Compare Protocols and Ports Flashcards

Lesson 5C

1
Q

is a set of rules that define how data is exchanged between devices on a network, essentially acting as a communication standard

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a virtual endpoint on a device that identifies a specific application or service, allowing data to be directed to the correct program on that device ranging from 0 - 65535

A

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transport layer.

A

Protocols and Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This protocol is used to deliver web pages and other resources.

A

HyperText Transfer Protocol (HTTP)/HyperText Transfer Protocol Secure (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protocol is used to encrypt access the command-line interface of a computer from across the network.

A

Secure Shell (SSH)—

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

non-guaranteed method of communication with no sequencing or acknowledgements.

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

protocol is used by clients to request IP configuration information from a server.

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

protocol is typically used by network devices to obtain a configuration file.

A

Trivial File Transfer Protocol (TFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP (20) Make files available for download across a network (data connection port)

A

File Transfer Protocol (FTP)—Data connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP (21) Make files available for download across a network (control connection port)

A

File Transfer Protocol
(FTP)—Control
connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TCP (22) Make a secure connection to the
command-line interface of a server

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TCP (23) Make an unsecure connection to the
command-line interface of a server

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP (25) Transfer email messages across a network

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP/UDP (53) Facilitate identification of hosts by name alongside IP addressing

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UDP (67) Provision an IP address configuration to clientsProvision an IP address configuration to clients

A

Dynamic Host Configuration
Protocol (DHCP) Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

UDP (68) Request a dynamic IP address configuration from a server

A

DHCP Client

17
Q

TCP (80) Provision unsecure websites and web services

A

HyperText Transfer
Protocol (HTTP)

17
Q

TCP (110) Retrieve email messages
from a server mailbox

C

A

Post Office Protocol
(POP)

17
Q

TCP (143) Read and manage mail messages on a servermailbox

A

Internet Mail Access
Protocol (IMAP)

18
Q

UDP (161) Query status information
from network devices

A

Simple Network
Management
Protocol (SNMP)

19
Q

UDP (162) Report status information to a management server

A

SNMP trap operation

20
Q

TCP (389) Query information about network users and resources

A

Lightweight Directory
Access Protocol (LDAP)

21
Q

TCP (443) Provision secure websites and services

A

HTTP Secure (HTTPS)

22
Q

TCP (445) Implement Windows-compatible file and printer sharing services on a local network (also sometimes referred to as Common Internet File System [CIFS])

A

Server Message Block
(SMB)

23
Q

TCP (3389) Make a secure connection to the
graphical desktop of a computer

A

Remote Desktop Protocol (RDP)