Ports And Protocols Flashcards

1
Q

Was is a Port?

A

Virtual entry/Exit Point for communications used by Software applications to Exchange information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a protocol?

A

Set of rules, conventions for data exchange between nw devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Nw Port Fundamentals, Port?

A

logical opening in computer
identify specific applications/services on computer that represents service/application
0 to 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP address

A

diect data to correct system in nw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three group of ports, well-known ports (5 points)

A

0-1023
FTP(20,21)
SMTP(25)
HTTP(80)
HTTPS(443)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three group of ports, registered ports 1 point

A

1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Three group of ports, ephemeral(very short time period) Ports (3 points)

A

short-lived ports, dynamic use
49152-65535
No registration required anyone can use them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does IANA stand for

A

Internet Assigned Numbers Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data transfer example (2 points)

A

client communicates with website using ip address + port
clients source ip + random ephemeral port connect websites dest ip and default port (e. g. 80)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Two Way Communication 2 points

A

Web server responds using well-known port (80) back to the clients ephermeral port
Two-way com. established client (ephermeral port) <=> web server (80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 more detail about nw fundamentals

A

ephermeral opens for specific task, closte after data transmission
subsequen com. client uses well-known(80) but select new random ephermeral port
Communication Flow (source ip + port initiate com, data is transmitted, port closed when task completed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does TCP stand for?

A

Transmission Control Protocol (TCP),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

4 facts about TCP

A

fundamental in Internet Protocol Suite, governs data exchange over inet
Ensures reliable delivery of packets (error checking, data sequencing, ack)
Transport Layer (3)
breaks down lager messages into smaller packet for efficient data transfer + reassembles at destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Three-Way Handshake? (2 points)

A

initiate to establish a connectgion between two systems:
SYN (Synchronize)
SYN-ACK (Synchronize-Acknowledgement)
ACK(Acknowledgement)
Ensures readiness for secure data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP Error Checking and Flow Control (2 points)

A

Error Chcking and Flow Control:
Use sequence numbers and ack messages
detects and retransmits lost or corrupted packets
Flow control:
prevents overwhelming the receiver
Windowing (Controls the amount of data sent at a time, allows dynamic adjustment based on nw conditions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are TCP Ports? (4 points)

A

Numerical identifiers for services or apps in TCP/IP suite
Distinguish between different services on same server
Each connection identified by source and dest ip addresses + ports (e. g. secure websites uses port 443 HTTPS)
Enable multiple nw applications on the same server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TCPs role in Internet Communication (5 points)

A

Ensures reliability + ordered delivery between client and server
Operates transport layer of the OSI model (layer 4)
Utilizes packetization, ack and error checking
Three-way handshake establishes secure conn
Ports facilitate logical differentiation of services on single machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

User Datagram Protocol (UDP), what is UDP, what is it good for (3 points)

A

Communication protocol used for time-sensitive transmissions on internet (ideal for apps prioritizing speed over error checking, low latency and reduced processin overhead, lacks error checking + recovery services like TCP
Operates at the transport layer ,similar to TCP
Connectionless communication model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is UDPs Packet Structure? (1 point, 4 sub-points)

A

Datagram:
Term for data packet in UDP
Sent without prior setup of transmission channels
Contains source/destination port numbers, length field, and checksum
Smaller and simpler header (8 bytes) compared to TCP (20-60) bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is UDPs Stateless Nature? ( 3 points)

A

UDP does not maintain conn state or track packets
Often referred to as a “fire and forget” protocol
No waiting for ack, leading -> faster transfer rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Reliability Trade-off UDP? (2 points)

A

UDP is less reliable due to lack of packets tracking
Suitable for scenarios where speed is crucial, and packet loss is acceptable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Use Cases UDP

A

Used in apps like live broadcasts, online gaming and VoIP calls
Effective for simple request-response comm (e.g DNS lookup)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does UPD utilizes?

A

Ports to differntiate between multiple services on the same client/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does UDP rely on?

A

application-level error handling due to lack of built-in error recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does UDP contain?

A

It contains a checksum in the header for minimal protection against data corruption

26
Q

Is UDP robust in comparison with TCP

A

No it is not as robust as TCP in ensuring data integrity and delivery

27
Q

What is the Internet Control Message Protocol (ICMP) (3 points)

A

An integral part of the Internet Protocol Suite which is considered to be a nw layer protocol for diagnosing nw comm issues
Not used for data transmission between system unlike TCP and UDP
Operates at nw layer of OSI model (3)

28
Q

What are ICMP Messages? (1 point)

A

Used for indication host or service unreachability, expire time to live + router buffer issues

29
Q

What is Ping Utility (ICMP)? (2 points)

A

Utilizes ICMP to test host reachablilty on IP nw
Measures roundtrip time (latency) for nw con

30
Q

What is the ICMP Message Structure? (1 point, 3 sub-points)

A

Header(Type - indicates the type of ICMP message (1 byte), Code - provides additional context about the message type (1 byte), Checksum - used for error checking the message header and data (2 bytes)

31
Q

What is ICMP Reliability and Design? (2 points)

A

Lacks reliability mechanisms like TCP (No guaranteed delivery, ordering, or error connection
Designed for speed and simplicity, not data integrity or security

32
Q

What are ICMPs Security Concerns (1 point, 2 sub-points)

A

ICMP Flood Attack ( overwhelms target with secho request packets, leading to Denial of Service (DoS) Attack, Amplified up to Distributed Deniaal of SErvice (DDoS) Attack to be effective
Ping of Death (Exploits vulnerablilties in older systems, causing system crashes)

33
Q

What are Modern Security Measures on ICMP? (2 points)

A

Many modern systems are not vulnerable to Ping of Death due to improved sec measures
Network admins may choose to block ICMP traffic for security but face challenges in troubleshooting nw issues

34
Q

What are Web Ports and Protocols? (2 points + 2 Fundamental Ports)

A

Web Ports and Protocols (Standardized rules and numerical gateways (gw) that govern data transmission and communication on internet for websites
Two Fundamental Ports (Port 80 HTTP Hypertext Transfer Protocol - an application layer protocol (7). Designed to enable comm between clients and servers - uses port 80 by default - Foundation of data com. on the worldwide web (www) - Requests and receives web content in plain text, HTTP over Port 80 lacks sec makes data vulnerable to evasdropping + attacks, Port 443 HTTPS Hyptertext Transfer Protocol Secure - similar to HTTP but adds encryption via SSL/TLS -encrypts data, securing it from interception or tampering

35
Q

Why is HTTPS important? (3 point)

A

Vital for websites handling sensitive data like banking, e-commerce or login pages
Automatic redirection from insecure HTTP (port 80) to secure HTTPS
Encryption ensures secure transmission of sensitive information

36
Q

Key Differences between HTTP (Port 80) and HTTPS (Port 443) (3 points)

A

Security and Encryption (HTTP port 80) - unencrypte, plain text, HTTPS (port 443) - encrypted using SSL/TLS, more secure against data breaches
Default Usage (HTTP - traditional, default for unsecured browsing
HTTPS - introduced later, became default for secure browsing in recent years)
Search Engine Optimization (SEO) and Trust (HTTPS - favored for increased sec and ranked higher by search engines due to user trust + encryption

37
Q

What are Email Ports and Protocols (2 points)

A

Govern the transmission of emails across the Internet
Ensure efficient sending, receiving, and management of messages

38
Q

What are Main Email Protocols (1 point (smtp,) several sub-points)

A

SMTP (Simple Mail Transfer Protocol) (standard protocol used for sendin emails over inet, port 25 - default port used by email servers
- insecure because data is sent in plain text, only used for sending emails, SMTPS (SMTP Secure) - a secure variant of SMTP - not really a protocol itself, but a way to secure the SMTP protcol by transportin it via the secure socket layer or transport layer security protcols -operates over ports 465 or port 587

39
Q

What are Main Email Protocols (1 point (pop3), several sub-points)

A

POP3 (Post Office Protocl version 3) (used to retrieve emails from a remote server to a local client, Operates over port 110, Designed to download and delete messages from the server, transmits emails in plain text (insecure), POP3S (POP3 Secure) - a secure variant of POP3 that overcomes the limitations of POP3 - Operates over port 995 via SSL/TLS

40
Q

What are Main Email Protocols (1 point (pop3), several sub-points)

A

IMAP (Internet Message Access Protocol) (Offers more flexibility than POP3, operates over port 143, allows managing emails directly on the server, synchronizing across multiple devices, Transmits emails in plain text (insecure), IMAPS (IMAP Secure) - A variant of IMAP that can provide a secure and encrypted connection by transmitting data inside of an encrypte SSL/TLS using the standard IMAP protocol, port 993

41
Q

What are IMAP? (4 points)

A

SMTP and SMTP are used for sending emails
POP3 and IMAP are both used for receiving emails (IMAP offers more sophisticated email management)
Understanding protocols ensures secure and efficient email communication
Configure system with secure variants to protect against security threats

42
Q

What are File Transfer Ports and Protocols (4 points)

A

File Transfer and Protocols, Specialized rules and procedures are utilized for the transmission of file across networks
FTP (File Transfer Protocol) Oldest prtocol for file transfer,
Ports (Port 20 -actual data transfer, Port 21 - sending control commands
Lack of encryption poses security risks
Transmissions are sent in plain text
Widely used for its simplicity across platforms

43
Q

SFTP (Secure File Transfer Protocol) (3 points)

A

Adresses FTP security concerns
Also stands for SSH File Transfer Protocol
Operates on port 22 - standard port for SSH con.
Encrypts data for sending files when minimal security is sufficient

44
Q

SMB (Server Message Block) (5 points)

A

A network file sharing protocol that allows applications to read and write to files and request services from the server programs
Operates on port 445
Predominantly used for Windows file sharing
Samba (cross- platform version of SMB that exist on Linux systems)
Almost exclusively used inside of LANs and it is not a protocol to send data across the Internet

45
Q

TFTP (Trivial File Transfer Prtocol) (3 points)

A

Basic version of FTP that lacks authentication + directory browsing
Operates on port 69
Designed for sending files when minimal securit is sufficient

46
Q

What are Key Considerations for Protocol Selections (1 point, 4 sub-points)

A

Align security requirements, nw env, and functionality (FTP - basic transfers (ports 20,21), SFTP - secure transfer (port 22), TFTP - simple, unsecured transfers (port 69), SMB - Windows file sharing in LANs (port 445)

47
Q

Remote Access Ports and Protocols (1 points)

A

Remote Access Ports + Protocols (Build and manage systems and nw remotely from anywhere in the world, crucial for interconnected env, allowing control over systems, commands, and files

48
Q

Remote Access Protocols (1 points, ssh)

A

SSH (Secure Shell) (protocol for sec remote login and nw services over an unsecure nw, operates port 22, provides a secure channel, strong authentication, and encrypte data communication
Used by nw admins for remote control of web and server

49
Q

What is Telnet? (4 points)

A

Early remote log-in protocol
Operates on port 23
Allows remote login to another computer on the same nw
Transfers data in plain text, making it susceptible
Replaced by SSH due to lack of encryption

50
Q

RDP (Remote Desktop Protcol) (4 points)

A

Proprietary protocol by Microsoft for graphical user interface remote connection
Port 3389
Allows remote access to a window system, supporting different network
Supports data encryption, smart card authentication, and bandwidth reduction

51
Q

Considerations (4 points)

A

Choose the appropriate protocol based on security requirements and specific tasks
SSH is recommended for secure command-line management
Telnet should be avoided due to its lack of encrypt
RDP is essential for secure graphical access to Windows-based system

52
Q

Network Service Port and Protocols (4 points)

A

Nw Service, Port and Protocols
(Fundamental services for smooth digital communication and nw management, different service, different service that ensure that the network device can discover each other, communicate efficently, and relay important system information to each other

53
Q

Network Service Port and Protocols DNS (3 points)

A

Used for translating human-friendly domain names to ip addresses
Port 53 (UDP by default) for queries and responses
Uses TCP for lager messages

54
Q

What is DHCP? (3 points)

A

Dynamic Host Configuration Protocol (Automates the assignment of IP addresses + nw parameter to client devices, listens on port 67 (UDP) for client requests, responds on port 68 (UDP)

55
Q

What does SQL stand for and what are SQL Services (3 points)

A

Structured Query Language
Refers to protocol usedby database servers for managin queries
Microsoft SQL Server operates on port 1433
MySQL Server on port 3306

56
Q

What SNMP (Simple Network Management Protocol)

A

Used for collecting information and configuring nw devices
Operates port 161
Operates port 162
Crucial for nw diagnsotics and performance monitoring

57
Q

What is syslog (2 points)

A

System Logging (standard for message logging allowing device to send event messages across ip nw (syslog server - event message collector where syslog messages are send to
Operates on port 514 (uses UDP by default, Can use TCP for reliability)

58
Q

Other nw Service Ports and Prtocols (2 points)

A

Refers to different nw, service, ports, and protocols that play a pivotal role in the nw, time sychronization, and the establishment of com sessions, as well as directory srevices
Crucial for organizing and providing access to distirbute information locate all accross the nw

59
Q

What is are other Nw protocol like ntp? (4 points)

A

NTP Network Time protcol (Used to synchronize clocks of computers over a nw)
Vital for time-dependent processes, timestamping events, transaction loggin, and security protcols
Operates over port 123 using the User Datagram Protocol (UDP)
Example: Ensure consistency between server and client times, affecting encryption and decryption functions)

60
Q

other nw services: Session Initiation Protcols (SIP) (3 points)

A

Session Initation Protcol (SIP):
Initates, maintains, and terminates real-time sessions for voice, video, and messaging (common usage includes voiceover ip application for internet phone calls
Operates over port 5060 (traditionally) on both UDP and TCP for unencrypted signaling
Uses port 5061 using TCP with TLS (Transport Layer Security) for encrypted signaling

61
Q

What is Lightweigt Diectory Access Protcol (LDAP)

A

Protcol for accessing and maintaining distribute directory information service over an IP network
Used to look up personal information in email programs
Ports (LDAP (Insecure) Communicates over port 389 using both TCP + UDP

62
Q
A