Intro to IP and Ports Flashcards

1
Q

IP is like a series of moving vans

A
  • Network topology is the road (ethernet, DSL, cabling)
  • the trucks are IP (roads designed for this truck)
  • the boxes inside hold your data (TCP/UDP)
  • inside the boxes are also application info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is multiplexing?

A

sending may different applications across the network simultaneously between the same devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP is connection oriented, what does that mean?

A

there is a formal set up and tear down process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP can acknowledge that the recipient has received data, which UDP cannot. what is this called?

A

Reliable Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a TCP acknowledgement?

A

TCP ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a sending device do if it does not receive a TCP ACK?

A

resend the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UDP is connectionless, meaning…?

A

there is no formal open or close, no acknowledgement. no warning that data is coming or when it will stop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can TCP or UDP use flow control?

A

TCP can because it is a connection oriented protocol which allows the recipient to perform flow control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what range is non ephemeral port numbers?

A

0 - 1,024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What range are ephemeral ports?

A

1,024 - 65,535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port numbers are for communication, not security

A

service port numbers need to be well known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TCP and UDP port numbers are not the same, but ranges are

A

TCP and UDP use port 80 for different things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTP use and port number?

A

tcp/20 (active mode data)
tcp/21 (control)
file transfer between systems. generic and not specific to an OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH / Secure Shell use and port number?

A

tcp/22, text based console communication. Encrpyted communication link, also allows for encrypted file communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

STFP use and port

A

tcp/22, generic file transfer with security alone an encrypted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

telnet

A

tcp/23, non encrpted communication, looks identical to SSH but telnet is sent in the clear (non encrpyted).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMTP using plaintext
SMTP using TLS encryption

A

tcp/25 (SMTP using plaintext)
tcp/587 (SMTP using TLS)

Simple Mail Transfer Protocol, server to server email transfer. Also used from client devices sending to mail server.

Other protocols are used for clients to receive email, IMAP or POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DNS (fqdn)

A

udp/53, larger transfers may use tcp/53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DHCP

A

udp/67 and udp/68
dynamic host configuration protocol, automatically configures IP address, subnet mask, etc. requires DHCP server.

20
Q

What are pooled addresses on DHCP?

A

Anyone who connects to a network will be given an IP from the pool of available addresses. Each system is given a lease that lasts a set amount of time.

21
Q

What is a DHCP reservation?

A

reserving a particular IP address for a particular device on a network. This is done by associating an IP address with the devices MAC address.

22
Q

TFTP

A

udp/69
Trivial File Transfer Protocol
For sending a small bit of information quickly to another device.

23
Q

HTTP and HTTPS

A

tcp/80 (in the clear)
tcp/443 (encrypted)
If encrypted, using SSL or TLS

24
Q

NTP

A

udp/123
Network Time Protocol
every device on the network has it’s own clock and uses NTP to stay synchronized. Critical for logging files, authentication or outage details

25
Q

SNMP

A

udp/161
Simple Network Management Protocol
query devices about how that device may be performing
v3 has encryption, unlike v1 and v2

26
Q

What are SNMP Traps?

A

When SNMP queries a device about how it’s performing, traps allow alerts from the network devices to be sent from the devices using udp/162

27
Q

LDAP/LDAPS

A

tcp/389
lightweight directory access protocol
store and retrieve information in a network directory.

28
Q

LDAP Secure

A

tcp/636 LDAP over SSL

29
Q

SMB

A

tcp/445
server message block
allows for file sharing, locking, sometimes calles CIFS
integrated into windows OS

30
Q

Syslog

A

udp/514
standard for message logging
often used in conjunction with a SIEM

31
Q

How should you log messages on a network?

A

using a log collector like syslog, used on a SIEM (Security Information and Event Manager)

32
Q

What is SQL

A

a standard language across database servers

33
Q

what port is Microsoft SQL server on?

A

tcp/1433

34
Q

RDP

A

tcp/3389
allows helpdesk to connect to a desktop or just an application

35
Q

SIP

A

tcp/5060 and tcp/5061
Session Initiation Protocol
control protocol for VoIP

36
Q

ICMP

A

it’s own protocol, doesn’t use TCP or IP.
internet control message protocol, like text messaging with a device

37
Q

GRE

A

generic routing ecapsulation
tunnelling between endpoints, like a VPN
No built in encryption but can be added

38
Q

What is a VPN Concentrator

A

purpose built device to encrypt/decrypt data at a central point in VPN tunnel
Commonly found on firewalls

39
Q

IPSec

A

internet protocol security
Security for OSI layer 3
Very standardized
anti-replay
TWO common protocols
AH authentication header
ESP encapsulation security payload

40
Q

IKE

A

Internet Key Exchange
agree on encryption/decryption keys without sending keys across the network, builds a security association (SA)

41
Q

IKE Phase 1

A

Uses diffie-hellman to create a shared secret key using udp/500

42
Q

IKE Phase 2

A

Coordinate ciphers and key sizes, negotiate inbound and outbound SA for IPsec

43
Q

What is the purpose of an AH

A

Authentication Header is to validate the information you’re receiving over an IPSec tunnel. If using AH mode, you’re sending info in the clear, but the AH mode includes hashing.

44
Q

What is the purpose of ESP

A

Encapsulation Security Payload (ESP) encrypts the packet. Adds a header, trailer, and integrity check value

45
Q
A