Flearn Website Header

Firewall Study Cards


Click any card to reveal the answer

What is a firewall port?

click to flip

Answer:

A communication endpoint that controls network traffic using numbered channels (0-65535).

What's the difference between TCP and UDP ports?

click to flip

Answer:

TCP provides reliable connections; UDP offers faster

What are well-known ports?

click to flip

Answer:

Standardized ports 0-1023 for common services like HTTP (80) and HTTPS (443).

Why block ports in firewalls?

click to flip

Answer:

To prevent unauthorized access

What does opening a port mean?

click to flip

Answer:

Creating firewall rules to allow traffic through a specific port number.

What are the three port number ranges?

click to flip

Answer:

Well-known (0-1023)

What is port forwarding?

click to flip

Answer:

Redirecting external traffic from one port to internal devices or services.

What are ephemeral ports?

click to flip

Answer:

Temporary high-numbered ports automatically assigned for outbound client connections.

📢
Advertisement
See Your Advert Here!

What services use ports 80 and 443?

click to flip

Answer:

Port 80 for HTTP web traffic

What is port 22 used for?

click to flip

Answer:

SSH (Secure Shell) for encrypted remote access and file transfers.

Which ports handle email services?

click to flip

Answer:

SMTP (25/587)

What do FTP ports 20 and 21 do?

click to flip

Answer:

Port 21 for FTP control

What is port 53 for?

click to flip

Answer:

DNS services that translate domain names to IP addresses.

What uses port 3389?

click to flip

Answer:

Remote Desktop Protocol (RDP) for Windows remote desktop connections.

What's the difference between inbound and outbound rules?

click to flip

Answer:

Inbound controls incoming traffic; outbound controls traffic leaving your network.

What is default deny policy?

click to flip

Answer:

Blocking all traffic except specifically allowed connections for maximum security.

📢
Advertisement
See Your Advert Here!

How do stateful firewalls work?

click to flip

Answer:

They track connections and automatically allow return traffic for established sessions.

What is port knocking?

click to flip

Answer:

Security technique requiring specific port sequence before opening protected services.

Why close unnecessary ports?

click to flip

Answer:

Reduces attack surface

Which ports are commonly attacked?

click to flip

Answer:

SSH (22)

How to detect port scanning?

click to flip

Answer:

Use intrusion detection systems

Why avoid Telnet port 23?

click to flip

Answer:

Telnet sends data unencrypted; use SSH port 22 instead.

What makes a port vulnerable?

click to flip

Answer:

Running outdated services

What is NAT with ports?

click to flip

Answer:

Network Address Translation using port numbers to share public IPs.

📢
Advertisement
See Your Advert Here!

How do dynamic ports work?

click to flip

Answer:

Applications automatically request available ports for temporary connections as needed.

What is port mirroring?

click to flip

Answer:

Copying network traffic to monitoring ports for security analysis purposes.

How do firewalls handle port ranges?

click to flip

Answer:

Create rules specifying start and end port numbers for multiple services.

What is a DMZ port configuration?

click to flip

Answer:

Isolated network zone with specific ports open for public-facing services.

How do VPNs use firewall ports?

click to flip

Answer:

Typically use UDP 1194 (OpenVPN) or UDP 500/4500 (IPSec) protocols.

What is zero-trust port security?

click to flip

Answer:

Verify every connection regardless of location

Remember: Use all available resources to study. Flearn alone cannot guarantee success in any exams—make sure to supplement your learning!