Port Numbers Flashcards

1
Q

20, 21

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FTP

A

20, 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is FTP secure?

A

FTP uses TCP- unencrypted data - FTP across the internet – not secure unless you have a VPN- Virtual Private Network.
You would want to use secure FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Telnet -Allows a user on a remote client machine, called the Telnet client, to access the resources of another _______, the Telnet server, in order to access a ________ ________ __________.
Telnet does that by ________ the Telnet server and making the client machine appear as though it were a terminal directly attached to the local network.

A

machine
command-line interface

tricking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Telnet -Allows a user on a remote client machine, called the Telnet client, to access the resources of another _______, the Telnet server, in order to access a ________ ________ __________.

A

machine

command-line interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Drawbacks to Telnet

A

no encryption techniques

everything must be sent in clear text, including passwords!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

23

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses TCP port 23 An “across the Internet” remote console terminal connection from any client device.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

25

A

SMTP Uses TCP to shuttle eMail across the Internet from one mail server to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SMTP Uses TCP to shuttle eMail across the Internet from one mail server to another using which port?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SMTP

A

Simple Mail Transfer Protocol port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Simple Mail Transfer Protocol

A

SMTP port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SNMP v3

A

Ports 162 & 161 Simple Network Management Protocol- The application layer protocol that securely gathers statistics from remote devices for management purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SNMP v3 Application layer protocol that securely gathers statistics from remote devices for management purposes?

A

SNMP v3 port 161, 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What application layer protocol securely gathers statistics from remote devices for management purposes?

A

SNMP v3 port 161, 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What application layer protocol facilitates very basic reading and writing of files to a remote device?

A

TFTP Trivial File transfer protocol port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TFTP

A

Trivial File transfer protocol- facilitates very basic reading and writing of files to a remote device -port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

69

A

TFTP Trivial File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TFTP Trivial File Transfer Protocol port?

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

22

A

SSH Secure Shell Used to log into a remote machine and execute commands, also supports tunneling, forwarding TCP ports and X11 connections; it can transfer files using the associated SSH SFTP or SCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Port number for SSH Secure Shell

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SSH

A

Secure Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Secure shell

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

scp stands for _________, which means you can copy files across a _____ connection. That connection will be securely _______, it is a very secure way to copy files between computers. Uses the port ____ by default, and connect via ___

A
secure copy
ssh
encrypted
22
SSH
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

scp

A

secure copy - you can copy files across a ssh connection. Uses the port 22 by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

_______________The application layer protocol that securely gathers _________ from remote devices for _________ purposes. Uses Ports ________________

A

Simple Network Management Protocol SNMP v3
securely gathers statistics
management
161 ; 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DNS

A

Domain Name Service port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Domain Name Service

A

DNS port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DNS - UDP or TCP?

A

Both UDP and TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DHCP

A

Dynamic Host Configuration Protocol port 67, 68

31
Q

Dynamic Host Configuration Protocol

A

DHCP port 67, 68

32
Q

Kerberos

A

Port 88

33
Q

HTTP

A

Hypertext Transfer Protocol - Port 80

34
Q

Hypertext Transfer Protocol

A

HTTP - Port 80

35
Q

Session Initiation Protocol

A

SIP - port 5060, 5061

36
Q

SIP

A

Session Initiation Protocol- port 5060, 5061

37
Q

POP3-

A

port 110 Retrieving email - Post Office Protocol - helps email clients retrieve their email from designated email “post office” servers

38
Q

port 110

A

Post Office Protocol - POP3- Retrieving email - helps email clients retrieve their email from designated email “post office” servers

39
Q

port 143

A

Imap- Internet message access Protocol used for retrieving email on the server. Can use it to set up rules reminders.

40
Q

Imap-

A

Port 143- Internet message access Protocol used for retrieving email on the server. Can use it to set up rules reminders.

41
Q

Internet message access Protocol

A

Port 143- Imap-used for retrieving email on the server. Can use it to set up rules reminders.

42
Q

Kerberos -

A

port 88

43
Q

port 88

A

Kerberos

44
Q

TACACS

A

port 49 Tunneling protocol for encryption (Triple A protocol that Cisco uses) Authentication, Authorization, Accounting- Verifies you are you, You are you and are authorized on the network, and accounting is basically logging everything that you do. (actually TACACS + - similar to Kerberos, but it is Cisco)

45
Q

port 49

A

TACACS - Tunneling protocol for encryption (Triple A protocol that Cisco uses) Authentication, Authorization, Accounting

46
Q

443

A

HTTPS

47
Q

HTTPS

A

443

48
Q

Port ___ and____ are ports generally associated with “the Internet”.

A

80

443

49
Q

Port 443/HTTPS is the __________ over TLS/SSL.

A

HTTP protocol

50
Q

Port 80/443 are generally a given for being _____ on any type of filtering device allowing traffic outbound on your network.

A

open

51
Q

Port ____/____ are generally a given for being open on any type of filtering device allowing traffic outbound on your network.

A

80/443

52
Q

solution to insecure money maker?

A

put a large firewall in front and only let traffic in on the one port (check video 2018 08017?)

53
Q

8080

A

Proxy

54
Q

Proxy

A

8080

55
Q

smb

A

445

56
Q

445

A

smb/netbios

57
Q

netbios udp

A

137, 138

58
Q

137, 138

A

netbios udp

59
Q

netbios tcp

A

135, 139, 445

60
Q

3389

A

RDP- Remote Desktop Protocol- provides a GUI designed for secure …..

61
Q

RDP

A

3389

62
Q

666

A

DOOM

63
Q

DOOM

A

666

64
Q

5900

A

VNC

65
Q

VNC

A

5900

66
Q

If you don’t know a port

A

do a Google search

67
Q

SSH, SFTP, SCP

A

22

68
Q

22

A

SSH, SFTP, SCP

69
Q

389

A

LDAP

70
Q

LDAP

A

389

71
Q

Port 80/HTTP is the ___ ____ ____.

A

World Wide Web

72
Q

World Wide Web

A

80

73
Q

HTTP protocol over TLS/SSL.

A

443/HTTPS