1.5 Explain common ports and protocols, their application, and encrypted alternatives. Flashcards
File Transfer Protocol (FTP)
20/21
Provides insecure file transfers
Secure Shell (SSH)
22
provides secure remote control of another machine using a text-based environment
Secure File Transfer Protocol (SFTP)
22
provides secure file transfers
Telnet
23
provides insecure remote control of another machine using a text-based environment
Simple Mail Transfer Protocol (SMTP)
25
provides the ability to send emails over the network
Domain Name System (DNS)
53
converts domain names to IP addresses, and IP addresses to domain names
Dynamic Host Configuration Protocol (DHCP)
67 & 68
automatically provides network parameters to your clients, such as their assigned IP address, subnet mask, default gateway, and the DNS server they should use
Trivial File Transfer Protocol (TFTP)
69
used as a lightweight file transfer method for sending configuration files or network booting of an operating system
Hypertext Transfer Protocol (HTTP)
80
used for insecure web browsing
Post Office Protocol v3 (POP3)
110
used for receiving incoming emails
Network Time Protocol (NTP)
123
used to keep accurate time for clients on a network
Internet Message Access Protocol (IMAP)
143
a newer method of retrieving incoming emails which improves upon the older POP3
Simple Network Management Protocol (SNMP)
161 & 162
used to collect data about network devices and monitor their status
Lightweight Directory Access Protocol (LDAP)
389
used to provide directory services to your network
Hypertext Transfer Protocol Secure (HTTPS) [Secure Sockets Layer (SSL)]
443
used as a secure and encrypted version of web browsing