Comptia A+ (anki) Flashcards

1
Q

A __ is where you store data permanently

A

hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The three main components of the ___ are the controller, hard disk, and host bus adapter

A

hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Each disk on hard disk is called a

A

Platter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Platters have a

A

top surface and bottom surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If you had three platters then you have __ writeable surfaces, two for each platter

A

six

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The more __ help increase the capacity of the hard drive

A

platters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The most common type of interface for hard drives are

A

Serial ATA (SATA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ___ controls all the operations of the hard drive. It controls all the moving parts. It handles how the data itself is encoded onto platters

A

controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ___ is a translator converting signals from the computer into the electrical signals that can be written on the disk and then vice versa it converts the electrical signals into data that the computer can understand

A

Host Bus Adapter (HBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The computer understands ___ or bits, a one, or a zero

A

Binary digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Devices that in any way hold ones and zeros that the CPU accesses are known generically as ___

A

memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The three connections for ___ are USB, Bluetooth, and PS/2

A

mice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For an advanced gaming mouse or something for 3D graphics you can __

A

update drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The __ on control panel applet is the way you want the pointer to appear

A

pointer options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

On the control panel applet you can use the __ to set up right handed/left handed, how many pages it might scroll when you scroll the wheel

A

button configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A __ is the primary method for inputting data into a PC

A

keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The three connections for a __ are USB, PS/2, Bluetooth

A

keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The two connections for scanners are USB and

A

wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The form factors of a ___ are All in one (multfunctional) and flatbed

A

scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

__ retrieve and/or store data on optical discs

A

Optical drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

__ are written to and read from using a laser

A

Optical drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

__ are commonly used for personal identification, access control, authentication, and financial transactions

A

Smart card readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

__ can be external (usb) or built in

A

Smart card readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Mice, keyboard, scanners, optical drives, smart card readers, are examples of __

A

input devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
__ connects you to the internet and eliminates the need to use cables
USB Wifi Adapter
26
__ cards are built into computer system and help connect to the internet
Wireless
27
Some older laptops might use a ___ connection to connect to internet
Mini PCI
28
__ is square in shape and has a 124 pin edge connection
Mini PCI
29
A __ offers spreads of 802.11g and 802.11b
Mini PCI
30
Newer laptops use __ wireless cards to connect to the internet
Mini PCI Express
31
A __ has a 54 pin edge connection and is rectangular in shape. They have speeds of 802.11a, 802.11b, 802.11g, and 802.11n
Mini PCI Express
32
__ card allows you to connect your laptop to the internet using a cellular signal
Cellular
33
__ Screens are input and output devices
Touch
34
A __ allows multiple computers to share a single keyboard, video output, and mouse
KVM
35
Different KVM models can accommodate various interface types like USB, VGA, and __
DVI
36
The connections of speakers are __ Jack
TRS (Tip, Ring, Sleeve)
37
The __ is the most common computer output device
Screen
38
The various connections for a laptop to connect to another laptop of display are _____
VGA, DVI, HDMI
39
5 connection types for printers are __
USB, Ethernet, 802.11 (wifi), Bluetooth, Infrared
40
KVM, speakers, display devices (screen), projectors, printers are all __ devices
output
41
On the hardrive the __ is the axis around which the platters spin
spindle
42
On the hard drive, the __ is the read/write point. That is where the electrical charges are applied and/or read
head
43
On the hard drive, the __ moves the head back and forth, so it can access any position on the platter
arm
44
In the hard drive, the __ is the point about which the arm rotates
actuator axis
45
In the hard drive, the __ are the power and the data cable to connect it to the rest of the system
connections
46
In the hard drive, the __ is the motor that moves the arm back and forth
acutator
47
__ hard disks are the primary storage of most desktop computers
Magnetic
48
The benefits of a __ hard disk are mature, reliable, and relatively inexpensive
magnetic
49
__ hard disks are magnetic fields to store data
magnetic
50
The three magnetic disks size are ___
1.8 in, 2.5in, and 3.5 in
51
The __ inch hard disk is not widely used
1.8
52
The most widely used hard disk size is the __ inch which is used in laptops or portable external drives
2.5
53
The __ inch hard drive disk is the mainstream type used in PCs
3.5
54
SSD
Solid State Drive
55
The __ has no moving parts. It uses nonvolatile (does not require power to retain its data) NAND flash memory for storage. NAND is NON-AND refers to a logical processing mechanism
Solid State Drive
56
RAM is often referred to as simply __
System Memory
57
__ uses traditional platters along with high speed flash memory
Hybrid drives
58
__ are a combination of HDD capacity with SSD speeds
Hybrid drives
59
RAM is very __ because there are no moving parts. It is also volatile which mean it requires power
fast-access
60
RAM
Random Access Memory
61
The benefits of __ are that they cost less than SSD, greater capacity than SSD, performance is between
hybrid drives
62
SODIMMs are __ to __ inches in size
2.5 to 3
63
__ is a smaller version of the DIMM modules that are used in desktops
SODIMM
64
SODIMM
Small Outline DIMM (Dual in-line-memory module)
65
Laptops use __ memory
SODIMM
66
RAM is physical storage that also __ storage
temporary
67
Memory modules from different vendors __ be mixed
can
68
Before trying to upgrade the memory on a laptop, you must first consult the ___
motherboard user guide
69
The __ on the SODIMM are the point of contact to the socket it sits in the laptop itself
pins
70
Before upgrading laptop memory, you must determine how much memory you are conveniently using by going to __ in windows
task manager or resource monitor
71
VGA, DVI, S-Video, HDMI, Display Port, Composite video, and component video are all numerous interfaces of __
video cards
72
CRT
Cathode Ray Tube
73
A __ or CRT monitor contains a large cathode ray tube, uses a electron gun behind the screen that activates phosphors. They are becoming obselete
Cathode Ray Tube
74
LCD
Liquid Crystal Display
75
__ are commonly used in laptop computers and flat panel monitors. They produce clear images and replaced traditional CRT monitor
LCD
76
In-plane switching (IPS) panel technology super plane to line switching (PLS) Vertical Alignment (VA) panel technology and Twisted Nematic (TN) panel technology are all different ___ technologies
LCD
77
OLED
Organic light-emitting diode
78
__ is a thin display technology. It does not require back lighting. It uses organic compounds for electroluminescence
OLED
79
The different types of OLED are ___ and __
Passive Matrix OLED (PMOLED) and Active Matrix OLED (AMOLED)
80
Cathode Ray Tube (CRT), Liquid Crystal Display (LCD), Organic Light-Emitting Diode (OLED) are all types of __
displays
81
__ are often wrapped around the laptop display screen by placing the cable around the frame, it can be better withstand constant opening and closing of the screen. It performs better if located in the top part of the lid
Wi-fi Antennas
82
For __ image quality resolution is measured in pixels. The higher the frame rate means a smoother video. 2 million pixels is good. 30 frame rate is good.
webcams
83
CCFL
Cold Cathode Fluorescent Light
84
__ is lighting technology commonly used with LCD monitors, neon signs, computer case lighting. They are common in earlier LCD screens. They weigh more and use more power than LEDs. For every one you needed in inverter
CCFL
85
LED
Light Emitting Diodes
86
__ are a semiconductor device that emits visible light. They are commonly used in LCD panel backlighting, fiber optic data transmission, and indicator lights
LED
87
__ are any type of device that can produce a digital result from a non-digital input. It creates a digital representation based on analog information. They use styles or finger to determine position. ex. tablet or smartphone
Digitizers
88
__ is a video interface that can carry both video and audio information
HDMI
89
__ allows you to connect multiple peripheral items. Items can include regular sized keyboard, mouse, external monitor, printer, USB drives, and speakers
Docking stations
90
The three modes of docking are ___
cold, warm, and hot
91
__ docking is when a laptop must be powered off
cold
92
__ docking is when the laptop must be put in an taken out of suspended mode ex. sleep mode
warm
93
__ docking is when the laptop can recognize changes while running normal operations
hot
94
__ provides additional functionality to a laptop. It can be used because some laptops do not contain ports such as keyboard, mouse, and DVI. Usually smaller, lighter, and much more portable than docking station
Port Replicator
95
__ can be connected via parallel, serial, USB, and SCSI USB is most common
Port Replicator
96
__ can provide a means of converting connection types | ex. Micro DVI to a regular DVI connection
Port Replicators
97
__ is the location in which laptop cable locks are secured. The other end of the cable is secured to a permanent anchored fixture ex. wall or desk
Lock Port
98
Devices that can be used as a laptop and tablet are called __
2 in 1 devices
99
The two types of 2 in 1 devices are __ tablet
one piece and detacable
100
2 in 1 device are equipped with both a __
removeable touch screen and physical keyboard
101
__ screens can rotate. Most can rotate 360 degrees
convertible
102
A _ is a mobile device that is a mobile version of an operating system. They have a LCD touchscreen and rechargeable battery. They are smaller than a notebook but larger than a smartphone
tablet
103
Fitness monitors have an _ display
OLED
104
The three types of USB connections are _
Micro-USB, Mini-USB, and USB-C
105
The _ carries the fastest protocol, USB 3.1 physical connector has no orientation. It can be input either way
USB-C
106
The _ is Apple proprietary, has 8 pins, and a higher power output ex. iphone
lighting cable
107
_ are vendor specific ports. They are unique to the device. ex. apple products, Macbook air, pro Mag safe - charging ports for Macbooks
Proprietary ports
108
NFC
Near-Field Communication
109
_ is a form of contactless communication commonly used between devices like smartphones and tablets. It can transfer video, contact info, photos, and payments ex. Apple pay
NFC
110
_ is a short range wireless communication technology between devices. It is used to transmit data or voice wirelessly over short distances. It can be used on mobile phones, computers, peripherals. You must pair two devices
Bluetooth
111
_ is common remote controls. Uses invisible portion of light spectrum for signaling and communication. Devices can communicate at a distance of about three or four feet. You need to have direct line of sight to have clear signal
Infared
112
_ is a method for sharing internet connection from one device to another. It can be done over wifi, bluetooth, or USB cable. Device acts as a modem. Ideal when no alternative connections old term for personal hotspot
Tethering
113
The three types of SD cards are _
SD, Mini SD, and Micro-SD
114
Mutual authentication for multiple services is also as known as _
Single Sign On (SSO)
115
_ is when both parties have to be satisfied that the other party is who they claim to be Access control method Users sign in once to access multiple services Common in enterprise networks like email, database, document management applications ex. online banking
Mutual Authentication for Multiple Services (SSO)
116
GSM
Global System for Mobile Communication
117
For connectivity cell phones use _, its networks consist of devices like gateways, repeaters, relays (antennae) or cell tower. Mobile devices connect to cell towers, which provide communication and location services. Towers need to overlap with another tower. A collection of them is called cell which is why we say cellular service
GSM
118
Cell phones use _ networks to make voice calls and send data The cellular networks support 3G, 4G, and 5G G stands for generation
GSM
119
SIM
Subscriber Identity Module
120
_ cards are used to connect mobile devices to GSM networks Chip contains info about your account, identity, and device Uniquely identifies devices on a GSM network
SIM
121
WPAN
Wireless Personal Area Network
122
_ is a wireless standard used for transmitting data over short distances. Approximately 10 meters or 30 feet Can be used to create a WPAN which is a type of personal network consisting of connected devices
Bluetooth
123
There are numerous options for mobile email communications. The two primary categories are _
standard and web-based
124
The three standard mobile email communications includes _
POP3, IMAP, and Exchange
125
Web-based mobile email communications include _
Gmail, Hotmail, and yahoo
126
POP3
Post Office Protocol Version 3
127
IMAP
Internet Message Access Protocol
128
_ is the first major email protocol It's a simple process Email client connects to the mail server Email is downloaded directly to the device Typically, the email is then deleted from the server It is a recieve protocol only, can only recieve incoming email and not send mail
POP3
129
_ includes all the same features as POP3 Main difference is it allows email to be synced between multiple devices. Email is stored on the server instead of being downloaded directly to the device It is a reiceve protocol only, it can only recieve incoming email not send mail
IMAP
130
SMTP
Simple Mail Transfer Protocol
131
To send email you need the protocol __ this is a sitiuation where you are using a home-based email account that your internet service provider is giving you then they will give you an outgoing server to use
SMTP
132
``` is a proprietary platform developed by Microsoft Benefits include Email synching folder support sent messages are saved on server ``` You can share calendars and documents with other people
Microsoft Exchange/Microsoft Office 365
133
S/MIME
Secure/Multipurpose Internet Mail Extensions
134
helps secures email provides encryped authentication (ensures identity of all parties) Message integrity (message has not been tampered with) Digitial structures (validates the identity of the person who sent it) Message security (it has been encryped) Server also requires it in order to function
S/MIME
135
You need a digitial encryption certificate (required for sender which is you) Digital Public Key (from intended recepient) Email program that supports S/MIME email ex. exchange These are all __ for S/MIME
requirements
136
PRI
Product Release Information
137
is the connection between the mobile device and the radio transmitter updates can contain radio setting like ID numbers, network codes, country codes Updating can add features and increase data speed because it is a physical aspect of the device itself
PRI
138
PRL
Preferred Roaming List
139
is a list of radio frequencies residing in the memory different frequencies are used in different geographic areas This ensures that mobile device connects to the proper tower
PRL
140
CDMA
Code-Division Multiple Access Networks
141
is commonly used on code-division multiple access (CDMA) networks based on codes in your phone, that determines which network you should be using All of us can use the networks at the same time but the codes are used distinguish my transmission from everyone else's Updates can contain radio bands, sub-bands, service providers ID's
PRL
142
is firmware used by cellular modem manufacturers controls all the GSM and 3G phone RF Waves Keeps code found in chip current by performing necessary updates
Baseband
143
are radios found in mobile devices are equipped with firmware Manufacturer updates often include mode/mbaseband firm updates
Radio Firmware
144
IMEI
International Mobile Equipment Identify
145
is used to identify a physical science hard coded into device making it difficult to change Every device has a dfferent number helps prevent the use of a stolen mobile devices it can be reported to a carrier and blacklisted This can be shared with other cellular networks The blacklisted device will not be able to be used even with new SIM card
IMEI
146
IMSI
International Mobile Subscriber Identification
147
is a unique 15 digit number first three digits represent mobile country code (MCC) -where subscriber lives The next two digits represent the mobile network code (MNC) The remaining numbers (typically around ten but could be less) are the mobile subscription identification number (MSIN) They indicate the actual subscriber
IMSI
148
VPN
Virtual Private Network
149
is a service that creates a secure direct connection to another network eg. internal intranet commonly used when logging onto public wifi -end users are instead redirected to a different to different endpoint -no longer seen as using a public network Use encrypted tunnel to establish connection to internal network. You can operate once signed in exactly as you were in the network (gives new IP)
VPN
150
The benefits of _ are security - prevent sensitive data from being exploited it is encrypted Access geo-specific content known as location spoofing
VPN
151
TCP
Transmission Control Protocol
152
is used by protocols like HTTP, SMTP, and Telnet
TCP
153
UDP
User Datagram Protocol
154
is conenectionless protocol faster transmission and faster than TCP You do not need any acknowledgement of message recieved Used for message transport
UDP
155
FTP
File Transfer Protocol
156
is a client/server configuration used to transfer files | Exclusively TCP-based service
FTP
157
utilized two ports call data port (port 20) and Command port (port 21)
FTP
158
The two modes of FTP are
Active and Passive
159
mode of FTP is when connection is initiated by the client using port 21
Active
160
mode of FTP is when the server connects back using port 20
Passive
161
SSH
Secure Shell
162
is typically used on UNIX or LINUX environments provides you with a terminal application Nothing happens on your system, the commands are transmitted to the other end and something happens there on the servers
SSH
163
provides confidentiality and integrity over an unsecured network -used public key cryptography encrypted commonly used to secure remote network logins
SSH
164
SSH uses port
22
165
Telnet uses port
23
166
is designed to support remote logins and communication between two computers communication is not encrypted information is sent to plain text and subject interception
Telnet
167
The benefits of _ are they have faster access time, reliable (no moving parts) require less power, make less noise, and usually physically smaller
Solid State Drive
168
VGA
Video Graphics Array
169
SMTP uses port
25
170
_ sends internet e-mail transmissions. Email transmission use it to transfer messages from one server to another
SMTP
171
POP3 uses port
110
172
is a client/server protocol used to retrieve e-mail by default, messages are deleted from the server after user has downloaded email built into most popular e-mail products
POP3
173
IMAP uses port
143
174
is used to retrieve mail stored on a server messages can remain stored on the server as well as stored locally on all devices -users can organize messages by using folders/containers
IMAP
175
is ideal for users that use multiple devices work computer home computer smartphone tablet every device can receive the same message
IMAP
176
HTTP
Hypertext Transfer Protocol
177
HTTP uses port
80
178
sends and receives web-based client requests eg. used to view HTML pages or data can use port 8080 as an alternative
HTTP
179
The _ client, your browser is responsible for generating request. The client uses Uniform Resource Locator (URL) to locate and request information from a web server eg. an HTML page it is requesting to see website request are then sent back to server using TCP/UDP port 80
HTTP
180
HTTPS
Hypertext Transfer Protocol Secure
181
HTTPS uses port
443
182
is used for secure web browser communication highly resistant to eavesdropping and interception because it uses Secure Sockets Layer (SSL) communication back and forth are encrypted secure connections can be identified in website address line by a padlock or an unbroken key
HTTPS
183
DNS
Domain Name System
184
DNS uses port
53
185
is for simple lookups and data replication
DNS
186
DHCP
Dynamic Host Configuration Protocol
187
is used to assign IP addresses to network devices | IP addresses can be assigned in two ways, manual and automatic (client requests IP address from the server)
DHCP
188
DORA
Discover, Offer, Request, Acknowledge
189
Requesting an IP address from a server uses a process sometimes referred to as
DORA
190
is when your client system boots up and realizes that it is set to obtain an address automatically so it sends out a discover packet which is asking are there any DHCP servers on this network
DORA process
191
During the _ you do not have an address yet the only way to communicate is to broadcast or send a packet is heard by everyone. You cannot send a packet to a specific server when you don't have an address. All DHCP servers will hear the discover and they will all offer. Your client will select one from all offers that come in (request) and other servers will then withdraw. The one server that offered the address that you requested will acknowledge the fact that you requested it
DORA process
192
DHCP servers use the UDP port _ to offer and acknowledge
67
193
DHCP clients uses UDP port _ to discover and request
68
194
The benefits of _ are simplified administration and centralized network configuration
DHCP
195
RDP
Remote Desktop Protocol
196
RDP uses port
389
197
is a Microsoft proprietary implementation protocol designed to allow remote users to have a graphical interface while accessing another computer the graphical interface is the entire desktop of the computer commonly used by administrators who want to user their workstation system in their office to connect through to multiple different servers
RDP
198
RDP services include _ which is mouse and keyboard functionality
input support
199
RDP services include __ which includes audio and printer | You can hear a sound from speakers or print form the server on your system
output support
200
In RDP Services you can have __ between client and remote host which means that you could copy text from my system and paste it to the server of vice versa
clipboard sharing
201
RDP services has _ which is implemented if you have an application that you feel won't run very well on client systems but it runs perfectly fine on the server since its newer. You install the application on the server and then allow users to remote into the server to run the application
application support
202
NetBIOS
Network Basic Input Output System
203
controls how application residing on different computers communicate on the same LAN commonly used in Ethernet and Token Ring Networks allows computers to communicate by using names
NetBIOS
204
NetBIOS communicates over UDP ports
137 and 138
205
NetBIOS communicates over TCP ports
137 and 139
206
SMB
Server Message Block
207
SMB uses port
445
208
is a client server communication protocol for sharing access to network resources such as files, printers, serial ports, and other resources
SMB
209
is also referred to as Common Internet File System (CIFS) commonly used when working with network attached storage (NAS) units gives you the ability to share a resource and then to connect to and access the resource
SMB
210
SLP
Service Location Protocol
211
SLP uses port
427
212
enables computers to dynamically locate services in a local area network
SLP
213
provides users with an easy to use interface to a network's resource information
SLP
214
is an alternative to Lightweight Directory Access Protocol (LDAP)
SLP
215
are a type of SLP agent that has subscribers and workstations. These are clients. They want to know what is out there
User agents
216
is an SLP agent that has peripherals and resources | these are the servers
Service agents
217
are SLP agents that can cache peripheral and resources information within service agents to reduce traffic
Directory agents
218
The three types of SLP agents are
user, service, and directory
219
AFP
Apple Filing Protocol
220
is a Mac OS file protocol that uses port 548 enables users to access outside system files Includes security that provides features that restrict user access to certain files so that not anyone can get to any file
AFP
221
An AFP feature is _ access where users must first establish a remote file server connection
Server file
222
An AFP feature is _ components which manage components such as files, volumes, and AFP calls and folders
file system
223
``` In _ you will gain access too directory attributes file attributes backup date request count creation date file creator and destination directory ID ```
AFP Frame Parameters
224
LDAP
Lightweight Directory Access Protocol
225
is an application protocol that uses port 389 to search a directory service for objects such as organizations, individuals, and resources like files and devices
LDAP
226
LDAP uses port
389
227
``` can create a hierarchy (organizes all the resources) that begins with a root directory - single parent container that contains everything eg. countries organization organizational units -divisions -departments Individuals -people -files -resources ```
LDAP
228
``` benefits include allows multiple independent directories uses a global naming model -ensures uniqueness runs over TCP/IP and SSL Supported by services such as DNS for resolving object names Open source protocol ```
LDAP
229
SNMP
Simple Network Management Protocol
230
is an application layer protocol that uses ports 161/162 to manage and monitor network devices
SNMP
231
provides a common language for network devices in a LAN or Wide Area Network (WAN)
SNMP
232
SNMP__ is the most recent iteration it has many security enhancements like protect packets during transit by authenticating and encrypting SNMP messages
version 3
233
is a program that runs on hardware or service used to monitor and collect data eg. bandwidth and disk space
SNMP agent
234
SNMP ___ and __ are nodes on which an agent runs
devices and resources
235
SNMP __ is the centralized console | any system where you can centralize and gather up all of the data that is being reported by the agents
Manager
236
All of the data from the SNMP Manager is stored in the __ which is a database file that itemizes and describes all of the objects
Management Information Base (MIB)
237
In the __ 1. SNMP Manager Create get request (asking for info from the agent) PDU message (Protocol Data Unit) 2. SNMP Manager Send GetRequest - PDU message 3. SNMP Agent Recieve and Process 4. SNMP Agent Generate response 5. SNMP Agent Send Response 6. SNMP Manager Process response
SNMP Information Poll Process
238
DVI
Digital Visual Interface
239
A name to IP address mapping is a request sent out over port
53
240
A remote desktop connection uses port __by default
3389
241
The characteristics of the __ protocol are that it is reliable it uses acknowledgments
TCP
242
An outgoing email is sent out over protocol
25
243
If a webpage is requested over port 443 you would expect to see the prefix __ in the address bar of the browser
https
244
Requests over port __ use the protocols CIFS and SMB
445
245
port __ is used by SSH by default
22
246
The lightweight directory Access Protocol uses port __ by default
3389
247
The __ protocol would be best suitied for searching for a file on FileServer1
Net BIOS
248
Traffic originating over ports__ would indicate monitoring a network device
161 and 162
249
agents are components of the SLP protocol
Service and User
250
Requests originating from port __ would most likely be coming from A Mac client
548