Intro to IP and Ports Flashcards

1
Q

IP is like a series of moving vans

A
  • Network topology is the road (ethernet, DSL, cabling)
  • the trucks are IP (roads designed for this truck)
  • the boxes inside hold your data (TCP/UDP)
  • inside the boxes are also application info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is multiplexing?

A

sending may different applications across the network simultaneously between the same devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP is connection oriented, what does that mean?

A

there is a formal set up and tear down process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP can acknowledge that the recipient has received data, which UDP cannot. what is this called?

A

Reliable Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a TCP acknowledgement?

A

TCP ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a sending device do if it does not receive a TCP ACK?

A

resend the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UDP is connectionless, meaning…?

A

there is no formal open or close, no acknowledgement. no warning that data is coming or when it will stop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can TCP or UDP use flow control?

A

TCP can because it is a connection oriented protocol which allows the recipient to perform flow control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what range is non ephemeral port numbers?

A

0 - 1,024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What range are ephemeral ports?

A

1,024 - 65,535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port numbers are for communication, not security

A

service port numbers need to be well known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TCP and UDP port numbers are not the same, but ranges are

A

TCP and UDP use port 80 for different things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTP use and port number?

A

tcp/20 (active mode data)
tcp/21 (control)
file transfer between systems. generic and not specific to an OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH / Secure Shell use and port number?

A

tcp/22, text based console communication. Encrpyted communication link, also allows for encrypted file communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

STFP use and port

A

tcp/22, generic file transfer with security alone an encrypted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

telnet

A

tcp/23, non encrpted communication, looks identical to SSH but telnet is sent in the clear (non encrpyted).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMTP using plaintext
SMTP using TLS encryption

A

tcp/25 (SMTP using plaintext)
tcp/587 (SMTP using TLS)

Simple Mail Transfer Protocol, server to server email transfer. Also used from client devices sending to mail server.

Other protocols are used for clients to receive email, IMAP or POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DNS (fqdn)

A

udp/53, larger transfers may use tcp/53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DHCP

A

udp/67 and udp/68
dynamic host configuration protocol, automatically configures IP address, subnet mask, etc. requires DHCP server.

20
Q

What are pooled addresses on DHCP?

A

Anyone who connects to a network will be given an IP from the pool of available addresses. Each system is given a lease that lasts a set amount of time.

21
Q

What is a DHCP reservation?

A

reserving a particular IP address for a particular device on a network. This is done by associating an IP address with the devices MAC address.

22
Q

TFTP

A

udp/69
Trivial File Transfer Protocol
For sending a small bit of information quickly to another device.

23
Q

HTTP and HTTPS

A

tcp/80 (in the clear)
tcp/443 (encrypted)
If encrypted, using SSL or TLS

24
Q

NTP

A

udp/123
Network Time Protocol
every device on the network has it’s own clock and uses NTP to stay synchronized. Critical for logging files, authentication or outage details

25
SNMP
udp/161 Simple Network Management Protocol query devices about how that device may be performing v3 has encryption, unlike v1 and v2
26
What are SNMP Traps?
When SNMP queries a device about how it's performing, traps allow alerts from the network devices to be sent from the devices using udp/162
27
LDAP/LDAPS
tcp/389 lightweight directory access protocol store and retrieve information in a network directory.
28
LDAP Secure
tcp/636 LDAP over SSL
29
SMB
tcp/445 server message block allows for file sharing, locking, sometimes calles CIFS integrated into windows OS
30
Syslog
udp/514 standard for message logging often used in conjunction with a SIEM
31
How should you log messages on a network?
using a log collector like syslog, used on a SIEM (Security Information and Event Manager)
32
What is SQL
a standard language across database servers
33
what port is Microsoft SQL server on?
tcp/1433
34
RDP
tcp/3389 allows helpdesk to connect to a desktop or just an application
35
SIP
tcp/5060 and tcp/5061 Session Initiation Protocol control protocol for VoIP
36
ICMP
it's own protocol, doesn't use TCP or IP. internet control message protocol, like text messaging with a device
37
GRE
generic routing ecapsulation tunnelling between endpoints, like a VPN No built in encryption but can be added
38
What is a VPN Concentrator
purpose built device to encrypt/decrypt data at a central point in VPN tunnel Commonly found on firewalls
39
IPSec
internet protocol security Security for OSI layer 3 Very standardized anti-replay TWO common protocols AH authentication header ESP encapsulation security payload
40
IKE
Internet Key Exchange agree on encryption/decryption keys without sending keys across the network, builds a security association (SA)
41
IKE Phase 1
Uses diffie-hellman to create a shared secret key using udp/500
42
IKE Phase 2
Coordinate ciphers and key sizes, negotiate inbound and outbound SA for IPsec
43
What is the purpose of an AH
Authentication Header is to validate the information you're receiving over an IPSec tunnel. If using AH mode, you're sending info in the clear, but the AH mode includes hashing.
44
What is the purpose of ESP
Encapsulation Security Payload (ESP) encrypts the packet. Adds a header, trailer, and integrity check value
45