Common Terminology Flashcards

To learn sockets and general network terminology

1
Q

ports 0 through 1,023

A

non-ephemeral ports / server only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ports 1024 through 65,535

A

ephemeral ports / determined in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ports used for communication or security

A

communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP/UDP ports

A

TCP ports are different than UDP ports so no conflict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

source port

A

used by the client to receive data from server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

destination port

A

used by server to receive data from client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS lookup utility

A

DIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

granting an IP address

A

lease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

time-to-live

A

max number of hops a packet can make before discarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hop

A

one portion of the path between source and destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Telnet

A

log into devices remotely, not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSH

A

(Secure Shell) log into devices remotely, encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS

A

(Domain Name System) convert the names in a browser to an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SMTP

A

(Simple Mail Transfer Protocol) server to server email transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IMAP4

A

(Internet Message Access Protocol) includes management of email inbox from multiple clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP3

A

(Post Office Protocol) basic transfer functionality for mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

FTP

A

(File Transfer Protocol) transfer files between systems and has login authentication, no encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TFTP

A

(Trivial File Transfer Protocol) very simple file transfer application, no login authentication, no encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SFTP

A

(Secure File Transfer Protocol) uses SSH and can resume interrupted transfers, remote file removal and directory listings, encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DHCP

A

(Dynamic Host Configuration Protocol) automated configuration of an IP address, subnet mask, and other options. Uses DHCP server to lease IP addresses from a pool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DHCP Reservation

A

addresses assigned to a particular MAC address

22
Q

MAC

A

Media Access Control

23
Q

HTTP

A

(Hyper Text Transfer Protocol) web server communication

24
Q

HTTPS

A

(Hyper Text Transfer Protocol Secure) web server communication with encryption

25
Q

SNMP

A

(Simple Network Management Protocol) gather statistics from network devices

26
Q

RDP

A

(Remote Desktop Protocol) share a desktop from a remote location

27
Q

SIP

A

(Session Initiaition Protocol) setup and manage voice over IP sessions, extends voice communication and file transfer

28
Q

H.323

A

ITU Telecommunication H.32x protocol series, setup, and manage VoIP sessions and extends voice communication

29
Q

SMB

A

(Server Message Block) also called Common Internet File System, direct SMB over TCP

30
Q

LDAP

A

(Lightweight Directory Access Protocol) store and retrieve information in a network directly

31
Q

LDAPS

A

(Lightweight Directory Access Protocol Secure) - non-standard implementation of LDAP over SSL

32
Q

Bridging

A

connection between two MAC addresses

33
Q

IP Fragmentation

A

breaks up packets into smaller pieces

34
Q

IP

A

Internet Protocol

35
Q

TCP

A

Transmission Control Protocol

36
Q

UDP

A

User Datagram Protocol

37
Q

Half-duplex

A

cannot send/recieve data simultaneously

38
Q

Half-duplex examples

A

LAN hubs

39
Q

A sensor that monitors incoming traffic before it is allowed into the network.

A

Intrusion Prevention System

40
Q

A sensor that receives a copy of network traffic in the middle of the network.

A

Intrusion Detection System

41
Q

A device that uses a set of rules to determine what traffic to allow or deny between different areas of a network.

A

Firewall

42
Q

A portion of a network that should be accessible by external devices.

A

Demilitarized Zone

43
Q

Locally stores content retrieved from a remote network and sends content to local devices that are requesting it.

A

Cache Engine

44
Q

Network appliance that makes storage resources available to network clients

A

Network Attached Storage

45
Q

A device that inspects network traffic using a set of rules for return traffic before allowing the connection

A

Stateful Firewall

46
Q

A device that monitors packets and applies a set of rules before allowing or denying them to be sent through.

A

Packet Filter

47
Q

Device inspects application layer traffic using a set of rules for return traffic before allowing the connection.

A

Application Layer Firewall

48
Q

Wireless can be administered individually

A

Autonomous Access Point

49
Q

Allows wireless devices on the data layer to communicate with one another without a network layer.

A

Wireless Ad Hoc Network

50
Q

Wireless Access Point can be managed by a WLAN controller

A

Lightweight Access Point

51
Q

Used to control lightweight access points using Lightweight access point protocol

A

Wireless Lan Controller

52
Q

Used by a wireless LAN controller to communicate with a lightweight access point

A

Lightweight Access Point Protocol