Security+ (SY0-601) Cram Notes

Previous   Contents   Next

1. Network Security

1.5 Identify commonly used default network ports

Protocol

IP protocol

Port Used

FTP (File Transfer Protocol)

TCP

21

SFTP (Secure FTP)

SCTP,TCP

22

FTPS (FTP Secure)

FTP

443

TFTP (Trivial FTP)

UDP

69

Telnet

TCP

23

HTTP (Hyper Text Transfer Protocol)

TCP

80

HTTPS (HTTP Secure)

TCP

443

SCP (Secure Copy)

SCTP, TCP

22

SSH (Secure SHell)

SCTP, TCP

22

SMTP (Simple Mail Transfer Protocol)

TCP

25

DNS (Domain Name Service)

UDP

53

SNMP (Simple Network Management Protocol)

TCP, UDP

161

SNMP Trap (Simple Network Management Protocol Trap )

TCP, UDP

162

ISAKMP (VPN) – Internet Security Association and Key Management Protocol (virtual private network)

UDP

500

TACACS (Terminal Access Controller Access-Control System)

TCP,UDP

49

POP3 ( Post Office Protocol version 3)

TCP

110

NNTP (Network News Transfer Protocol)

TCP

119

IMAP4 (Internet message access protocol version 4)

TCP

143

Kerberos

UDP

88

Syslog

TCP,UDP

514

L2TP (Layer 2 Tunneling Protocol)

UDP

1701

PPTP (Point-to-Point Tunneling Protocol)

TCP

1723

RDP (Remote Desktop Protocol)

TCP, UDP

3389

NetBIOS (Network Basic Input/Output System): NetBIOS, or Network Basic Input/Output System, allows for session-layer communication on the OSI model. NetBIOS is primarily concerned with two functions: naming and starting/stopping NetBIOS "sessions." Since NetBIOS is not actually a networking protocol (it's an API) it is not routable and therefore nodes are only visible to other nodes within the same subnet.

1.6 Implement wireless network in a secure manner

WEP (Wired Equivalent Privacy): A deprecated wireless network security standard, less secure than WPA. Key size is 64 bit. WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not very secure. WEP is used at the two lowest layers of the OSI model - the data link and physical layers; it therefore does not offer end-to-end security.

WPA (Wi-Fi Protected Access): A wireless encryption standard created by the Wi-Fi Alliance to secure wireless computer networks. WPA improves on the authentication and encryption features of WEP (Wired Equivalent Privacy). Key size is 128 bits. WPA provides stronger encryption than WEP through use of either of two standard technologies: Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). WPA also includes built-in authentication support that WEP does not offer. WPA provides comparable security to VPN tunneling with WEP, with the benefit of easier administration and use.

WPA2 (Wi-Fi Protected Access Version 2): It is wireless encryption protocol and is based on the IEEE 802.11i technology standard for data encryption. Key size is 256 bits. It is more secure than WPA and WEP. WPA2 also improves the security of Wi-Fi connections by requiring use of stronger wireless encryption than what WPA requires. Specifically, WPA2 does not allow use of an algorithm called TKIP (Temporal Key Integrity Protocol) that has known security holes (limitations) in the original WPA implementation. There are two versions of WPA2: WPA2-Personal, and WPA2-Enterprise. WPA2-Personal protects unauthorized network access by utilizing a set-up password. WPA2-Enterprise verifies network users through a server. WPA2 is backward compatible with WPA.

Previous   Contents   Next

Copyright © Anand Software and Training Private Limited.