• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
MAC means
Media Access Control---- for MIC's
What port does SSH use?
SSH uses port 22
What port does SSL use for HTTP? For LDAP?
443 and 636
What port does SNMP use?
161
What port does DNS use?
53
What's a protocol that's a file transfer protocol using SSH?
Secure FTP, using port 22
What ports does NetBIOS use?
137, 138, and 139
IPsec uses Internet Key Exchange over what port?
500
IPsec tunnels: What's the difference between AH and ESP? When would you use them?
AH is used in transport mode and doesn't encrypt the entire packet and is used internally.

Encapsulating Security Payload(ESP) in tunnel mode encapsulates the entire packet and provides confid., integrity, and auth. Should be used in remote VPN solutions
Define Change management
it's the process or policy in place when someone wants to make a change to a system or network.
1. ensures chagnes to IT ssytems do not result in outages
2. Provide an accounting stgructure or methos to document all changes.
Describe 6 step process for https web traffic. Asymmetric vs Symmetric.
1. Client requests from web server
2. Web server sends its certificate
3. Client creates a secret, encrypts secret with server's public key.
4. Client sends the encrypted secret to server
5. Server decrypts the secret with its private key
6. Session is then established via symmetric encryption (which is less taxing) with the shared secret.