OBJ 1.5 X Flashcards

1
Q

File Transfer Protocol (FTP) 20/21

A

▪ Transfers computer files between a client and server on a computer
network
▪ Unsecure method
▪ Data transferred in the clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Secure Shell (SSH) 22

A

▪ Cryptographic network protocol for operating network services securely
over an unsecured network
▪ Best known for remote login to computer systems by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure File Transfer Protocol (SFTP) 22

A

▪ Provides file access, file transfer, and file management over any
reliable data stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Telnet 23

A

▪ Provides bidirectional interactive text-oriented communication facility
using a virtual terminal connection
▪ Like SSH, but insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Simple Mail Transfer Protocol (SMTP) 25

A

▪ Internet standard for sending electronic mail
▪ RFC 821 was defined originally in 1982
▪ RFC 5321 developed in 2008 (current version)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Domain Name System (DNS) 53

A

Hierarchical decentralized naming system for computers, services, or
other resources connected to the Internet or a private network
▪ Converts domain names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dynamic Host Configuration Protocol (DHCP) 67/68

A

▪ DHCP server dynamically assigns an IP address and other network
configuration parameters to a client
▪ Enables computers to request IP addresses and networking parameters
automatically?
▪ Reduces burden on network administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trivial File Transfer Protocol (TFTP) 69

A

▪ Transmits files in both directions of a client-server application
▪ Used for booting an operating system from a local area network file
server
▪ Doesn’t provide user authentication or directory visibility
▪ Essentially a stripped-down version of FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hypertext Transfer Protocol (HTTP) 80

A

▪ Foundation of data communication for WWW
▪ Designed for distributed, collaborative, and hypermedia presentation
across many devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Post Office Protocol v3 (POP3) 110

A

▪ Used by local e-mail clients to retrieve e-mail from a remote server over
TCP/IP connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Time Protocol (NTP) 123

A

▪ Provides clock synchronization between computer systems over packetswitched, variable-latency data networks
▪ Created in 1985, one of the oldest Internet protocols in current use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Message Access Protocol (IMAP) 143

A

▪ Provides e-mail clients to retrieve e-mail messages from a mail server
over a TCP/IP connection
▪ Allows the end user to view and manipulate the messages as if they’re
stored locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Simple Network Management Protocol (SNMP) 161/162

A

▪ Provides collection and organization of information about managed
devices on IP networks
▪ Can modify that information to change device behavior, commonly used
in network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lightweight Directory Access Protocol (LDAP) 389

A

Open, vendor-neutral, industry standard for accessing and maintaining
distributed directory information services
▪ LDAP and Active Directory use this port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hypertext Transfer Protocol Secure (HTTPS) [Secure Sockets Layer (SSL)] 443

A

▪ Foundation of ecommerce on WWW
▪ Designed for adding security to the insecure HTTP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Server Message Block (SMB) 445

A

Provides shared access to files, printers, and miscellaneous
communications between devices on a network

17
Q

Syslog 514

A

Used to send logging data back to a centralized server

18
Q

SMTP TLS 587

A

▪ Secure and encrypted way to send emails

19
Q

Lightweight Directory Access Protocol (over SSL) (LDAPS) 636

A

▪ Open, vendor-neutral, industry standard for accessing and maintaining
distributed directory information services
Provides secure directory services

20
Q

IMAP over SSL 993

A

▪ Secure and encrypted way to receive emails

21
Q

POP3 over SSL 995

A

▪ Secure and encrypted way to receive emails

22
Q

Structured Query Language (SQL) Server 1433

A

▪ Used for communication from a client to the database engine

23
Q

SQLnet 1521

A

Used for communication from a client to an Oracle database

24
Q

MySQL 3306

A

Used for communication from a client to the MySQL database engine

25
Q

Remote Desktop Protocol (RDP) 3389

A

Proprietary protocol developed by Microsoft
▪ Provides a user with a graphical interface to connect to another
computer over a network connection
▪ User employs RDP client software for this purpose and the other
computer must run RDP server software

26
Q

Session Initiation Protocol (SIP) 5060/5061

A

Provides signaling and controlling multimedia communication sessions in
applications
▪ Used for Internet telephony for voice and video calls, VOIP, and instant
messaging

27
Q

Internet Control Message Protocol (ICMP)

A

A network level protocol that is used to communicate information about network connectivity issues back to the sender.
▪ ICMP is used a lot by network technicians during troubleshooting, but it is also used by attackers to conduct ping scans and network mapping

28
Q

Generic Routing Encapsulation protocol (GRE)

A

A tunneling protocol that was developed by Cisco to encapsulate a wide
variety of network layer protocols inside a virtual point-to-point or pointto-multipoint link over an Internet Protocol network
▪ Important to set a smaller maximum transmission unit or MTU size on
the tunnel
▪ It does not provide any encryption

29
Q

Internet Protocol Security protocol (IPsec)

A

▪ Set of secure communication protocols at the network or packet
processing layer that is used to protect data flows between peers

30
Q

Authentication Header (AH)

A

o A protocol within IPSec that provides integrity and
authentication

31
Q

Encapsulating security payload (ESP)

A

o Provides encryption and integrity for the data packets sent over IPsec
o Backwards-compatible with most IP routers including those that were not designed to work with IPsec initially