CS0-003 Ports, Cisco, Cyber Kill Chain Flashcards

1
Q

Port 20, 21

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Port 22

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Port 23

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port 25

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port 53

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Port 80

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Port 110

A

Post Office Protocol version 3 (POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Port 123

A

Network Time Protocol (NTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Port 135

A

Windows Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port 137

A

Windows Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port 138

A

Windows Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port 139

A

Windows Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port 445

A

Windows Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port 143

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port 161

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port 162

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port 443

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port 636

A

Lightweight Directory Access Protocol Secure (LDAPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port 1433

A

SQL Server

20
Q

Port 1434

A

SQL Server

21
Q

Port 1521

22
Q

Port 1720

A

H.323 (Voice over IP)

23
Q

Port 1723

A

Point-to-Point Tunneling Protocol (PPTP)

24
Q

Port 3389

A

Remote Desktop Protocol (RDP)

25
Port 9100
HP JetDirect Printing
26
CVSS 0
None
27
CVSS 0.1-3.9
Low
28
CVSS 4.0-6.9
Medium
29
CVSS 7.0-8.9
High
30
CVSS 9.0-10
Critical
31
Cisco 0
Emergency
32
Cisco 1
Alert
33
Cisco 2
Critical
34
Cisco 3
Error
35
Cisco 4
Warning
36
Cisco 5
Notification
37
Cisco 6
Informational
38
Cisco 7
Debug
39
Reconnaissance
Gather OSINT Information
40
Weaponization
Goal: Create a malicious payload (usually a combination of malware + exploit). Example: The attacker creates a PDF that exploits a known vulnerability and embeds a Remote Access Trojan (RAT) inside.
41
Delivery
Goal: Transmit the payload to the target. Example: The malicious PDF is emailed to an employee disguised as an invoice from a known vendor.
42
Exploitation
Goal: Trigger the malicious code on the target system. Example: The employee opens the PDF, which silently executes code due to the vulnerability.
43
Installation
Goal: Install malware on the victim’s machine. Example: The RAT (random access trojan) is installed on the system, giving the attacker persistent access.
44
Command and Control (C2)
Goal: Establish communication with the attacker’s server. Example: The RAT (random access trojan) contacts the attacker's server to receive instructions like downloading more tools or stealing files.
45
Actions and Objectives
Goal: Complete the attack objective (data theft, destruction, surveillance, etc.). Example: The attacker exfiltrates sensitive customer data or installs ransomware.