To Memorize Flashcards

1
Q

SSH

A

port 22 Secure Shell
Protocol allows secure remote admin of Linux servers and network equipment through text console. Uses public key cryptography. Pw and transmissions after login are encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TELNET

A

23, TELNET TCP
Legacy protocol being replaced by SSH. Allows remote admin of network devices through a text-based console. No encryption. Server/device listens for connection on port 23.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS

A

53 Domain Name Service
Used in translating fully qualified domain names to IP addresses. Decentralized hierarchical database used for resolving fully qualified domain names to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SMTP

A

Simple Mail Transport Protocol (tcp 25)

Protocol used to deliver emails to a destination mail server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SFTP

A

22, Secure File Transfer Protocol, tcp
File transfer protocol that uses SSH. When SSH is installed on Linux, SFTP is automatically enabled to transfer files. Command is often scp (secure copy protocol). Since it uses SSH it awaits incoming connections on port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FTP

A

File Transfer Protocol-20, 21 (tcp)
Legacy file-sharing protocol still commonly used. Being replaced with SFTP; SFTP offers encryption.
- Control Channel/Data Channel.
- Active Mode/Passive mode
- Control Channel listens for requests on TCP port 21.
- Sends data on port 20.
- Can cause issues at client firewall/NAT because server sends to port above 1023, from port 20….passive mode alleviates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TFTP

A

69-Trivial File Transfer Protocol
TFTP server listens for requests on 69. Used to boot computers over the network with the Preboot Execution Environment (PXE). Also used to transfer software images for network devices (routers, switches) during software upgrades. No security, authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DHCP

A

(67, 68) Dynamic Host Configuration Protocol UDP
Provides automatic configuration of IP addresses, subnet masks, and options such as Domain Name Server (DNS) servers and the remote gateway to network devices.

  • operates in connectionless state.
  • DHCP server listens for client requests on 67.
  • CLIENTS send initial request FROM 68.
  • SERVER responds, it to client port 68 from server port 67.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP

A

80, Hyper Text Transfer Prot. TCP

Web page requests, web element requests. Web crawlers and mobile apps use 80 and http. Server listens on port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port 80

A

HTTP, Hyper Text Transfer Prot. TCP

Web page requests, web element requests. Web crawlers and mobile apps use 80 and http. Server listens on port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTPS

A

Hyptertext Transfer Protocol. 443.
Provides same functionality as HTTP but also allows for the encryption of these transfers via a Secure Socket Layer.
Private key must be imported into the web server from a mutually trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port 443

A

HTTPS, Hyptertext Transfer Protocol. TCP
Functionality of HTTP but also allows for encryption with Secure Socket Layer.
Private key must be imported into the web server from a mutually trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SNMP

A

161, Simple Network Management Prot
Used for the management of servers and network devices. Can collect data on memory, CPU, and bandwidth. Works with NMS network management station.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port 161

A

SNMP, Simple Network Management Prot
Used for the management of servers and network devices. Can collect data on memory, CPU, and bandwidth. Works with NMS network management station.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What application uses tcp/3389?

A

RDP, Remote Desktop Protocol

MS protocol used for connecting to another Microsoft computer or server for remote admin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RDP

A

3389, Remote Desktop Protocol, tcp

MS protocol used for connecting to another Microsoft computer or server for remote admin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NTP

A

Network Time Protocol, 123, udp

Optimized for synchronizing clocks between computers over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is on udp/123?

A

NTP Network Time Protocol
Synchronizes clocks between devices
Automatic updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What applications uses tcp/5060 and tcp/5061?

A

SIP Session Initiation Protocol. Used for VoIP service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

POP3 protocol?

A

TCP/110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Tcp/110

A

POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IMAP4 protcol?

A

143 tcp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What app uses tcp/143?

A

IMAP4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is LDAP?

A

Lightweight Directory Access protocol

Store and retrieve network info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Whats on tcp/389?

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What protcol does h.323 use?

A

tcp/1720

27
Q

What is on tcp/1720?

A

h.323
ITU telecom
Setup and manages voip sessions

28
Q

What does the session layer do?

A

The Session layer provides the mechanism for opening, closing, and managing a session between end-user application processes. Communication sessions consist of requests and responses that occur between applications.

29
Q

What does the presentation layer do?

A

The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems.

30
Q

the Application layer of the OSI model in action.

A

Service Host: Network Services in Windows Task Manger.

All of those services run just below web browseres, email apps, etc. and represent the app layer of the OSI.

31
Q

SMB

A

Server Message Block, TCP Port 445. SMB is a file and print sharing protocol that allows applications on a computer to read and write to files, and to request services from servers in a computer network.
When using the SMB protocol, an application (or the user of an application) can access folders, files, printers and other resources at a remote server.

32
Q

What is RDP?

A

Remote Desktop Protocol (RDP) is a client-server based protocol that provides a user with a graphical user interface (GUI) to connect to another computer over a network connection. RDP is designed for secure communications between Windows Terminal Services Client and Windows Terminal Services Server. This protocol supports devices connected to the whole range of network sizes - from a WAN (such as over the Internet) on one end to a LAN (within an enterprise network) on the other. RDP uses port 3389 by default.

33
Q

port 22

A

SSH Secure Shell AND SFTP
Protocol allows secure remote admin of Linux servers and network equipment through text console.
Uses public key cryptography. Pw and transmissions after login are encrypted.
22, Secure File Transfer Protocol, tcp
Since it uses SSH it awaits incoming connections on port 22.

34
Q

port 53

A

DNS Domain Name Service

Used in translating fully qualified domain names to IP addresses.

35
Q

port 25

A

SMTP Simple Mail Transport Protocol

Protocol used to deliver emails to a destination mail server. TCP.

36
Q

port 69

A

TFTP, Trivial File Transfer Protocol
TFTP server listens for requests on 69. Used to boot computers over the network with the Preboot Execution Environment (PXE). Also used to transfer software images for network devices (routers, switches) during software upgrades. No security, authentication.

37
Q

port 23

A

TELNET TCP
Legacy protocol being replaced by SSH. Allows remote admin of network devices through a text-based console. No encryption. Server/device listens for connection on port 23.

38
Q

port 123

A

NTP. Network Time Protocol, 123, udp

Optimized for synchronizing clocks between computers over the Internet.

39
Q

SIP

A

(5060, 5061), Session Initiation Protocol
Communications protocol for the setup and signaling of VoIP calls. Does not transport the media stream-assists in setting up the media stream for the sess. Can be encrypted by using TLS on UDP port 5061. ALso used in SIP trunk which connects VoIP PBX to PSTN.

40
Q

5060, 5061

A

SIP, Session Initiation Protocol.
Communications protocol for the setup and signaling of VoIP calls. Does not transport the media stream-assists in setting up the media stream for the sess. Can be encrypted by using TLS on UDP port 5061. ALso used in SIP trunk which connects VoIP PBX to PSTN.

41
Q

SMB

A

445, Server Message Block.

Common network file and printer sharing protocol that is used with MS products.

42
Q

445

A

SMB, Server Message Block.

Common network file and printer sharing protocol that is used with MS products.

43
Q

POP

A

110, Post Office Protocol. TCP

Allows email clients to log in and retrieve email.

44
Q

110

A

POP, Post Office Protocol.

Allows email clients to log in and retrieve email.

45
Q

IMAP

A

143, Internet Message Access Proto.

Used to allow email clients to retrieve and read email on the server. IMAP over SSL operates on 993.

46
Q

143

A

IMAP, Internet Message Access Proto.

Used to allow email clients to retrieve and read email on the server. IMAP over SSL operates on 993.

47
Q

LDAP

A

389, Lightweight Directory Access Proto.
Application protocol that can search a directory service for objects. MS AD is an example of a directory service that uses LDAP to locate objects. AD uses directory services to locate objects such as domain controllers (DCs), user objects for Group Policy (GP) application.

48
Q

389

A

LDAPS, Lightweight Directory Access Proto.
Application protocol that can search a directory service for objects. MS AD is an example of a directory service that uses LDAP to locate objects. AD uses directory services to locate objects such as domain controllers (DCs), user objects for Group Policy (GP) application.

49
Q

LDAPS

A

636, LDAP over SSL.

By installing an SSL certificate into AD, you can enable the LDAPS protocol.

50
Q

H.323

A

1720, H.232
Telco standard for comms over the Internet. H.232 encompasses all of the communications technologies used by VoIP and videoconferencing.

51
Q

ICMP

A

Internet Control Message Protocol. A support protocol for TCP/IP that operates alongside of the IP protocol on the network layer. ping, tracert, etc. Used by devices (routers) to identify operation problems, such as a a gateway that is no longer responsive. ICMP has bigger role with IPv6. There it also does Neighbor Discovery Protocol (NDP), which is like ARP in IPv4.

52
Q

UDP

A

User Datagram Protocol. Connectionless transport layer protocol. Data passed from one IP addy to the next. Sender doesn’t know if anyone listening. No receipt acknowledgments. Data blocks sent unsequenced. But it’s fast. NTP uses it for “what time is it?” queries. Good for fast easy transmissions too. UDP can work with other protocols which may have tools it lacks.

53
Q

TCP

A

Transmission Control Protocol. Connection oriented transport layer protocol. 3-way handshake, reliable comms, receipts. When sender receiver use syn/ack flags in tcpheader to negotiate window size, connection established. FIN flag in tcp header breaks connection at end.

54
Q

IP

A

Internet Protocol. Allows for the logical addressing of networks and hosts. UDP and TCP protocols function on top of the IP protocol. UDP/TCP handle data for the applications. IP protocol is responsible for encapsulating these protocols and delivering them to the appropriate address.

55
Q

568a Wiring

A

GrW, Gr, Ow, Bl, Blw, O, BrW, Br

56
Q

568b Wiring

A

Ow, O, GrW, BlW, Bl, Gr, BrW, Br

57
Q

A

A

Address record. A records allow a host to resolve a FQDN to an IPv4 address.

58
Q

AAAA

A

Quad A Record. AAAA records allow a host to resolve a FQDN to an IPv6 address.

59
Q

TXT

A

Used for:
Allows text to be queried via DNS.
Proof of ownership of a domain.
Management of search engine crawling.

60
Q

SRV

A

Service Locator Records used to locate services like LDAP.

61
Q

MX

A

Mail Exchanger.
If you want to receive mail from other mail servers you must publish an MX record for your mail server.
MX records assist a mail server in identifying the mail server for your domain.

62
Q

CNAME

A

Canonical name record allows a FQDN to resolve to an A record.
Handy when you have one host with multiple names.

63
Q

SOA

A

Start of authority. Defines a zone file, and allow secondary DNS servers to know when the zone file has changed.

64
Q

PTR

A

Pointer record points the IP address to a FQDN.