Quiz 5 Flashcards

(36 cards)

1
Q

Which encryption method is automatically used by IPv6?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protocol do ping and traceroute use in their operation?

A

ICMP
The ICMP protocol is used by many troubleshooting and monitoring tools. Ping and traceroute are examples of two of these utilities that are ICMP-based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FTP PORT #

A

20/21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DNS PORT#

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DHCP PORT#

A

67/68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IMAP4 PORT#

A

143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HTTP PORT#

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTPS PORT#

A

433

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LDAP PORT#

A

389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NTP PORT#

A

123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

POP3 PORT#

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RDP PORT#

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SFTP PORT#

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MGCP PORT#

A

2427

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SIP PORT#

A

5060/5061

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SMB PORT#

17
Q

SNMP PORT#

18
Q

SQL PORT#

19
Q

SQLnet PORT#

20
Q

Syslog PORT#

21
Q

Telnet PORT#

22
Q

TFTP PORT#

23
Q

SSH PORT#

24
Q

Which program uses port 445 to read/write to files in Windows?

A

SMB
Server Message Block is a network file sharing protocol for Windows file sharing.

25
What port and protocol is used by NTP?
NTP relies on UDP port 123 in its operation.
26
What port number is used by TFTP?
69
27
What is the port and protocol used by syslog?
Syslog produces machine data that you can use to monitor and understand the state of services on the device. Syslog runs on UDP port 514.
28
A source IP Socket address of 192.168.1.10:53 has been detected. What kind of information is being returned to the destination?
An FQDN/IP match
29
To avoid using Telnet, what protocol allows to secure access to remote systems for management purposes?
ssh
30
What port and protocol is used by NTP?
NTP relies on UDP port 123 in its operation.
31
Which incoming email protocols are encrypted and secure because they use an SSL/TLS session?
Using POP3S (port 995) or IMAPS (port 993) allows the incoming data from the client to be encrypted because they use an SSL/TLS session.
32
You need to establish an authenticated and encrypted connection between a client and a host system over the Internet. What should you use?
VPN
33
What is the range of well-known TCP and UDP ports?
Below 1024
34
A packet capture has been copied into data analysis. It shows numerous attempts to authenticate to the network domain controller on port 389. What does this indicate?
An attempt to authenticate to the LDAP service. Port 389 is mapped to LDAP applications.
35
An email server is passing a request to another server. What protocol and port combination will it need to use?
POP3, 111
36