1.
Port 3389
Correct Answer
A. RDP
Explanation
Remote Desktop Protocol - A proprietary protocol developed by Microsoft. It allows you to connect to another computer and run programs. RDP operates similar to Telnet with the key difference being that it is NOT command line based, instead you view and operate through the graphical user interface of the remote computer.
2.
Port 23?
Correct Answer
C. Telnet
Explanation
Telnet is the correct answer because it is a network protocol that allows remote access to computers or devices over a network. Port 23 is the default port used by Telnet for communication. The other options, Telecommunication, Teleport, and Telephone, are not specifically related to port 23 or the Telnet protocol.
3.
What is HTTP/S and where is it commonly seen?
Correct Answer
C. Hypertext Transfer Protocol / Secure - Internet
Explanation
http://www.google.com - Look familiar?
https://www.bankofamerica.com - Secure used for sensitive data.
4.
Port 20, 21?
Correct Answer
D. FTP
Explanation
Port 20 and 21 are commonly used for FTP (File Transfer Protocol) communication. Port 20 is used for data transfer, while port 21 is used for control commands and responses. FTP is a standard network protocol used to transfer files between a client and a server on a computer network. It provides a simple and reliable way to exchange files over the internet.
5.
Port 67, 68?
Correct Answer
C. DHCP
Explanation
Port 67 and 68 are commonly associated with the DHCP (Dynamic Host Configuration Protocol) service. DHCP is responsible for automatically assigning IP addresses and other network configuration parameters to devices on a network. Port 67 is used by DHCP servers to receive client requests, while port 68 is used by DHCP clients to send requests to the server. Therefore, the correct answer is DHCP.
6.
What is DHCP?
Correct Answer
A. Dynamic Host Configuration Protocol
Explanation
DHCP is used on IP networks to automatically assign network configuration parameters such as IP addresses.
7.
Telnet is being replaced with?
Correct Answer
C. SSH
Explanation
SSH (Secure Shell) is being used as a replacement for Telnet. Telnet is an insecure protocol that transmits data in plain text, making it vulnerable to eavesdropping and unauthorized access. On the other hand, SSH provides a secure encrypted connection between a client and a server, ensuring confidentiality and integrity of the transmitted data. It also offers various authentication methods, making it a safer alternative to Telnet for remote access and file transfer. Therefore, SSH is the preferred choice for secure remote administration and file transfer, replacing the outdated and insecure Telnet protocol.
8.
What port does Secure Shell use?
Correct Answer
D. 22
Explanation
Secure Shell (SSH) is a cryptographic network protocol that allows secure remote login, remote command execution, and other secure network services over an insecure network. It uses port 22 as the default port for communication. Therefore, the correct answer is 22.
9.
Why is Telnet being replaced?
Correct Answer
A. Lack of security
Explanation
Telnet is being replaced due to its lack of security. Telnet is a protocol that allows remote access to servers and network devices, but it transmits data in plain text, making it vulnerable to eavesdropping and unauthorized access. As a result, it is no longer considered a secure method for remote access. To address these security concerns, alternative protocols such as SSH (Secure Shell) have been developed, which encrypt the data transmission and provide stronger authentication mechanisms, making them more suitable for secure remote access.
10.
HTTP
Correct Answer
C. 80
Explanation
Port 80 is the correct answer because it is the default port for HTTP (Hypertext Transfer Protocol) communication. HTTP is the protocol used for transmitting and receiving web pages and other resources on the internet. When a user types a website address into their browser, the browser sends a request to the web server using port 80. The server then responds with the requested web page, which is displayed in the user's browser. Other ports mentioned (161, 443, and 67) are used for different protocols such as SNMP, HTTPS, and DHCP respectively.
11.
HTTPS
Correct Answer
A. 443
Explanation
HTTPS is a secure communication protocol used for secure transfer of data over the internet. It uses port 443 as the default port for establishing secure connections. This port is specifically dedicated to handling HTTPS traffic. Other ports mentioned in the question, such as 80, 161, and 23, are used for different protocols like HTTP, SNMP, and Telnet respectively, but they are not associated with secure communication like HTTPS.
12.
RDP
Correct Answer
B. 3389
Explanation
The correct answer is 3389. This is because RDP (Remote Desktop Protocol) uses port 3389 as its default port for communication. RDP allows users to remotely access and control a computer over a network connection. By using the correct port, users can establish a remote desktop session and interact with the remote computer as if they were physically present at the machine.
13.
What is SFTP?
Correct Answer
C. Secure File Transfer Protocol
Explanation
SFTP stands for Secure File Transfer Protocol. It is a network protocol that provides a secure and encrypted method for transferring files between a client and a server. Unlike regular FTP, which is unsecured, SFTP uses encryption to protect the data being transferred, ensuring confidentiality and integrity. Therefore, the correct answer is "Secure File Transfer Protocol".
14.
Port 53?
Correct Answer
D. DNS
Explanation
Port 53 is commonly used for DNS (Domain Name System) communication. DNS is responsible for translating domain names into IP addresses, allowing users to access websites using human-readable names instead of numerical IP addresses. Therefore, the correct answer is DNS, as it is the protocol associated with Port 53.
15.
Port 25?
Correct Answer
A. SMTP
Explanation
SMTP stands for Simple Mail Transfer Protocol and is a communication protocol used for sending and receiving email messages between servers. Port 25 is the default port used by SMTP to transmit email messages. Therefore, the correct answer is SMTP as it is the protocol associated with port 25.
16.
Port 110?
Correct Answer
A. POP3
Explanation
Port 110 is used for the POP3 (Post Office Protocol version 3) protocol. POP3 is an internet standard protocol used by email clients to retrieve email from a remote server. It allows users to download their emails onto their local devices and manage them offline. Therefore, the correct answer is POP3.
17.
What is POP3?
Correct Answer
C. Post Office Protocol v3
Explanation
POP3 stands for Post Office Protocol version 3. It is a standard protocol used for receiving email messages from a mail server. It allows users to download their email messages from the server to their local devices, such as computers or mobile devices, and then delete them from the server. POP3 is widely used by email clients to retrieve email messages and is an essential component of email communication.
18.
What is POP3 used for?
Correct Answer
A. Receiving mail
Explanation
POP3 (Post Office Protocol version 3) is a standard protocol used for receiving mail from a mail server to a client device. It allows users to download their emails from the server to their local device, such as a computer or smartphone. Unlike SMTP (Simple Mail Transfer Protocol) which is used for sending mail, POP3 is specifically designed for the purpose of receiving mail. Therefore, the correct answer is "Receiving mail."
19.
If POP3 is used to receive mail, SMTP is used to?
Correct Answer
B. Send mail
Explanation
SMTP (Simple Mail Transfer Protocol) is used to send mail. When a user composes an email and clicks on the send button, the SMTP server is responsible for delivering that email to the recipient's email server. It establishes a connection between the sender's email client and the recipient's email server and transfers the email from the sender to the recipient. Therefore, SMTP is the correct answer for the given question.
20.
What is replacing POP3?
Correct Answer
B. IMAP4
Explanation
IMAP4 is replacing POP3 as the correct answer. IMAP4 (Internet Message Access Protocol version 4) is an internet standard protocol used by email clients to retrieve email messages from a mail server. It offers more advanced features compared to POP3, such as the ability to access and manage email messages on the server without downloading them to the client device. IMAP4 allows for better synchronization between multiple devices and provides more flexibility in organizing and managing emails. Therefore, it is considered a more modern and efficient replacement for POP3.
21.
Port 143
Correct Answer
D. IMAP4
Explanation
Port 143 is associated with the IMAP4 (Internet Message Access Protocol version 4) protocol. IMAP4 is used for retrieving and managing email messages from a mail server. It allows users to access their email accounts and keep the messages stored on the server, providing synchronization across multiple devices. Unlike POP3 (Post Office Protocol version 3) which is another email retrieval protocol, IMAP4 allows users to view and manage their email messages without downloading them to their local device. SMTP (Simple Mail Transfer Protocol) is used for sending email messages, while FTP (File Transfer Protocol) is used for transferring files over a network.
22.
IMAP4
Correct Answer
D. Internet Message Access Protocol v4
Explanation
IMAP4 stands for Internet Message Access Protocol version 4. It is a protocol used by email clients to retrieve emails from a mail server. IMAP4 allows users to access their emails from multiple devices while keeping the emails stored on the server. This protocol provides advanced features such as folder management, message search, and synchronization between devices. Therefore, the correct answer is "Internet Message Access Protocol v4".
23.
Port 500
Correct Answer
C. IPsec
Explanation
Port 500 is associated with IPsec (Internet Protocol Security), which is a protocol suite used for securing Internet Protocol (IP) communications. IPsec provides encryption, authentication, and integrity for IP packets, ensuring secure communication over an IP network. It operates at the network layer of the OSI model and can be used for VPN (Virtual Private Network) connections. Therefore, IPsec is the correct answer for this question.
24.
SNMP
Correct Answer
D. Simple Network Management Protocol
Explanation
SNMP stands for Simple Network Management Protocol. It is a widely used protocol for network management and monitoring. SNMP allows network administrators to manage and monitor network devices, such as routers, switches, and servers, by collecting and organizing information about these devices. It provides a standardized way to communicate with network devices and retrieve information such as device status, performance data, and configuration details. SNMP is an essential tool for network administrators to ensure the smooth operation and optimal performance of their networks.
25.
SNMP
Correct Answer
A. 161
26.
Telnet port + 100
Correct Answer
A. 123
Explanation
The given answer, 123, is obtained by adding 100 to the telnet port number. The telnet port number is not explicitly mentioned in the question, but it is implied that the telnet port number is 23. Adding 100 to 23 gives us 123, which is the correct answer.
27.
Port 123
Correct Answer
D. NTP
Explanation
Port 123 is associated with NTP (Network Time Protocol). NTP is a protocol used for synchronizing the time on computer systems. It allows devices connected to a network to maintain accurate time by synchronizing with a reference time source. NTP uses the User Datagram Protocol (UDP) on port 123 to communicate. SFTP (Secure File Transfer Protocol) uses port 22, TFTP (Trivial File Transfer Protocol) uses port 69, and DNS (Domain Name System) uses port 53. Therefore, the correct answer is NTP.
28.
NTP is?
Correct Answer
D. Network Time Protocol
Explanation
NTP stands for Network Time Protocol, which is a networking protocol used to synchronize the clocks of computer systems over a network. It allows computers to maintain accurate time even if they are located in different time zones or have different clock settings. NTP is widely used in computer networks to ensure that all devices have consistent time, which is crucial for various applications such as file synchronization, network security, and distributed systems.
29.
Port 69
Correct Answer
C. TFTP
Explanation
TFTP (Trivial File Transfer Protocol) is a network protocol used for transferring files between systems. It operates on port 69, making it the correct answer. SFTP (Secure File Transfer Protocol) is a different protocol that provides secure file transfer over SSH, so it is not the correct answer. DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses to devices on a network, and IPsec is a suite of protocols used for securing internet communications. Neither of these protocols uses port 69, so they are not the correct answers.
30.
TFTP is
Correct Answer
B. Trivial File Transfer Protocol
Explanation
TFTP stands for Trivial File Transfer Protocol. It is a simple and lightweight file transfer protocol used for transferring files between client and server on a network. TFTP is commonly used in scenarios where a minimalistic and fast file transfer solution is required, such as in booting devices over a network or transferring firmware updates to network devices. Unlike other file transfer protocols, TFTP does not provide authentication or encryption mechanisms, making it less secure but more efficient for certain applications.
31.
What is the secure version of Telnet?
Correct Answer
C. SSH
Explanation
The secure version of Telnet is SSH. Telnet is a protocol used for remote login and command execution on a network. However, Telnet does not provide encryption, making it vulnerable to security threats. SSH (Secure Shell) is a cryptographic network protocol that provides secure communication over an unsecured network. It encrypts the data transmitted over the network, ensuring confidentiality and integrity of the information exchanged between the client and server. Therefore, SSH is the recommended secure alternative to Telnet.
32.
HTTP manages communications between web browsers and web servers.
Correct Answer
A. True
Explanation
HTTP (Hypertext Transfer Protocol) is a protocol used for communication between web browsers (clients) and web servers. It enables the exchange of data, such as web pages, images, and other resources, over the internet. HTTP requests are made by browsers to retrieve information from servers, and servers respond with the requested data. Therefore, the statement "HTTP manages communications between web browsers and web servers" is true.
33.
HTTPS employs a multitude of security features for keeping a connection secure when you shop online or sign into applications.
Correct Answer
A. True
Explanation
HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that uses encryption to protect the data exchanged between a user's browser and a website. It employs several security features such as encryption, data integrity, and authentication to ensure a secure connection. This is important when shopping online or signing into applications because it helps to prevent unauthorized access, protect sensitive information, and ensure that the data transmitted between the user and the website remains confidential. Therefore, the statement that HTTPS employs a multitude of security features for keeping a connection secure when shopping online or signing into applications is true.
34.
Telnet is being replaced with Secure Shell because it offers poor transfer rates.
Correct Answer
B. False
Explanation
Telnet is not being replaced with Secure Shell because it offers poor transfer rates. In fact, Telnet is being replaced with Secure Shell primarily due to security concerns. Telnet is an unencrypted protocol that transmits data in clear text, making it vulnerable to eavesdropping and unauthorized access. On the other hand, Secure Shell (SSH) provides secure encrypted communication between two systems, ensuring confidentiality and integrity of the data being transferred. While transfer rates can vary depending on various factors, it is not the main reason for the replacement of Telnet with SSH.
35.
Telnet is GUI based.
Correct Answer
B. False
Explanation
Telnet is not GUI based. It is a command-line protocol used to establish a remote connection to a device or server. It allows users to access and manage remote systems using text-based commands. Unlike GUI-based applications, Telnet does not provide a graphical user interface with icons, menus, and windows. Instead, it relies on a command-line interface where users input commands and receive text-based responses. Therefore, the correct answer is False.
36.
RDP is GUI based.
Correct Answer
A. True
Explanation
RDP stands for Remote Desktop Protocol, which is a proprietary protocol developed by Microsoft. It allows users to connect to and control a remote computer or virtual machine over a network. One of the main advantages of RDP is that it provides a graphical user interface (GUI) for the remote computer, allowing users to interact with it as if they were physically present. Therefore, the statement "RDP is GUI based" is true, as RDP enables the transmission of graphical information between the local and remote machines.
37.
SFTP uses SSH to transfer files.
Correct Answer
A. True
Explanation
SFTP (Secure File Transfer Protocol) is a network protocol that allows secure file transfer over a secure shell (SSH) connection. SSH provides a secure channel for transmitting data, including file transfers, over an unsecured network. Therefore, SFTP does indeed use SSH to transfer files, making the statement true.
38.
DNS resolves internet names, such as google.com, to their corresponding MAC addresses.
Correct Answer
B. False
Explanation
DNS (Domain Name System) resolves internet names, such as google.com, to their corresponding IP addresses, not MAC addresses. MAC addresses are used for identifying devices on a local network, while IP addresses are used for identifying devices on the internet. Therefore, the given statement is incorrect, and the correct answer is False.
39.
IMAP4 is superior to POP3 because it allows you to control how you download your mail. For added security, it allows you to peek at the message header or view part of the message before you access it completely.
Correct Answer
A. True
Explanation
IMAP4 is indeed superior to POP3 because it offers more control over downloading emails. With IMAP4, users can choose how they want to download their mail, which provides flexibility and convenience. Additionally, IMAP4 allows users to preview the message header or view a portion of the message before fully accessing it, enhancing security by enabling users to identify potential spam or malicious content. Therefore, the statement is true.
40.
NTP syncs the clocks on our computers to one standard time source, typically an atomic clock.
Correct Answer
A. True
Explanation
NTP (Network Time Protocol) is a protocol used to synchronize the clocks on computers to a standard time source. This standard time source is usually an atomic clock, which is known for its high accuracy. By syncing the clocks on our computers to this standard time source, we ensure that all devices are using the same time reference, which is important for various network operations and time-sensitive applications. Therefore, the given statement is true.
41.
TFTP is a stripped down lesser unsecured version of FTP.
Correct Answer
A. True
Explanation
TFTP, or Trivial File Transfer Protocol, is indeed a stripped-down and less secure version of FTP. Unlike FTP, TFTP does not support authentication or encryption, making it less secure for transferring files over a network. It is commonly used in situations where simplicity and speed are more important than security, such as for booting diskless workstations or transferring firmware updates to network devices. Therefore, the statement that TFTP is a stripped down lesser unsecured version of FTP is true.
42.
Secure Shell sets up an encrypted remote server to perform operations.
Correct Answer
B. False
Explanation
Secure Shell (SSH) is a cryptographic network protocol that allows secure remote login, file transfer, and other network services. It does not set up an encrypted remote server, but rather provides a secure channel over an unsecured network. Therefore, the given statement is false.