Ports Flashcards

1
Q

FTP

A

Port 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HTTP

A

Port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HTTPS

A

Port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LDAP

A

Port 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LDAP (SSL)

A

Port 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SNMP

A

Port 161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSH

A

Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Telnet

A

Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SMTP

A

Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Microsoft RDP

A

Port 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS

A

Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NNTP

A

Port 119

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IMAP

A

Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IMAP (SSL)

A

Port 993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two features of 802.11b

A
  • 2.4Ghz

- 11Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two features of 802.11a

A
  • 5.0Ghz

- 54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Two features of 802.11g

A
  • 2.4Ghz

- 54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Three features of 802.11n

A
  • 2.4Ghz/5.0Ghz
  • 108 - 300Mbps
  • MIMO
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Three features of 802.11ac

A
  • 5.0Ghz
  • 1Gbps+
  • MU-MIMO
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which DNS records are commonly used with the DNS TXT record?

A
  • DKIM

- SPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which DNS records are used to protect a domain from being wrongfully identified as a source of email spam?

A
  • DKIM

- SPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which DNS record specifies a host and port information that allow to find specific services on a network?

A
  • SRV
23
Q

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal?

A

Power Level Controls

24
Q

Which antenna types provide a 360-degree horizontal signal coverage?

A
  • Dipole Antenna

- Omnidirectional Antenna

25
Q

Which of the following answers refers to a method for managing a network’s IP address space?

A

IPAM

26
Q

Which of the following answers refers to a connector type not used with copper cabling?

A

MT-RJ

27
Q

An OC-3 line supports transmission rates of up to ___

A

155.52Mbps

28
Q

What is the maximum data transfer rate of OC-192 connection?

A

9.95Gbps

29
Q

What refers to an ISDN service designed for larger organizations that take advantage of digital PBX systems?

A

PRI

30
Q

Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?

A

WWAN

31
Q

Which VPN type enables direct communication links between remote hosts on a WAN?

A

DMVPN

32
Q

A remote-line diagnostic device placed at the joining point between an ISP’s line and customer’s premises wiring is known as ____

A

Smart Jack

33
Q

What would add power redundancy on a server box?

A

Dual-power supply

34
Q

A cold site is the most expensive type of backup site for an organization to operate.

A

False

35
Q

Which type of agreement would be the most suitable for regulating responsibilities of users with administrative rights on a network?

A

PUA

36
Q

A network protocol that allows for secure file transfer over SSL is called _____

A

FTPS

37
Q

What refers to a set of bug fixes or code enhancements available in the form of a single installable package?

A

Service Pack

38
Q

A type of server used for collecting diagnostic and monitoring data from networked devices is known as ___

A

Syslog Server

39
Q

A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called:

A

MSDS

40
Q

Which of the answers listed below refers to a means for executing reflective DOS attack?

A

IP Spoofing

41
Q

A type of technology that provides control over the usage of a mobile device within a designated area is referred to as

A

Geofencing

42
Q

acronyms refers to a client authentication method used in WPA/WPA2 Personal modes?

A

PSK

43
Q

What is the name of an AES-based encryption mode implemented in WPA2?

A

CCMP

44
Q

A security protocol designed to strengthen WEP implementations is known as ___

A

TKIP

45
Q

A type of computer security solution that allows to define and enforce network access policies is referred to as ___

A

NAC

46
Q

A wireless disassociation attack is a type of ___

A

DOS Attack

47
Q

What refers to a network protocol used in the most common types of spoofing attacks?

A

SMTP

48
Q

Remapping a domain name to a rogue IP address is an example of what kind of exploit?

A

DNS Poisoning

49
Q

Malicious code activated by a specific event is known as ____

A

Logic Bomb

50
Q

What tool would be used for testing power supply voltage output?

A

Multimeter

51
Q

While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC’s port can be tested with the use of ___

A

Loopback Plug

52
Q

What refers to a special type of frame used by STPs?

A

BPDU

53
Q

What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses?

A

Flood Guard