Ports And Protocols Flashcards

1
Q

Was is a Port?

A

Virtual entry/Exit Point for communications used by Software applications to Exchange information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a protocol?

A

Set of rules, conventions for data exchange between nw devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Nw Port Fundamentals, Port?

A

logical opening in computer
identify specific applications/services on computer that represents service/application
0 to 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP address

A

diect data to correct system in nw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three group of ports, well-known ports (5 points)

A

0-1023
FTP(20,21)
SMTP(25)
HTTP(80)
HTTPS(443)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three group of ports, registered ports 1 point

A

1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Three group of ports, ephemeral(very short time period) Ports (3 points)

A

short-lived ports, dynamic use
49152-65535
No registration required anyone can use them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does IANA stand for

A

Internet Assigned Numbers Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data transfer example (2 points)

A

client communicates with website using ip address + port
clients source ip + random ephemeral port connect websites dest ip and default port (e. g. 80)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Two Way Communication 2 points

A

Web server responds using well-known port (80) back to the clients ephermeral port
Two-way com. established client (ephermeral port) <=> web server (80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 more detail about nw fundamentals

A

ephermeral opens for specific task, closte after data transmission
subsequen com. client uses well-known(80) but select new random ephermeral port
Communication Flow (source ip + port initiate com, data is transmitted, port closed when task completed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does TCP stand for?

A

Transmission Control Protocol (TCP),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

4 facts about TCP

A

fundamental in Internet Protocol Suite, governs data exchange over inet
Ensures reliable delivery of packets (error checking, data sequencing, ack)
Transport Layer (3)
breaks down lager messages into smaller packet for efficient data transfer + reassembles at destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Three-Way Handshake? (2 points)

A

initiate to establish a connectgion between two systems:
SYN (Synchronize)
SYN-ACK (Synchronize-Acknowledgement)
ACK(Acknowledgement)
Ensures readiness for secure data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP Error Checking and Flow Control (2 points)

A

Error Chcking and Flow Control:
Use sequence numbers and ack messages
detects and retransmits lost or corrupted packets
Flow control:
prevents overwhelming the receiver
Windowing (Controls the amount of data sent at a time, allows dynamic adjustment based on nw conditions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are TCP Ports? (4 points)

A

Numerical identifiers for services or apps in TCP/IP suite
Distinguish between different services on same server
Each connection identified by source and dest ip addresses + ports (e. g. secure websites uses port 443 HTTPS)
Enable multiple nw applications on the same server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TCPs role in Internet Communication (5 points)

A

Ensures reliability + ordered delivery between client and server
Operates transport layer of the OSI model (layer 4)
Utilizes packetization, ack and error checking
Three-way handshake establishes secure conn
Ports facilitate logical differentiation of services on single machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

User Datagram Protocol (UDP), what is UDP, what is it good for (3 points)

A

Communication protocol used for time-sensitive transmissions on internet (ideal for apps prioritizing speed over error checking, low latency and reduced processin overhead, lacks error checking + recovery services like TCP
Operates at the transport layer ,similar to TCP
Connectionless communication model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is UDPs Packet Structure? (1 point, 4 sub-points)

A

Datagram:
Term for data packet in UDP
Sent without prior setup of transmission channels
Contains source/destination port numbers, length field, and checksum
Smaller and simpler header (8 bytes) compared to TCP (20-60) bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is UDPs Stateless Nature? ( 3 points)

A

UDP does not maintain conn state or track packets
Often referred to as a “fire and forget” protocol
No waiting for ack, leading -> faster transfer rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Reliability Trade-off UDP? (2 points)

A

UDP is less reliable due to lack of packets tracking
Suitable for scenarios where speed is crucial, and packet loss is acceptable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Use Cases UDP

A

Used in apps like live broadcasts, online gaming and VoIP calls
Effective for simple request-response comm (e.g DNS lookup)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does UPD utilizes?

A

Ports to differntiate between multiple services on the same client/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does UDP rely on?

A

application-level error handling due to lack of built-in error recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does UDP contain?
It contains a checksum in the header for minimal protection against data corruption
26
Is UDP robust in comparison with TCP
No it is not as robust as TCP in ensuring data integrity and delivery
27
What is the Internet Control Message Protocol (ICMP) (3 points)
An integral part of the Internet Protocol Suite which is considered to be a nw layer protocol for diagnosing nw comm issues Not used for data transmission between system unlike TCP and UDP Operates at nw layer of OSI model (3)
28
What are ICMP Messages? (1 point)
Used for indication host or service unreachability, expire time to live + router buffer issues
29
What is Ping Utility (ICMP)? (2 points)
Utilizes ICMP to test host reachablilty on IP nw Measures roundtrip time (latency) for nw con
30
What is the ICMP Message Structure? (1 point, 3 sub-points)
Header(Type - indicates the type of ICMP message (1 byte), Code - provides additional context about the message type (1 byte), Checksum - used for error checking the message header and data (2 bytes)
31
What is ICMP Reliability and Design? (2 points)
Lacks reliability mechanisms like TCP (No guaranteed delivery, ordering, or error connection Designed for speed and simplicity, not data integrity or security
32
What are ICMPs Security Concerns (1 point, 2 sub-points)
ICMP Flood Attack ( overwhelms target with secho request packets, leading to Denial of Service (DoS) Attack, Amplified up to Distributed Deniaal of SErvice (DDoS) Attack to be effective Ping of Death (Exploits vulnerablilties in older systems, causing system crashes)
33
What are Modern Security Measures on ICMP? (2 points)
Many modern systems are not vulnerable to Ping of Death due to improved sec measures Network admins may choose to block ICMP traffic for security but face challenges in troubleshooting nw issues
34
What are Web Ports and Protocols? (2 points + 2 Fundamental Ports)
Web Ports and Protocols (Standardized rules and numerical gateways (gw) that govern data transmission and communication on internet for websites Two Fundamental Ports (Port 80 HTTP Hypertext Transfer Protocol - an application layer protocol (7). Designed to enable comm between clients and servers - uses port 80 by default - Foundation of data com. on the worldwide web (www) - Requests and receives web content in plain text, HTTP over Port 80 lacks sec makes data vulnerable to evasdropping + attacks, Port 443 HTTPS Hyptertext Transfer Protocol Secure - similar to HTTP but adds encryption via SSL/TLS -encrypts data, securing it from interception or tampering
35
Why is HTTPS important? (3 point)
Vital for websites handling sensitive data like banking, e-commerce or login pages Automatic redirection from insecure HTTP (port 80) to secure HTTPS Encryption ensures secure transmission of sensitive information
36
Key Differences between HTTP (Port 80) and HTTPS (Port 443) (3 points)
Security and Encryption (HTTP port 80) - unencrypte, plain text, HTTPS (port 443) - encrypted using SSL/TLS, more secure against data breaches Default Usage (HTTP - traditional, default for unsecured browsing HTTPS - introduced later, became default for secure browsing in recent years) Search Engine Optimization (SEO) and Trust (HTTPS - favored for increased sec and ranked higher by search engines due to user trust + encryption
37
What are Email Ports and Protocols (2 points)
Govern the transmission of emails across the Internet Ensure efficient sending, receiving, and management of messages
38
What are Main Email Protocols (1 point (smtp,) several sub-points)
SMTP (Simple Mail Transfer Protocol) (standard protocol used for sendin emails over inet, port 25 - default port used by email servers - insecure because data is sent in plain text, only used for sending emails, SMTPS (SMTP Secure) - a secure variant of SMTP - not really a protocol itself, but a way to secure the SMTP protcol by transportin it via the secure socket layer or transport layer security protcols -operates over ports 465 or port 587
39
What are Main Email Protocols (1 point (pop3), several sub-points)
POP3 (Post Office Protocl version 3) (used to retrieve emails from a remote server to a local client, Operates over port 110, Designed to download and delete messages from the server, transmits emails in plain text (insecure), POP3S (POP3 Secure) - a secure variant of POP3 that overcomes the limitations of POP3 - Operates over port 995 via SSL/TLS
40
What are Main Email Protocols (1 point (pop3), several sub-points)
IMAP (Internet Message Access Protocol) (Offers more flexibility than POP3, operates over port 143, allows managing emails directly on the server, synchronizing across multiple devices, Transmits emails in plain text (insecure), IMAPS (IMAP Secure) - A variant of IMAP that can provide a secure and encrypted connection by transmitting data inside of an encrypte SSL/TLS using the standard IMAP protocol, port 993
41
What are IMAP? (4 points)
SMTP and SMTP are used for sending emails POP3 and IMAP are both used for receiving emails (IMAP offers more sophisticated email management) Understanding protocols ensures secure and efficient email communication Configure system with secure variants to protect against security threats
42
What are File Transfer Ports and Protocols (4 points)
File Transfer and Protocols, Specialized rules and procedures are utilized for the transmission of file across networks FTP (File Transfer Protocol) Oldest prtocol for file transfer, Ports (Port 20 -actual data transfer, Port 21 - sending control commands Lack of encryption poses security risks Transmissions are sent in plain text Widely used for its simplicity across platforms
43
SFTP (Secure File Transfer Protocol) (3 points)
Adresses FTP security concerns Also stands for SSH File Transfer Protocol Operates on port 22 - standard port for SSH con. Encrypts data for sending files when minimal security is sufficient
44
SMB (Server Message Block) (5 points)
A network file sharing protocol that allows applications to read and write to files and request services from the server programs Operates on port 445 Predominantly used for Windows file sharing Samba (cross- platform version of SMB that exist on Linux systems) Almost exclusively used inside of LANs and it is not a protocol to send data across the Internet
45
TFTP (Trivial File Transfer Prtocol) (3 points)
Basic version of FTP that lacks authentication + directory browsing Operates on port 69 Designed for sending files when minimal securit is sufficient
46
What are Key Considerations for Protocol Selections (1 point, 4 sub-points)
Align security requirements, nw env, and functionality (FTP - basic transfers (ports 20,21), SFTP - secure transfer (port 22), TFTP - simple, unsecured transfers (port 69), SMB - Windows file sharing in LANs (port 445)
47
Remote Access Ports and Protocols (1 points)
Remote Access Ports + Protocols (Build and manage systems and nw remotely from anywhere in the world, crucial for interconnected env, allowing control over systems, commands, and files
48
Remote Access Protocols (1 points, ssh)
SSH (Secure Shell) (protocol for sec remote login and nw services over an unsecure nw, operates port 22, provides a secure channel, strong authentication, and encrypte data communication Used by nw admins for remote control of web and server
49
What is Telnet? (4 points)
Early remote log-in protocol Operates on port 23 Allows remote login to another computer on the same nw Transfers data in plain text, making it susceptible Replaced by SSH due to lack of encryption
50
RDP (Remote Desktop Protcol) (4 points)
Proprietary protocol by Microsoft for graphical user interface remote connection Port 3389 Allows remote access to a window system, supporting different network Supports data encryption, smart card authentication, and bandwidth reduction
51
Considerations (4 points)
Choose the appropriate protocol based on security requirements and specific tasks SSH is recommended for secure command-line management Telnet should be avoided due to its lack of encrypt RDP is essential for secure graphical access to Windows-based system
52
Network Service Port and Protocols (4 points)
Nw Service, Port and Protocols (Fundamental services for smooth digital communication and nw management, different service, different service that ensure that the network device can discover each other, communicate efficently, and relay important system information to each other
53
Network Service Port and Protocols DNS (3 points)
Used for translating human-friendly domain names to ip addresses Port 53 (UDP by default) for queries and responses Uses TCP for lager messages
54
What is DHCP? (3 points)
Dynamic Host Configuration Protocol (Automates the assignment of IP addresses + nw parameter to client devices, listens on port 67 (UDP) for client requests, responds on port 68 (UDP)
55
What does SQL stand for and what are SQL Services (3 points)
Structured Query Language Refers to protocol usedby database servers for managin queries Microsoft SQL Server operates on port 1433 MySQL Server on port 3306
56
What SNMP (Simple Network Management Protocol)
Used for collecting information and configuring nw devices Operates port 161 Operates port 162 Crucial for nw diagnsotics and performance monitoring
57
What is syslog (2 points)
System Logging (standard for message logging allowing device to send event messages across ip nw (syslog server - event message collector where syslog messages are send to Operates on port 514 (uses UDP by default, Can use TCP for reliability)
58
Other nw Service Ports and Prtocols (2 points)
Refers to different nw, service, ports, and protocols that play a pivotal role in the nw, time sychronization, and the establishment of com sessions, as well as directory srevices Crucial for organizing and providing access to distirbute information locate all accross the nw
59
What is are other Nw protocol like ntp? (4 points)
NTP Network Time protcol (Used to synchronize clocks of computers over a nw) Vital for time-dependent processes, timestamping events, transaction loggin, and security protcols Operates over port 123 using the User Datagram Protocol (UDP) Example: Ensure consistency between server and client times, affecting encryption and decryption functions)
60
other nw services: Session Initiation Protcols (SIP) (3 points)
Session Initation Protcol (SIP): Initates, maintains, and terminates real-time sessions for voice, video, and messaging (common usage includes voiceover ip application for internet phone calls Operates over port 5060 (traditionally) on both UDP and TCP for unencrypted signaling Uses port 5061 using TCP with TLS (Transport Layer Security) for encrypted signaling
61
What is Lightweigt Diectory Access Protcol (LDAP)
Protcol for accessing and maintaining distribute directory information service over an IP network Used to look up personal information in email programs Ports (LDAP (Insecure) Communicates over port 389 using both TCP + UDP
62