Ch. 4 - Network Security Flashcards
What port number does File Transfer Protocol (FTP) use?
21
What port number does Telnet use?
23
What port number for Secure Shell (SSH)?
22
What port does Simple Mail Transfer Protocol (SMTP) use?
25
What port does Time Protocol use?
123
What port number does Domain Name Service use?
53
What port number does HTTP and HTTPS use?
80 and 443
What port number does LDAP and LDAPS use?
389 and 636
Port 21?
FTP - File Transfer Protocol
Port 22?
Secure Shell (SSH)
Port 23?
Telnet
Port 25?
SMTP - Simple Mail Transfer Protocol
Port 53?
DNS - Domain Name System
Port 80?
HTTP - Hypertext Transfer Protocol
Port 123?
NTP - Network Time Protocol
Port 389?
LDAP - Lightweight Directory Access Protocol
Port 443?
HTTPS - Hypertext Transfer Protocol Secure
Port 636?
LDAPS - Lightweight Directory Access Protocol Secure
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services)
that can be rapidly provisioned and released with minimal management effort or service provider interaction.
A. Virtualization
B. On-Premises Computing
C. Cloud Computing
D. Virtual Desktop Interface (VDI)
C. Cloud Computing
Source: NIST 800-145
A system in which the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy and compliance considerations). It may be owned, managed and operated by one or more of the organizations in the community, a third party or some combination of them, and it may exist on or off premises.
A. Community Cloud
B. Public Cloud
C. Hybrid Cloud
D. Private Cloud
A. Community Cloud
Source: NIST 800-145
The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.) Typically, a one-to-one attack.
A. Denial-of-Service (DoS)
B. Phishing
C. Snarfing
D. Man-in-the-Middle
A. Denial-of-Service (DoS)
NIST SP 800-27 Rev A
The process and act of converting the message from its plaintext to ciphertext.
A. Decryption
B. Decapsulation
C. Encapsulation
D. Encryption
D. Encryption
The internet protocol (and program) used to transfer files between hosts.
File Transfer Protocol (FTP)
Port 21
A combination of public cloud storage and private cloud storage where some critical data resides in the enterprise’s private cloud while other data is stored and accessible from a public cloud storage provider.
A. Community Cloud
B. Public Cloud
C. Hybrid Cloud
D. Private Cloud
C. Hybrid Cloud