Ports Flashcards

1
Q

FTP

A

Port 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HTTP

A

Port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HTTPS

A

Port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LDAP

A

Port 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LDAP (SSL)

A

Port 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SNMP

A

Port 161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSH

A

Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Telnet

A

Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SMTP

A

Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Microsoft RDP

A

Port 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS

A

Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NNTP

A

Port 119

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IMAP

A

Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IMAP (SSL)

A

Port 993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two features of 802.11b

A
  • 2.4Ghz

- 11Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two features of 802.11a

A
  • 5.0Ghz

- 54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Two features of 802.11g

A
  • 2.4Ghz

- 54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Three features of 802.11n

A
  • 2.4Ghz/5.0Ghz
  • 108 - 300Mbps
  • MIMO
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Three features of 802.11ac

A
  • 5.0Ghz
  • 1Gbps+
  • MU-MIMO
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which DNS records are commonly used with the DNS TXT record?

A
  • DKIM

- SPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which DNS records are used to protect a domain from being wrongfully identified as a source of email spam?

A
  • DKIM

- SPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which DNS record specifies a host and port information that allow to find specific services on a network?

23
Q

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal?

A

Power Level Controls

24
Q

Which antenna types provide a 360-degree horizontal signal coverage?

A
  • Dipole Antenna

- Omnidirectional Antenna

25
Which of the following answers refers to a method for managing a network's IP address space?
IPAM
26
Which of the following answers refers to a connector type not used with copper cabling?
MT-RJ
27
An OC-3 line supports transmission rates of up to ___
155.52Mbps
28
What is the maximum data transfer rate of OC-192 connection?
9.95Gbps
29
What refers to an ISDN service designed for larger organizations that take advantage of digital PBX systems?
PRI
30
Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?
WWAN
31
Which VPN type enables direct communication links between remote hosts on a WAN?
DMVPN
32
A remote-line diagnostic device placed at the joining point between an ISP's line and customer's premises wiring is known as ____
Smart Jack
33
What would add power redundancy on a server box?
Dual-power supply
34
A cold site is the most expensive type of backup site for an organization to operate.
False
35
Which type of agreement would be the most suitable for regulating responsibilities of users with administrative rights on a network?
PUA
36
A network protocol that allows for secure file transfer over SSL is called _____
FTPS
37
What refers to a set of bug fixes or code enhancements available in the form of a single installable package?
Service Pack
38
A type of server used for collecting diagnostic and monitoring data from networked devices is known as ___
Syslog Server
39
A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called:
MSDS
40
Which of the answers listed below refers to a means for executing reflective DOS attack?
IP Spoofing
41
A type of technology that provides control over the usage of a mobile device within a designated area is referred to as
Geofencing
42
acronyms refers to a client authentication method used in WPA/WPA2 Personal modes?
PSK
43
What is the name of an AES-based encryption mode implemented in WPA2?
CCMP
44
A security protocol designed to strengthen WEP implementations is known as ___
TKIP
45
A type of computer security solution that allows to define and enforce network access policies is referred to as ___
NAC
46
A wireless disassociation attack is a type of ___
DOS Attack
47
What refers to a network protocol used in the most common types of spoofing attacks?
SMTP
48
Remapping a domain name to a rogue IP address is an example of what kind of exploit?
DNS Poisoning
49
Malicious code activated by a specific event is known as ____
Logic Bomb
50
What tool would be used for testing power supply voltage output?
Multimeter
51
While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC's port can be tested with the use of ___
Loopback Plug
52
What refers to a special type of frame used by STPs?
BPDU
53
What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses?
Flood Guard