Intro To Protocols Flashcards

1
Q

File transfer protocol

A

Transfer of computer files between a client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What ports does FTP use ?

A

20 for data transfers
21 for control (commands and responses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does FTP allow users to do ?

A

Upload, download, delete, and manage files on a remote server but does not encrypt its traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure file transfer protocol

A

Extension of SSH to provide a secure method for transferring files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does SFTP use ?

A

Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Telnet

A

Text-oriented communication facility using a virtual terminal connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which port does telnet use ?

A

Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is telnet known for ?

A

Being insecure since it transmits data in plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secure shell

A

Provide a secure channel over an unsecured network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When is SSH recommended ?

A

When connecting to servers,switches, and routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does SSH support?

A

Secure logging in, file transfers, and port forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does SSH encrypt ?

A

All traffic including passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does SSH replace ?

A

FTP and telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two traits of DNS ?

A

Hierarchical and decentralized naming system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What port does DNS use ?

A

Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What port does SSH use ?

A

Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can DNS be sent ?

A

Via TCP or UDP protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does DNS do ?

A

Translates more readily memorized domain names to the numerical IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dynamic host configuration protocol

A

Dynamically assigns an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which ports does DHCP use ?

A

UDP 67 (server)
UDP 68 (client)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does DHCP facilitate ?

A

Automatic and centralized management of IP addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does DHCP allow devices to do ?

A

Obtain IP addresses, subnet masks, default gateways, and DNS server information without manual configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trivial file transfer protocol

A

FTP with no authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What port does TFTP use ?

A

Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is TFTP typically used for ?

A

Transferring boot files or configurations to devices in a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Where is TFTP generally used ?

A

In controlled environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Hypertext Transfer protocol

A

Provides a standard for web browsers and servers to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which port does HTTP use ?

A

Port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does HTTP transfer ?

A

Hypermedia documents (HTML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is HTTP considered ?

A

A stateless protocol where each command is executed independently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

HTTPS/TLS

A

HTTPS when using TLS enhances security further compared to SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the port for HTTPS ?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does the secure 443 port provide ?

A

Secure web browsing by encrypting the data and ensuring the integrity and security of the data transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Transport Layer Security

A

Standard security technology for establishing an encrypted link between web serves and browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Simple Mail Transfer Protocol

A

Email transmission across the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is SMTP primarily for, and what port does it use ?

A

Uses port 25 to primarily send emails from an email client to an email server or between servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

SMTP over TLS (SMTPS)

A

SMTP secure email transmission over TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What port and protocol does SMTPS use ?

A

TCP port 587

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Where does post office protocol v3 retrieve emails from ?

A

Retrieves email from a remote server

40
Q

What situations is POP3 designed for ?

A

Client access the mail server infrequently or needs to operate online

41
Q

POP3 over SSL

A

Encrypted alternative used for securely retrieving email from a remote server

42
Q

Why is IMAP preferred over POP3 ?

A

Provides synchronization across all devices by multiple clients

43
Q

IMAP over SSL

A

Protects the transmission of email data and credentials against interception

44
Q

Network Time Protocol

A

Synchronized the clocks of computers over a network

45
Q

What port does POP3 use ?

A

Port 110

46
Q

Which port is used for the secure version of POP3 (POP3 over SSL) ?

A

Port 995

47
Q

Which protocol and port does NTP use ?

A

UDP port 123

48
Q

What is NTP designed to do ?

A

Mitigate the effects of variable latency

49
Q

Simple Network Management Protocol

A

Manages devices on IP networks

50
Q

On which ports does SNMP operate ?

A

UDP 161 for sending commands from a management station to the network devices
UDP 162 for receiving

51
Q

What does SNMP help network admins with ?

A

Manage network performance, find and solve problems, and plan for growth

52
Q

Which version of SNMP is secure and encrypted ?

A

Only v3

53
Q

Lightweight Directory Access Protocol

A

Access and maintain distributed directory information services

54
Q

What port does LDAP use ?

A

TCP/UDP port 389

55
Q

What does LDAP provide when working with directories ?

A

Mechanism for connecting to, searching, and modifying internet directories

56
Q

LDAP over SSL (LDAPS)

A

Securing directory services, queries, and mods

57
Q

Which protocol and port does LDAPS use ?

A

TCP port 636

58
Q

Server Message Block

A

Network file sharing and requesting services from server programs

59
Q

Which port and protocol does SMB use ?

A

TCP port 445

60
Q

Is SMB used on a local network ?

A

Yes, inter-process communication

61
Q

Syslog

A

Message logging to track and record system messages

62
Q

What aspects makes Syslog crucial ?

A

System monitoring, troubleshooting, and security auditing

63
Q

Which transport protocols can be used for Syslog ? What port is typically used ?

A

UDP (typically port 514), TCP, TLS/SSL

64
Q

SQL server

A

Relational database management system developed by Microsoft

65
Q

Which port is essential for SQL ? What transport protocol does it use ?

A

TCP port 1433 for application and services to access the database stored on the SQL server

66
Q

Remote Desktop Protocol

A

Enables remote connections primarily running Windows OS

67
Q

Which port and protocol does RDP use ?

A

TCP port 3389

68
Q

How is RDP used ?

A

Remote admin, remote work, IT support over an encrypted and secure access to remote desktops and applications

69
Q

Session initiation protocol

A

Signaling protocol used for initiating, modifying, maintaining, and terminating real-time sessions of video, voice, messaging, and other communications

70
Q

Where does SIP operate ?

A

Application layer

71
Q

Which protocols and ports does SIP use ?

A

TCP and UDP either port 5060 or 5061 over TLS

72
Q

Is SIP fundamental for VoIP ?

A

Yes, enabling the establishment of call sessions and multimedia distribution

73
Q

Internet control message protocol

A

Send diagnostic or control messages between network devices to manage and troubleshoot networks

74
Q

Why is ICMP utilized ?

A

Error reporting

75
Q

Where does ICMP operate ?

A

On top of IP, providing feedback without carrying application data

76
Q

TCP

A

Connection-oriented provides reliable, ordered, and error-checked delivery

77
Q

How many bytes of overhead does TCP use ?

A

24-60 bytes

78
Q

How does TCP ensure packet transmission ?

A

Acknowledgment, retransmission, windowing, flow control mechanisms, and sequence numbers

79
Q

Connectionless-communication

A

Sending data between devices without establishing a dedicated connection

80
Q

Connect-oriented

A

Requires a connection to be established before data is exchanged

81
Q

How to choose between TCP and UDP

A

Depends on the applications requirements

82
Q

TCP 3-way handshake

A

SYN,SYN-ACK, ACK

83
Q

UDP

A

Doesn’t need to establish a prior connection providing speed but less reliability

84
Q

How much overheard does UDP use ?

A

8 bytes

85
Q

What are some UDP applications ?

A

Streaming audio and video or gaming

86
Q

Generic routing encapsulation

A

Tunneling protocol that can encapsulate a wide variety of network layer protocol packets inside IP tunnels

87
Q

What does GRE create ?

A

A virtual point-to-point link

88
Q

Where is GRE commonly used ?

A

VPNs and carrying network Protocols across networks that do not natively support them

89
Q

IPSec

A

Designed to secure IP communications by authenticating and encrypting each IP packet in a data stream

90
Q

Where is IPSec used ?

A

Securing internet communications and establishing VPNs

91
Q

Two modes of IPSec ?

A

Transport and tunnel mode

92
Q

Transport mode

A

Encrypts the payload of each packet but leaves the header untouched

93
Q

Tunnel mode

A

Encrypts the payload and the header. Is used for VPNs

94
Q

Authentication Header

A

Component of IPSec used for authentication, integrity, and nonrepudiation through digital signatures

95
Q

What does Encapsulating Security Payload provide ?

A

Adds encryption to ensure confidentiality of the data being transmitted