0
0
Cybersecurityknowledge~5 mins

Service and port management in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is a network port in the context of service and port management?
A network port is a virtual point where network connections start and end. It helps computers identify specific services or applications on a device.
Click to reveal answer
beginner
Why is managing open ports important for cybersecurity?
Managing open ports is important because open ports can be entry points for attackers. Closing unused ports reduces the risk of unauthorized access.
Click to reveal answer
intermediate
What is the difference between TCP and UDP ports?
TCP ports use a connection-based method to ensure data is received correctly, while UDP ports send data without confirming receipt, making UDP faster but less reliable.
Click to reveal answer
beginner
What tool can you use to check which ports are open on your computer?
You can use tools like 'netstat' or 'nmap' to see which ports are open and which services are listening on those ports.
Click to reveal answer
beginner
What is a common port number for HTTP service?
The common port number for HTTP service is 80.
Click to reveal answer
Which port number is typically used for HTTPS?
A443
B80
C21
D25
What does it mean if a port is 'open' on a computer?
AThe port is blocked by a firewall
BThe port is used only for outgoing traffic
CA service is listening and ready to accept connections on that port
DThe port is closed and inactive
Which protocol uses ports to manage communication endpoints?
AIP
BTCP/UDP
CHTTP
DFTP
Why should unused ports be closed on a server?
ATo improve internet speed
BTo allow more users to connect
CTo increase power consumption
DTo reduce security risks by limiting access points
Which tool is commonly used to scan open ports on a network?
ANmap
BPhotoshop
CExcel
DWord
Explain what a network port is and why it is important in managing services.
Think about how computers know which program to send data to.
You got /3 concepts.
    Describe why closing unused ports is a good security practice.
    Consider how attackers might use open doors to get inside.
    You got /3 concepts.