Ports/Purpose

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

FTP

Used for transferring files. Port 21 is for control/commands, and port 20 is for transferring data between client and server.

2
New cards

SSH

Allows secure remote management of systems and is also used for SFTP and SCP file transfers.

3
New cards

DNS

Translates domain names to IP addresses for web browsers and other network services.

4
New cards

HTTP

The language web browsers use to ask for websites. It sends information in plain text, meaning anyone watching the network can read what you are looking at.

5
New cards

HTTPS

It scrambles the language into a secret code. It ensures that only you and the website know what is being discussed (like passwords or credit cards).

6
New cards

POP3

An old way to check email that downloads the message to your device and usually deletes it from the server. If you lose your phone, you lose the emails forever.

7
New cards

IMAP

A way to check email that keeps the original message on the server. If you read it on your phone, it is still there for your laptop to see later. It syncs everywhere.

8
New cards

RDP

A "remote control" for a computer. It puts a picture of another computer's screen on your monitor and lets you control the mouse and keyboard from miles away.

9
New cards

SMB

The feature that lets you see folders and printers on other computers in your house or office and use them as if they were plugged into your own machine.

10
New cards

LDAP

A digital phonebook for a company. Computers use it to look up usernames, passwords, and email addresses to verify that a user actually exists.

11
New cards

SNMP

A tool that checks on network equipment to see if it is working correctly. It reports back if a device is overheating, full of data, or broken.

12
New cards

DHCP

The system that automatically assigns a unique address to every device that joins a network so they don't clash. Without it, you'd have to manually set up every phone and laptop.

13
New cards

Kerberos

A security system that gives you a digital "ticket" after you log in once. You show this ticket to different servers to prove who you are, so you don't have to type your password constantly.

14
New cards

SFTP/SCP

Two ways to copy files securely over a text-based connection. One is for simple "copy and paste", and the other lets you actually manage the files, like deleting or renaming them.

15
New cards

FTPS

A standard way to move files from one computer to another, but wrapped in a layer of security so nobody can steal the data while it is moving.

16
New cards

PPTP

An ancient, outdated way to connect to a work network from home. It is considered very unsafe now because hackers can easily break into it.

17
New cards

L2TP

A way to create a direct link between two distant computers (a VPN). It builds the "pipe" but doesn't scramble the data inside to keep it safe, so it usually brings a friend along to handle the security.

18
New cards

IPSec

Provides secure IP communications via encryption.

19
New cards

TACACS+

A network security protocol that centrally handles authentication, authorization, and accounting (AAA) for administrators who log in to manage network devices like routers and switches.

20
New cards

RADIUS

A network security protocol that centrally handles AAA for users who are connecting to network services, such as VPNs or Wi‑Fi, to control whether and how they can access the network.