Ports And Protocols Flashcards

1
Q

What is a port in networking?

A

A virtual entry or exit point used by applications to exchange information, identified by numerical values (e.g., Port 443 for secure web traffic).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a protocol in networking?

A

A set of rules for data exchange between network devices, ensuring structured and predictable transmission (e.g., TCP, IP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three port range categories?

A
  1. Well-Known Ports (0–1023) – Reserved for common services (e.g., HTTP 80, HTTPS 443).
  2. Registered Ports (1024–49,151) – Assigned to specific applications (e.g., SQL Server 1433).
  3. Dynamic/Private Ports (49,152–65,535) – Used temporarily by applications for communication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port does HTTP use?

A

Port 80 (Unsecured web traffic).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does HTTPS use?

A

Port 443 (Secured web traffic using encryption).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What ports does SMTP use?

A

Port 25 (Unsecured), Port 587 (Secure SMTP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What port does POP3 use?

A

Port 110 (Retrieve email from the server).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What port does IMAP use?

A

Port 143 (Retrieve and manage emails on the server).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What ports does FTP use?

A

Port 20 (Data transfer), Port 21 (Control commands).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What port does SFTP use?

A

Port 22 (Secure data transfer using SSH).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What port does TFTP use?

A

Port 69 (Simple file transfer with no authentication).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What port does SSH use?

A

Port 22 (Secure remote access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What port does Telnet use?

A

Port 23 (Unencrypted remote access, not secure).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What port does RDP use?

A

Port 3389 (Remote desktop connections for Windows).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What port does DNS use?

A

Port 53 (Resolves domain names to IP addresses).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What ports does DHCP use?

A

Port 67 (Server), Port 68 (Client).

17
Q

What port does SQL Server use?

A

Port 1433.

18
Q

What ports does SNMP use?

A

Port 161 (Queries), Port 162 (Traps/Notifications).

19
Q

What port does Syslog use?

A

Port 514 (Log collection).

20
Q

What port does NTP use?

A

Port 123 (Time synchronization).

21
Q

What ports does SIP use?

A

Port 5060 (Unsecured), Port 5061 (Secured).

22
Q

What ports does LDAP use?

A

Port 389 (Unsecured), Port 636 (Secure LDAPS).

23
Q

What is TCP?

A

A connection-oriented protocol that ensures reliable, ordered, and error-checked data transmission.

24
Q

What are the steps in the Three-Way Handshake?

A
  1. SYN – Client sends a synchronization request.
  2. SYN-ACK – Server acknowledges and responds.
  3. ACK – Client confirms, establishing a connection.
25
Q

What mechanisms does TCP use for reliability?

A

Error checking, flow control (windowing), and packet retransmission.

26
Q

How does UDP differ from TCP?

A
  1. Connectionless (no handshake).
  2. Faster but unreliable (no retransmissions).
  3. Used in real-time applications like streaming and VoIP.
27
Q

What are some common UDP-based applications?

A
  1. Streaming media (YouTube, Netflix).
  2. Online gaming (low latency).
  3. VoIP calls.
  4. DNS lookups (Port 53).
28
Q

What is ICMP used for?

A

Diagnosing network issues (e.g., Ping, Traceroute).

29
Q

What are some ICMP vulnerabilities?

A
  1. ICMP Flood Attack – Overwhelms a system with echo requests.
  2. Ping of Death – Sends oversized packets, crashing a system.
30
Q

What is Nmap used for?

A

Scanning and identifying open ports and active services on a network.

31
Q

What is Zenmap?

A

A GUI version of Nmap, useful for network analysis.

32
Q

How can Nmap be used to scan a target system?

A

nmap -ss -O 10.0.2.6 (SYN scan for open ports and OS detection).

33
Q

What are best security practices for ports?

A
  1. Limit open ports (close unused ones).
  2. Disable insecure services (e.g., replace Telnet with SSH).
  3. Use encrypted protocols (e.g., SFTP over FTP).
  4. Regularly scan networks for vulnerabilities.