Network Plus Ports
The MGCP protocol is generating traffic, which VoIP uses to send voice data over a network.
You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427. Which kind of network traffic uses this port?
Open port 25 to allow SMTP service.
After blocking a number of ports to secure your server, you are unable to send email. To allow email service which of the following needs to be done?
80 for HTTP; 443 for SSL
Haley configures a website using Windows Server 2016 default values. What are the HTTP port and SSL port settings?
downloading a file
In the output of the netstat command you notice that a remote system has made a connection to your windows Server 2016 system using TPC/IP port 21. Which of the following actions is the remote system most likely performing?
Telnet which is inherently insecure because its communication is in plain text and is easily intercepted.
Setting up computer at worker's home to connect to UNIX server at the office. Which utility should you use to accomplish this task?
Someone is using voice over IP (VoIP) to make a telephone call.
You are monitoring network traffic on your network, and you see traffic between two network hosts on port 1720. What is the source of this network traffic?
web server and email server Explanation (TCP/IP port 80 is associated with accessing web pages from a web server using the hypertext transfer protocol (HTTP). Email can be accessed using a number of protocols, including the simple mail transfer protocol (SMTP), the post office protocol version 3 (POP3) and the internet message access protocol version 4 (IMAP4). SMTP uses TCP/IP port 25, while POP3 uses TCP/IP port 110, and IMAP4 uses TCP/IP port 143. )
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server?
110 (POP3) and 25 (SMTP)
You are configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select two.)
443
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, though you can browse the internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
Coordinates rules for transmitting bits.
What is the basic purpose of the OSI Physical layer?
Routes messages between networks
What is the primary function of the Network layer?
connection establishment
What task is associated with the Session Layer?
Encrypt and compress data Specify data format (such as file formats)
What two functions are performed at the Presentation Layer?
Close all ports; open only ports required by applications inside the DMZ
When designing a firewall what is the recommended approach for opening and closing ports?
Identifying physical network devices Controlling how messages are propagated through the network
Which of the following are included as part of Data Link Layer specifications?
End-to-end flow control Reliable message delivery Data segmentation and reassembly
Which of the following functions are performed by OSI Transport layer? ̣Three
TFTP (Trivial File Transfer Protocol)
Which of the following is a file transfer protocol that uses UDP?
SSH
Which of the following network services or protocols uses TCP/IP 22?
TFTP (explanation: The trivial file transfer protocol (TFTP) uses TCP/IP port 69. TFTP is a connectionless service for downloading files from a remote system. It is often used for downloading firmware to networking devices.
Which of the following network services or protocols uses TCP/IP port 69?
23
Which port does telnet use?
161
Which port number is used by SNMP?
UDP 69
Which protocol and port number is used by TFTP?
UDP 67 and TCP 67
Which protocols and port numbers are used by DHCP? (Select two.)
The HTTP port should be changed to 80.
You administer a web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.17. The name of the computer is www.westsim.com. You configured the website as follows: !P address 192.168.23.8; HTTP Port 1030; SSL Port: 443.... Users complain they can't connect to the website when they type www.westsim.com. What is the most likely cause of the problem?
The workstation is using NetBIOS to access shared resources on the server.
You are monitoring network traffic on your network. You see a large amount of traffic between a Windows workstation and a Windows server on the following ports: • 137 • 138 • 139 What is the source of this network traffic?
A proxy server is blocking access to the websites.
You connect your computer to a wireless network available at the local library. You find that you can access all the websites you want on the Internet except for two. Which might be causing the problem?
Destination address of a packet Source address of a packet Port number
You have just installed a packet filtering firewall on your network. Which options will you be able to set on your firewall? (Select all that apply.)
123 (TCP/IP port 123 is assigned to the network time protocol (NTP). NTP is used to communicate time synchronization information between systems on a network. )
You have recently installed a new Windows Server 2016 system. To ensure the accuracy of the system time, you have loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. Now, you must configure the firewall on your network to allow time synchronization traffic through. Which of the following ports are you most likely to open on the firewall?
FTP (File Transfer Protocol)
You want to allow users to download files from a server running the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability?
53
You want to maintain tight security on your internal network so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable?