1/28
Part 2
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network Ports
guide traffic to the correct final destination
Network port numbers contain
16-bit binary numbers or 65,536 possible values (0-65,535)
Ports 0-1,023 are known as
Well-known ports
Ports 1,024-49,151 are known as
Registered ports
Ports 49,152-65,535 are known as
Dynamic ports
Port 21
File Transfer Protocol (FTP)
Port 22
Secure Shell (SSH)
Port 3389
Remote Desktop Protocol (RDP)
Ports 137, 138, 139
NetBios
Port 53
Domain Name Service (DNS)
Port 25
SMTP
Port 110
Post Office Protocol (POP)
Port 143
Internet Message Access Protocol (IMAP)
Port 80
HTTP
Port 443
HTTPS
Service Set Identifier (SSIDs)
identify wireless networks
You can disable SSID Broadcasting
True
Pre-shared keys restrict
wifi access
Captive Portals
intercept web requests to require Wi-Fi login. They provide authentication on unencrypted wireless networks.
WEP (Wired Equivalent Privacy)
is considered insecure
Wifi Protected Access
is considered insecure
WPA2
add security with CCMP and is secure
WPA3
adds Simultaneous Authentication of Equals (SAE) and is secure
Ping Command
checks whether a remote system is responding
Troubleshooting with Ping
Ping the remote system
Ping another system on the internet
Ping a system on your local network
Try the same process with a different computer
hping command
creates customized ping requests
Traceroute command
determines the network path between two systems
Tracer route is abbreviated to what on windows
tracert
pathping
windows command that combines ping and tracert functionality