TCP vs UDP Flashcards

1
Q

A connection-oriented protocol

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Suited for applications requiring high reliability

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transmission time is less cruicial

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used by:
HTTP
SMTP
Telnet

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Uses acknowledgements to ensure that data has arrived before sending data back. Takes more time.

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Connectionless protocol

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Good for message transport

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Suited for applications that require fast and efficient transmission, such as video games or videos.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Used by:
DNS
DHCP
SNIMP
VOIP
A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Favors speed over reliability

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Client/Server configuration that is used to transfer files

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exclusively TCP based, no UDP

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

uses data port 20 and command port 21

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Connection initiated by client over command port 21

A

FTP Active mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Server connects back to port 20

A

FTP passive mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port 22

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Uses public key encryption, providing confidentiality and integrity over an unsecured network

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Commonly used to secure remote logins

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Primarily used in unix and Linus

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Port 23

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Designed to communicate between 2 computers and remote logins.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Not encrypted

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Port 25

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

For sending email. It transfers messages from server to another.

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Port 110

A

POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Client/Server protocol used to retrieve email. By default, messages are deleted from server after user has downloaded email. Built into most popular email products.

A

POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Port 143

A

IMAP

28
Q

Retrieves messages, but messages remain on server as well as saved locally. User can organize messages.

A

IMAP

29
Q

Email protocol ideal for multiple devices, so same message can be accessed across different devices

A

IMAP

30
Q

Port 80

A

HTTP

31
Q

Port 8080 (alternate)

A

HTTP

intranet

32
Q

Send and receives web based client request to view webpages

A

HTTP

33
Q

Client uses a URL to locate and request info from a webserver

A

HTTP

34
Q

Requests are sent back to client using TCP/UDP port 80 and is unencrypted by default.

A

HTTP

35
Q

Port 443

A

HTTPS

36
Q

Secure web browsing communications and highly resistant to eavesdropping and interception. Is encrypted

A

HTTPS

37
Q

Uses SSL

A

HTTPS

38
Q

Port 53

A

DNS

39
Q

Translates URLs into IP addresses

A

DNS

40
Q

Uses TCP & UDP

A

DNS

41
Q

Uses databases that contain known IP addresses and their corresponding names.

A

DNS servers

42
Q

Used for simple lookups

A

UDP

43
Q

Used for data replication

A

TCP

44
Q

Used to assign IP addresses to network devices

A

DHCP

45
Q

Process used by DHCP to request an IP address

A

DORA

46
Q

What does DORA stand for?

A

Discover
Offer
Request
Acknowledge

47
Q

UDP Port 67

A

DHCP server

48
Q

UDP Port 68

A

DHCP client

49
Q

Port 3389

A

RDP

50
Q

4 RDP services

A

Input support
Output support
Clipboard sharing
Application support

51
Q

controls how applications residing on different computers communicate on the same LAN

A

NetBIOS

52
Q

found on ethernets and token ring networks

A

NetBIOS

53
Q

Allows computers to communicate by using names

A

NetBIOS

54
Q

UDP ports 137/138

A

NetBIOS

55
Q

TCP ports 137/139

A

NetBIOS

56
Q

Client-server communication protocol that allows sharing to network resources

A

SMB

57
Q

Port 445

A

SMB

58
Q

Also called CIFS

A

SMB

59
Q

commonly used when working with NAS

A

SMB

60
Q

Port 427

A

SLP

61
Q

Service discovery protocol that enables computers to locate service in a local area network

A

SLP

62
Q

Port 548

A

AFP

63
Q

MacOS protocol that enables users to access outside system files

A

AFP

64
Q

Port 389

A

LDAP

65
Q

Application protocol that searches a directory service for an object

A

LDAP

66
Q

Ports 161/162

A

SNMP

67
Q

application protocol that manages and monitors network devices. Provides a common language for network devices in LANs and WANs

A

SNMP