Chapter 6: Understanding Secure and Insecure Protocols Flashcards

1
Q

refers to the rules required by different applications for the exchange of data, where the application can perform actions such as running commands on remote systems, sending and receiving emails, and downloading files from the internet.

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the 2 types of ports?

A
  1. Transmission Control Protocol (TCP)
  2. User Diagram Protocol (UDP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

connection oriented as it uses a three way handshake
-first packet sent is called the syn packet where sending host informs the receiving host of the number of its next packet
-receiving host sends an SYN/ACK packet, where it says what the next packet is.
-the ACK packet acknowledges both kinds of packets and then the data is sent

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

faster but less reliable as it is connectionless
-used for streaming video and gaming where speed is paramount

A

User Diagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If I wanted to upload files to web server I would use FTP on port 20, but the more common use is to download files using port 21—downside of FTP is the transfer is done using clear text, so a packet sniffer could view the information—replaced by secure protocols such as SFTP or FTPS

A

File Transfer Protocol (FTP)–>port 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Run commands on remote hosts–runs remote commands on devices such as routers–session is in clear text and is not secure–SSH is replacement protocol

A

Telnet–>port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Transport mail between mail servers

A

Simple Mail Network Protocol (SMNP)–>Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Host name resolution/zone transfer (TCP)/name queries

A

Domain Name System (DNS)–>UDP Port 56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Automatic IP address allocation–allocates IP addresses dynamically to computers. If a computer cannot obtain the IP address, then there is a faulty cable or no more IP addresses in the database

A

Dynamic Host Configuration Protocol (DHCP)–>UDP port 67/68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

file transfer using UDP–>not as secure

A

Trivial File Transfer Protocol (TFTP)–>UDP Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

used to access websites

A

Hypertext Transfer Protocol (HTTP)–>port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

pull mail from mail server, no copy left on mail server

A

Post Office Protocol 3–>Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Time Syncronization–ensures the clocks of all computers are synced

A

Network Time Protocol (NTP)–>port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NETBIOS to IP address resolution

A

NETBIOS–>UDP Port 137-139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pulls mail from mail server

A

Internet Message Access Protocol (IMAP4)–>Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Notifies status and creates reports on network devices—each network device has an agent installed and is programmed so that if a trigger is met, the ____ management console is notified

A

Simple Network Management Protocol (SNMP)–>UDP Port 161

17
Q

Stores X500 Objects, searches directory services for users and groups and other information

A

Lightweight Directory Access Protocol (LDAP)–>Port 389

18
Q

the purpose of a ______ is to connect networks, whether they are internal subnets or external networks, and route packets between them.

A

router

19
Q

internal device that connects all of the users in a local area network so they can communicate with each other. A computer connects to a wall jack that runs into a patch panel, and then from the patch panel to the switch. The cables are places inside a conduit to protect them.

A

Switch

20
Q

the router will have to allow rules at the top of the ACL, but the last rule is to deny all. If traffic that is not on the list arrives, then the last rules of the denial will apply—Implicit Deny

A

Access Control List (ACL)

21
Q

used to remotely access the router and runs commands securely

A

SSH

22
Q

a managed switch is called ________,
here the switch identifies and authenticates devices connecting to the switch and blocks rogue devices, such as rogue access points.
-can work in conjunction with a Remote Authentication Dial in User Service (RADIUS)

A

802.1x

23
Q

where a port in a switch is switched off to prevent someone from plugging their laptop into a wall jack.

A

port security

24
Q

is used in a switch to prevent Media Access Control (MAC) flooding, where the switch is flooded with a high volume of fake MAC addresses; this prevents DDoS attacks.

A

Flood Guard

25
Q

can be set up on a switch to segment network traffic. If the finance department wanted to be isolated from other departments within the local area network, a _____ could be created.
-the ____ tag must be set up, otherwise the switch wont know where to route the traffic

A

VLAN

26
Q

when more than one switch is connected, you may have redundant paths, and this causes looping that provides broadcast traffic. STP has an algorithm that sets up some ports to forward, listen, or block traffic to prevent looping

A

Spanning Tree Protocol (STP)

27
Q

performs same function as LDAP; however, LDAP is not secure and is vulnerable to LDAP injection attacks, where an attacker tries to gain information from directory service.
-using ______ encrypts the session using SSL/TLS—this is known as LDAP over SSL—making it secure

A

LDAPS

28
Q

the authentication system used to log in to Active Directory and uses tickets for authentication

A

Kerberos