22. The core administrative unit in DNS is called "zone". A zone is a physical file composed of resource records that define a group of domains. A domain is a node in the DNS namespace and all sub-domains below it.
23. Telnet is used for terminal emulation that runs programs remotely.
FTP is used to transfer files.
24. To see TCP/IP configuration on a Windows 95 / 98 computer in a graphical format, use WINIPCFG. It will display your IP address, subnet mask, default gateway, hardware MAC address and other details.
To see TCP/IP configuration in a non-graphical format or on an NT machine, use IPCONFIG. It will also display the IP configuration information on an NT machine. To get more details, use IPCONFIG/ALL.
25. A valid IP address on a host / node can't start with 127; 127.X.X.X is reserved for local loop back. A valid IP address can't be larger than 255 (in any octet), The maximum allowed value is 255 in any or combination of octets. For example, 150.206.256.31 is an invalid IP, since one octet exceeded the value 255. An example of valid IP is 220.127.116.11.
26. TCP/IP utilities:
NBTSTAT This utility displays current NetBIOS over TCP/IP connections, and display NetBIOS name cache.
NETSTAT Displays protocol statistics and current TCP/IP connections since the server was last booted
TRACERT This command is used to determine which route a packet takes to reach its destination from source.
IPCONFIG Displays Windows IP configuration information.
NSLOOKUP This utility enables users to interact with a DNS server and display resource records.
ROUTE This command can be used to display and edit static routing tables.
27. PAP and CHAP:
28. HOSTS file:HOSTS file is an ASCII file and can be edited using Notepad or any other text editor. The IP address and domain name ns.dname.com of a proper entry in a HOSTS file looks like: 18.104.22.168 ns.dname.com. Hash mark (#) is used before writing the comment in HOSTS file. The entire line after the # mark is treated as comment. You can enter any number of lines into a HOSTS file. But the number of characters that each line in a HOSTS file is limited to 255.
29. PPP & SLIP:
SLIP is an older protocol and supports only TCP/IP. No error correction/ compression are offered by SLIP.
30. Some frequently occurring HTTP error messages:
1. Client side:
2. Server side:
31. OSI 7 layers: The 7 layers of OSI model are:
32. FTP utility is used for transferring files between server and client. It uses TCP/IP protocol and therefore connection oriented. The ftp is a reliable (since it is connection oriented) method of data transmission.
The syntax of ftp is as below:
ftp [-v] [-n] [-I] [-d] [-g] [-s:filename] [host name].
-v Suppresses any display of server responses (verbose)
-n Prevents automatic logon when the connection with the server has been established.
-I Turns off interactive prompting during file transfers
-d Displays all ftp commands exchanged between client and server. Useful during debugging.
-g Prevents the use of wildcard characters in path and file names.
-s: filename : Specifies a text file containing ftp commands and then runs the commands within the file. This is similar to running batch file in DOS.
Hostname Specifies the host to connect to and must be the last parameter to be specified.
33. Search Engines: By placing the phrase in double quotes, the search engine returns all the pages that contain the phrase. For example, to return all pages with the phrase 'space ship' type in the same within double quotes "space ship"; On the other hand +space +ship return all pages that contain 'space' and 'ship' not necessarily together.
34. A computer on Internet having a unique IP address is known as HOST.
35. PPTP, L2TP, and L2F:
36. A DNS zone file contains the resource records for the part of the domain for which the zone is responsible. Some of the resource records are:
1. SOA (Start Of Authority Record): The first record in any zone file is the SOA record. The SOA file contains some general parameters such as contact e-mail of the person responsible for this zone file, the host on which zone file is maintained etc.
2. The NS Record (Name Server Record): NS Record contains the name servers for this domain. This will enable other name servers to look up names in your domain.
3. MX Record (Mail Exchange Record): MX record tells us which host processes mail for this domain.
4. Host Record (A Record): A host record is used to statically associate hosts names to IP addresses within a zone. The syntax for this is
5. <hostname> IN A <ip address of the host>
NameServer1 IN A 22.214.171.124
Here 'NameServer1' is the host name and 126.96.36.199 is its ip address.
6. CNAME Record (Canonical name): These records allow you to use more than one name to point to a single Host. Using CNAME, you can host both WWW and FTP servers on the same machine.
7. Reverse Look up is useful when you want to implement security. Reverse look up ensures that the domain name is indeed the domain that it claims to be.
The correct format for Pointer record is
<ip reverse domain name> IN PTR <host name>
ex.: 188.8.131.52.in-addr.arpa. IN PTR services.yourcompany.com
Here the IP numbers are written in backward order and in-addr.arpa is appended to the end, creating a Pointer record.
37. ARP, RARP, and BootP:
38. Proxy Server:A Proxy server is primarily used in between the Web and the client machines that reside on a LAN / intranet. It serves multiple fuctions as required, including:
39. Cookies:A cookie is a plain text file that sends out client information to the corresponding Web server, usually when the client makes a visit to the Web server. Disabling Cookies may result in improperly loaded Web pages.
40. A multi-homed computer will have atleast two IP addresses defined. These IP addresses can be defined to a single network card or there might be more than one network card with atleast one IP address defined to each. It is important to note that there can be more than one IP address defined to a single network card.
41. Only WINS update entries dynamically. All others require records to be entered manually. Remember that DNS and HOSTS resolve FQDN names to IP addresses, whereas, LMHOSTS and WINS resolve NetBIOS names to IP addresses.
43. News Service:
44. The port number needs to be specified if you are accessing a website at a port other than the default port, the default port number for WWW traffic is port 80. By default, the Web page request is sent to port 80 unless otherwise specified. For example, if you want to access a web page at port number 5064, the correctly formatted URL is http://www.yoursite.com:5064/default.htm.
45. MIME specifies how non-ASCII (binary) messages such as graphics can be sent across the Internet.
46. Features supported by HTTP1.1:
1.Host headers enable a single IP address to be assigned to multiple web sites.
2.Persistent connections allow a single session between a client and server to transfer multiple objects, connected to a single resource.
3.Pipelining does not require clients to wait for a confirmation or completion of each request before sending another request.
47. Server Side Includes (SSI):Server-side include (SSI) directives instruct the Web server to insert the contents of another file into an HTML page. This is a convenient way to store information used on many pages in a single file.
48. When you enable SSL communication on your Web site, you need to install a digitally certified key on your Web server.
49. At least first and second level domain names (in this case company.com) are to be registered with InterNIC for access over Internet. Third level and below can be resolved by installing DNS server.
50. FTP site can usually be configured with the following messages. Users (clients computers) get these messages when appropriate.
51. Certificate authority (CA) is any trusted third party that issues certificates and verifies the identity of a server or an individual for security purposes. A certificate is a digital signature containing the identity of a server or an individual.
52. Active Server Pages (ASP):
ASP tags begin with "<%" and end with "%>". The tags are known as delimiters.
ASP runs at the server side.
53. JScript, VBScript, and Java are some of the client side content tools that run on the client computers.
54. URL (Uniform Resource Locator):A URL uniquely identifies the location of a computer, directory, or file on the Internet. The URL also specifies the appropriate port to be used (if different from default port value), Internet protocol, such as HTTP or FTP. The following is an example of a correctly formed URL: http://www.microsoft.com. When no file is specified in the URL, the default.htm or default.asp file, located in the home directory of the Web site is displayed by the client's browser.
55. File Extensions:The extensions that are usually associated with some important file types are:
56. CGI and ISAPI can only be used for server side scripting.
57. XML (Extensible Markup Language) is a reduced version of SGML.
58. A DLL is used in Microsoft operating systems. DLLs' are library routines that are called to perform some common tasks within Microsoft operating environment. DLLs can also be developed by third party vendors to enable integration of their programs into Microsoft environment. Multiple programs can call a DLL.
59. If you want to embed a Pert script into html page, the correct syntax for inserting PerlScript is
Note that "/" is placed before the SCRIPT command as shown, to signify that it is the end of the script.
60. The correct syntax for inserting Java Script into html page is
Note that "/" is placed before the SCRIPT command as shown, to signify that it is the end of the script.
61. ODBC is Microsoft's implementation for accessing Microsoft SQL Server / Access databases from a Web Server, and delivering the results over the Web in html format to client computers.
62. The correct sequence of tags in an html page is:
<html> <head> <title> </title> </head> <body> </body> </html>
Please note that the tag "title" comes between "head" tags. "title" describes the title of the page and usually appears in the Title window of the browser.
63. Correct syntax to insert a comment into html page is:
The correct syntax is <!-- your message -->
An example is
<!-- BEGIN FASTCOUNTER LINK -->
Here 'BEGIN FASTCOUNTER LINK' is the comment that you have inserted into html code.
If you write <IMG SRC="myimage.gif">, the web server assumes that the image is in the same folder as that of the web page. If the image is in different folder, you need to specify the folder in the IMG directive ex: <IMG SRC="images/myimage.gif">.
Correct syntax to insert a hyperlink to www.yahoo.com, when user clicks on "YAHOO" is <A HREF="http://www.yahoo.com">YAHOO
To include special characters, such as '<', '>' etc. we can use specified character entities.
This is required because, these characters have special meaning within html and therefore need to be specified otherwise.
Given below are some character entities used in HTML:
Less than (<): <
Greater than (>): >
Registered trademark: ®
The attribute "ALT" provides an alternative description of an image. This is useful, for example if a client has selected "Text Only" version and prevented any images to be down loaded for faster access to a web page. Also, it may so happen that a browser does not support the image format and can not display the image.
Common syntax for displaying alternate text is:
<IMG SRC="mypicture.gif" ALT="MY Picture">
65. Some of the image / video / audio file formats available are:
66. Web Graphics:
67. A text editor such as Note pad can be used for writing HTML pages. But you need to enter all the code yourself (including html tags). On the other hand, if you are using a GUI editor to write HTML pages, inherent tags are inserted by the editor itself, such that you don't have to worry about the syntax. This will save time more efficient.
68. A Web page written in HTML can usually support the following lists:
The correct syntax for writing Ordered lists is:
<L1>Bulleted item 1
<L2>Bulleted item 2
Note that there is no /L1 or /L2 tag
The correct syntax for writing Unordered lists is:
<L1>Bulleted item 1
<L1>Bulleted item 2
Note that there is no /L1 or /L2 tag.
The correct syntax for writing Definition Lists is: <DL>
<DT> Definition Term 1
<DD> Definition Description 1
<DT> Definition Term 2
<DD> Definition Description 2
Remember that CompTIA expects you to be familiar with HTML tags and writing Web pages with pure HTML.
69. Flash: Flash is from Macromedia. Flash is based on vector graphics, and used for developing dazzling Web sites. You can also incorporate animation with Flash. Flash plug-in is required to display Flash content.
Shockwave: Shockwave is also from Macromedia. Shockwave is used for displaying interactive Web sites involving video, graphics, and Audio. Shockwave plug-in is required to display web pages with Shockwave content.
70. The correct syntax of html code to start an email client on client browser is
<A HREF="mailto:email@example.com"> Email Yahoo Support </A>
This command will open the clients email program and puts "firstname.lastname@example.org" in the "TO" address field. email@example.com is taken only as an example.
71. A trademark is an original and unique name or symbol that is provided legal protection indefinitely.
72. A copyright applies to original works of "authorship". It is protected for the life of the author and an additional 50 years.
73. There are some occasions, where it will not constitute violation of copyright law:
74. The following are valid representations of copyright display:
© 2001 Sky Publications
Copyright 2001 Sky Publications
75. SSL, Secure Socket Layer, works by using a private key to encrypt data that's transferred over the SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, Web pages that require an SSL connection start with https: instead of http:.
Another protocol for transmitting data securely over the World Wide Web is Secure HTTP (S-HTTP). Whereas SSL creates a secure connection between a client and a server, over which any amount of data can be sent securely, S-HTTP is designed to transmit individual messages securely. SSL and S-HTTP, therefore, can be seen as complementary rather than competing technologies. Both protocols have been approved by the Internet Engineering Task Force (IETF) as a standard.
76. Techniques for indexing a site
Keyword index uses only keywords as specified by the user for indexing.
Stemming: Stemming is a technique that searches for the base of a work. For example, if you search for "tutoring", a word containing "tutor" may result.
77. When using "PUSH" technology, the server pushes the information to the browser, even if the browser doesn't request that information. This is different from PULL technology, wherein browser requests the information or pulls the information from the server.
78. X.509 is the most widely used standard for defining digital certificates.
79. S/MIME, Short for Secure/MIME, a new version of the MIME protocol that supports encryption of messages. S/MIME is based on RSA's public-key encryption technology.
The above notes is provided AS IS. ExamGuides.com assumes no responsibility about the accuracy or compliance with vendor's stated Exam objectives