D481 - Chapter 5 and 6 Flashcards
What are considered “insecure” ports?
20, 21, 23, 25, 53, 69, 80, 161, and 162
What are two of the most common Layer 4 Protocols?
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
I.e., These are considered the “heart of the Internet Protocol suite”
What is a “Socket?”
An instance of a service listening for traffic on a specific port.
What Network Layer is considered the most visible layer and why?
The Application Layer
Because it interacts with software applications that need access to network services and resources
What does “TCP” stand for?
Transmission Control Protocol (TCP)
What does “UDP” stand for?
User Datagram Protocol (UDP)
What application is connected to ports 20 and 21?
The “File Transfer Protocol (FTP) data” and the FTP Command
I.e., They are responsible for moving files from one computer to another
What principle should be used to configure firewall based on industry best practices?
The “Deny-all” Principle
I.e., You should block everything and allow only what is needed.
What port listening on a server is set up to automatically assign Internet Protocol addresses?
User Datagram Protocol (UDP) 67