Common Terminology Flashcards

To learn sockets and general network terminology (52 cards)

1
Q

ports 0 through 1,023

A

non-ephemeral ports / server only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ports 1024 through 65,535

A

ephemeral ports / determined in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ports used for communication or security

A

communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP/UDP ports

A

TCP ports are different than UDP ports so no conflict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

source port

A

used by the client to receive data from server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

destination port

A

used by server to receive data from client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS lookup utility

A

DIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

granting an IP address

A

lease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

time-to-live

A

max number of hops a packet can make before discarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hop

A

one portion of the path between source and destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Telnet

A

log into devices remotely, not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSH

A

(Secure Shell) log into devices remotely, encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS

A

(Domain Name System) convert the names in a browser to an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SMTP

A

(Simple Mail Transfer Protocol) server to server email transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IMAP4

A

(Internet Message Access Protocol) includes management of email inbox from multiple clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP3

A

(Post Office Protocol) basic transfer functionality for mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

FTP

A

(File Transfer Protocol) transfer files between systems and has login authentication, no encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TFTP

A

(Trivial File Transfer Protocol) very simple file transfer application, no login authentication, no encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SFTP

A

(Secure File Transfer Protocol) uses SSH and can resume interrupted transfers, remote file removal and directory listings, encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DHCP

A

(Dynamic Host Configuration Protocol) automated configuration of an IP address, subnet mask, and other options. Uses DHCP server to lease IP addresses from a pool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DHCP Reservation

A

addresses assigned to a particular MAC address

22
Q

MAC

A

Media Access Control

23
Q

HTTP

A

(Hyper Text Transfer Protocol) web server communication

24
Q

HTTPS

A

(Hyper Text Transfer Protocol Secure) web server communication with encryption

25
SNMP
(Simple Network Management Protocol) gather statistics from network devices
26
RDP
(Remote Desktop Protocol) share a desktop from a remote location
27
SIP
(Session Initiaition Protocol) setup and manage voice over IP sessions, extends voice communication and file transfer
28
H.323
ITU Telecommunication H.32x protocol series, setup, and manage VoIP sessions and extends voice communication
29
SMB
(Server Message Block) also called Common Internet File System, direct SMB over TCP
30
LDAP
(Lightweight Directory Access Protocol) store and retrieve information in a network directly
31
LDAPS
(Lightweight Directory Access Protocol Secure) - non-standard implementation of LDAP over SSL
32
Bridging
connection between two MAC addresses
33
IP Fragmentation
breaks up packets into smaller pieces
34
IP
Internet Protocol
35
TCP
Transmission Control Protocol
36
UDP
User Datagram Protocol
37
Half-duplex
cannot send/recieve data simultaneously
38
Half-duplex examples
LAN hubs
39
A sensor that monitors incoming traffic before it is allowed into the network.
Intrusion Prevention System
40
A sensor that receives a copy of network traffic in the middle of the network.
Intrusion Detection System
41
A device that uses a set of rules to determine what traffic to allow or deny between different areas of a network.
Firewall
42
A portion of a network that should be accessible by external devices.
Demilitarized Zone
43
Locally stores content retrieved from a remote network and sends content to local devices that are requesting it.
Cache Engine
44
Network appliance that makes storage resources available to network clients
Network Attached Storage
45
A device that inspects network traffic using a set of rules for return traffic before allowing the connection
Stateful Firewall
46
A device that monitors packets and applies a set of rules before allowing or denying them to be sent through.
Packet Filter
47
Device inspects application layer traffic using a set of rules for return traffic before allowing the connection.
Application Layer Firewall
48
Wireless can be administered individually
Autonomous Access Point
49
Allows wireless devices on the data layer to communicate with one another without a network layer.
Wireless Ad Hoc Network
50
Wireless Access Point can be managed by a WLAN controller
Lightweight Access Point
51
Used to control lightweight access points using Lightweight access point protocol
Wireless Lan Controller
52
Used by a wireless LAN controller to communicate with a lightweight access point
Lightweight Access Point Protocol