Port definitions Flashcards

1
Q

used to transfer files from host to host

A

File Transfer Protocol FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

used to remotely administer network devices and systems. SCP is used for
secure copy and SFTP for secure FTP.

A

Secure Shell SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unencrypted method to remotely administer network devices (should not be used)

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used to send email over the Internet

A

Simple Mail transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

used to resolve hostnames to IPs and IPs to hostnames

A

Domain Name Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

used as a simplified version of FTP to put a file on a remote host, or get a file
from a remote host

A

Trivial FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

s used to transmit web page data to a client for unsecured web
browsing

A

Hyper Text Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Used for network authentication using a system of tickets within a Windows domain

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

used to receive email from a mail server

A

Post Office Protocol v3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

used to transport Usenet articles

A

Network News Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

used to located DCOM ports request a service from a program on
another computer on the network

A

Remote PRocedure Call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

used to conduct name querying, sending of data, and other functions over a
NetBIOS connection

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

used to receive email from a mail server with more
features than POP3

A

Internet Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

used to remotely monitor network devices

A

Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used to send Trap and InformRequests to the SNMP Manager on a network

A

SNMPTRAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

used to maintain directories of users and other
objects

A

Lightweight Directory Access Protocol

17
Q

used to transmit web page data to a client over an
SSL/TLS-encrypted connection

A

Hyper Text Transfer protocol secure

18
Q

used to provide shared access to files and other resources on a
network

A

Server Message Block

19
Q

used to send email over the Internet with an SSL and TLS
secured connection

A

Simple Mail Transfer Protocol

20
Q

used to conduct computer message logging, especially for routers and firewall logs

21
Q

used to maintain directories of users and other objects over an encrypted SSL/TLS
connection

22
Q

used for linking data storage facilities over IP

23
Q

used to transfer files from host to host over an encrypted
connection

A

File Transfer Protocol Secure

24
Q

to receive email from a mail server over an SSL/TLS-encrypted connection

A

Internet Message Access Protocol

25
used to receive email from a mail server using an SSL/TLS-encrypted connection
Post Office Protocol v3
26
used to receive SQL database queries from clients
Microsoft SQL server
27
used for authentication and authorization (1645) and accounting (1646)
Remote Authentication Dial-In user service
28
used as an underlying VPN protocol but has no inherent security
Layer 2 tunnel Protocol
29
an underlying VPN protocol with built-in security
Point to Point Tunneling Protocol
30
used for authentication and authorization (1812) and accounting (1813)
Remote Authentication Dial-In User Service
31
used to encapsulate Fibre Channel frames within TCP/IP packets
Fibre Channel IP
32
as the listening port for iSCSI-targeted devices when linking data storage facilities over IP
iSCSI Target
33
used to remotely view and control other Windows systems via a Graphical User Interface
Remote Desktop Protocol
34
A more advanced AAA protocol that is a replacement for RADIUS
Diameter
35
It is used to conduct computer message logging, especially for routers and firewall logs, over a TLS-encrypted connection
Syslog over TLS