• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/110

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

110 Cards in this Set

  • Front
  • Back
Protocols

provide the rules need for computers to communicate on a network.
SYN

Sycronized packet
SYN / ACK

Synchronized / Acknowledgment is the acknowledgement from a server that a packet can be sent.
ACK
Acknowledgement packet identifies that the server responded with a SYN/ACK and send an ACK in response.
SYN Flood Attack

is a DoS attack where the computer sends multiple SYN packets but never responds with a ACK packet forcing the packets in transit. ping
Ping, PathPing, and Tracert can all be done using what protocol?
ICMP - Internet Control Message Protocol
Many Dos Attacks use what protocol?

ICMP
SSH

Secure Shell
Secure Shell (SSH)

encrypts a wide variety of traffic and uses port 22
What is SFTP encrypted with?

SSH
SCP
Secure Copy
Secure Copy (SCP)

allows the copy of encrypted files over a network.
SSL

Secure Socket Layer Protocol
Secure Socket Layer Protocol

Encrypts HTTP as HTTPS but can also do LDAP as LDAPS
What port does SSL use?

22
What port does SCP use?

22
Telnet

is a session layer protocol used for two way text communication with routers for configuration changes
Telnet uses port?

23 or 22 when using SSH
SSL uses port?


443 when encrypting HTTP


636 when encrypting LDAP

TLS

Transport Layer Security
Transport Layer Security (TLS)


is a protocol that was designed to replace SSL




Uses same ports as SSL

IPsec

Internet Protocol Security
Internet Protocol Security (IPsec)

is used to encrypt IP traffic. then protects VPN (Virtual Private network) traffic using tunneling mode.
Hypertext Transfer Protocol (HTTP)

is used for web traffic.
Hypertext markup Language is..
a common language to display web pages
HTTP uses port

80
HTTPS uses port?

443
File Transfer Protocol (FTP)

used to upload and download files from an FTP SErver
FTP uses ports?


20 for data


21 for controls

SFTP uses port?

22 for data
SFTP and FTPS?

SFTP secure using SSH


FTPS secure using SSL or TLS

TFTP

Trivial File Transfer Protocol
Trivial File Transfer Protocol (TFTP)
Uses UDP port 69
SNMP
Simple Network Management Protocol
Simple Network Management Protocol (SNMP)
used to monitor and manage network devices such as routers and switches
SNMP uses port?
161
DNS

Domain Name System

DNS uses port?
53
Domain Name System (DNS)

resolves domain names to IP addresses
NetBIOS

Network Basic Input Output System
Network Basic Input Output System
Is a naming resolution service for NetBIOS names
LDAP

Lightweight Directory Access Protocol
Lightweight Directory Access Protocol
is the language used to communicate with directories
NetBIOS uses port?

137 - 139
LDAP uses port?

389
Kerberos uses port?

88
SQL uses port?
1433
Remote Desktop services uses port?

3389
SMTP uses port?
25
3 e-mail protocols


SMTP


POP3


IMAP4

SMTP

Simple mail transport protocol
POP3

Post office Protocol v3
POP3 uses port?

110
IMAP4

Internet message access protocol
IMAP4 uses port?
143
PPP

Point-to-Point protocol
Point-to-Point Protocol (PPP)

Is a remote access protocol used to create a dial-up connection between a dial-up client and a remote access server, or a dial-up and an ISP.
VPN

Virtual Private network
IPsec is what type of protocol?

Remote access
PPTP

Point-to-Point Tunneling Protocol
Point-to-Point Tunneling Protocol
a tunneling protocol used with VPN's.
Point-to-Point Tunneling Protocol uses port?

TCP 1723
L2TP

Layer 2 Tunneling Protocol
L2TP uses port?

1701
XTACACS is proprietary to?

Cisco
TACACS

Terminal Access Control...Access Control System
TACACS uses port

UDP port 49
What is the benefit of TACACS+ over RADIUS?

TACACS+ encrypts the entire authentication process where RADIUS only encrypts the pass-word
TACACS+ uses port

TCP 49
IPsec uses port ? for VPN connections.

500
IANA

Internet Assigned Numbers Authority
IPv4 used all assignable numbers on what date? (Month and year)

Feb 2011
How long is an IPv4 address? (in bits)

32
How long is an IPv6 address? (in bits)
128
strings of zeros in IPv6 can be represented by?

two colons in a row ::
IPv6 supports how many addresses?

340 undecillion
NAT

Network Address Translation
How is IPv6 expressed?

8 groups of four hexadecimal characters
hexadecimal
a bit expressed as a letter or number
Subnetting

dividing a single range of IP addresses into several smaller ranges
What is the purpose of subnetting?

By dividing similar traffic in to groups (subnet) you reduce collisions from different types of traffic which increases network efficiency.
What are the port number ranges for common protocols?

0 - 1023
What are the port ranges for companies that need port assignments for proprietary use?

1024 - 49,151
What port number ranges are reserved for dynamic and Private ports? Called registered ports.

49,152 - 65,535
What port is used for Terminal Services?

3389
Ports are used to....?

Block or allow traffic on routers and firewalls.
Port scanner

is a tool used to query a host to determine which ports are open
Fingerprinting attack
Sending specific protocol queries to a server and analyzing the responses. This can provide info on services running as well as OS info.
How do you increase security on switches?


- limit the number of MAC address per port and disabling unused ports




- advanced.....limit MAC address to only 1 per port




- maintain physical security of the switch

STP? RSTP?


Spanning Tree Protocol


Rapid Spanning Tree Protocol

Spanning tree protocol protects against?

Switching loops
What is the benefit of a VLAN?

They can connect computers using a switch based on logical need instead of physical location. Subnets must be at the same location.
VLAN

Virtual Local Area Network
You can create multiple VLAN's with a single......?

switch
Network Bridging

and event that occurs when a computer is connected to a network with 2 separate connections.
Routers connect.......?

Multiple network segments to a single network and route traffic between segments.
Router do not pass......?

Broadcasts
Broadcast Domain

is a single network segments separated with a router.
NIC

Network Interface Controller
ACL's are rules implemented on a..... or a .......?
router or a firewall
Routers can filter packets base on.....?
IP addresses, ports, and some protocols.
What is "implicit deny" that is used on boundary routers?
all traffic is blocked unless a rule is created for the traffic to be allowed.
Firewalls filter traffic which way? Incoming or outgoing?
both
Host based Firewall

Is a firewall for a single host
Deny any any

is the final firewall rule that denies any
WAF

Web Application Firewall
Web Application Firewall (WAF)

a firewall specifically designed to protect a web application such as a web server. IN addition to the network based firewall
Web Security Gateways

Like WSA can filter content
Network Address Translation (NAT)
a protocol that translates public IP address to Private and vise versa.
What is the function of NAT?

It hides addresses on the internal network from the internet.