Home
Product Directory
Product Installation
Product Activation
Buy

Products > Security+ > Cram Notes
   

Security+ (SY0-401) Cram Notes

Previous        Next      

1.5 Identify commonly used default network ports

Protocol

IP protocol

Port Used
FTP (File Transfer Protocol) TCP 21
SFTP (Secure FTP) SCTP,TCP 22
FTPS (FTP Secure) FTP 443
TFTP (Trivial FTP) UDP 69
Telnet TCP 23
HTTP (Hyper Text Transfer Protocol) TCP 80
HTTPS (HTTP Secure) TCP 443
SCP (Secure Copy) SCTP, TCP 22
SSH (Secure SHell) SCTP, TCP 22
SMTP (Simple Mail Transfer Protocol) TCP 25
DNS (Domain Name Service) UDP 53
SNMP (Simple Network Management Protocol) TCP, UDP 161
SNMP Trap (Simple Network Management Protocol Trap ) TCP, UDP 162
ISAKMP (VPN) Internet Security Association and Key Management Protocol (virtual private network) UDP 500
TACACS (Terminal Access Controller Access-Control System) TCP,UDP 49
POP3 ( Post Office Protocol version 3) TCP 110
NNTP (Network News Transfer Protocol) TCP 119
IMAP4 (Internet message access protocol version 4) TCP 143
Kerberos UDP 88
Syslog TCP,UDP 514
L2TP (Layer 2 Tunneling Protocol) UDP 1701
PPTP (Point-to-Point Tunneling Protocol) TCP 1723
RDP (Remote Desktop Protocol) TCP, UDP 3389

NetBIOS (Network Basic Input/Output System): NetBIOS, or Network Basic Input/Output System, allows for session-layer communication on the OSI model. NetBIOS is primarily concerned with two functions: naming and starting/stopping NetBIOS "sessions." Since NetBIOS is not actually a networking protocol (it's an API) it is not routable and therefore nodes are only visible to other nodes within the same subnet.

1.6 Implement wireless network in a secure manner

WEP (Wired Equivalent Privacy): A deprecated wireless network security standard, less secure than WPA. Key size is 64 bit. WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not very secure. WEP is used at the two lowest layers of the OSI model - the data link and physical layers; it therefore does not offer end-to-end security.

WPA (Wi-Fi Protected Access): A wireless encryption standard created by the Wi-Fi Alliance to secure wireless computer networks. WPA improves on the authentication and encryption features of WEP (Wired Equivalent Privacy). Key size is 128 bits. WPA provides stronger encryption than WEP through use of either of two standard technologies: Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). WPA also includes built-in authentication support that WEP does not offer. WPA provides comparable security to VPN tunneling with WEP, with the benefit of easier administration and use.

WPA2 (Wi-Fi Protected Access Version 2): It is wireless encryption protocol and is based on the IEEE 802.11i technology standard for data encryption. Key size is 256 bits. It is more secure than WPA and WEP. WPA2 also improves the security of Wi-Fi connections by requiring use of stronger wireless encryption than what WPA requires. Specifically, WPA2 does not allow use of an algorithm called TKIP (Temporal Key Integrity Protocol) that has known security holes (limitations) in the original WPA implementation. There are two versions of WPA2: WPA2-Personal, and WPA2-Enterprise. WPA2-Personal protects unauthorized network access by utilizing a set-up password. WPA2-Enterprise verifies network users through a server. WPA2 is backward compatible with WPA.

Previous        Next      

 
FAQ
Contact Us
Disclaimer