• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/34

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

34 Cards in this Set

  • Front
  • Back

ICMP

Internet Control Message Protocol.


Used for testing connectivity for things like ping. Used in DDOS attacks so disabled frequently.

ARP

address resolution protocol.


Resolves IPv4 to MAC address.


ARP poisoning is tricking giving clients false MAC addresses.

NDP

neighborhood discovery protocol.


Used for IPv6 and does what ARP does.

SSH

encryption protocol on TCP port 22. (SCP, SFTP)





SSL

encryption protocol




TCP

TLS

encryption protocol,


designed to replace SSL

IPsec

internet protocol security.


Protects VPN traffic in tunneling.


Includes authentication header and ESP (encapsulating Security Payload) over port udp 500.

FTPS

File Transfer Protocol Secure.


Uses SSL over ports 989 and 990, uses ssl

FTP

uses TCP ports 20 and 21





TFTP

Trivial File Transfer Protocol. Uses UDP port 69.





SNMP

Simple network management protocol. Port 161 and 162 for SNMP trap

LDAP

port 389 (unencrypted)


port 636 via TLS

NetBios

ports 137, 138, 139




Mostly UDP

Microsoft SQL Server

TCP port 1433





RDP

Remote Desktop Protocol




TCP/UDP port 3389

SMTP

simple mail transfer protocol




TCP port 25 and port 465 via TLS



POP3

post office protocol v.3




TCP port 110 and 995 via TLS





IMAP4

internet message access protocol v4




TCP port 143 and 993 via TLS





Subnetting

dividing classful network into two or more smaller networks

ACL

Access control list.


Set on network level device and firewalls. Control based on networks, subnets, IP addresses, ports, and protocols.



DNS

port UDP 53 for resolution queries and TCP port 53 for zone transfers

A

host record. Used in DNS to resolve name to IPv4 address

AAAA

host record for IPv6

PTR

opposite of host record, resolves ip address to name

Hub vs Switch

Hubs are dumber, broadcast traffic to everyone. Switches are unicast and safer.

STP and RSTP

spanning tree protocol and Rapid STP




used to prevent switching loop problems

VLAN

vlans logically group different computer together

802.1x

port security protocol.


Used on both wireless and wired networks.


Can be used with Radius to ensure only authenticated users.


Protection against rogue access devices.

WAF

web application firewall.


Can inspect content for things like no operation commands (for buffer overflow attacks) and code for XSS attacks.


Used in addition to network firewall.

DMZ

buffer zone between intranet and internet.


Can host internet facing servers so access to internal network avoided.

NAT, DNAT

NAT is encompassing term for assigning public IP addresses to private IP addresses and vice versa.




DNAT is dynamic and assigns IP addresses based on availability (multiple public)



proxy server

Forwards client requests. Increases performance through caching and enhances security via URL filtering

Secure Zone Transfers

These are used to prevent the mapping of IP addresses of an internal network

Security advantage of IPv6

use of IPsec