8.1 Flashcards

1
Q

SSH

A

Port: tcp/22

Name: Secure Shell

Description: Encrypted,console,login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNS

A

Port: udp/53 tcp/53

Name: Domain Name System

Description: Convert domain names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SMTP

A

Port: tcp/25

Name: Simple mail Transfer Protocol

Description: Transfer email between mail servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SFTP

A

Port: tcp/22 udp/22

Name: Secure (SSH) File Transfer Protocol

Description: provides file access, file transfer, and file management over any reliable data stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FTP

A

Port: 20 TCP/UDP, 21 TCP/UDP

Name: File Transfer Protocol

Description:Sends and receives files between systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TFTP

A

Port: 69 TCP and UDP

Name: Trivial File Transfer Protocol

Description: A,very,simple,file,transfer,application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TELNET

A

Port: 23 TCP
Name: Telecommunication Network
Description: Remote console login to network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DHCP

A

Port: 67 TCP and UDP 68 TCP and UDP

Name: Dynamic Host Configuration Protocol

Description: Update to BOOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP

A

Port: 80 TCP and UDP

Name:Hypertext Transfer Protocol

Description: Web server communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTPS

A

Port: 443 TCP and UDP

Name: HTTP over Secure Sockets Layer

Description: Web server communication with encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SNMP

A

Port: 162 TCP and UDP

Name: Simple Network Management
Protocol

Description: Gather statistics and manage network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RDP

A

Port: 3389 TCP and UDP

Name: Remote Desktop Protocol

Description: Graphical display of remote device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NTP

A

Port: 123 TCP and UDP

Name: Network Time Protocol

Description: clock synchronization between computer systems over packet-switched, variable-latency data networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SIP

A

Port: 5060 TCP and UDP 5061 TCP

Name: Session Initiation Protocol

Description: Voice over IP signaling protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SMB

A

Port: 445 TCP

Name: Microsoft Server Message Block (SMB) File Sharing

Description: Windows file transfers and printer sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP

A

Port: Post Office Protocol

Name: 110 TCP

Description: Receive mail into a mail client

17
Q

IMAP

A

Port: 143 TCP
Name: internet Message Access Protocol
Description: A newer mail client protocol

18
Q

LDAP

A

Port: 389 TCP and UDP

Name: Lightweight Directory Access Protocol

Description: used to access and manage directory information

19
Q

LDAPS

A

Port: 636 TCP and UDP

Name: Lightweight Directory Access Protocol over TLS/SSL

Description: used to provide either server or mutual (server and client) authentication

20
Q

H.323

A

Port: 1720 TCP
Name: H.323 Call Signaling
Description: Voice over IP signaling

21
Q

access control lists (ACLs)

A

Firewalls use filtering rules, which are sometimes called _____, to identify allowed and blocked traffic. A rule identifies specific characteristics:

22
Q

Firewall

A

a software- or hardware-based network security system that allows or denies network traffic according to a set of rules.

23
Q

Unified Threat Management (UTM) Device

A

combines multiple security features into a single network appliance
Can provide several security features:

  • Firewall
  • VPN
  • Ant-spam Antivirus
  • Load balancing
24
Q

An NGFW:

A

combines a traditional firewall with other network device filtering functionalities like an application firewall

  • Tracks the state of traffic based on layers 2 through 7 —
  • Utilizes an intrusion protection system (IPS)
  • Tracks the identity of the local traffic device and user ( LDAP, RADIUS, Active Directory) C
  • an be used in bridged and routed modes Utilizes external intelligence sources
25
Q

Content Filters

A

Control traffic based on network data

  • Filter email - avoid malicious software, phishing, and viruses
  • Filter URLs - filter by web site category
26
Q

Proxy server

A

-Control both inbound and outbound traffic.
Increase performance by caching frequently accessed content.

  • Content is retrieved from the proxy cache instead of the original server.
  • Filter content and restrict access depending on the user or specific website.
  • Shield or hide a private network.
27
Q

Intrusion Detection Systems (IDS)

A

analyze and monitor network traffic for signs that indicate attackers are using a known cyberthreat to infiltrate or steal data from your network.

28
Q

Intrusion Prevention Systems (IPS)

A

live in the same area of the network as a firewall, between the outside world and the internal network.

29
Q

DMZ (Demilitarized Zone)

A

is a buffer network (or subnet) that sits between the private network and an untrusted network (such as the internet).

30
Q

Packet Filtering Firewall

A

Operates at OSI Layer 3 (Network layer).

31
Q

Circuit-Level Gateway

A

Operates at OSI Layer 5 (Session layer).

32
Q

Application-Layer Firewall

A

Operates at OSI Layer 7 (Application layer).

33
Q

MAC Filtering

A

refers to a security access control method whereby the MAC address assigned to each network card is used to determine access to the network.