exit message: When a user exits an FTP site, this message is displayed.
  • Maximum connections: This is displayed when the maximum simultaneous connections limit is reached at the FTP server, and the user computer can not be connected because of this.

51. Certificate authority (CA) is any trusted third party that issues certificates and verifies the identity of a server or an individual for security purposes. A certificate is a digital signature containing the identity of a server or an individual.

52. Active Server Pages (ASP):

ASP tags begin with "<%" and end with "%>". The tags are known as delimiters.

ASP runs at the server side.

53. JScript, VBScript, and Java are some of the client side content tools that run on the client computers.

54. URL (Uniform Resource Locator):A URL uniquely identifies the location of a computer, directory, or file on the Internet. The URL also specifies the appropriate port to be used (if different from default port value), Internet protocol, such as HTTP or FTP. The following is an example of a correctly formed URL: When no file is specified in the URL, the default.htm or default.asp file, located in the home directory of the Web site is displayed by the client's browser.

55. File Extensions:The extensions that are usually associated with some important file types are:

  • Active Server Pages -- .asp
  • Java source code -- .java
  • Java Script -- .js
  • Perl script -- .pl

56. CGI and ISAPI can only be used for server side scripting.

VBScript, JavaScript, ASP are used for client side scripting.

57. XML (Extensible Markup Language) is a reduced version of SGML.

58. A DLL is used in Microsoft operating systems. DLLs' are library routines that are called to perform some common tasks within Microsoft operating environment. DLLs can also be developed by third party vendors to enable integration of their programs into Microsoft environment. Multiple programs can call a DLL.

59. If you want to embed a Pert script into html page, the correct syntax for inserting PerlScript is

Note that "/" is placed before the SCRIPT command as shown, to signify that it is the end of the script.

60. The correct syntax for inserting Java Script into html page is

Note that "/" is placed before the SCRIPT command as shown, to signify that it is the end of the script.

61. ODBC is Microsoft's implementation for accessing Microsoft SQL Server / Access databases from a Web Server, and delivering the results over the Web in html format to client computers.

62. The correct sequence of tags in an html page is:








Please note that the tag "title" comes between "head" tags. "title" describes the title of the page and usually appears in the Title window of the browser.

63. Correct syntax to insert a comment into html page is:

The correct syntax is <!-- your message -->

An example is


Here 'BEGIN FASTCOUNTER LINK' is the comment that you have inserted into html code.

64. HTML:

If you write <IMG SRC="myimage.gif">, the web server assumes that the image is in the same folder as that of the web page. If the image is in different folder, you need to specify the folder in the IMG directive ex: <IMG SRC="images/myimage.gif">.

Correct syntax to insert a hyperlink to, when user clicks on "YAHOO" is <A HREF="">YAHOO

To include special characters, such as '<', '>' etc. we can use specified character entities.

This is required because, these characters have special meaning within html and therefore need to be specified otherwise.

Given below are some character entities used in HTML:

Less than (<): <

Greater than (>): >

Copyright: ©

Registered trademark: ®

The attribute "ALT" provides an alternative description of an image. This is useful, for example if a client has selected "Text Only" version and prevented any images to be down loaded for faster access to a web page. Also, it may so happen that a browser does not support the image format and can not display the image.

Common syntax for displaying alternate text is:

<IMG SRC="mypicture.gif" ALT="MY Picture">

65. Some of the image / video / audio file formats available are:

  • GIF (extension .gif): GIF is one of the most widely used formats for images on the World Wide Web. GIF images are very compact and have only 256 colors or 8 bits.
  • JPEG (Joint Photographic Expert Group, extension .jpg): JPEG is a 24 bit, 16-million color graphic file format widely used on the Web. JPEG uses compression to reduce the file size and recommended for continuous tone images.
  • PNG (Portable network Graphics, extension .png): This is a new format, not yet widespread. Specifically designed for the Web.
  • MOV (Quick Time Movie, extension .mov): Quick Time Plug-in is required to play .mov files on the Internet.
  • MPEG (Extension .mpg): MPEG can provide full motion, full screen video with special software /or hardware.
  • PDF (Extension .pdf): This format is developed by Adobe Acrobat. It is used to display documents that are created using Adobe Acrobat. .pdf format is most widely used over the Internet to distribute the documents.

66. Web Graphics:

  • VRML allows the display of 3D pictures with Web browsers.
  • All .bmp,.gif, and .jpeg use raster graphics, where as Flash uses vector graphics. Vector graphics take less file space compared to raster graphics.
  • VRML files use the extension .wrl.

67. A text editor such as Note pad can be used for writing HTML pages. But you need to enter all the code yourself (including html tags). On the other hand, if you are using a GUI editor to write HTML pages, inherent tags are inserted by the editor itself, such that you don't have to worry about the syntax. This will save time more efficient.

68. A Web page written in HTML can usually support the following lists:

  • Unordered lists: Unordered lists are bulleted and used when it is not required to number the lists.
  • Ordered lists: In an ordered list, the number precedes each list item.
  • Definition lists: A definition list typically lists each definition term followed by an indented description.

The correct syntax for writing Ordered lists is:


<L1>Bulleted item 1

<L2>Bulleted item 2


Note that there is no /L1 or /L2 tag

The correct syntax for writing Unordered lists is:


<L1>Bulleted item 1

<L1>Bulleted item 2


Note that there is no /L1 or /L2 tag.

The correct syntax for writing Definition Lists is: <DL>

<DT> Definition Term 1

<DD> Definition Description 1

<DT> Definition Term 2

<DD> Definition Description 2


Remember that CompTIA expects you to be familiar with HTML tags and writing Web pages with pure HTML.

69. Flash: Flash is from Macromedia. Flash is based on vector graphics, and used for developing dazzling Web sites. You can also incorporate animation with Flash. Flash plug-in is required to display Flash content.

Shockwave: Shockwave is also from Macromedia. Shockwave is used for displaying interactive Web sites involving video, graphics, and Audio. Shockwave plug-in is required to display web pages with Shockwave content.

70. The correct syntax of html code to start an email client on client browser is

<A HREF=""> Email Yahoo Support </A>

This command will open the clients email program and puts "" in the "TO" address field. is taken only as an example.

71. A trademark is an original and unique name or symbol that is provided legal protection indefinitely.

72. A copyright applies to original works of "authorship". It is protected for the life of the author and an additional 50 years.

73. There are some occasions, where it will not constitute violation of copyright law:

  • Parody
  • Use by free educational institutions, where in portions of the material is used for non-profit
  • Limited use, wherein, the material is used only to quote some portions.
  • Archiving purposes.

74. The following are valid representations of copyright display:

© 2001 Sky Publications

Copyright 2001 Sky Publications

75. SSL, Secure Socket Layer, works by using a private key to encrypt data that's transferred over the SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, Web pages that require an SSL connection start with https: instead of http:.

Another protocol for transmitting data securely over the World Wide Web is Secure HTTP (S-HTTP). Whereas SSL creates a secure connection between a client and a server, over which any amount of data can be sent securely, S-HTTP is designed to transmit individual messages securely. SSL and S-HTTP, therefore, can be seen as complementary rather than competing technologies. Both protocols have been approved by the Internet Engineering Task Force (IETF) as a standard.

76. Techniques for indexing a site

Keyword index uses only keywords as specified by the user for indexing.

Stemming: Stemming is a technique that searches for the base of a work. For example, if you search for "tutoring", a word containing "tutor" may result.

77. When using "PUSH" technology, the server pushes the information to the browser, even if the browser doesn't request that information. This is different from PULL technology, wherein browser requests the information or pulls the information from the server.

78. X.509 is the most widely used standard for defining digital certificates.

79. S/MIME, Short for Secure/MIME, a new version of the MIME protocol that supports encryption of messages. S/MIME is based on RSA's public-key encryption technology.

<--Previous Page

The above notes is provided AS IS. assumes no responsibility about the accuracy or compliance with vendor's stated Exam objectives

Please visit our sponsor: images-used/se-banner125X125.gif