1.1 Flashcards

1
Q

What are TCP and UDP encapsulated by?

A

IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IP encapsulates what?

A

TCP and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are TCP and UDP?

A

Two ways to move data from a place to another. Different features for different applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which layer handles TCP and UDP in OSI:

A

Transport, almost all the time when someone is talking about layer 4, they are talking about TCP & UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

one of the features of using TCP and UDP protocols:

A

Multiplexing, It allows us to use multiple applications at the same time across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are TCP and UDP?

A

one of the protocols in the IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP:

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP:

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP specifications:

A
  1. It is connection oriented (a formal connection setup & close)
  2. RELIABLE delivery and acknowledgement is sent back (recovery from errors, can manage out of order messages or re-transmissions
  3. Flow control (Receiver can manage how much data is sent)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UDP:

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

UDP specifications:

A
  1. Connection-less (no formal open or close to the connection)
  2. UNRELIABLE delivery, no acknowledgement (No error recovery, No reordering of data or re-transmission)
  3. No flow control (sender determines the amount of data transmitted)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what decides the form of protocol between TCP and UDP:

A

application and the way the application works. Not all applications need an acknowledgement for sending data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T/F) IP delivers data from one IP address to another IP address.

A

True, every computer has an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what happens to the data when it gets to receiver:

A

each part of the data goes to designated port number in the new device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F) We usually don’t associate different port numbers with different applications.

A

False, that’s why when a data arrives on a new computer, it knows exactly which applicant it is going to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of ports do we have:

A
  1. IPv4 sockets
  2. non-ephemeral ports
  3. Ephemeral ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what information do we need to be able to transfer data over IP sockets:

A
  1. a)Server IP address, b)Protocol (TCP/UDP), c)server application port number
  2. a) Client IP address b) protocol (TCP/UDP)
    c) client port number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

non-ephemeral ports specifications:

A
  1. They have permanent port numbers
  2. ports are 0 - 1023
  3. usually on a server or service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ephemeral ports specifications:

A
  1. temporary port numbers
  2. Ports are 1024 -65535
  3. Determined in real-time by the client
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What port numbers can be used for TCP and what port numbers can be used for UDP:

A

They both can use any port number between 0 - 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

T/F) All servers only use non-ephemeral port numbers.

A

False. Most servers use non-ephemeral port numbers but thats not always the case and it can be different.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

can port numbers be used for security:

A

No, Port numbers are for communication, not security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

why do service/server port numbers need to be WELL KNOWN:

A

To access a server we need to know the exact port number and to be able to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

T/F) TCP port numbers are the same UDP port number and can have a conflict.

A

False. each protocol can use the same number as the other one and still no issues. ie, UDP 80 can work for one application and TCP 80 could be used by another application at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the third form of protocol in IP:

A

ICMP: Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

T/F) ICMP protocol is used for data transfer.

A

False. Commonly used for:

  1. administrative functions to check on devices.
  2. devices can send messages when things don’t go well.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Telnet protocol:

A

Telecommunication Network (Port: TCP/23)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is telnet used for:

A
  1. Login to devices remotely
  2. Console access
  3. In the clear communication
  4. Not the best choice for production systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

SSH protocol:

A

Secure Shell (Port: TCP/22)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Is SSH secured:

A

Even though it looks and acts the same as Telnet, Encrypted Communication link makes it a lot more secured.

31
Q

DNS protocol:

A

Domain Name System (Port UDP/53)

32
Q

What is DNS primary objective:

A

It converts names to IP address, we can not remember numbers so we remember a name that DNS converts into the IP address.

33
Q

SMTP protocol:

A

Simple Mail Transfer Protocol (port TCP/25)

34
Q

What is SMTP protocol used for:

A
  1. Server to server email transfer

2. to send mail from a device to a mail server

35
Q

What protocols do clients use to receive mail:

A
  1. IMAP

2. POP3

36
Q

SFTP protocol:

A

Secure File Transfer Protocol (Port TCP/22) uses the same port as SSH since it uses SSH

37
Q

Advantages of SFTP:

A
  1. Provides file system functionality (resumes interrupted transfers, directory listings, remote file removal)
  2. Encrypted communication using SSH
  3. Full-featured functionality (list, add, delete, etc)
38
Q

FTP protocol:

A

File Transfer Protocol

39
Q

what are FTP ports:

A
  1. TCP/20 for active mode data

2. TCP/21 for control

40
Q

What does FTP do:

A
  1. Transfers files between systems
41
Q

whats the advantage of FTP:

A
  1. it is full-featured functionality (list, add, delete, etc.)
  2. Authenticates with a username and password, but it is not encrypted
42
Q

TFTP protocol:

A

Trivial File Transfer Protocol (Port UDP/69)

43
Q

T/F) TFTP is a very simple file transfer application. But requires Authentication.

A

False, TFTP is very simple and only reads and writes files, but it does not require any authentication. Not too secured.

44
Q

DHCP protocol:

A

Dynamic Host configuration Protocol (ports UDP/67, UDP/68)

45
Q

What does DHCP do:

A

Automated configuration of IP address, subnet mask and other options but you will need a DHCP server somewhere in the network.

46
Q

DHCP characterization:

A
  1. It is dynamic/pooled which means IP addresses are assigned in real-time from a pool out of a server
  2. Each system is given a lease and must renew at set intervals
  3. DHCP Reservation (addresses are assigned by MAC address in the DHCP server and quickly manage addresses from one location.)
47
Q

what does DHCP and DHCP server configure?

A
  1. IP address

2. subnet mask

48
Q

HTTP & HTTPS protocols:

A

Hypertext Transfer Protocol (Port TCP/80)

Hypertext Transfer Protocol Secure (Port TCP/443)

49
Q

What application mainly uses HTTP or HTTPS?

A

Communication in the Browser but other applications use them as well.

50
Q

whats the difference between HTTP and HTTPS:

A

HTTP does the Web Server communication in clear and not encrypted but HTTPS is encrypted and more secured.

51
Q

SNMP protocol:

A

Simple Network Management Protocol (Port UDP/161)

52
Q

Whats SNMP job:

A

To gather statistics from network devices

53
Q

How many versions of SNMP exist:

A

3,

a) v1 (The original): in the clear
b) v2 (a good step ahead): still in the clear but you can bulk transfer
c) v3 (a secure standard): 1.message integrity, 2.Authentication 3.Encryption.

54
Q

Benefits of v3 SNMP protocol:

A
  1. Message integrity
  2. Authentication
  3. Encryption.
55
Q

RDP Protocol:

A

Remote Desktop Protocol (Port TCP/3389)

56
Q

What is RDP used for:

A
  1. It is the Remote Desktop services on many windows versions
  2. Can connect to an entire desktop or just an application
  3. By using RDP, we can help clients for windows, MacOS, Linux, Unix, iPhone and other devices.
57
Q

What does RDP do:

A

Shares a desktop from a remote location over TCP/3389 port.

58
Q

NTP protocol:

A

Network Time Protocol (Port UDP/123)

59
Q

What devices have NTP?

A
  1. Switches
  2. routers
  3. Firewalls
  4. Servers
  5. Workstations
    Every device has its own clock
60
Q

T/F) since every device has its own clock, there is no need to synchronize the clocks

A

False, Synchronizing clocks between all devices becomes critical.

61
Q

NTP characterizations:

A
  1. It does automatic updates
  2. Flexible (you control how clocks are updated)
  3. Very accurate
62
Q

SIP protocol:

A

Session Initiation Protocol (Port TCP/5060,5061)

63
Q

What is SIP used in:

A

Voice over IP (VoIP) signaling

64
Q

What does SIP do in VoIP:

A
  1. It helps to setup and manage VoIP sessions (call, ring, hang up)
  2. Extends Voice communication (video conferencing, Instant messaging, File Transfer)
65
Q

SMB protocol:

A

Sever Message Block (Port TCP/445 [NetBIOS-less])

66
Q

What company uses SMB and what for:

A

Microsoft uses it for file sharing and printer sharing in windows systems.

67
Q

What is CIFS:

A

Another name for SMB, Common Internet File System

68
Q

POP3/IMAP4 protocols:

A

POP: Post Office Protocol v3 (Port TCP/110)
IMAP: Internet Message Access Protocol v4 (Port TCP/143)

69
Q

What is POP/IMAP used for:

A

To receive emails from an email server (Authenticate and transfer)

70
Q

What are the differences between POP & IMAP:

A

POP is a basic mail transfer functionality but IMAP includes email inbox management from multiple clients.

71
Q

LDAP/LDAPS protocol:

A

LDAP: Lightweight Directory Access Protocol (Port TCP/389
LDAPS: LDAP Secure (Port TCP/636)

72
Q

Differences between LDAP & LDAPS:

A

LDAP stores and retrieves info. in a network directory but LDAP is a non-standard implementation of LDAP over SSL

73
Q

H323 Protocol:

A

Also a VoIP signalling like SIP protocol (Port TCP/1720)

74
Q

T/F) H323 is used to setup & manage VoIP sessions (call, ring, hang up) but it is not used any longer.

A

False, H323 is used like SIP to setup & manage VoIP sessions, but even though it is one of the earliest VoIP standards, we still use it today.