Term
| ________ is a worldwide system of connected computer networks. Connected computers use the _______ protocol suite. |
|
Definition
|
|
Term
The Internet is not controlled by any one governing body except in two technical aspects.
First, the IP classification system is defined by the _______. Second, DNS is defined by the ________. Otherwise, the Internet is “controlled” by various ISPs and network providers depending on the location. |
|
Definition
Internet Assigned Numbers Authority (IANA)
Internet Engineering Task Force (IETF) |
|
|
Term
| ________ is an enormous system of interlinked hypertext documents that are accessed with a web browser. _______ is the current stage. |
|
Definition
World Wide Web (WWW)
Web 2.0 |
|
|
Term
| ________ is a private computer network that an organization implements to share data with employees. |
|
Definition
Intranet
TCP/IP protocols, such as HTTP and FTP, and email protocols, such as POP3 and SMTP, are all utilized in the same way that they are on the Internet. Again, the only difference is this is a privatized version of the Internet, and any company can have one. |
|
|
Term
| ________ is a private computer network that extends to users outside a company in order to share data. |
|
Definition
|
|
Term
| ________ a connection between two or more computers or devices that are not on the same private network. In effect creating a tunnel through LANs and WANs connecting the 2 devices together. |
|
Definition
| VPN (Virtual Private Network) |
|
|
Term
| ________ has widespread support with nearly all versions of Windows. It uses the Microsoft Point‐to‐Point Encryption (MPPE) protocol with RC4 (128‐bit key) to protect data that is in transit. |
|
Definition
Point‐to‐Point Tunneling Protocol (PPTP)
PPTP provides confidentiality, it prevents data from being viewed, but does not provide data integrity. It doesn't protect the packet from being intercepted and modified.
Uses Port 1723 |
|
|
Term
| ________, is a type of tunneling protocol that requires that the computers mutually authenticate themselves to each other. |
|
Definition
Layer 2 Tunneling Protocol over IPsec (L2TP/IPsec)
Uses UDP port 1701 |
|
|
Term
| _________ is the native authentication protocol for Windows Server 2003 and later and provides the easiest way to secure VPN connections in a domain‐based environment. It provides mutual authentication, anti‐replay, and non-repudiation just like digital certificates. |
|
Definition
|
|
Term
| _________, is a type of tunneling protocol that works by sending PPP or L2TP traffic through an SSL 3.0 channel |
|
Definition
Secure Socket Tunneling Protocol (SSTP)
SSTP uses SSL and TCP port 443 to relay traffic. It is designed for remote access VPNs; works over IPv4 and IPv6 networks; and traverses NAT, firewalls, and web proxies. It uses a generic port that is rarely blocked by firewalls. It uses PPP for user authentication and RC4/AES for data confidentiality. |
|
|
Term
| VPN Reconnect also known as ________, is a feature introduced with Routing and Remote Access Service (RRAS) in Windows Server 2008 R2 and Windows 7. |
|
Definition
Internet Key Exchange version 2 (IKEv2)
It differs from other VPN protocols in that it will not drop the VPN tunnel associated with the session. Its designed for remote access VPNs. It works well over IPv4 and IPv6 networks and traverses NAT. It also supports user or machine authentication via IKEv2 and uses 3DES and AES for data confidentiality. IKEv2 uses UDP port 500. |
|
|
Term
| ________, also known as pure packet filtering, does not retain memory of packets that have passed through the firewall. Due to this it can be vulnerable to IP spoofing attacks. |
|
Definition
|
|
Term
| A firewall running ________, is normally not vulnerable to IP Spoofing because it keeps track of the state of network connections by examining the header in each packet. |
|
Definition
Stateful Packet Inspection (SPI)
This function operates at the Network Layer of the OSI model. |
|
|
Term
| _______, filters traffic per ports (TCP or UDP). This can be done in three ways: by way of basic endpoint connections, by matching incoming traffic to the corresponding outbound IP address connection, or by matching incoming traffic to the corresponding IP address AND port |
|
Definition
|
|
Term
| ________, supports address and port translation and checks if they type of application traffic is allowed. |
|
Definition
| Application-level Gateway (ALG) |
|
|
Term
| ________ works at the Session Layer of the OSI model, when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. |
|
Definition
Circuit-level Gateway
Circuit‐level gateways hide information about the private network, but they do not filter individual packets. |
|
|
Term
| __________ acts as an intermediary between the LAN and the Internet. Can also cache pages in order to increase speed of commonly accessed websites. |
|
Definition
|
|
Term
| ________ attempts to detect malicious network activities, for example port scans and DoS attacks, by constantly monitoring network traffic, then reports any issues that it finds to a network administrator as long as it is configured properly. |
|
Definition
| Network Intrusion Detection System (NIDS) |
|
|
Term
| _________ is designed to inspect traffic and based on the configuration or security policy, it can remove, detain, or redirect malicious traffic in addition to simply detecting it. |
|
Definition
| Network Intrusion Prevention System (NIPS) |
|
|
Term
| ________ is a group of computers, that exchange data, usually confined to a small geographic area. |
|
Definition
|
|
Term
| ________ is the device that enables the sending and receiving of data to and from a computer. |
|
Definition
| Network Adapter aka. Network Interface Card (NIC) |
|
|
Term
| ________ means the network card can send and receive data simultaneously |
|
Definition
|
|
Term
| __________ is a set of rules that govern the transmission of data between network adapters and various central connecting devices. All network adapters and central connecting devices must be compatible in order to communicate with each other. |
|
Definition
|
|
Term
| __________ is when information is sent to one host only. This reduces network traffic greatly, and helps with packet loss and duplicates |
|
Definition
|
|
Term
| what is the loopback address for a computer? What commands are used to ping? |
|
Definition
127.0.0.1
ping localhost ping loopback ping 127.0.0.1 |
|
|
Term
| ________ acts as the central connecting device for the wireless network and allows laptops, PDAs and handheld computers to communicate with each other. |
|
Definition
| Wireless Access Point (WAP) |
|
|
Term
| __________ is a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location |
|
Definition
|
|
Term
| __________ is a small network that is set up separately from a company’s private local area network and the Internet. It is called this because it is usually on the edge of the LAN |
|
Definition
Perimeter Network aka Demilitarized Zone (DMZ)
DMZ has become the more popular way to reference it. |
|
|
Term
| The configuration for a DMZ that has it situated between two firewall devices. |
|
Definition
| Back-to-back configuration |
|
|
Term
| When the DMZ is attached to a separate connection of the company firewall. So, the firewall would have three connections: one to the company LAN, one to the DMZ, and one to the internet. |
|
Definition
| 3-leg perimeter configuration |
|
|
Term
| __________ define the physical connections of hosts in a computer network. |
|
Definition
|
|
Term
| When a __________ topology is used, each computer is individually wired to a central connecting device with twisted-pair cabling. |
|
Definition
|
|
Term
| In a ________ topology, every computer connects to every other computer; no central connecting device is needed. |
|
Definition
|
|
Term
| In a ________ topology, each computer is connected to two other computers in a circular path. |
|
Definition
|
|
Term
| The _________ network architecture sends data logically in a ring fashion, however the computers are physically connected in a star fashion. |
|
Definition
|
|
Term
| _________ topology describes how the data is actually sent from one computer to the next. |
|
Definition
|
|
Term
| __________ is a dynamic protocol that uses distance-vector routing algorithms to decipher which route to send data packets. |
|
Definition
| Routing Information Protocol (RIP) |
|
|
Term
| __________ is a link-state protocol that monitors the network for routers that have a change in their link-state, meaning whether they were turned off or on or restarted. |
|
Definition
| Open Shortest Path First (OSPF) |
|
|
Term
| __________ refers to the networks ability to use maximum bandwidth while reducing latency, error rates, and downtime. |
|
Definition
|
|
Term
The maximum throughput of a T1 line. The maximum throughput of a T3 line. |
|
Definition
|
|
Term
| ________ is a digital technology developed to combat the limitations of PSTN. Users can send data, talk on the phone, and fax simultaneously from one line. |
|
Definition
| Integrated Services Digital Network (ISDN) |
|
|
Term
| __________ is a standard for transmitting data on optical fiber cables at a rate of around 100 Mbps. |
|
Definition
| Fiber Distributed Data Interface (FDDI) |
|
|
Term
| _________ is a family of technologies that provide data transmissions over local telephone networks. |
|
Definition
| Digital Subscriber Lines (DSL) |
|
|
Term
| __________ is used to send packets from one network to another network. |
|
Definition
|
|
Term
| __________ cable is used to connect like devices to each other; for example, a computer to another computer or a switch to another switch. |
|
Definition
|
|
Term
| __________ cable is the most common type of patch cable, and is the type that you would use to connect a computer to a central connecting device like a switch. |
|
Definition
|
|
Term
| When a signal degrades as it runs through a wire, you have _________. |
|
Definition
|
|
Term
| What is the most common adapter or connector used to connect a computer to a wired network. |
|
Definition
|
|
Term
| To test a cable, you would use a _________. |
|
Definition
|
|
Term
| You need to connect a twisted-pair cable to the back of a patch panel. What tool would you use. |
|
Definition
|
|
Term
What are the speeds of the following Cable Types.
1. Category 3 2. Category 5 3. Category 5e 4. Category 6 5. Category 7A |
|
Definition
1. 10 Mbps
2. 100 Mbps
3. 100 Mbps and Gigabit networks
4. Gigabit networks
5. 10 Gigabit networks |
|
|
Term
| What are two types of interference for signals traveling along a wire. |
|
Definition
Electormagnetic Interference (EMI) Radio Frequency Interference (RFI) |
|
|
Term
| What is it called when a signal transmitted on one copper wire or pair of wires creates an undesired effect on another wire or pair of wires. |
|
Definition
|
|
Term
| Cables that are installed inside walls or above drop ceilings where sprinkler systems cannot access in the case of a fire should be __________ or low smoke rated. |
|
Definition
|
|
Term
| __________ transmits light instead of electricity. The light (photons) is transmitted over glass and plastic. |
|
Definition
|
|
Term
| __________ is a cable with an optical fiber that is meant to carry a single ray of light: one ray of light, one mode. This type of cable is normally used for longer distance runs, generally 10 km, and up to 80 km. |
|
Definition
| Single-mode fiber optic (SMF) |
|
|
Term
| __________ is a cable with a larger fiber core, capable of carrying multiple rays of light. This type of cable is used for shorter distance runs, up to 600 meters. Though much shorter than single‐mode fiber runs, this is still six times the length of twisted‐pair cable runs. |
|
Definition
| Multi-mode fiber optic (MM) |
|
|
Term
| ________ acts as the central connecting device for the wireless network and allows laptops, PDAs and handheld computers to communicate with each other. |
|
Definition
| Wireless Access Point (WAP) |
|
|
Term
| _________ is used to extend the coverage of a wireless network. |
|
Definition
|
|
Term
| Similar to a wireless repeater, a __________ can connect different 802.11 standards together. |
|
Definition
|
|
Term
| __________, which is the EM field that is generated by a network cable or network device that can be manipulated to eavesdrop or steal data. |
|
Definition
|
|
Term
Max Data transfer rate and frequency for the following 802.11 standards.
1. 802.11a 2. 802.11b 3. 802.11g 4. 802.11n |
|
Definition
1. 54 Mbps at 5GHz
2. 11 Mbps at 2.4 GHz
3. 54 Mbps at 2.4 GHz
4. 600 Mbps (300 Mbps Typical) at 5 or 2.4 GHz |
|
|
Term
| What is the least secure wireless encryption protocol and which is the most secure. |
|
Definition
WEP (Wired Equivalent Privacy) Least
WPA2 (Wi-Fi Protected Access) Most |
|
|
Term
| __________ is a Port-based Network Access Control (PNAC) it provides strong authentication to devices that want to connect to the WLAN. |
|
Definition
|
|
Term
| The two primary ways to connect to a wireless network are __________ and _________. |
|
Definition
Infrastructure mode - Uses WAP and SSID to connect
ad hoc mode - Also referred as P2P as all clients communicate directly with eachother, there is no base (WAP) |
|
|
Term
|
Definition
|
|
Term
| __________ is a reference model used to define how data communications occur on computer networks. |
|
Definition
Open Systems Interconnection reference model (OSI)
The OSI model was created as a set of seven layers, each of which houses different protocols within one of several protocol suites, the most common of which is TCP/IP. The OSI model categorizes how TCP/IP transactions occur. It is invaluable when it comes to installing, configuring, maintaining, and, especially, troubleshooting networks. |
|
|
Term
| What are the 7 Layers of the OSI model |
|
Definition
Layer 1 - Physical Layer 2 - Data Link Layer 3 - Network Layer 4 - Transport Layer 5 - Session Layer 6 - Presentation Layer 7 - Application
Mnemonic - Please Do Not Throw Sausage Pizzas Away |
|
|
Term
| Layer 1: Physical layer: This is the physical and electrical medium for data transfer. It includes but is not limited to cables, jacks, patch panels, punch blocks, hubs, and multistation access units (MAUs). It is also known as the physical plant. If you can touch it, it is part of the Physical layer.
The unit of measurement used on this layer is bits.
|
|
Definition
| Layer 2: Data Link layer: This layer establishes, maintains, and decides how transfer is accomplished over the Physical layer. Devices that exist on the DLL are network interface cards, bridges, WAP, layer 2 switches and network adapters. Just about any device that makes a physical connection to the network and can move data is on the Data Link layer.
The unit of measurement used on this layer is frames.
|
|
|
Term
| Layer 3: Network layer: The Network layer is dedicated to routing and switching information between different networks, LANs, or internetworks. This can be on the LAN or WAN. Devices that exist on the Network layer are routers and IP switches. Now we are getting into the logical addressing of hosts.
Now you can see that a typical computer really has two addresses: a physical or hardware‐based address, such as a MAC address, and a logical or software‐based address, such as an IP address. Part of the trick in networking is to make sure the two get along together!
The unit of measurement used on this layer is packets.
|
|
Definition
| Layer 4: Transport layer: This layer ensures error‐free transmission between hosts through logical addressing. Therefore, it manages the transmission of messages through Layers 1 through 3. The protocols that are categorized by this layer break up messages, send them through the subnet, and ensure correct reassembly at the receiving end, making sure there are no duplicates or lost messages. This layer contains both connection‐oriented and connectionless systems. Inbound and outbound ports are controlled by this layer. When you think ports, think the Transport layer.
The unit of measurement used on this layer is sometimes referred to as segments, or messages. All layers above this use the terms data and messages.
|
|
|
Term
| Layer 5: Session layer: This layer governs the establishment, termination, and synchronization of sessions within the OS over the network and between hosts-—for example, when you log on and log off. It is the layer that controls the name and address database for the OS or NOS. NetBIOS (Network Basic Input/Output System) works on this layer. |
|
Definition
| Layer 6: Presentation layer: This layer translates the data format from sender to receiver in the various operating systems that may be used. Concepts include code conversion, data compression, and file encryption. Redirectors work on this layer, for example, mapped network drives that enable a computer to access file shares on a remote computer. |
|
|
Term
| Layer 7: Application layer: This is where message creation—and, therefore, packet creation—begins. DB access is on this level. End‐user protocols, such as FTP, SMTP, Telnet, and RAS, work at this layer. This layer is not the application itself, but the protocols that are initiated by this layer. |
|
Definition
|
|
Term
| _________ is the most common type of switch that is used on a LAN. They are hardware based and they use the MAC address of each host computer’s network adapter when deciding where to direct frames of data; every port on the switch is mapped to the specific MAC address of the computer that physically connects to it. |
|
Definition
Layer 2 Switch
Layer 2 Switches do not normally modify frames as they pass through the switch. Can also allow for a VLAN. |
|
|
Term
| __________ determines paths for data using logical addressing (IP addresses) instead of physical addressing (MAC addresses), they are very similar to routers. Can be managed by utilizing the Simple Network Management Protocol (SNMP). |
|
Definition
Layer 3 Switch
Layer 3 switches forward packets, whereas Layer 2 forward frames. |
|
|
Term
| __________ switches are the least expensive and are used in homes and Small Office/Home Office environments. You just connect AC power to the switch and connect your network devices. |
|
Definition
|
|
Term
| __________ switches include more advanced features, including supporting Spanning Tree Protocol, port mirroring, setting port bandwidth, and creating and modifying virtual LANs. |
|
Definition
|
|
Term
| Ports in the 0-1023 range are known as _________, and defines commonly used protocols; FTP, SMTP, and HTTP are some examples. |
|
Definition
|
|
Term
| Ports above 29,152 are known as __________. |
|
Definition
|
|
Term
What ports do the following use:
1. FTP 2. Telnet 3. SMTP 4. HTTP 5. POP3 |
|
Definition
1. File Transfer Protocol 21
2. TErminaL NETwork -23
3. Simple Mail Transfer Protocol -25
4. Hypertext Transfer Protocol -80
5. Post Office Protocol Version 3 -110 |
|
|
Term
| What is the difference between Layer 2 and Layer 3 switches |
|
Definition
| Switches reside on the Network layer. A Layer 3 switch differs from a Layer 2 switch in that it determines paths for data using logical addressing (IP addresses) instead of physical addressing (MAC addresses). Layer 3 switches are very similar to routers |
|
|
Term
|
Definition
| netstat (the original command, shows basic connections)
netstat –a (shows in‐depth TCP and UDP connections)
netstat –an (shows TCP and UDP connections numerically)
arp -a (displays MAC addresses of other hosts that your computer has recently connected to) |
|
|
Term
| What are the Layers of the TCP model |
|
Definition
Layer 1: Data Link layer (aka Link layer)
Layer 2: Network layer (aka Internet layer)
Layer 3: Transport layer
Layer 4: Application layer - Comprises the OSI Application, Presentation and Session Layers. |
|
|
Term
| TCP/IP protocol that is connection-oriented |
|
Definition
Transmission Control Protocol (TCP)
Example would be a web browser. Using TCP ensures that data gets to its final destination. If a packet is lost along the way, it is resent until the destination computer acknowledges delivery or ends the session |
|
|
Term
| TCP/IP protocol that is connectionless |
|
Definition
User Datagram Protocol (UDP)
Example would be streaming media. But with streaming media, we are either watching or listening in real time. So, if a packet is lost, we don’t really care because that time frame of the video or music has already passed. |
|
|
Term
| If the binary digit is a 0, it is ________, meaning the corresponding IP address bit is part of the Host ID. |
|
Definition
|
|
Term
| If the binary digit is a 1, it is ________, meaning the corresponding IP address bit is part of the Network ID. |
|
Definition
|
|
Term
| __________ is the act of dividing a network into smaller logical subnetworks. |
|
Definition
|
|
Term
| _________ is the first IP address of the device that a client computer will look for when attempting to gain access outside the local network. |
|
Definition
|
|
Term
| If a Windows client cannot get an IP address from a DHCP server, and has not been configured statically, it will auto‐assign 169.254.0.0 this is called _______. |
|
Definition
APIPA (Automatic Private IP Addressing) |
|
|
Term
| ________ is a way of allocating IP addresses and routing internet Protocol packets. It was intended to replace classful IP addressing to slow the exhaustion of IPv4 addresses. |
|
Definition
CIDR (Classless Interdomain Routing) |
|
|
Term
| The process of modifying an IP address while it is in transit across a router, computer, or similar device. |
|
Definition
NAT (Network Address Translation) |
|
|
Term
| IP resides on which layer of the OSI model. |
|
Definition
|
|
Term
| What is the default subnet mask and IP Range for Class A, B, and C and what is the IP range for D and E. |
|
Definition
Class | IP Range | Default Subnet Mask
A | 0-127 | 255.0.0.0 B | 128-191 | 255.255.0.0 C | 192-223 | 255.255.255.0 D | 224-239 | Multicasting E | 240-255 | |
|
|
Term
| ________ allows a Network to be divided into different Subnets and make an IP Network to appear to be a different Class |
|
Definition
VLSM (Variable-Length Subnet Masking) |
|
|
Term
| Link-local addresses in IPv6 can be broken down into two types they are |
|
Definition
Windows auto-configured address start with - FE80, FE90, FEAO, FEBO Loopback Address which is know as ::1 |
|
|
Term
| FE80::5efe:10.0.0.2%2 is an example of what |
|
Definition
|
|
Term
| ________ is when there is two internet Protocol software implementations in an operating system, one for IPv4 another for IPv6 |
|
Definition
|
|
Term
|
Definition
|
|
Term
| The __________ command displays information pertaining to your network adapter, namely TCP/IP configurations. |
|
Definition
|
|
Term
| The __________ command is used to test connectivity to other hosts; it tells you by way of command‐line results whether a remote host is “alive” on the network |
|
Definition
|
|
Term
| __________ provides information and statistics about protocols in use and current TCP/IP network connections on a local host. |
|
Definition
| Netstat
(The name derives from the words network and statistics.) |
|
|
Term
| netstat –a This displays TCP and UDP connections.
netstat –an
This displays TCP and UDP connections in numeric format
netstat –r
This displays the route table and produces the same results as executing route print, which is covered in more depth later. |
|
Definition
|
|
Term
| The __________ command is used to show NetBIOS over TCP/IP statistics for local and remote computers. |
|
Definition
|
|
Term
| __________ command shows the paths to a destination on another network, it does this by showing each hop and displays the host name and IP address along with the amount of time for each hop. |
|
Definition
|
|
Term
| __________ command is similar to tracert in the information displayed, but will also show you the degree of packet loss |
|
Definition
|
|
Term
| __________ displays information about DNS names and their corresponding IP addresses, and can be used to diagnose DNS servers |
|
Definition
|
|
Term
| __________ is used to take control of a remote computer via the command line. |
|
Definition
|
|
Term
| __________ is an error-reporting protocol, network devices like routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets. |
|
Definition
| Internet Control Message Protocol (ICMP) |
|
|
Term
| Dynamic Host Configuration Protocol (DHCP) allows properly configured client computers to obtain IP addresses automatically from a DHCP server. This is done so that a network administrator does not have to manually configure IP addresses on all of the computers on the network individually. The DHCP server takes care of this task quickly and automatically. |
|
Definition
| DHCP sessions use a four‐step process known as DORA. The four steps are:
Discovery: The client computer broadcasts out to the network in order to find a DHCP server.
Offering: The DHCP server sends out a unicast “offering” of an IP address to the client computer.
Request: The client broadcasts to all servers that it has accepted the offer.
Acknowledge: The DHCP server sends a final unicast to the client, including the IP information that the client will use.
|
|
|
Term
| Which two ports does DHCP use |
|
Definition
|
|
Term
| Which tool allows you to access a machine remotely, including programs, the desktop, and the command prompt? |
|
Definition
|
|
Term
| __________ is a network service in Windows servers, including Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016. It allows an administrator to configure dial‐up remote access servers, VPN servers, IP routing, and NAT. |
|
Definition
| Routing and Remote Access Service (RRAS) |
|
|
Term
| Internet Protocol Security (IPsec) is a protocol within the TCP/IP suite that encrypts and authenticates IP packets. It is designed to secure any application traffic because it resides on the Network layer (or Internet layer as TCP/IP programmers refer to it). |
|
Definition
| There are three main protocols that IPsec uses to perform its necessary functions:
Security association (SA): This generates the encryption and authentication keys that are to be used by IPsec.
Authentication header (AH): This provides connectionless integrity and the authentication of data. It also provides protection versus replay attacks.
Encapsulating Security Payload (ESP): This provides the same services as AH but also provides confidentiality when sending data.
|
|
|
Term
| __________ is a worldwide service that resolves host names to IP addresses. This facilitates proper communication between computers. |
|
Definition
|
|
Term
| __________ is a service that resolves NetBIOS names to IP addresses. It is the Microsoft version of the NetBIOS Name Service (NBNS) combined with a name server. |
|
Definition
| Windows Internet Naming Service (WINS) |
|
|
Term
| __________ is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. |
|
Definition
| Network Address Translation (NAT) |
|
|
Term
| __________ is a local file stored on the computer that translates domain names or NetBIOS names into an IP addresses. |
|
Definition
|
|
Term
| ___________ file is used to enable Domain Name Resolution under Windows when other methods, such as WINS, fail. It is used in conjunction with workgroups and domains. |
|
Definition
|
|
Term
| _________ is used to connect to a terminal server. |
|
Definition
| Remote Desktop Connection (RDC) |
|
|
Term
|
Definition
Port 21
File Transfer Protocol |
|
|
Term
| What port does telnet use? |
|
Definition
|
|
Term
|
Definition
Port 25
Simple Mail Transfer Protocol |
|
|
Term
|
Definition
Port 53
Domain Name System |
|
|
Term
| What ports do HTTP and HTTPS use? |
|
Definition
HTTP uses Port 80
HTTPS uses Port 443
Hypertext Transfer Protocol |
|
|
Term
|
Definition
Port 110
Post Office Protocol Version 3 |
|
|
Term
|
Definition
Port 1701
Layer 2 Tunneling Protocol |
|
|
Term
|
Definition
Port 1723
Point-to-Point Tunneling Protocol |
|
|
Term
|
Definition
Port 389
Lightweight Directory Access Protocol |
|
|
Term
|
Definition
|
|