CCENT Concepts Pt. 5 Flashcards
TCP/IP Transport Layer Feature -
Multiplexing using ports
Function that allows receiving hosts to
choose the correct application for
which the data is destined, based on
the port number
TCP/IP Transport Layer Feature -
Error recovery
Process of numbering and
acknowledging data with Sequence
and Acknowledgement header fields.
TCP/IP Transport Layer Feature -
Flow control using windowing
Process that uses window sizes to
protect buffer space and routing
devices.
page
TCP/IP Transport Layer Feature -
Connection establishment and
termination
Process used to initialize port
numbers and Sequence and
Acknowledgment fields.
TCP/IP Transport Layer Feature -
Ordered data transfer and data
segmentation
Continuous stream of bytes from an upper-layer
process that is “segment” for transmission and
delivered to upper-layer processes at the receiving
device, with the bytes in the same order.
FTP Port Number
20 (data) & 21 (control)
SSH Port Number
22
Telnet Port Number
23
SMTP Port Number
25 TCP
DNS Port Number
UDP, TCP 53
DHCP Port Number
UDP 67,68
TFTP Port Number
UDP 69
HTTP (WWW) Port Number
TCP 80
POP3 Port Number
TCP 110
SNMP Port Number
UDP 161
SSL Port Number
TCP 443
RTP-based Voice (VoiP) and
Video
UDP, 16, 384 - 32, 767
Connection-oriented protocol
A protocol that requires an exchange an exchange
of message before data transfer begins or that has
a required preestablished correlation between two
endpoints.
Connectionless protocol
A protocol that does not require an
exchange of messages and that does
not require a preestablished correlation
between two endpoints.
Low Delay
VoiP requires a very low delay between the sending phone and the receiving
phone - typically less than 200 milliseconds (.2 seconds). This is a much lower
delay than what is required by typical data applications.
Low Jitter
Jitter is the variation in delay. VoiP requires very low jitter as well, whereas
data applications can tolerate much higher jitter. For example, the jitter for
consecutive VoIP packets should not exceed (.03 seconds), or the quality
degrades.
Loss
if a VoIP packet is lost in transit because of errors of because a router doesn’t
have room to store the packet while waiting to send it, the VoIP packet is not
delivered across the network. Because of the delay and jitter issues, there is
no need to try to recover the lost packet. It would be useless by the time it was
recovered. Lost packets can sound like a break in the sound of the VoIP call.
Denial of Service (DoS)
An attack whose purpose is to break things.
Reconnaissance attack
The kind of attack may be disruptive as
a side effect, but its goal is gathering
information to perform an access
attack.
Access attacks
An attempt to steal data, typically data
for some financial advantage, for a
competitive advantage with another
company, or even for international
Common Security Issues in an
Enterprise
- Access from the wireless LAN
- Infected mobile laptops
- Disgruntled employees
anti-x
The term used by Cisco to refer to a
variety of security tools that help
prevent various attacks including
antivirus, anti-phishing, and anti-spam.