1.1 Protocols and ports Flashcards

Types of Ports

1
Q

Port do FTP servers listen for incoming traffic and send their own traffic.

A

Port 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are network protcols

A

Network protocols are sets of rules and standards that define how devices communicate over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocols are used by devices to

A

send and receive different types of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Segments are encapsulated in IP packets in which layer

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does NIC stand for

A

Network interface card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a network service

A

Provide a service
DHCP
DNS
MAIL SERVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Apache

A

A web server. HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSL stands for

A

secure sockets layer

encryption-based Internet security protocol. Its main purposes are to provide privacy, authentication, and data integrity in Internet communications. SSL is the predecessor to the modern TLS (Transport Layer Security) encryption used today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does tls stand for

A

transport layer security It is a cryptographic protocol used to secure data sent over a network, such as internet traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which layers do TCP and UDP segments send data from

A

layer 5, 6, and 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IMAP stands for

A

Internet message access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RTSP stands for

A

Real time streaming protocal.
Ensures data processed in the correct order.
UDP.Port 544

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does three way handshake work

A

A TCP feature.
Synronication - meaning two devices send a message stating that they are ready to send and receive data packets.
Acknowledgement- both devices send announcements that they have authenticated with each other and ready to being data transmission.
Transmission of data begins.
syn, syn ack, ack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what four simple fields to UDP headers contain

A

source port, destination port, packet length (header and data), and a simple (and optional) checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a packet

A

Network layer pdu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ICMP is used for

A

Utilites like ping and tracert/traceroute to provide control info to IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what three fields do ICMP headers start with

A

type, code and checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

explain differences between tcp and udp

A

TCP - Accurate - connection-oriented, can’t lose packets, logical. UDP - Efficient, connectionless, can lose packets, quick performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

well known port numbers

A

0-1023 used by major protocls and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what does a port # do?

A

Gets data to the right applicaiton.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ports 1024 to 49151

A

Reserved ports assigned by IANA to specific companies that want a common port to be used for their programs or protocols.

22
Q

49512 to 65535

A

Dynamic ports. Not assigned controled or registured. Used by client applications on an as needed basis.

23
Q

which has more overhead, and which strives for accuracy and which integrity and one striving for efficiency.

A

TCP and UDP

24
Q

What makes TCP have more overhead

A

3 way handshake and akmolw

25
Q

what is checksum

A

Used for error detection.

26
Q

two types of ICMP messages?

A

info messages and error messages

27
Q

What is flow control.

A

TCP will use technique called Buffer Space. As data is sent over tcp protocol the receiving device will send the sending device the amount of available space it has on its end to receive data.
Allows sending device to send data at approate rate.

28
Q

Error checking

A

TCP feature called a Checksum.
Checksum is an algorithm within each Data packet will be verified at the receiving device. If there is any type of modification to the checksum. then we know the data been modifed somewhere across the transmission path.

29
Q

Name four features of TCP

A

Error checking, reassembly, flow control and full duplex.

30
Q

Reassembly

A

When tcp sends packets across the network they are broken down into smaller units called segments. At the destination device all data packets are reassembled into their original form.

31
Q

what is Full duplex

A

data can be sent and received at the same time.

32
Q

Connection less protocol.

A

UDP. It does not have defined connection period.

33
Q

What does UDP support that TCP does not support

A

Broadcasting and Multicasting.

34
Q

What does UDP not have compared to TCP

A

Flow control, error checking, data reliably.

35
Q

What is broadcasting.

A

Single data packet can be sent to all devices on network segment.

36
Q

multicasting.

A

data can be sent to either one device or Mutiple users devices or users of your choosing.

37
Q

UDP is used for:

A

Services that require a consistently open protocol.
DHCP
VOIP
Video streaming, online gaming

38
Q

IPsec

A

Internet Protocol Security, is a set of protocols designed to secure internet communication.

39
Q

Name two components of IPsec

A

autheincation header (AH) and security payload.
(AH) provides authentication and integrity verification for an entire IP data packet.
Security Payload (encapsuling) (ESP)

40
Q

ESP

A

Encapsulating Security Payload. It’s a protocol used within IPsec to provide a secure path for data to travel across the internet or other networks.

41
Q

Name two modes of IPSec

A

IPSec operates in two main modes, each designed for different security needs. Here’s a simple explanation of each:
Transport Mode: Imagine sending a private letter to a friend. In transport mode, the contents of the letter (the payload) are sealed and secure, but the envelope (the IP header) is visible, showing where it’s going. This mode is typically used for end-to-end communication between two computers.
Tunnel Mode: Now, think of sending a letter within another package. In tunnel mode, not only is the letter’s content secure, but the envelope is also hidden inside another envelope. This mode is used for network-to-network communications, like between two offices, where the entire original IP packet is encrypted and encapsulated within a new IP packet12

42
Q

Three common protocol types used for data transmission.

A

TCP, UDB IPSec

43
Q

DHCP Lease

A

How long IP address can be used before it’s released back into pool.

44
Q

What does ESP do

A

ESP in networking does something similar for your data:
It encapsulates
It encrypts
It also checks that the data hasn’t been changed along the way.

45
Q

GRE

A

Generic Routing Encapsulation

46
Q

What does GRE do

A

It’s a tunnelling protocol capable of encapsulating a wide variety of network layer protocols.

47
Q

GRE’s relationship with IPSec

A

Creates a sub-tunnle in IPSec. IPSec will only transmit Unicast Packets (one to one communication) GRE allows for IPSec packets to be transferred multicast (one to some) or broadcast (one to many)

48
Q

PPTP

A

Older tech VPN. Supports dial up VPN connections.

49
Q

TLS

A

A VPN Protocol is

50
Q

Which layer does TLS work

A

Layer 5 and above

51
Q

IPSec works at which layer of the

A

layer 3 and above.