04 Flashcards

(59 cards)

1
Q

FTP (Data) protocol: Port:

A

TCP, 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FTP (command/control) protocol: Port:

A

TCP 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSH Protocol: Port:

A

TCP 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Telnet (Data) protocol: Port:

A

TCP 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SMTP (Data) protocol: Port:

A

TCP 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DNS protocol: Port:

A

UDP(Queries):53 TCP(Zone Transfers):53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DHCP (Data) protocol: Port:

A

UDP 67/68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TFTP protocol: Port:

A

UDP 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP protocol: Port:

A

TCP 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

POP3 protocol: Port:

A

TCP 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IMAP4 protocol: Port:

A

TCP 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SNMP protocol: Port:

A

UDP 161/162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LDAP protocol: Port:

A

TCP 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Https protocol: Port:

A

TCP 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RLOGIN protocol: Port:

A

TCP 513

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__________ Allows us to optimize available IP addresses by specifying a different subnet mask for an ip address

A

Variable-length subnet masking (VLSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_________ Is a reliable connection-oriented Transport Layer protocol that accepts data of any length from upper-layer protocols and breaks them into segments

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP uses a process known as ___________ to establish a logical connection prior to the transmission of data. (_____)(______,_______)(_____)

A

Three-way handshake
Syn Syn/Ack Ack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The ____________ is an unreliable, connectionaless protocol that does not guarantee data transmission, Since _______ is void of fields, it uses a fixed ___________

A

UDP , 8-byte header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Well-known port ranges?

A

0-1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Registered port ranges?

A

1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_______ are objects that allow software to communicate and send data across a network connection via access to a computers NIC

A

socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Within a netsts what does the Proto, loacl address, foriegn address, and state columns show?

A

Protocols
Source IP
Destination IP
State of the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does each of these states in a netstat mean?

Established
Syn_sent
SYN_RECV
CLOSE
LISTEN
CLOSING

A

A connection has been established
Actively trying to make connection
Received a connection request
The socket is not being used
Socket is listening for incoming connections
Sockets are shutdown not all data was sent

25
________ is a protocol used by a host to obtain an IP address from a DHCP server Protocol____ Port#_____ DORA
DHCP UDP 67/68 Discover, Offer, Request, Acknowledge
26
________ Is a distributers name system that contains services to map computer names to IP addresses and IP addresses to computer names
Domain Name System (DNS)
27
What is a root name server?
are machines that provide root access to the root zone file, containing information on all TLDs
28
What is a DNS Generic TLD (gTLD)
TLDs with three or more characters, .com, .net
29
What is a DNS sponsored TLD (sTLD)
TLDs owned by an organization .mil
30
What is a DNS country code TLD (cTLD)
TLDs owned by country's .ru .cn
31
__________ is a unique name used to identify a particular system in the namespace, sometimes referred too as an absolute domain name
Fully Qualified Domain Name (FQDN)
32
What is a portion of the domain namespace?
zone
33
One DNS server acts as the ______ The ___ acts as the primary DNS server, any other authoriaticve servers for the zone are termed ________
SOA, name servers
34
What is a forward look-up?
looking up a website using its name and the computer turning that into an IP address to follow (Ip-Name)
35
What is a reverse lookup?
Looking up an ip address and the computer using that to follow its name (Name-IP)
36
What DNS Resource records are the follwoing? A AAAA CNAME MX SRV PTR
Ipv4 host records Ipv6 Host records canonical name, alias like using another word for a command to reach somewhere Mail exchange Service record Pointer record, maps IP addresses to names for reverse lookups
36
_____ are how a client requests the FQDN for an IP or gets an IP for a known FQDN Protocol/port number
DNS Queries UDP/53
37
An _______ DNS query, the client makes additional DNS Queries
Iterative
38
An _______ DNS query makes quries to other DNS servers
Recursive
39
A DNS _____ is a server used to forward DNS queries to DNS servers outside the network
forwarder
40
Storing previously resolved responses to queries is called ______
caching
41
_________ are conducted when a primary DNS server transfers its cache/database to a secondary or back-up DNS server. Protocol/port number
Zone transfers TCP 53
42
_______ is used to send mail messages across a network and is the basis for internet email Protocol/port number
Simple Mail Transfer Protocol TCP 25
43
_________ is a protocol used to retrieve email form a mail server protocol/port number
Post Office Protocol version 3POP3 TCP: 110
44
___________ is a more advanced version of POP3 and allows you to search through email/messages and orgainze them into folders protocl/port number?
Internet message access protocol version 4 IMAP4 TCP: 143
45
_________ is the set of rules for exchanging files, image, sound, video, and other multimedia files form server to client (unsecured)
HTTP TCP:80
46
_________ Is an extension to the HTTP protocol where the HTTP protocol rides over the secure sockets layer or transport security layer, making it more secure Protocol/port number?
HTTPS TCP: 443
47
_______ is an application layer cryptographic protocol of the TCP/IP suite capable of securing other application layer protocols Where does it reside in the OSI model? _____ relies upon the exchange of server certificates to negotiate encryption/decryption
SSL Presentation SSL
48
_____ is an upgrade to, and more robust SSL
TLS
49
_____ is a robust file manipulation application used for exchanging and manipulating files over a TCP-based computer network Protocol/port numbers?
FTP TCP Data:20 Command:21
50
What is the difference between passive and active mode in FTP? protocol/port numbers?
Active: Pizza delivery, server send me data Passive: Pizza takeout, I the client go to the server and pick up the data TCP Data:20 Command:21
51
______ Is a simple protocol that only provides for the reading and writing of files or mail protocol/port numbers?
Trivial File Transfer Protocol (TFTP) UDP:69
52
_________ is a binary TCP/IP Application layer protocol allowing a user to establish a virtual connection with another host
telnet TCP:23
53
_____ is a UNIX utility often used as an alternative to telnet which allows a user on a UNIX host to login to another UNIX host have a TCP/IP Internet internetwork
Remote Login RLogin TCP:513
54
______ is a cryptographic protocol that allows data to be exchanged using a secure channel between two networked devices Protocol/port numbers?
SSH Secure shell TCP:22
55
______ is an application Layer Protocol used to structure information on a directory server (telephone/look up address) Protocol/port numbers
Lightweight Directory Access LDAP TCP: 389
56
______ is used to manage and collect statistical network data, such as performance statistics, network availability and error rates, from remote devices through polling
SNMP UDP 161 Trap messages 162
57
____________ allows the management of a network device through the network or within normal communication channels
In-band management (over the network)
58
__________ allows management outside of normal communication channels. This type of management is through a channel physically seperated form the network.
Out-of-band management (Through a cable)