Port Numbers Flashcards

1
Q

20, 21

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FTP

A

20, 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is FTP secure?

A

FTP uses TCP- unencrypted data - FTP across the internet – not secure unless you have a VPN- Virtual Private Network.
You would want to use secure FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Telnet -Allows a user on a remote client machine, called the Telnet client, to access the resources of another _______, the Telnet server, in order to access a ________ ________ __________.
Telnet does that by ________ the Telnet server and making the client machine appear as though it were a terminal directly attached to the local network.

A

machine
command-line interface

tricking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Telnet -Allows a user on a remote client machine, called the Telnet client, to access the resources of another _______, the Telnet server, in order to access a ________ ________ __________.

A

machine

command-line interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Drawbacks to Telnet

A

no encryption techniques

everything must be sent in clear text, including passwords!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

23

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses TCP port 23 An “across the Internet” remote console terminal connection from any client device.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

25

A

SMTP Uses TCP to shuttle eMail across the Internet from one mail server to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SMTP Uses TCP to shuttle eMail across the Internet from one mail server to another using which port?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SMTP

A

Simple Mail Transfer Protocol port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Simple Mail Transfer Protocol

A

SMTP port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SNMP v3

A

Ports 162 & 161 Simple Network Management Protocol- The application layer protocol that securely gathers statistics from remote devices for management purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SNMP v3 Application layer protocol that securely gathers statistics from remote devices for management purposes?

A

SNMP v3 port 161, 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What application layer protocol securely gathers statistics from remote devices for management purposes?

A

SNMP v3 port 161, 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What application layer protocol facilitates very basic reading and writing of files to a remote device?

A

TFTP Trivial File transfer protocol port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TFTP

A

Trivial File transfer protocol- facilitates very basic reading and writing of files to a remote device -port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

69

A

TFTP Trivial File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TFTP Trivial File Transfer Protocol port?

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

22

A

SSH Secure Shell Used to log into a remote machine and execute commands, also supports tunneling, forwarding TCP ports and X11 connections; it can transfer files using the associated SSH SFTP or SCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Port number for SSH Secure Shell

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SSH

A

Secure Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Secure shell

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

scp stands for _________, which means you can copy files across a _____ connection. That connection will be securely _______, it is a very secure way to copy files between computers. Uses the port ____ by default, and connect via ___

A
secure copy
ssh
encrypted
22
SSH
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
scp
secure copy - you can copy files across a ssh connection. Uses the port 22 by default
26
_______________The application layer protocol that securely gathers _________ from remote devices for _________ purposes. Uses Ports ________________
Simple Network Management Protocol SNMP v3 securely gathers statistics management 161 ; 162
27
DNS
Domain Name Service port 53
28
Domain Name Service
DNS port 53
29
DNS - UDP or TCP?
Both UDP and TCP
30
DHCP
Dynamic Host Configuration Protocol port 67, 68
31
Dynamic Host Configuration Protocol
DHCP port 67, 68
32
Kerberos
Port 88
33
HTTP
Hypertext Transfer Protocol - Port 80
34
Hypertext Transfer Protocol
HTTP - Port 80
35
Session Initiation Protocol
SIP - port 5060, 5061
36
SIP
Session Initiation Protocol- port 5060, 5061
37
POP3-
port 110 Retrieving email - Post Office Protocol - helps email clients retrieve their email from designated email "post office" servers
38
port 110
Post Office Protocol - POP3- Retrieving email - helps email clients retrieve their email from designated email "post office" servers
39
port 143
Imap- Internet message access Protocol used for retrieving email on the server. Can use it to set up rules reminders.
40
Imap-
Port 143- Internet message access Protocol used for retrieving email on the server. Can use it to set up rules reminders.
41
Internet message access Protocol
Port 143- Imap-used for retrieving email on the server. Can use it to set up rules reminders.
42
Kerberos -
port 88
43
port 88
Kerberos
44
TACACS
port 49 Tunneling protocol for encryption (Triple A protocol that Cisco uses) Authentication, Authorization, Accounting- Verifies you are you, You are you and are authorized on the network, and accounting is basically logging everything that you do. (actually TACACS + - similar to Kerberos, but it is Cisco)
45
port 49
TACACS - Tunneling protocol for encryption (Triple A protocol that Cisco uses) Authentication, Authorization, Accounting
46
443
HTTPS
47
HTTPS
443
48
Port ___ and____ are ports generally associated with "the Internet".
80 | 443
49
Port 443/HTTPS is the __________ over TLS/SSL.
HTTP protocol
50
Port 80/443 are generally a given for being _____ on any type of filtering device allowing traffic outbound on your network.
open
51
Port ____/____ are generally a given for being open on any type of filtering device allowing traffic outbound on your network.
80/443
52
solution to insecure money maker?
put a large firewall in front and only let traffic in on the one port (check video 2018 08017?)
53
8080
Proxy
54
Proxy
8080
55
smb
445
56
445
smb/netbios
57
netbios udp
137, 138
58
137, 138
netbios udp
59
netbios tcp
135, 139, 445
60
3389
RDP- Remote Desktop Protocol- provides a GUI designed for secure .....
61
RDP
3389
62
666
DOOM
63
DOOM
666
64
5900
VNC
65
VNC
5900
66
If you don't know a port
do a Google search
67
SSH, SFTP, SCP
22
68
22
SSH, SFTP, SCP
69
389
LDAP
70
LDAP
389
71
Port 80/HTTP is the ___ ____ ____.
World Wide Web
72
World Wide Web
80
73
HTTP protocol over TLS/SSL.
443/HTTPS