Application Layer Protocols PE Flashcards

1
Q

_____ is an application layer protocol that was designed to communicate between web browsers and web servers using transport layer security.

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ports ___ and __ are utilized by FTP? (Format: “__ and __”)

A

20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

On a network you own, clients cannot enter the network. You are told that the DHCP IP pool is exhausted, and you do not want to increase the pool or create a new one. Which of the following is the best solution to your issue?

A

reduce the DHCP lease time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protocol would you see in use for retrieving emails, if the protocol allows you to access the emails on the server from multiple devices at a time?

A

IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What application layer protocol is used to access remote computers, via the command line, over the Internet, but not in a secure manner?

A

telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_______ is a client/server protocol used to access and manage directory information.

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol uses Transport Layer Security (TLS) to encrypt data between a web browser and a website?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two modes of FTP?
(Format: “__ and __”)

A

active and passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your email client and your mail server use what protocol to move your email on and across networks?

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When you see port 23 in use for traffic in your network, it indicates that what protocol is being utilized?

A

telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What part of the FQDN refers to the “maps” in www.maps.google.com?

A

subdomain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

File transfers, assuming they occur solely in your private network, likely employ what port number(s) for communicating to the associated server?

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When looking at a list of FQDNs, what are some common TLDs that you would see? (Provide one)

A

.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the default port for HTTP communication?

A

port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTPS makes it possible for website users to safely transmit sensitive data over the internet. T or F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which port is used, by default, to connect to a remote host via the command line, specifically in a secure manner?

A

SSH, port 22

17
Q

You are a security engineer for your unit, in charge of protecting your network from external threats. Your goal is to air-gap your network in order to prevent all traffic from leaving your internal network, as well as any external traffic from coming in.

Which of the following protocols could you expect to be used in your internal network AFTER you have successfully air-gapped your network?

A

UDP 69

18
Q

You are looking at your unit’s traffic to a web server to ensure that the proper websites are blocked. One of your soldiers tried to access “amazon.com” to purchase some amazing CBTC swag to remember their time at the schoolhouse.

While understandable, this is not allowed, and you have your network security configured to block traffic going to that website. Assuming you have the ability to filter the traffic by port numbers, what port would you use to see traffic bound for “https://www.amazon.com?”

A

port 443

19
Q

What is the characteristic of HTTP that requires HTTP Requests to contain enough information on their own, in order for the client to receive the response they want?

A

stateless

20
Q

IMAP4 is utilized for client-to-server communication, NOT server-to-server. T or F

A

True

21
Q

What type of query involves the DNS Recursive Resolver contacting the Root nameserver, TLD nameserver, and Authoritative name server individually (and in that order), to find the resolution to a client’s query?

A

Iterative

22
Q

What is maintained by the client’s OS, and holds records of all the recent visits to websites>

A

DNS cache

23
Q

If you notice that your unit utilizes port 23 when they remotely connect to infrastructure at another unit, what port should you recommend they use instead?

A

port 22

24
Q

How many DHCP messages are used in the IP allocation process?

A

4

25
Q

When used OUTSIDE of Microsoft-based networks, what transport layer protocol would be used in conjunction with port 389 for directory database management?

A

TCP

26
Q

When looking at ports that are being used over a network, which two ports would you see if the network nodes use SNMP to relay information?
(Format: “__ and __”)

A

161 and 162

27
Q

This application layer protocol is used by email clients to retrieve email from the mail server, where the emails are stored on the individual hosts.

A

pop3

28
Q

What protocol uses UDP to transfer files from a client to a server?

A

TFTP

29
Q

Through the use of ___, SMTP traffic is able to encode photo attachments into a friendly format to be transferred to other SMTP servers.

A

MIME (multipurpose internet mail extensions)

30
Q

Your MAN has multple routers within its private network, with 2 routers that act as an egress point for traffic flow to the Internet.
If one of these routers breaks, and becomes unoperational, what protocol would be used to report the traffic bottleneck that this situation created?

A

SNMP

31
Q

What protocol, used during the DHCP IP allocation process, ensures that no other devices on the network share the IP that a DHCP server has offered to a computer?

A

ARP

32
Q

What DHCP message is sent as a broadcast to find the DHCP Server?

A

discover

33
Q

Your unit works closely with another unit for a particular mission. In order to access the databases on their separate network, they have given you the IP of a node in their network, that you can remotely connect to in order to securely query their data repository.

What command would you input into the terminal in order to remotely connect to the node 150.76.10.13, assuming they provided you with the following login information
Username: supersecureconnect
Password: Reallygoodpassword

A

ssh supersecureconnect@150.76.10.13

34
Q

When collecting information on an adversary’s network, you notice that they have an internal DNS server that is used to manage their databases.

Assuming you already knew the IPs/Hostnames associated, what record type could you try to find if you wanted any additional notes about what these servers do, or other administrative comments?

A

txt