1.5 Explain Common Ports And Protocols, Their Application, And Encrypted Alternatives. Flashcards
Which of the following provides an automatic method for allocating an Internet Protocol (IP) address, subnet mask, default gateway, and Domain Name System (DNS) server addresses?
O RARP
O APIPA
O TFTP
O DHCP
DHCP
A router downloads configuration files over User Datagram Protocol (UDP) port 69. The router does not have access to browse the directory or delete files. Analyze File Transfer Protocols (FTPs) and determine what protocol the router is using
O Secure File Transfer Protocol (SFTP)
O Trivial File Transfer Protocol (TFTP)
O File Transfer Protocol over Secure Sockets Layer (SSL)
O Active File Transfer protocol (FTP)
Trivial File Transfer Protocol (TFTP)
What provides additional options, rather than only leases, for host Internet Protocol (IP) addresses?
O APIPA
O EUI64
O ESP
O DHCPv6
DHCPv6
Corporate hired a penetration testing expert expert to test their internal security. The final report given to the executive shows that the way the expert circumvented their security was by using port 1521 from a remote location. The expert suggested enabling access control lists on that service. What protocol did the expert use to infiltrate the network?
O Telnet
O SQLnet
O MySQL
O Syslog
SQLnet
Which port will a Domain Name Server (DNS) use for record transfers over 512 bytes?
O User Datagram Protocol (UDP) 69
O User Datagram Protocol (UDP) port 53
O Transmission Control Protocol (TCP) port 53
O Transmission Control Protocol (TCP) port 23
Transmission Control Protocol (TCP) port
Which protocol uses Network Level Authentication (NLA) which requires the client to authenticate before a full remote session starts?
O Secure Shell (SSH)
O Telnet
O Virtual Network Computing (VNC)
O Remote Desktop Protocol (RDP)
Remote Desktop Protocol (RDP)
Explain how the Simple Authentication and Security Layer (SASL) provides binding in Lightweight Directory Access Protocol Secure (LDAPS)
O The server authenticates to the client and configures a secure channel for communications.
O The client and server negotiate the use of a supported security mechanism.
O The directory grants anonymous accessories
O The client supplies the Domain Name (DN) and password
The client and server negotiate the use of a supported security mechanism
Company A has purchased new computing devices that support IPv4. What protocol could the company enable on the network to allow the transmission of IPv6 packets and encapsulated frames or packets from different types of network protocols over an IPv4 network?
GRE
Which protocol allows for a protected dialog between the client and server by assigning the web server a digital certificate issued by a Certificate Authority?
O Network Time Protocol (NTP)
O Hypertext Transfer Protocol secure (HTTPS)
O Hypertext Transfer Protocol (HTTP)
O Secure Sockets Layer/Transport Layer Security (SSL/TLS)
Hypertext Transfer Protocol Secure (HTTPS)
Which delivery method and protocol may send data out of order and over different paths? (Select all that apply.)
O Connectionless
O TCP
O UDP
O Connection-oriented
Connectioiniless
UDP
Which of the following provides an automatic method for allocating an Internet Protocol (IP) address, subnet mask, default gateway, and domain Name System (DNS) server addresses?
O RARP
O APIPA
O TFTP
O DHCP
DHCP
What provides additional options, rather than only leases, for host Internet Protocol (IP) addresses?
O DHCPv6
O EUI64
O APIPA
O ESP
DHCPv6
A new help desk technician has been working on a computer for a few days with no issues. Today, the technician logged into the computer and noticed no connection. The network technician tells the h el pedal technician that the IP lease expired, and there are no usable IP addresses right now. What Service should the network technician modify to incorporate more IP addresses or reduce the lease times?
DHCP
A system administrator for ABC Company receives a request for a new account. A new employee is onboarding and will receive a Voice over Internet Protocol (VoIP) phone. The employee’s name is Sam Smith and the phone number will be 1234567890. The company’s domain is @abccompany.com. Develop a Session Initiation Protocol (SIP) Uniform Resource Indicator (URI).(Select all that apply.)
O sip:Sam.smith@abccompany.com
O sip:123456789.abccomopany.com
O sip:sam.smith@1234567890
O sip:sam.smith.abccompany.com
sip:sam.smith@abccompany.com
sip:sam.smith@1234567890
A new system administrator configures a shared repository for access to files through a web-based interface. What port must the administrator enable on the repository?
O445
O 80
O 21
O 22
80