Ports Flashcards
FTP
Port 21
HTTP
Port 80
HTTPS
Port 443
LDAP
Port 389
LDAP (SSL)
Port 636
SNMP
Port 161
SSH
Port 22
Telnet
Port 23
SMTP
Port 25
Microsoft RDP
Port 3389
DNS
Port 53
NNTP
Port 119
IMAP
Port 143
IMAP (SSL)
Port 993
Two features of 802.11b
- 2.4Ghz
- 11Mbps
Two features of 802.11a
- 5.0Ghz
- 54Mbps
Two features of 802.11g
- 2.4Ghz
- 54Mbps
Three features of 802.11n
- 2.4Ghz/5.0Ghz
- 108 - 300Mbps
- MIMO
Three features of 802.11ac
- 5.0Ghz
- 1Gbps+
- MU-MIMO
Which DNS records are commonly used with the DNS TXT record?
- DKIM
- SPF
Which DNS records are used to protect a domain from being wrongfully identified as a source of email spam?
- DKIM
- SPF
Which DNS record specifies a host and port information that allow to find specific services on a network?
- SRV
Which WAP configuration setting allows for adjusting the boundary range of a wireless signal?
Power Level Controls
Which antenna types provide a 360-degree horizontal signal coverage?
- Dipole Antenna
- Omnidirectional Antenna
Which of the following answers refers to a method for managing a network’s IP address space?
IPAM
Which of the following answers refers to a connector type not used with copper cabling?
MT-RJ
An OC-3 line supports transmission rates of up to ___
155.52Mbps
What is the maximum data transfer rate of OC-192 connection?
9.95Gbps
What refers to an ISDN service designed for larger organizations that take advantage of digital PBX systems?
PRI
Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?
WWAN
Which VPN type enables direct communication links between remote hosts on a WAN?
DMVPN
A remote-line diagnostic device placed at the joining point between an ISP’s line and customer’s premises wiring is known as ____
Smart Jack
What would add power redundancy on a server box?
Dual-power supply
A cold site is the most expensive type of backup site for an organization to operate.
False
Which type of agreement would be the most suitable for regulating responsibilities of users with administrative rights on a network?
PUA
A network protocol that allows for secure file transfer over SSL is called _____
FTPS
What refers to a set of bug fixes or code enhancements available in the form of a single installable package?
Service Pack
A type of server used for collecting diagnostic and monitoring data from networked devices is known as ___
Syslog Server
A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called:
MSDS
Which of the answers listed below refers to a means for executing reflective DOS attack?
IP Spoofing
A type of technology that provides control over the usage of a mobile device within a designated area is referred to as
Geofencing
acronyms refers to a client authentication method used in WPA/WPA2 Personal modes?
PSK
What is the name of an AES-based encryption mode implemented in WPA2?
CCMP
A security protocol designed to strengthen WEP implementations is known as ___
TKIP
A type of computer security solution that allows to define and enforce network access policies is referred to as ___
NAC
A wireless disassociation attack is a type of ___
DOS Attack
What refers to a network protocol used in the most common types of spoofing attacks?
SMTP
Remapping a domain name to a rogue IP address is an example of what kind of exploit?
DNS Poisoning
Malicious code activated by a specific event is known as ____
Logic Bomb
What tool would be used for testing power supply voltage output?
Multimeter
While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC’s port can be tested with the use of ___
Loopback Plug
What refers to a special type of frame used by STPs?
BPDU
What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses?
Flood Guard