Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
34 Cards in this Set
- Front
- Back
ICMP |
Internet Control Message Protocol. Used for testing connectivity for things like ping. Used in DDOS attacks so disabled frequently. |
|
ARP |
address resolution protocol. Resolves IPv4 to MAC address. ARP poisoning is tricking giving clients false MAC addresses. |
|
NDP |
neighborhood discovery protocol. Used for IPv6 and does what ARP does. |
|
SSH |
encryption protocol on TCP port 22. (SCP, SFTP) |
|
SSL |
encryption protocol TCP |
|
TLS |
encryption protocol, designed to replace SSL |
|
IPsec |
internet protocol security. Protects VPN traffic in tunneling. Includes authentication header and ESP (encapsulating Security Payload) over port udp 500. |
|
FTPS |
File Transfer Protocol Secure. Uses SSL over ports 989 and 990, uses ssl |
|
FTP |
uses TCP ports 20 and 21 |
|
TFTP |
Trivial File Transfer Protocol. Uses UDP port 69. |
|
SNMP |
Simple network management protocol. Port 161 and 162 for SNMP trap |
|
LDAP |
port 389 (unencrypted) port 636 via TLS |
|
NetBios |
ports 137, 138, 139 Mostly UDP |
|
Microsoft SQL Server |
TCP port 1433 |
|
RDP |
Remote Desktop Protocol TCP/UDP port 3389 |
|
SMTP |
simple mail transfer protocol TCP port 25 and port 465 via TLS |
|
POP3 |
post office protocol v.3 TCP port 110 and 995 via TLS |
|
IMAP4 |
internet message access protocol v4 TCP port 143 and 993 via TLS |
|
Subnetting |
dividing classful network into two or more smaller networks |
|
ACL |
Access control list. Set on network level device and firewalls. Control based on networks, subnets, IP addresses, ports, and protocols. |
|
DNS |
port UDP 53 for resolution queries and TCP port 53 for zone transfers |
|
A |
host record. Used in DNS to resolve name to IPv4 address |
|
AAAA |
host record for IPv6 |
|
PTR |
opposite of host record, resolves ip address to name |
|
Hub vs Switch |
Hubs are dumber, broadcast traffic to everyone. Switches are unicast and safer. |
|
STP and RSTP |
spanning tree protocol and Rapid STP used to prevent switching loop problems |
|
VLAN |
vlans logically group different computer together |
|
802.1x |
port security protocol. Used on both wireless and wired networks. Can be used with Radius to ensure only authenticated users. Protection against rogue access devices. |
|
WAF |
web application firewall. Can inspect content for things like no operation commands (for buffer overflow attacks) and code for XSS attacks. Used in addition to network firewall. |
|
DMZ |
buffer zone between intranet and internet. Can host internet facing servers so access to internal network avoided. |
|
NAT, DNAT |
NAT is encompassing term for assigning public IP addresses to private IP addresses and vice versa. DNAT is dynamic and assigns IP addresses based on availability (multiple public) |
|
proxy server |
Forwards client requests. Increases performance through caching and enhances security via URL filtering |
|
Secure Zone Transfers |
These are used to prevent the mapping of IP addresses of an internal network |
|
Security advantage of IPv6 |
use of IPsec |