Shared Flashcard Set

Details

Comptia Security Chapter1
Chapter 1
141
Other
Graduate
12/01/2020

Additional Other Flashcards

 


 

Cards

Term
Port 20
Definition
FTP DATA
Port used by FTP commands sent to a client.
Term
Port 21
Definition
FTP Control
Port used by FTP commands sent to the server.
Term
Port 22
Definition
SSH
Port used by Secure Shell (SSH) to encrypt remote access communication. It typically is used as a secure replacement to Telnet.
Term
Port 23
Definition
Telnet
Port used by Telnet to remotely connect to a system such as a server or router.
Term
Port 25
Definition
SMTP
SMTP (Simple Mail Transfer Protocol) port used to send e-mail.
Term
Port 53
Definition
DNS
DNS (Domain Name Systems) zone transfers.
Term
Port 80
Definition
HTTP
HTTP (Hypertext Transfer Protocol) Internet protocol for delivering web pages to the browser.
Term
Port 110
Definition
POP3
POP3 (Post Office Protocol version 3) Port used by POP3, which is the internet protocol to read e-mail.
Term
Port 139
Definition
NetBios
Port used by the NetBios session service and is used to establish a connection between two systems for NetBios communication.
Term
Port 143
Definition
IMAP
IMAP (Internet Message Access Protocol) is a port that used by IMAP, which is newer Internet protocol to read e-mail.
Term
Port 443
Definition
HTTPS
HTTPS (Hypertext Transfer Protocol Secure) Port used for secure web traffic.
Term
Port 3389
Definition
RDP
Port used by Remote Desktop Protocol (RDP) for remote administration of a Windows System.
Term
SYN
Definition
The SYN flag is assigned to any packets that are part of the SYN phases of a three-way handshake.
Term
ACK
Definition
The acknowledgement flag acknowledges that a previous packet has been received.
Term
PSH
Definition
The push flag is designed to force data on an application.
Term
URG
Definition
The urgent flag is specifies that a packet is an urgent packet.
Term
FIN
Definition
The finish flag specifics that you would like to finalize, or end, he connection. This ends a TCP connection politely, like saying goodbye to end a phone call.
Term
RST
Definition
The reset flag is used to end a TCP conversation impolitely. This is like hanging up the phone without saying goodbye.
Term
Source Port
Definition
This 16-bit field identifies the port number of the sending system.
Term
Destination Port
Definition
This 16-bit field identifies the port number the packet is destined for on the destination system.
Term
Sequence Number
Definition
This 32-bit field identifies the sequence number of the packet.
Term
Acknowledgement Number
Definition
This 32-bit field identifies the packet that this packet is acknowledging.
Term
Offset
Definition
This 4-bit field indicates where the data begins.
Term
Reserved
Definition
This 6-bit field is always set to 0 and was designed for future use.
Term
Flags
Definition
This 6-bit field is where the TCP flags are stored. There is a 1-bit field for each of the flags mentioned earlier in this section.
Term
Window Size
Definition
This 16-bit field determines the amount of information that can be sent before an acknowledgment is expected.
Term
Checksum
Definition
This 16-bit field is used to verify the integrity of the TCP header.
Term
Urgent Pointer
Definition
This 16-bit field is used only if the URG flag is set and is a reference to the last piece of information that is urgent.
Term
Options
Definition
This field is a variable-length field tat specifies any additional settings that may be needed in the TCP header.
Term
Version
Definition
A 4-bit field that identifies the version of the IP being used, for example, IP4 or IP6
Term
Header Length
Definition
A 4-bit field that indicates the size of the IP header.
Term
Type of Service
Definition
An 8-bit field that indicates how the packet should be handled by the system. For example, if the Low Delay option is specified here, it means that the system should deal with the packet right away.
Term
Total Length
Definition
A 16-bit field that indicates the size of the IP header.
Term
Identification
Definition
A 16-bit field. Networks can only handle packets of a specific maximum size -- known as a Maximum Transmission Unit (MTU) -- so the system may break the data being sent into multiple fragments. This field uniquely identifies the fragment.
Term
IP Flags
Definition
A 3-bit field that specifics how fragments are going to be dealt with. For example, a More Fragments (MF) flag indicates more fragments are to come . Also, a bit known as Don't Fragment (DF) specifics not to fragment the packet.
Term
Fragment Offset
Definition
A13-bit field that specifies the order in which the fragments are to be put back together when the packets is assembled.
Term
Time to Live
Definition
(TTL) is an 8-bit field that specifies when the packet is to expire. The TT is a value that is decremented with every router the packet passes through. When TTL reaches 0, the packet is discarded.
Term
Protocol
Definition
An 8-bit field that specifies which layer-4 protocol (TCP or UDP) the packet should use.
Term
Header Checksun
Definition
A 6-bit field that verifies the integrity of the IP header.
Term
Source Address
Definition
A 32*bit field that represents the IP address of the sending system. This is how the receiving system knows where to send the reply message.
Term
Destination Adrress
Definition
A 32-bit field that represents the IP address of the system the packet is destined for.
Term
IP Options
Definition
A variable-length field that is used to specify any other settings in the IP header.
Term
ICMP Type 0
Definition
Echo reply message
Term
IMCP Type 0-3
Definition
0 - Destination network
1 - Destination host unreachable
2 - Destination protocol unreachable
3 - Destination port unreachable
Term
ICMP Type 8
Definition
Echo request message
Term
ICMP
Definition
Internet Control Message Protocol
Term
ICMP Type
Definition
An 8-bit field that indicates the ICMP type being used.
Term
ICMP Code
Definition
An 8-bit field indicating the ICMP code being used.
Term
ICMP Checksum
Definition
a 16*bit field that is used to verify the integrity of the ICMP header.
Term
ICMP Other
Definition
A field that stores any data within the ICMP header. For example, operating system place part of the alphabet in this field for ech request messages.
Term
ARP
Definition
Address Resolution Protocol
Term
ARP is responsible for ..
Definition
Converting an IP address (layer-3 address) to the physical MAC address (layer-2 address).
Term
HTTP
Definition
Hypertext Transfer Protocol
Term
TCP Port 80
Definition
HTTP
Term
HTTPS
Definition
Hypertext Transfer Protocol Secure
Term
SSL
Definition
Secured Sockets Layer
Term
TLS
Definition
Transport Layer Security
Term
TCP Port 443
Definition
HTTPS
Term
DNS
Definition
Domain Name Server
Term
FQDNs
Definition
Fully Qualified Domain Name Server
Term
TCP / UDP Port 53
Definition
DNS Queries
Term
SMTP
Definition
Simple Mail Transfer Protocol
Term
TCP / UDP Port 25
Definition
Port used for sending e-mail onto the internet.
Term
TCP Port 110
Definition
Port used for POP3 clients to download e-mail .
Term
POP3 and IMAP are ...
Definition
Internet protocols for reading (receiving)e-mail.
Term
IMAP4
Definition
Internet Message Access Protocol version 4, more advanced e-mail receiving program.
Term
POP3
Definition
Simply e-mail receiving program.
Term
SMTP is ..
Definition
Internet protocol for sending e-mails.
Term
TCP Port 143
Definition
POP3 and IMAP
Term
SNMP
Definition
Simple Network Transport Protocol
Term
UDP Port 161
Definition
SNMP
Term
FTP
Definition
File Transfer protocol
Term
FTP is a ....
Definition
TCP/IP protocol that exists to upload and download files.
Term
TCP Port 21 / 20
Definition
FTP
21 -- Carries FTP commands from one system to another
22 -- allows transfer between hosts
Term
TFTP
Definition
Trivial File Transfer Protocol
Term
UDP Port 69
Definition
TFTP uses it from a TFTP server.
Term
SFTP
Definition
Secure File Transfer Protocol
Term
TCP Port 23
Definition
Telnet
Term
SSH
Definition
Secure Shell
Term
TCP Port 22
Definition
SSH
Term
SCP
Definition
Secure Copy Protocol
Term
NTP
Definition
Network Time Protocol
Term
PDC
Definition
Primary Domain Controller
Term
LDAP
Definition
Lightweight Directory Access Protocol
Term
TCP / IP Port 389
Definition
LDAP by default
Term
NetBios
Definition
Network Basic Input/Output System
Term
API
Definition
Application Interface Program
Term
iSCSI
Definition
Internet Small Computer System Interface
Term
FCoE
Definition
Fiber Channel Over Ethernet
Term
32-Bit Address Scheme
Definition
IPv4
Term
128-Bit Address Scheme
Definition
IPv6
Term
IPv6 Loopback Address
Definition
0:0:0:0:0:0:0:1 or ::1 or ::
Term
IPv6 Unicast
Definition
Used for one-to-one communication.
Term
IPv6 Multicast
Definition
Used to send data to a group of systems.
Term
IPv6 Anycast
Definition
Sent to any system on the any cast system.
Term
IPv6 Global Unicast
Definition
A public IPv6 address that is routable on the Internet. The address assigned to the host must be unique on the Internet.
Term
IPv6 Site-Local Unicast
Definition
A private address (FEC0), the address can not be used outside the system or the Internet.
Term
IPv6 Link-Local Unicast
Definition
A self-assigned address (FE80), that can only tal to other nodes on a link.
Term
MLD
Definition
Multicast Listener Discovery replaces IGMP (Internet Group Message Protocol) for Multicast communication.
Term
ND
Definition
Neighbor Discovery replaces ARP (Address Resolution Protocol)
Term
Sending a bogus MAC address information to the switch to cause the switch to fail-open.
Definition
MAC Flooding
Term
A communication boundary
Definition
VLAN
Term
A layer-3 device that sends data from one network to another.
Definition
Router
Term
A laer-2 device that filters traffic based on MAC addresses.
Definition
Switch
Term
A device that is used to split the workload between multiple servers.
Definition
Load balancer
Term
A cable type that carries pulses of light.
Definition
Fiber-optic
Term
A cable type that has copper wires divided into pairs.
Definition
UTP (Unshielded Twisted Pair)
Term
Controlling which MAC addresses can connect to the switch.
Definition
Port Security
Term
Class A Subnet range and mask
Definition
Range = 0 - 127
Mask = 255.0.0.0
Term
Class B Subnet range and mask
Definition
Range = 128 - 191
Mask = 255.255.0.0
Term
Class C Subnet range and mask
Definition
Range = 192 - 223
Mask = 255.255.255.0
Term
Class D Subnet range
Definition
Range = 224 - 239
Term
Class E range
Definition
Range = 240 - 247
Term
Private address addresses
Definition
10.0.0.0 - 10.255.255.255
172.0.0.0 - 172.255.255.255
192.0.0.0 - 192.255.255.255
Term
10.0.40.10 = Valid or Invalid? Why?
Definition
Invalid (Private address)
Term
127.54.67.89 = Valid or Invalid? Why?
Definition
Invalid (Loopback address)
Term
131.107.34.0 = Valid or Invalid? Why?
Definition
Valid (Class B address)
Term
45.12.0.0 = Valid or Invalid? Why?
Definition
Valid (Class A address)
Term
216.83.11.255 = Valid or Invalid? Why?
Definition
Invalid (Class C address on last octet)
Term
63.256.4.78 = Valid or Invalid? Why?
Definition
Invalid (Class A address, Octet went over 255 range)
Term
200.67.34.0 = Valid or Invalid? Why?
Definition
Invalid (Class C address set at 0 octet)
Term
131.107.23.255
Definition
Valid (Class B address)
Term
Converts FQDNs to IP addresses
Definition
DNS
Term
Responsible for error reporting and status information
Definition
ICMP
Term
Protocol used to download files
Definition
FTP
Term
Responsible for network monitoring and management
Definition
SNMP
Term
Coverts logical address to physical address
Definition
ARP
Term
Protocol used to secure web traffic
Definition
HTTPS
Term
Responsible for unreliable delivery
Definition
UDP
Term
Responsible for logical addressing and routing
Definition
IP
Term
Responsible for reliable delivery
Definition
TCP
Term
Which feature of a network switch allows the network administrator to capture network traffic when monitoring or troubleshooting the network?
#Port Security
#VLAN
#Collusion Domain
#Port Mirroring
Definition
Port Mirroring
Term
Your manager has been reading about hackers capturing network traffic in a switched network environment and ahs asked you to explain how it is possible that hackers can do this. Which technique will you describe in your explanation?
#ARP Poisoning
#Port Mirroring
#Port Security
#MAC Flooding
#VLANs
Definition
ARP Poisoning and MAC Flooding
Term
Your company has a web application that seems to be running slowly. What cab be done to improve the performance of the application?
#Install a proxy server
#Install a load balancer
#Configure the web site in a VLAN
#Configure port security
Definition
Install a load balancer
Term
Which of the following devices could be used to limit which web sites users on the network can visit?
#Router
#Load balancer
#Proxy Server
#Cat 5e
Definition
Proxy Server
Term
Which TCP/IP protocol is used to convert the IP address to a MAC address?
#ARP
#TCP
#ICMP
#UDP
Definition
ARP (Address Resolution Protocol)
Term
Which ICMP type is used to identify echo request messages?
#0
#4
#8
#9
Definition
8
Term
Which of the following identifies the stages of the three-way handshake?
#ACK/SYN,ACK,SYN
#SYN,SYN/ACK,ACK
#ACK,SYN,ACK/SYN
#SYN,ACK,ACK/SYN
Definition
SYN,SYN/ACK,ACK
Term
Which of the following represent ports used by secure TCP applications? (Choose all that apply)
#23
#22
#80
#143
#443
Definition
22 and 443
Term
You are the network administrator for a small company, and you wish to follow security best practices that relate to the switch. Which of the following should you do? (Choose all that apply).
#Disable unused ports
#Enable all unused ports
#Configure port security
#Disable port security
#Enable console password
#Disable console password
Definition
Disable unused ports, Configure port security, and Enable Console password.
Term
What popular feature of a switch allows you to create communication boundaries between systems connected to the switch?
#Arp Poisoning
#Port Mirroring
#Port Security
#MAC Flooding
#VLANs
Definition
VLANs
Supporting users have an ad free experience!