Chapter 3: Exploring Network Technologies andTools Flashcards
A ________ typically describes an organizational goal and administrators enable specific protocols to meet organizational goals.
use case
Protocols used for voice and video include _____ and ______.
Real-time Transport Protocol (RTP) and Secure Real-time Transport Protocol (SRTP)
______ provides encryption, message authentication, and integrity for RTP.
Secure Real-time Transport Protocol (SRTP)
______ is commonly used to transfer files over networks, but does not encrypt the transmission.
File Transfer Protocol (FTP)
Several encryption protocols encrypt data-in-transit to protect its confidentiality. They include: File Transfer Protocol Secure (FTPS), Secure File Transfer Protocol (SFTP), Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).
File Transfer Protocol Secure (FTPS) Secure File Transfer Protocol (SFTP) Secure Shell (SSH) Secure Sockets Layer (SSL) Transport Layer Security (TLS)
Which ports do these protocols use? SMTP POP3 IMAP4 Secure POP Secure IMAP
SMTP sends email using TCP port 25.
POP3 receives email using TCP port 110.
IMAP4 uses TCP port 143.
Secure POP uses TLS on port 995 (legacy) or with STARTTLS on port
110.
Secure IMAP uses TLS on port 993 (legacy) or with STARTTLS on port 143.
Which ports do these protocols use?
HTTP
HTTPS
HTTP uses port 80 for web traffic. HTTPS encrypts HTTP traffic in transit and uses port 443.
Directory services solutions implement _________ as the authentication protocol. They also use ______ over TCP port 389 and _______ over TCP port 636.
Directory services solutions implement Kerberos as the authentication protocol. They also use Lightweight Directory Access Protocol (LDAP) over TCP port 389 and LDAP Secure (LDAPS) over TCP port 636.
Administrators commonly connect to remote systems using SSH instead of Telnet because
SSH encrypts the connection.
Administrators use Remote Desktop Protocol (RDP) to connect to remote systems using TCP port
3389
The Network Time Protocol (NTP) provides
time synchronization services.
Domain Name System (DNS) provides
domain name resolution.
DNS zones include ____ records for IPv4 addresses and _____ records for IPv6 addresses.
DNS zones include A records for IPv4 addresses and AAAA records for IPv6 addresses.
DNS uses ____ port 53 for zone transfers and ____ port 53 for DNS client queries.
DNS uses TCP port 53 for zone transfers and UDP port 53 for DNS client queries.
Domain Name System Security Extensions (DNSSEC) provides
validation for DNS responses and helps prevent DNS poisoning attacks.
Two command-line tools used to query DNS are
nslookup and dig. Both support the axfr switch, allowing them to download all zone data from a DNS server, unless the DNS server blocks the attempt.
Switches are used for
network connectivity and they map media access control (MAC) addresses to physical ports.