Describe Protocol Uses and Port Numbers Flashcards
What protocol(s) do we use when asking for a website?
HTTP or HTTPs
At the application layer, protocols are known by name, but at the transport layer, what are they known by?
Their associated port numbers.
What is the port number for HTTPs?
Port number 443
True or False? HTTP runs on port 80.
True
Regarding HTTPs, what is used to provide the encryption for it?
SSL (Secure Socket Layer) and TLS (Transport Layer Security)
Are SSL and TLS effectively the same thing?
Yes
What particular type of file are we transferring when we use HTTP/HTTPs?
HTML Documents
Regarding file transfers outside of HTML, what protocols would be used and what are their port numbers?
FTP (File Transfer Protocol) - Port(s) 20/21
SFTP (Secure File Transfer Protocol) - Port 22
TFTP (Trivial File Transfer Protocol) - Port 69
What is a Microsoft proprietary protocol used for file transfer?
SMB (Server Message Block) - Port 445
What three protocols are used to transfer emails and what ports do they run on?
POP3 (Post Office Protocol v3) - Port(s) 110/995
IMAP (Internet Message Access Protocol) - Port(s) 143/993
SMTP (Simple Mail Transfer Protocol) - Port(s) 25/465
True or false? POP3 and IMAP are used for sending email from a client to a server.
False, they are used for retrieving emails from a server to a client.
Nowadays, do we need to configure the protocols ourselves, or are they done automatically?
They are done automatically by email applications such as Gmail and Outlook.
What is LDAP used for?
It’s used for storing passwords and usernames on a server along with the files and other things, rather than locally on the said workstation.
What port does LDAP run on?
Port 389
True or False? LDAPs uses port 366.
False, it uses port 636.
Give a step-by-step process as to what would happen with LDAP being used on a server.
1) A username and password are entered on the clients PC.
2) LDAP checks the database to see if the credentials are authentic or not.
3) If the credentials are authentic, the server will send back a token of authenticity, allowing the client to access other files.
What is Dynamic Host Configuration Protocol (DHCP) responsible for?
Giving your workstation an IP Address when accessing a network for the first time.
Fill in the blanks:
IP runs at the ……… layer, therefore …… must run on the same layer.
network, DHCP