2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes Flashcards

1
Q

Computers use port numbers to:

A

identify protocols and keep the different processes sorted out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The protocol HTTP does what?

A

Makes the connection to the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does the protocol HTTP work?

A

It selects an unused port on the computer (known as an outbound port) to send and receive data to and from a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an inbound port?

A

It is a port used by the websites web server that is open at all times, ready to accept sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transmission Control Protocol (TCP) sessions are known as:

A

connection-oriented sessions (this means that every packet that is sent is checked for delivery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

User Datagram Protocol (UDP) sessions are known as:

A

connectionless sessions (this means the messages are sent without an expectation of communication from the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UDP is used in:

A

streaming media sessions, such as Voice over IP (VoIP) and gaming

and for protocols that use a simple query and response, such as DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When is UDP better than TCP?

A

for time-sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When is TCP more beneficial than UDP?

A

When reliability is important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port Number(s), Port Type

FTP

A

20 & 21, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port Number(s), Port Type

SSH

A

22, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port Number(s), Port Type

Telnet

A

23, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port Number(s), Port Type

SMTP

A

25, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port Number(s), Port Type

DNS

A

53, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port Number(s), Port Type

HTTP

A

80, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port Number(s), Port Type

POP3

A

110, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port Number(s), Port Type

IMAP

A

143, TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port Number(s), Port Type

HTTPS

A

443, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port Number(s), Port Type

RDP

A

3389, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Port Number(s), Port Type

NetBIOS/NetBT

A

137-139, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Port Number(s), Port Type

SMB/CIFS

A

445, TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Port Number(s), Port Type

SLP

A

427, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Port Number(s), Port Type

AFP

A

548, TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Port Number(s), Port Type

DHCP

A

67/68, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Port Number(s), Port Type

LDAP

A

389, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Port Number(s), Port Type

SNMP

A

161/162, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

File Transfer Protocol is a protocol used by:

A

both web browsers and specialized FTP programs to access dedicated file transfer servers for file downloads and uploads

28
Q

Secure Shell (SSH) allows:

A

data to be exchanged computers on a secured channel

29
Q

What protocol is more secure than FTP and Telnet?

A

Secure Shell

30
Q

Secure FTP combats

FTP lack of security by providing:

A

file access over a reliable data stream, generated and protected by SSH

31
Q

Telnet enables:

A

a user to make a text-based connection to a remote computer or networking device and use it as if he were a regular user sitting in front of it rather than simply downloading pages and files he would with an http:// or ftp:// connection

32
Q

Simple Mail Transfer Protocol (SMTP) is used to:

A

send email from a client system to an email server, which also uses SMTP to relay the message to the receiving email server

33
Q

Domain Name System (DNS) is the name for:

A

the network of servers on the Internet that translate domain names and individual hostnames into their corresponding IP addresses

34
Q

Hypertext Transfer Protocol (HTTP) is the protocol used by:

A

web browsers, such as Internet Explorer, Microsoft Edge, Firefox, and Chrome, to access websites and content

35
Q

Hypertext Transfer Protocol Secure or HTTP over SSL (HTTPS) are:

A

sites that are secured with various encryption schemes

36
Q

What are the two leading protocols for receiving email?

A

Post Office Protocol version (POP3)

Internet Message Access Protocol (IMAP)

37
Q

What happens to the email in an email system based on POP3?

A

email is downloaded from the mail server to folders on a local system

38
Q

POP3 is not a suitable email protocol for:

A

users who frequently switch between computers and mobile devices because email might be spread over computers

39
Q

Internet Message Access Protocol (IMAP) is:

A

an email protocol that enables messages to remain on the email server so they can be retrieved from any location

40
Q

IMAP also supports folders, so users can:

A

organize their messages as desired

41
Q

What is the current version of IMAP?

A

IMAP4

42
Q

To configure an IMAP-based email account you must:

A

select IMAP as the email server type and specify the name of the server, your username and password, and whether the server uses SSL

43
Q

NetBIOS is a protocol that:

A

allows some legacy applications that were developed in the 1980s to work on larger networks and the Internet

44
Q

Server Message Block (SMB) provides:

A

access to shared items such as files and printers

45
Q

Server Message Block (SMB) uses:

A

packets that authenticate remote computers through what are known as interprocess communication mechanisms

46
Q

Server Message Block (SMB) uses ports 137-139 for:

A

SMB traffic using NetBIOS over TCP (NetBT)

47
Q

Server Message Block (SMB) uses port 445 for:

A

SMB hosted on TCP

48
Q

Port 445 is used by:

A

Server Message Block SMB)

Common Internet File System (CIFS)

49
Q

Common Internet File System (CIFS) is an:

A

enhanced version of Microsoft SMB, which is an open, cross-platform protocol

50
Q

Common Internet File System (CIFS) has now been widely replaced by:

A

updated versions of SMB (SMB 2.0 and 3.0)

51
Q

Service Location Protocol (SLP) was designed to:

A

allow networked hosts to find services of other devices such as printers on the local network

52
Q

With Service Location Protocol (SLP), devices providing services can:

A

announce their presence to hosts and provide configuration information

53
Q

Apple Filing Protocol (AFP) was previously known as:

A

Apple-Talk Filing Protocol

54
Q

Apple Filing Protocol (AFP) uses:

A

TCP/IP for transport

55
Q

The Remote Desktop Protocol (RDP) is used by:

A

Remote Desktop Services (RDS), which is the Windows Server-based companion of Remote

56
Q

Dynamic Host Configuration Protocol (DHCP) service makes life easier for a network administrator:

A

by automatically assigning IP addresses, subnet masks, gateway addresses, DNS servers, and so on

57
Q

If you get your address from a Dynamic Host Configuration Protocol (DHCP) server, you are getting:

A

your address from a DHCP server, you are getting your address assigned dynamically, and it could change periodically

58
Q

Simple Network Management Protocol (SNMP) is used as:

A

the standard for managing and monitoring devices on a network

59
Q

Simple Network Management Protocol (SNMP) manages:

A

routers, switches, and computers and is often incorporated into software known as a network management system (NMS)

60
Q

Lightweight Directory Access Protocol (LDAP) is used to:

A

access and maintain distributed directories of information such as the kind involved with Microsoft domains

61
Q

Simple Network Management Protocol (SNMP) manages:

A

routers, switches, and computers and is often incorporated into software known as a network management system (NMS)

62
Q

What is the main software that controls everything Simple Network Management Protocol (SNMP) based?

A

Network management system (NMS)

63
Q

Network management system (NMS) is installed on a computer known as:

A

a manager

64
Q

The devices monitored by Network management system (NMS) is known as:

A

managed devices

65
Q

Network management system (NMS) installs a small piece of software known as:

A

an agent

66
Q

Microsoft refers to Lightweight Directory Access Protocol (LDAP) as:

A

directory services