Port definitions Flashcards

1
Q

used to transfer files from host to host

A

File Transfer Protocol FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

used to remotely administer network devices and systems. SCP is used for
secure copy and SFTP for secure FTP.

A

Secure Shell SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unencrypted method to remotely administer network devices (should not be used)

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used to send email over the Internet

A

Simple Mail transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

used to resolve hostnames to IPs and IPs to hostnames

A

Domain Name Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

used as a simplified version of FTP to put a file on a remote host, or get a file
from a remote host

A

Trivial FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

s used to transmit web page data to a client for unsecured web
browsing

A

Hyper Text Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Used for network authentication using a system of tickets within a Windows domain

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

used to receive email from a mail server

A

Post Office Protocol v3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

used to transport Usenet articles

A

Network News Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

used to located DCOM ports request a service from a program on
another computer on the network

A

Remote PRocedure Call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

used to conduct name querying, sending of data, and other functions over a
NetBIOS connection

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

used to receive email from a mail server with more
features than POP3

A

Internet Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

used to remotely monitor network devices

A

Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used to send Trap and InformRequests to the SNMP Manager on a network

A

SNMPTRAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

used to maintain directories of users and other
objects

A

Lightweight Directory Access Protocol

17
Q

used to transmit web page data to a client over an
SSL/TLS-encrypted connection

A

Hyper Text Transfer protocol secure

18
Q

used to provide shared access to files and other resources on a
network

A

Server Message Block

19
Q

used to send email over the Internet with an SSL and TLS
secured connection

A

Simple Mail Transfer Protocol

20
Q

used to conduct computer message logging, especially for routers and firewall logs

A

syslog

21
Q

used to maintain directories of users and other objects over an encrypted SSL/TLS
connection

A

LDAP

22
Q

used for linking data storage facilities over IP

A

iSCSI

23
Q

used to transfer files from host to host over an encrypted
connection

A

File Transfer Protocol Secure

24
Q

to receive email from a mail server over an SSL/TLS-encrypted connection

A

Internet Message Access Protocol

25
Q

used to receive email from a mail server using an SSL/TLS-encrypted
connection

A

Post Office Protocol v3

26
Q

used to receive SQL database queries from clients

A

Microsoft SQL server

27
Q

used for authentication and authorization
(1645) and accounting (1646)

A

Remote Authentication Dial-In user service

28
Q

used as an underlying VPN protocol but has no inherent security

A

Layer 2 tunnel Protocol

29
Q

an underlying VPN protocol with built-in security

A

Point to Point Tunneling Protocol

30
Q

used for authentication and authorization
(1812) and accounting (1813)

A

Remote Authentication Dial-In User Service

31
Q

used to encapsulate Fibre Channel frames within TCP/IP packets

A

Fibre Channel IP

32
Q

as the listening port for iSCSI-targeted devices when linking data storage
facilities over IP

A

iSCSI Target

33
Q

used to remotely view and control other Windows systems via a
Graphical User Interface

A

Remote Desktop Protocol

34
Q

A more advanced AAA protocol that is a replacement for RADIUS

A

Diameter

35
Q

It is used to conduct computer message logging, especially for routers and firewall logs, over
a TLS-encrypted connection

A

Syslog over TLS