Section 4: TCP/IP Model Flashcards

1
Q

Which port does File Transfer Protocol (FTP) connect to and what is the protocol’s usage?

A

Port: 21,22
Usage: Provides Insecure file transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which port does Secure Shell (SSH) connect to and what is the protocol’s usage?

A

Port: 22
Usage: Provides secure remote control of another machine using a text-based environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which port does Secure File Transfer Protocol (SFTP) connect to and what is the protocol’s usage?

A

Port: 22
Usage: Provides secure file transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which port does Telnet connect to and what is the protocol’s usage?

A

Port: 23
Usage: Provides insecure remote control of another machine using a text-based environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which port does Simple Mail Transfer Protocol (SMTP) connect to and what is the protocol’s usage?

A

Port: 25
Usage: Provides the ability to send emails over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which port does Domain Name System (DNS) connect to and what is the protocol’s usage?

A

Port: 53
Usage: Converts domain names to IP addresses, and IP address to domain names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which port does File Dynamic Host Control Protocol (DHCP) connect to and what is the protocol’s usage?

A

Port: 67,68
Usage: Automatically provides network parameteres to your clients, such as their IP address, subnet mask, default gateway, and the DNS server they should use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which port does Trivial File Transfer Protocol (TFTP) connect to and what is the protocol’s usage?

A

Port: 69
Usage: Used as a lightweight file transfer method for sending configuration files or network booting of an operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which port does Hypertext transfer protocol (HTTP) connect to and what is the protocol’s usage?

A

Port: 80
Usage: Used for insecure web browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which port does Post Office Protocol Version Three (POP3) connect to and what is the protocol’s usage?

A

Port: 110
Usage: Used for receiving incoming emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which port does Network Time Protocol (NTP) connect to and what is the protocol’s usage?

A

Port: 123
Usage: Used to keep accurate time for clients on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which port does Network Basic Input/Output System (NetBIOS) connect to and what is the protocol’s usage?

A

Port: 139
Usage: Used for file or printer sharing in a Windows Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which port does Internet Mail Application Protocol (IMAP) connect to and what is the protocol’s usage?

A

Port: 143
Usage: A newer method of retrieving incoming emails which improves upon older POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which port does Simple Network Management Protocol (SNMP) connect to and what is the protocol’s usage?

A

Port: 161,162
Usage: Used to collect data about network devices and monitor their status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which port does Lightweight Directory Access Protocol (LDAP) connect to and what is the protocol’s usage?

A

Port: 389
Usage: Used to provide directory services to your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which port does Hypertext Transfer Protocol -Secure (HTTPS) connect to and what is the protocol’s usage?

A

Port: 443
Usage: Used for secure browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which port does Server Message Block (SMB) connect to and what is the protocol’s usage?

A

Port: 445
Usage: Used for Windows file and printer sharing services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which port does System Logging Protocol (SysLog) connect to and what is the protocol’s usage?

A

Port: 514
Usage: Used for logging data back to centralized server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which port does Simple Mail Transfer Protocol Transport Layer Security (SMTP TLS) connect to and what is the protocol’s usage?

A

Port: 587
Usage: Secure and encrypted way to send emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which port does Lightweight Directory Access Protocol - Secure (LDAPS) connect to and what is the protocol’s usage?

A

Port: 636
Usage: Provides secure directory services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which port does Internet Message Access Protocol over SSL (IMAP over SSL) connect to and what is the protocol’s usage?

A

Port: 993
Usage: Secure and encrypted way to receive emails

22
Q

Which port does Post Office Protocol Version 3 over SSL (POP3 over SSL) connect to and what is the protocol’s usage?

A

Port: 995
Usage: Secure and encrypted way to receive emails

23
Q

Which port does Structured Query Language Server Protocol (SQL) connect to and what is the protocol’s usage?

A

Port: 1433
Usage: Used for communication from a client to a database engine

24
Q

Which port does SQLnet Protocol connect to and what is the protocol’s usage?

A

Port: 1521
Usage: Used for communication from a client to an Oracle database

25
Q

Which port does MYSQL connect to and what is the protocol’s usage?

A

Port: 3306
Usage: Used for communication from a client to the MYSQL database engine

26
Q

Which port does File Remote Desktop Protocol (RDP) connect to and what is the protocol’s usage?

A

Port: 3389
Usage: Provides graphical remote control of another client or server

27
Q

Which port does Session Initiation Protocol (SIP) connect to and what is the protocol’s usage?

A

Port: 5060, 5061
Usage: Used to initiate VoIP and video calls

28
Q

What are the different layers in order in the TCP/IP model? Start with layer 1.

A
  1. Network Interface
  2. Internet
  3. Transport
  4. Application
29
Q

What does the Network Interface layer do in the TCP/IP model?

A

Describes how to transmit bits accross a network and determines how the network medium is going to be used. Like twister pair copper cable, CoAxial Cable, wireless etc.

30
Q

What does the Internet layer do in the TCP/IP model?

A

The Internet layer is where data is taken and packaged into IP datagrams. Protocols include ARP, IP, ICMP, Reverse ARP etc.

31
Q

What does the Transport layer do in the TCP/IP model?

A

Defines the level of service and the status of the connection being used by TCP, UDP, or RTP

32
Q

What does the Application layer do in the TCP/IP model?

A

Dictates how programs are going to interface with the transport layer by conduction session management. The protocols in this layer are HTTP, SNMP, DNS, FTP, Telnet, SSH, SMTP, SSL/TLS etc.

33
Q

What is a Port?

A

A Port is a logical opening on a system representing a service or application that’s listening and waiting for traffic. Ports are numbered from 0 - 65535.

34
Q

What range of ports are Well-Known/Reserved Ports?

A

Ports 0 - 1023

35
Q

What are Ephemeral Ports?

A

Ephemeral ports are short lived temporary ports that are opened for short period of time for pre defined ranges.

36
Q

What range of ports are Ephemeral Ports?

A

Ports 1024 - 65535

37
Q

What information does a IPv4 packet consists of?

A

source address, destination address, IP flags and protocols

38
Q

What are the sizes of a TCP and a UDP header?

A

TCP Header: 20 bytes
UDP Header: 8 bytes

39
Q

What tool can be used to scan for open ports?

A

Nmap

40
Q

How does a Transmission Control Protocol (TCP) work?

A

By conducting a three-way handshake between a client and a server, thereby establishing a connection

41
Q

Please Answer true or false.
1. TCP is a connection-oriented protocol
2. Sender cannot resend a packet if the end user did not receive a packet
3. UDP can detect if packets are corrupted when they are received by a client
4. UDP is reliable than TCP

A
  1. True
  2. False
  3. True
  4. False
42
Q

What is an Internet Control Message Protocol (ICMP)?

A

A Protocol used to communicate information about network connectivity issues back to the sender

43
Q

True or False.
Does “ping” use the ICMP protocol?

A

True

44
Q

What is a Genereic Routing Encapsulation (GRE) protocol?

A

A protocol used as a simple and effective way to create a tunnel, called a GRE tunnel, over a public network.

45
Q

Does a GRE tunnel provide encryption?

A

No

46
Q

What is an alternative protocol that can create a tunnel over a public network and also provide encryption?

A

Internet Protocol Security (IPSec)

47
Q

What is an Internet Protocol Security (IPSec)?

A

A set of secure network communication protocols that operates at the network or packet processing layer and is used to protect one or more data flows between peers.

48
Q

What are the two underlying protocols of IPSec?

A
  1. Authentication Header (AH)
  2. Encapsulating Security Payload
49
Q

What is the Authentication Header (AH) in IPSec?

A

A protocol that provides integrity and authentication

50
Q

What is Encapsulating Security Payload (ESP) in IPSec?

A

Provides encryption and integrity for the data packets sent over IPSec