Port numbers Flashcards

1
Q

23

A

Telnet -

  1. Telecommunication network
  2. Login to devices remotely
  3. Console access
  4. In-the-clear communcation (NO ENCRYPTION)”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

22

A

SSH (Secure shell) -

Like telnet, but encrypted. Designed to transmit data through a remote connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

53

A

DNS (Domain Name System) -

“Converts names to IP addressses
Very critical resources”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

25

A

SMTP (Simple Mail Transfer Protocol) -

“Server to server email transfer - NOT encrypted.
Also used to send mail from a device to a mail server.
Commonly configured on mobile devices and email”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

587

A

SMTP (Simple Mail Transfer Protocol) - using TLS encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

110

A

POP3 (Post Office Protocol Ver 3) -

“Basic mail transfer functionality.
Receive email from email server.
Only one-way communication.
NOT encrypted”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

995

A

POP3 over TLS (Encrypted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

143

A

IMAP (Internet Message Access Protocol v4) -

Includes mgmt of email inbox from multiple clients.
Provides 2-way communication unlike POP.
IN THE CLEAR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

993

A

IMAP (Internet Message Access Protocol v4) -

Includes mgmt of email inbox from multiple clients.
Provides 2-way communication unlike POP.
ENCRYPTED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

22

A

SSH FTP - Secure File Transfer Protocol -

Provides file system functionality
Resuming uninterrupted transfers
Directory listings
Remote file removal
A completely separate protocol from FTP (it is not compliant with FTP servers) that uses SSH to encrypt file transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

20

A

FTP (File transfer protocol) -

Active Mode data - actually transferring a file.
Transfers files between systems.
Authenticates with username and password.
Full-featured functionality (list, add, delete, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

21

A

FTP (File transfer protocol) -

Control - tells computer which file to send.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

69

A

TFTP - Trivial FTP -

Very simple file transfer app.
No authentication
Read and writes files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

67, 68

A

DHCP (Dynamic Host Configuration Protocol)

Requires a DHCP server.
1. Dynamic/pooled - IPs assigned in real time from a pool. Each client given a lease and must renew.
2. DHCP reservation - addresses assigned by MAC address.
This network management protocol is used to assign local IP addresses to devices on a network. It is used to create multiple private IP addresses from one public IPv4 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

80

A

HTTP (Hypertext transfer protocol) -

Protocol used for websites and most internet traffic. NO ENCRYPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

443

A

HTTP over TLS

17
Q

161

A

SNMP (Simple Network Management Protocol) -
Gather stats from network devices.

18
Q

162

A

SNMP traps -

Alerts and notifications from network devices. (If anything bad happens, let us know.)

19
Q

514

A

Syslog -

Usually a central log connector (integrated into a SIEM)

20
Q

389

A

LDAP (Lightweight Directory Access Protocol) -

Store and retrieve info in a network directory (user info, passwords, etc).
Used to manage and communicate with directories.

21
Q

636

A

LDAPS (LDAP Secure) - “LDAP” over TLS -

Store and retrieve info in a network directory (user info, passwords, etc).
Used to manage and communicate with directories.

22
Q

49

A

TACACS+

Cisco proprietary protocol used for authentication, authorization, and accounting (AAA) services

23
Q

88

A

Kerberos -

Network authentication protocol that allows for communication over a non-secure network.

24
Q

989/990

A

File Transfer Protocol Secure (FTPS) -

FTPS uses TLS for encryption. IT can run on ports 20/21, but is sometimes allocated to ports 989/990.

25
Q

1812, 1813

A

Remote Authentication Dial-In User Service (RADIUS) -

Used to provide AAA for network devices. like TACACS+ or Kerberos

26
Q

3868

A

Diameter - developed as an upgrade to RADIUS.

27
Q

5004

A

Secure Real Time Protocol (SRTP) -

SRTP replaced RTP and is a protocol used to stream audio and video communication using UDP.

28
Q

1701

A

Layer 5 Session Layer.

Layer 2 Tunneling Protocol (L2TP) -

Used to create point to point connections, like VPNs over a UDP connection. Needs IPSec for encryption. Designed as an extension to (Point to Point Tunneling Protocol) PPTP. Operates at the data link layer but encapsulates packets at the session layer.

29
Q

TCP (Transmission Control Protocol)

A

Layer 4 - Transport

One of two main protocols of the Internet Protocol (IP) suite used to transmit data over an IP network. TCP provides error checking to ensure packets are not lost in transit.

30
Q

UDP (User Datagram Protocol)

A

Layer 4 - Transport

The second main protocol in the IP suite that transmits datagrams in a best effort method. UDP does not include error checking.

31
Q

1723

A

Layer 4 - Transport

Point to Point Tunneling Protocol (PPTP) -

Based on PPP. Deprecated protocol for VPNs.

32
Q

3389

A

Layer 4 - Transport

RDP (Remote Desktop Protocol) -

Remote Desktop Services - Windows proprietary protocol that provides a remote connection between two computers.