TCP vs UDP Flashcards

1
Q

A connection-oriented protocol

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Suited for applications requiring high reliability

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transmission time is less cruicial

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used by:
HTTP
SMTP
Telnet

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Uses acknowledgements to ensure that data has arrived before sending data back. Takes more time.

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Connectionless protocol

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Good for message transport

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Suited for applications that require fast and efficient transmission, such as video games or videos.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Used by:
DNS
DHCP
SNIMP
VOIP
A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Favors speed over reliability

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Client/Server configuration that is used to transfer files

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exclusively TCP based, no UDP

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

uses data port 20 and command port 21

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Connection initiated by client over command port 21

A

FTP Active mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Server connects back to port 20

A

FTP passive mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port 22

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Uses public key encryption, providing confidentiality and integrity over an unsecured network

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Commonly used to secure remote logins

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Primarily used in unix and Linus

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Port 23

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Designed to communicate between 2 computers and remote logins.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Not encrypted

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Port 25

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

For sending email. It transfers messages from server to another.

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Port 110
POP3
26
Client/Server protocol used to retrieve email. By default, messages are deleted from server after user has downloaded email. Built into most popular email products.
POP3
27
Port 143
IMAP
28
Retrieves messages, but messages remain on server as well as saved locally. User can organize messages.
IMAP
29
Email protocol ideal for multiple devices, so same message can be accessed across different devices
IMAP
30
Port 80
HTTP
31
Port 8080 (alternate)
HTTP | intranet
32
Send and receives web based client request to view webpages
HTTP
33
Client uses a URL to locate and request info from a webserver
HTTP
34
Requests are sent back to client using TCP/UDP port 80 and is unencrypted by default.
HTTP
35
Port 443
HTTPS
36
Secure web browsing communications and highly resistant to eavesdropping and interception. Is encrypted
HTTPS
37
Uses SSL
HTTPS
38
Port 53
DNS
39
Translates URLs into IP addresses
DNS
40
Uses TCP & UDP
DNS
41
Uses databases that contain known IP addresses and their corresponding names.
DNS servers
42
Used for simple lookups
UDP
43
Used for data replication
TCP
44
Used to assign IP addresses to network devices
DHCP
45
Process used by DHCP to request an IP address
DORA
46
What does DORA stand for?
Discover Offer Request Acknowledge
47
UDP Port 67
DHCP server
48
UDP Port 68
DHCP client
49
Port 3389
RDP
50
4 RDP services
Input support Output support Clipboard sharing Application support
51
controls how applications residing on different computers communicate on the same LAN
NetBIOS
52
found on ethernets and token ring networks
NetBIOS
53
Allows computers to communicate by using names
NetBIOS
54
UDP ports 137/138
NetBIOS
55
TCP ports 137/139
NetBIOS
56
Client-server communication protocol that allows sharing to network resources
SMB
57
Port 445
SMB
58
Also called CIFS
SMB
59
commonly used when working with NAS
SMB
60
Port 427
SLP
61
Service discovery protocol that enables computers to locate service in a local area network
SLP
62
Port 548
AFP
63
MacOS protocol that enables users to access outside system files
AFP
64
Port 389
LDAP
65
Application protocol that searches a directory service for an object
LDAP
66
Ports 161/162
SNMP
67
application protocol that manages and monitors network devices. Provides a common language for network devices in LANs and WANs
SNMP