Ports and Protocols 2 Flashcards

1
Q

LDAP uses port?

A

TCP port 389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Port 389 is used by?

A

LDAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which port is used by HTTPS?

A

TCP port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port 443 is used by?

A

HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which protocol uses TCP port 445?

A

SMB/CIFS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Syslog uses port?

A

514.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network admin wants to secure the existing access to a directory service with SSL/TLS encryption. Which TCP needs to be opened?

A

TCP port 636, which is for LDAP over SSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP port 636 is used by?

A

LDAP over SSL(TLS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Port used by RDP?

A

TCP port 3389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SIP uses ports?

A

TCP ports 5060 and 5061.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which protocol is used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets?

A

ICMP. Internet Control Message Protocol is used by networked devices to diagnose communications issues and determine if data is reaching its intended destination in a timely manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GRE is a…?

A

GRE or Generic Routing Encapsulation is a protocol used for tunneling one network protocol inside another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BGP is…?

A

Border Gateway Protocol is an exterior protocol that exchanges routing and reachability information between autonomous systems. It is a path-vector routing protocol that makes routing decisions based on paths, network policies, or configured rule-sets. It is the primary Internet protocol, and is used by ISPs to establish routes between their networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which part of the IPsec protocol suite provides authentication and inegrity?

A

AH (not AES).

Authentication Header. As a part of the IPsec protocol suite, it provides data integrity, origination authentication, and optional anti-replay services for IP packets. It does not provide any data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which part of the IPsec protocol suite provides authentication, integrity and confidentiality?

A

ESP.
Encapsulating Security Payload is a protocol providing data confidentiality, origin authentication, data integrity, and replay protection. It provides encryption, whereas AH does not. Both protocols provide authentication. ESP is used to encrypt IP packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which part of the IPsec protocol suite provides entire packet encryption?

A

Tunnel.

17
Q

A DNS record that stores administrative information about a domain or zone is?

A

SOA.

18
Q

Which DNS record provides reverse lookups (IP address to hostname)?

A

PTR.

19
Q

What is the function of a DNS TXT record?

A

Provides outside services with additional information about a domain.

Not used to direct any traffic.

20
Q

Which DNS record specifies a host and port information that allow to find specific services on a network?

A

SRV.

21
Q

DNS record that specifies a list of additional name servers on a domain is called?

A

NS.

22
Q

What are the differences between iterative and recursive DNS queries?

A

Iterative queries are a type of DNS query in which a name server sends a request to another name server for the lookup and the query is referred between name servers until the correct information is found.

Recursive queries are DNS queries in which the client communicates directly with each DNS server.

23
Q

Which of the following answers refer to the characteristics of the spine-and-leaf datacenter network architecture model?

A

Two-tier architecture.
Full mesh topology.

24
Q

FCoE, Fibre Channel, and iSCSI are connection types used in:

A

SAN.