Acronyms & Definitions Flashcards

1
Q

DHCP

A

The dynamic host configuration protocol is a network management protocol used on the Internet protocol networks for automatically assigning IP addresses to devices connected to the network, using a client-server architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNS

A

Used to associate IP addresses with the domain names, DNS local name queries go on UDP 53, whereas DNS Zone Transfer goes on TCP 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Default TFTP

A

TFP’s main difference from FTP is the transport protocol it uses and the lack of any authentication mechanisim. Where FTP uses the robust TCP protocol to establish connections and complete the file transfers, TFTP uses the UDP protocol which is unsecure and has no error checking built in to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FTPS

A

FTPS is an extension to the commonly used File Transfer Protocol that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL cryptographic protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HTTP

A

The hypertext transfer protocol is used to load up, pages on the Internet, using hyperlinks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HTTPS

A

HTTPS uses TLS (SSL) to encrypt normal HTTP requests and responses. As a result, HTTPS is far more secure than HTTP. A website that uses HTTP has HTTP:// in its URL, while a website that uses
HTTPS has HTTPS://

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IMAP4

A

Internet Message Access Protocol is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/ IP connection. It is not encrypted at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IMAP4S

A

Secure Internet Message Access
Protocol is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. It is encrypted using SSL or TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPSec

A

Internet Protocol Security is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPN) for creating secure tunnels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Kerberos

A

Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

L2TP

A

Layer 2 Tunneling Protocol is a tunneling protocol used to support virtual private networks or as part of the delivery of services by ISPs. It uses encryption only for its own control messages, and does not provide any encryption or confidentiality of content by itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LDAP

A

Companies store usernames, passwords, email addresses, printer connections, and other static data within directories. LDAP is an open, vendor-neutral application protocol for accessing and maintaining that data. LDAP can also tackle authentication, so users can sign on just once and access many different files on the server. This is not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LDAP/S

A

This is encrypted version of LDAP using SSL or TLS for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NTP

A

NTP is an internet protocol that’s used to synchronize the clocks on computer networks to within a few milliseconds of universal coordinated time (UTC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NetBIOS

A

NetBIOs is a non-routable OSI
Session Layer 5 Protocol and a service that allows applications on computers to communicate with one another over a local area network (LAN). It is used in Windows for its file and printer sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP3

A

Post Office Protocol is an application-layer internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. It is not encrypted.

17
Q

POP3S

A

Secure Post Office Protocol is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. This one is fully encrypted using SSL or TLS. Secure version of POP that uses TLS for encryption.

18
Q

PPTP

A

PPTP, operating on TCP port 1723, is one of the oldest VPN protocols still in use, having been around since Windows 95 and standard on all versions of Windows since. PPTP is also subject to serious security vulnerabilities.

19
Q

RADIUS

A

Remote Authentication Dial-In
User Service is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service.

20
Q

RDP

A

Windows proprietary protocol that provides a remote connection between two computers. The Remote Desktop Protocol (RDP) makes it possible for employees to connect to their work desktop computer when they work remotely.

21
Q

SCP

A

Secure copy protocol is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell protocol.

22
Q

SFTP

A

This is encrypted file transfer protocol using SSH encryption.

23
Q

SMB

A

The Server Message Block (SMB)
Protocol is a network file sharing protocol, and as implemented in Microsoft Windows is known as
Microsoft SMB Protocol.

24
Q

SMTP

A

The Simple Mail Transfer Protocol is an internet standard communication protocol for electronic mail transmission. Mail servers and other message transfer agents use SMTP to send and receive mail messages.

25
Q

SNMP

A

Protocol used for monitoring, collecting and organizing information about managed devices on IP networks. SNMP uses both port 161 and port 162 for sending commands and messages. SNMP ports are utilized via UDP 161 for SNMP Managers communicating with SNMP Agents (i.e. polling) and UDP 162 when agents send unsolicited Traps to the SNMP Manager.

26
Q

SQL Server

A

Microsoft SQL Server is a relational database management system developed by Microsoft. As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications.

27
Q

SSH

A

Designed to transmit data through a remote connection.

28
Q

Secure SMTP

A

This is SSL encrypted SMTP email protocol.

29
Q

TACACS+

A

Terminal Access Controller Access
Control Server is a security protocol used in the AAA framework to provide centralized authentication for users who want to gain access to the network. The protocol allows a TACACS+ client to request detailed access control and allows the TACACS+ process to respond to each component of that request

30
Q

TFTP

A

Trivial File Transfer Protocol (TFTP)
is a simple protocol used for transferring files. TFTP uses the User Datagram Protocol (UDP) to transport data from one end to another. TFTP is mostly used to read and write files/mail to or from a remote server.

31
Q

Telnet

A

The Telnet Protocol (TELNET)
provides a standard method for terminal devices and terminal-oriented processes to interface.
TELNET is commonly used by terminal emulation programs that allow you to log into a remote host. It is not encrypted at all.

32
Q

sTelnet

A

Telnet is inherently insecure.
Credential information (usernames and passwords) submitted through telnet is not encrypted and is therefore vulnerable to identity theft.
However, users can establish a
Secure Shell connection instead to prevent this type of intrusion. A Secured Shell connection is used to log onto a remote machine, and to transfer files from one machine to another. Secure Shell replaces telnet, rlogin, rsh, and rcp