Section 4: Ports and Protocols Flashcards

(85 cards)

1
Q

What is the primary function of a network port?

A

To serve as a logical endpoint for communications, directing network traffic to the correct application or service on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three ranges of network ports and their corresponding numbers?

A
  1. Well-Known Ports (0-1,023), 2. Registered Ports (1,024-49,151), and 3. Dynamic/Ephemeral Ports (49,152-65,535).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which organization is responsible for assigning and managing registered ports?

A

The Internet Assigned Numbers Authority (IANA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a client computer connects to a web server, what type of port does the client use for its side of the communication?

A

A dynamic or ephemeral port (from the range 49,152-65,535).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the total number of available network ports?

A

65,536 (from 0 to 65,535).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three defining characteristics of TCP?

A

It is connection-oriented, reliable, and provides flow control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three steps of the TCP three-way handshake?

A
  1. SYN (Synchronize), 2. SYN-ACK (Synchronize-Acknowledge), 3. ACK (Acknowledge).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does TCP ensure the reliable delivery of data packets?

A

By using sequence numbers to track packets and acknowledgments (ACKs) to confirm their receipt. It retransmits any unacknowledged packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What mechanism does TCP use for flow control to avoid overwhelming a receiver?

A

Windowing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

At which layer of the OSI model does TCP operate?

A

Layer 4, the Transport Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is UDP considered a ‘connectionless’ protocol?

A

Because it does not establish a formal connection (like a three-way handshake) before sending data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the main advantages of using UDP over TCP?

A

Speed and low overhead, as it does not have the reliability and ordering checks of TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some common applications that use UDP and why?

A

Streaming media, online gaming, and VoIP. These applications prioritize speed and can tolerate minor packet loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does it mean that UDP is a ‘stateless’ or ‘fire-and-forget’ protocol?

A

It does not track the state of the connection or whether packets have been successfully delivered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does UDP’s header size compare to TCP’s header size?

A

UDP’s header is much smaller (8 bytes) than TCP’s header (20-60 bytes), contributing to its speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

At which layer of the OSI model does UDP operate?

A

Layer 4, the Transport Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the primary purpose of ICMP?

A

To send error messages and operational information about network conditions, primarily for diagnostics and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does ICMP stand for?

A

Internet Control Message Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the two most common network utilities that use ICMP?

A

ping and traceroute (or tracert).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why might a network administrator choose to block ICMP traffic at the firewall?

A

To prevent network reconnaissance (like ping sweeps) and protect against ICMP-based denial-of-service attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an ICMP Flood Attack?

A

A denial-of-service attack where the target is overwhelmed with a large number of ICMP Echo Request (ping) packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

At which layer of the OSI model does ICMP operate?

A

Layer 3, the Network Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What port does HTTP use?

A

Port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Is HTTP secure?

A

No, all data is sent in unencrypted plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What port does HTTPS use?
Port 443.
26
What protocol uses port 443?
HTTPS (Hypertext Transfer Protocol Secure).
27
What technology does HTTPS use to secure communications?
Transport Layer Security (TLS), which superseded Secure Sockets Layer (SSL).
28
Why should you avoid entering passwords or credit card numbers on a page that uses HTTP?
Because the data is unencrypted and can be easily intercepted and read by attackers.
29
What visual cues in a web browser indicate that a connection is using HTTPS?
The URL starts with https:// and there is a padlock icon in the address bar.
30
Which protocol is used exclusively for sending email?
SMTP (Simple Mail Transfer Protocol).
31
What does SMTP stand for?
Simple Mail Transfer Protocol.
32
What are the two primary protocols used for receiving email?
POP3 (Post Office Protocol v3) and IMAP (Internet Message Access Protocol).
33
What is the main difference between how POP3 and IMAP handle emails on the server?
POP3 downloads emails to the local client and typically deletes them from the server. IMAP synchronizes emails with the server, keeping them in a central location.
34
What port does secure SMTP (SMTPS) use?
Port 587 (or legacy port 465).
35
What port does secure POP3 (POP3S) use?
Port 995.
36
What port does secure IMAP (IMAPS) use?
Port 993.
37
Why is IMAP generally preferred over POP3 in modern environments?
Because it synchronizes email state across multiple devices (phone, laptop, etc.), providing a consistent view of the inbox.
38
Which two ports does FTP use and what is each port's function?
Port 21 is for control commands, and Port 20 is for the data transfer.
39
What protocol uses ports 20 and 21?
FTP (File Transfer Protocol).
40
What makes SFTP secure compared to FTP?
SFTP encrypts both the commands and the data by tunneling the session through SSH (Secure Shell).
41
What does SFTP stand for?
SSH File Transfer Protocol.
42
What port does SFTP use?
Port 22, because it uses SSH.
43
In what scenarios is the simple, insecure TFTP protocol typically used?
For simple, automated transfers where security is not a concern, like booting diskless workstations or downloading configurations to network devices.
44
What does TFTP stand for?
Trivial File Transfer Protocol.
45
What port does TFTP use?
Port 69.
46
What is the primary use case for the Server Message Block (SMB) protocol?
For providing shared access to files, printers, and other resources on a local area network, primarily in Windows environments.
47
What does SMB stand for?
Server Message Block.
48
What port does SMB use?
Port 445.
49
Which file transfer protocol uses UDP instead of TCP?
TFTP (Trivial File Transfer Protocol).
50
What is the primary security difference between SSH and Telnet?
SSH encrypts the entire communication session, while Telnet sends all data, including usernames and passwords, in unencrypted plain text.
51
Which remote access protocol provides a full graphical user interface (GUI)?
RDP (Remote Desktop Protocol).
52
What does RDP stand for?
Remote Desktop Protocol.
53
What is the default port for SSH?
Port 22.
54
What protocol uses Port 22?
SSH (Secure Shell). It is also used by SFTP.
55
What is the default port for Telnet?
Port 23.
56
What protocol uses Port 23?
Telnet.
57
What is the default port for RDP?
Port 3389.
58
What protocol uses Port 3389?
RDP (Remote Desktop Protocol).
59
Why is Telnet considered a legacy protocol that should no longer be used?
Because it completely lacks encryption, making it a major security vulnerability.
60
What is the function of DNS and what port does it use?
It translates domain names into IP addresses and primarily uses Port 53.
61
What does DNS stand for?
Domain Name System.
62
What protocol uses Port 53?
DNS (Domain Name System).
63
What is the function of DHCP, and what two ports does it operate on?
It automatically assigns IP configuration to hosts. It uses UDP port 67 for the server and UDP port 68 for the client.
64
What does DHCP stand for?
Dynamic Host Configuration Protocol.
65
What is the primary purpose of NTP and what port does it use?
To synchronize the clocks of computers and network devices. It uses UDP port 123.
66
What does NTP stand for?
Network Time Protocol.
67
What might be the problem if a Windows computer receives an IP address in the 169.254.0.0/16 range?
The computer could not reach the DHCP server to obtain an IP address, so it assigned itself an APIPA address.
68
What is the difference between LDAP and LDAPS in terms of security and port number?
LDAP is unencrypted and uses port 389. LDAPS is secured with SSL/TLS and uses port 636.
69
What does LDAP stand for?
Lightweight Directory Access Protocol.
70
What port does insecure LDAP use?
Port 389.
71
What port does secure LDAP (LDAPS) use?
Port 636.
72
What are the two primary ports used by SNMP and what is the direction of communication for each?
Port 161 (UDP) for manager-to-agent queries, and Port 162 (UDP) for agent-to-manager traps (alerts).
73
What does SNMP stand for?
Simple Network Management Protocol.
74
What is the purpose of a Syslog server?
To act as a central repository for collecting and storing log messages from various network devices.
75
What port does Syslog use?
Port 514 over UDP.
76
What are the default ports for Microsoft SQL Server and MySQL?
Microsoft SQL Server uses TCP port 1433. MySQL uses TCP port 3306.
77
Which version of SNMP should be used to ensure authentication and encryption?
SNMPv3.
78
What is the primary function of the Session Initiation Protocol (SIP)?
To initiate, maintain, modify, and terminate real-time sessions like VoIP calls and video conferences.
79
What does SIP stand for?
Session Initiation Protocol.
80
What are the default ports for unencrypted and encrypted SIP traffic?
Port 5060 is for unencrypted SIP, and Port 5061 is for secure SIP over TLS.
81
SIP is responsible for signaling. What protocol typically carries the actual voice/video media in a VoIP call?
RTP (Real-time Transport Protocol).
82
What are the four primary functions of Nmap?
1. Host Discovery, 2. Port Scanning, 3. Version Detection, and 4. OS Detection.
83
What is the name of the graphical user interface for Nmap?
Zenmap.
84
In an Nmap scan, what is the difference between a port state of 'closed' and 'filtered'?
A 'closed' port is accessible but has no application listening on it. A 'filtered' port means a firewall or other device is preventing Nmap from determining if the port is open or closed.
85
What is a common Nmap command switch used to detect the operating system of a target?
-O