1/24
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
An SNMP agent receives requests on UDP port:
161
An SNMP management station receives SNMP notifications from agents on UDP port:
162
TCP port 389 is the default network port for:
LDAP
Which of the following TCP ports is used by HTTPS?
443
TCP port 445 is assigned to:
SMB
The Syslog protocol runs on UDP port:
514
Which TCP port is used by the SMTP protocol for secure email transmission over TLS?
587
A network administrator wants to secure the existing access to a directory service with SSL/TLS encryption. Which of the TCP ports listed below needs to be opened to implement this change?
636
Which of the following services runs on TCP port 1433?
SQL Server
A network technician uses an RDP client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which TCP port needs to be opened for the built-in Windows RDP server to allow this type of network connection?
3389
Which of the TCP/UDP ports listed below is used for non-encrypted SIP traffic?
5060
Which TCP port is used by SIP over TLS?
5061
Which of the following protocols is used by network devices to send error messages and operational information, enabling administrators to diagnose and troubleshoot issues with IP packet delivery?
ICMP
UDP is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required for establishing a network connection. UDP supports error checking, flow control (managing the amount of data that is being sent), sequencing (rearranging packets that arrived out of order), and retransmission of lost packets. Example applications of UDP include the transmission of text and image data.
False
TCP is an example of a connectionless protocol. Because TCP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol. Example applications of TCP include the transmission of video and audio streaming data.
False
Which of the answers listed below does not refer to GRE?
Provides authentication, encryption, and data integrity
Which part of the IPsec protocol suite provides data integrity and authentication but not encryption?
AH
Which of the following answers refers to an IPsec component that provides (among other security features) data confidentiality?
ESP
Which of the answers listed below refers to a protocol within the IPsec protocol suite used to set up secure connections and exchange cryptographic keys?
IKE
A type of network traffic intended for a single host identified by a unique IP address is called:
Unicast
A type of network traffic sent from one sender to a particular group of receivers is referred to as:
Multicast
Which of the following answers describes network traffic sent from one sender to the nearest or best receiver among a group of potential receivers?
Anycast
Which of the answers listed below refers to a one-to-all communication type where data is sent from one sender to all possible receivers within a network segment?
Broadcast
Which of the following answers refer(s) to the IEEE 802.11a standard? (Select all that apply)
5 GHz frequency band, Maximum speed: 54 Mbps
Characteristic features of the IEEE 802.11b standard include: (Select all that apply)
2.4 GHz frequency band, Maximum speed: 11 Mbps