Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
110 Cards in this Set
- Front
- Back
Protocols
|
provide the rules need for computers to communicate on a network. |
|
SYN
|
Sycronized packet |
|
SYN / ACK
|
Synchronized / Acknowledgment is the acknowledgement from a server that a packet can be sent. |
|
ACK
|
Acknowledgement packet identifies that the server responded with a SYN/ACK and send an ACK in response.
|
|
SYN Flood Attack
|
is a DoS attack where the computer sends multiple SYN packets but never responds with a ACK packet forcing the packets in transit. ping |
|
Ping, PathPing, and Tracert can all be done using what protocol?
|
ICMP - Internet Control Message Protocol
|
|
Many Dos Attacks use what protocol?
|
ICMP |
|
SSH
|
Secure Shell |
|
Secure Shell (SSH)
|
encrypts a wide variety of traffic and uses port 22 |
|
What is SFTP encrypted with?
|
SSH |
|
SCP
|
Secure Copy
|
|
Secure Copy (SCP)
|
allows the copy of encrypted files over a network. |
|
SSL
|
Secure Socket Layer Protocol |
|
Secure Socket Layer Protocol
|
Encrypts HTTP as HTTPS but can also do LDAP as LDAPS |
|
What port does SSL use?
|
22 |
|
What port does SCP use?
|
22 |
|
Telnet
|
is a session layer protocol used for two way text communication with routers for configuration changes |
|
Telnet uses port?
|
23 or 22 when using SSH |
|
SSL uses port?
|
636 when encrypting LDAP |
|
TLS
|
Transport Layer Security |
|
Transport Layer Security (TLS)
|
Uses same ports as SSL |
|
IPsec
|
Internet Protocol Security |
|
Internet Protocol Security (IPsec)
|
is used to encrypt IP traffic. then protects VPN (Virtual Private network) traffic using tunneling mode. |
|
Hypertext Transfer Protocol (HTTP)
|
is used for web traffic. |
|
Hypertext markup Language is..
|
a common language to display web pages
|
|
HTTP uses port
|
80 |
|
HTTPS uses port?
|
443 |
|
File Transfer Protocol (FTP)
|
used to upload and download files from an FTP SErver |
|
FTP uses ports?
|
21 for controls |
|
SFTP uses port?
|
22 for data |
|
SFTP and FTPS?
|
SFTP secure using SSH FTPS secure using SSL or TLS |
|
TFTP
|
Trivial File Transfer Protocol |
|
Trivial File Transfer Protocol (TFTP)
|
Uses UDP port 69
|
|
SNMP
|
Simple Network Management Protocol
|
|
Simple Network Management Protocol (SNMP)
|
used to monitor and manage network devices such as routers and switches
|
|
SNMP uses port?
|
161
|
|
DNS
|
Domain Name System |
|
DNS uses port? |
53
|
|
Domain Name System (DNS)
|
resolves domain names to IP addresses |
|
NetBIOS
|
Network Basic Input Output System |
|
Network Basic Input Output System
|
Is a naming resolution service for NetBIOS names
|
|
LDAP
|
Lightweight Directory Access Protocol |
|
Lightweight Directory Access Protocol
|
is the language used to communicate with directories
|
|
NetBIOS uses port?
|
137 - 139 |
|
LDAP uses port?
|
389 |
|
Kerberos uses port?
|
88 |
|
SQL uses port?
|
1433
|
|
Remote Desktop services uses port?
|
3389 |
|
SMTP uses port?
|
25
|
|
3 e-mail protocols
|
POP3 IMAP4 |
|
SMTP
|
Simple mail transport protocol |
|
POP3
|
Post office Protocol v3 |
|
POP3 uses port?
|
110 |
|
IMAP4
|
Internet message access protocol |
|
IMAP4 uses port?
|
143
|
|
PPP
|
Point-to-Point protocol |
|
Point-to-Point Protocol (PPP)
|
Is a remote access protocol used to create a dial-up connection between a dial-up client and a remote access server, or a dial-up and an ISP. |
|
VPN
|
Virtual Private network |
|
IPsec is what type of protocol?
|
Remote access |
|
PPTP
|
Point-to-Point Tunneling Protocol |
|
Point-to-Point Tunneling Protocol
|
a tunneling protocol used with VPN's.
|
|
Point-to-Point Tunneling Protocol uses port?
|
TCP 1723 |
|
L2TP
|
Layer 2 Tunneling Protocol |
|
L2TP uses port?
|
1701 |
|
XTACACS is proprietary to?
|
Cisco |
|
TACACS
|
Terminal Access Control...Access Control System |
|
TACACS uses port
|
UDP port 49 |
|
What is the benefit of TACACS+ over RADIUS?
|
TACACS+ encrypts the entire authentication process where RADIUS only encrypts the pass-word |
|
TACACS+ uses port
|
TCP 49 |
|
IPsec uses port ? for VPN connections.
|
500 |
|
IANA
|
Internet Assigned Numbers Authority |
|
IPv4 used all assignable numbers on what date? (Month and year)
|
Feb 2011 |
|
How long is an IPv4 address? (in bits)
|
32 |
|
How long is an IPv6 address? (in bits)
|
128
|
|
strings of zeros in IPv6 can be represented by?
|
two colons in a row :: |
|
IPv6 supports how many addresses?
|
340 undecillion |
|
NAT
|
Network Address Translation |
|
How is IPv6 expressed?
|
8 groups of four hexadecimal characters |
|
hexadecimal
|
a bit expressed as a letter or number
|
|
Subnetting
|
dividing a single range of IP addresses into several smaller ranges |
|
What is the purpose of subnetting?
|
By dividing similar traffic in to groups (subnet) you reduce collisions from different types of traffic which increases network efficiency. |
|
What are the port number ranges for common protocols?
|
0 - 1023 |
|
What are the port ranges for companies that need port assignments for proprietary use?
|
1024 - 49,151 |
|
What port number ranges are reserved for dynamic and Private ports? Called registered ports.
|
49,152 - 65,535 |
|
What port is used for Terminal Services?
|
3389 |
|
Ports are used to....?
|
Block or allow traffic on routers and firewalls. |
|
Port scanner
|
is a tool used to query a host to determine which ports are open |
|
Fingerprinting attack
|
Sending specific protocol queries to a server and analyzing the responses. This can provide info on services running as well as OS info.
|
|
How do you increase security on switches?
|
- advanced.....limit MAC address to only 1 per port - maintain physical security of the switch |
|
STP? RSTP?
|
Rapid Spanning Tree Protocol |
|
Spanning tree protocol protects against?
|
Switching loops |
|
What is the benefit of a VLAN?
|
They can connect computers using a switch based on logical need instead of physical location. Subnets must be at the same location. |
|
VLAN
|
Virtual Local Area Network |
|
You can create multiple VLAN's with a single......?
|
switch |
|
Network Bridging
|
and event that occurs when a computer is connected to a network with 2 separate connections. |
|
Routers connect.......?
|
Multiple network segments to a single network and route traffic between segments. |
|
Router do not pass......?
|
Broadcasts |
|
Broadcast Domain
|
is a single network segments separated with a router. |
|
NIC
|
Network Interface Controller |
|
ACL's are rules implemented on a..... or a .......?
|
router or a firewall
|
|
Routers can filter packets base on.....?
|
IP addresses, ports, and some protocols.
|
|
What is "implicit deny" that is used on boundary routers?
|
all traffic is blocked unless a rule is created for the traffic to be allowed.
|
|
Firewalls filter traffic which way? Incoming or outgoing?
|
both
|
|
Host based Firewall
|
Is a firewall for a single host |
|
Deny any any
|
is the final firewall rule that denies any |
|
WAF
|
Web Application Firewall |
|
Web Application Firewall (WAF)
|
a firewall specifically designed to protect a web application such as a web server. IN addition to the network based firewall |
|
Web Security Gateways
|
Like WSA can filter content |
|
Network Address Translation (NAT)
|
a protocol that translates public IP address to Private and vise versa.
|
|
What is the function of NAT?
|
It hides addresses on the internal network from the internet. |