common ports and protocols Flashcards

1
Q

What protocol is considered the de facto standard when it comes to secure
access to remote systems for management purposes?
a. Telnet
b. SSH
c. IPSec
d. IMAP

A

Answer: b. The Secure Shell (SSH) protocol allows you to make secure
remote connections to network systems. This protocol is specialized for terminal connections. For graphical user interface connections, you can use technologies such as Remote Desktop Protocol (RDP) and VNC Viewer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are interested in dynamically assigning the IP address information in your
IPv4-based network infrastructure. What protocol can you use to accomplish
this?
a. DNS
b. TFTP
c. FTP
d. DHCP

A

Answer: d. Dynamic Host Configuration Protocol is used to dynamically
assign IP address information to network systems (typically end-user devices).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What global hierarchical system is used to resolve names to IP addresses?
a. TFTP
b. DHCP
c. NTP
d. DNS

A

Answer: d. Domain Name System (DNS) is a global hierarchy system that
resolves names to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port and protocol are used by HTTPS? (Choose two.)
a. TCP
b. UDP
c. 443
d. 123
e. 8080
f. 80

A

Answer: a, c. HTTPS uses TCP port 443 in its operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the port and protocol used by Syslog? (Choose two.)
a. TCP
b. UDP
c. 148
d. 514
e. 240

A

Answer: b, d. Syslog produces machine data that you can use to monitor and
understand the state of services on a device. Syslog runs on UDP port 514.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol do ping and traceroute use in their operation?
a. IPsec
b. DNS
c. ICMP
d. DHCP

A

Answer: c. ICMP is used by many troubleshooting and monitoring tools. ping
and traceroute are two such ICMP-based utilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which incoming email protocols are encrypted and secure because they use
SSL/TLS sessions? (Choose two.)
a. POP3 over SSL
b. IMAPS
c. SMTP
d. POP

A

Answer: a, b. Using POP3 over SSL (port 995) or IMAPS (port 993) allows
the incoming data from the client to be encrypted because these protocols use
SSL/TLS sessions. Answer c is incorrect because Simple Mail Transfer Protocol (SMTP) (port 25) is for outgoing email. Answer d is incorrect because one
of the biggest security issues with plain POP (and IMAP as well) is that login
credentials are transmitted in plaintext over unencrypted connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You need to establish an authenticated and encrypted connection between a
client and a host system. What should you use?
a. Telnet
b. SSH
c. LDAP
d. LDAPS

A

Answer: b. Secure Shell (SSH) establishes a session between the client and
host computers using an authenticated and encrypted connection over port 22.
SSH requires encryption of all data, including the login portion. Answer a is
incorrect because SSH is the secure replacement for Telnet. Using Telnet is ill
advised because a Telnet session is not encrypted. Answers c and d are incorrect. Lightweight Directory Access Protocol (LDAP) is a directory services
protocol for use on IP networks. By default, LDAP traffic is unsecured. LDAP
over SSL (LDAPS) is a method to secure LDAP by enabling communication
over SSL/TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly