• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR).
A. 21
B. 22
C. 23
D. 69
E. 3389
F. SSH
G. Terminal services
H. Rlogin
I. Rsync
J. Telnet

Answer: B,C,F,J

Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall?


A. TCP 23


B. UDP 69


C. TCP 22


D. TCP 21

Answer: C

Which of the following is the default port for TFTP?


A. 20


B. 69


C. 21


D. 68

Answer: B

FTP

21

Telnet

23

SMTP

25

SNMP

161

SCP

22

TFTP

69

Which of the following uses port 22 by default? (Select THREE).


A. SSH


B. SSL


C. TLS


D. SFTP


E. SCP


F. FTPS


G. SMTP


H. SNMP

Answer: A,D,E

Which of the following ports should be opened on a firewall to allow for Net BIOS communication? (Select TWO).


A. 110


B. 137


C. 139


D. 143


E. 161


F. 443

Answer: B,C

Which of the following ports is used for SSH, by default?


A. 23


B. 32


C. 12


D. 22

Answer: D

Which of the following ports should be used by a system administrator to securely manage a remote server?


A. 22


B. 69


C. 137


D. 445

Answer: A

Which of the following ports is used to securely transfer files between remote UNIX systems?


A. 21


B. 22


C. 69


D. 445

Answer: B

Ann, a technician, is attempting to establish a remote terminal session to an end user’s computer using Kerberos authentication, but she cannot connect to the destination machine. Which of the following default ports should Annen sure is open?
A. 22
B. 139
C. 443
D. 3389
Answer: D
A security technician wishes to gather and analyze all Web traffic during a particular time period.Which of the following represents the BEST approach to gathering the required data?
A. Configure a VPN concentrator to log all traffic destined for ports 80 and 443.
B. Configure a proxy server to log all traffic destined for ports 80 and 443.
C. Configure a switch to log all traffic destined for ports 80 and 443.
D. Configure a NIDS to log all traffic destined for ports 80 and 443.
Answer: B
A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to unauthorized file transfers,and wants to configure a firewall to block all TFTP traffic. Which of the following would accomplish this task?
A. Deny TCP port 68
B. Deny TCP port 69
C. Deny UDP port 68
D. Deny UDP port 69
Answer: D

Which of the following ports would be blocked if Pete, a security administrator, wants to deny access to websites?


A. 21


B. 25


C. 80


D. 3389

Answer: C

Which of the following secure file transfer methods uses port 22 by default?
A. FTPS
B. SFTP
C. SSL
D. S/MIME

Answer: B

A company has implemented PPTP as aVPN solution. Which of the following ports would need to be opened on the firewall in order forthis VPN to function properly? (Select TWO).

A. UDP 1723
B. TCP 500
C. TCP 1723
D. UDP 47
E. TCP 47

Answer: C,D

FTP/S uses which of the following TCP ports by default?


A. 20 and 21


B. 139 and 445


C. 443 and 22


D. 989 and 990

Answer: D

A security technician needs to open ports on a firewall to allow for domain name resolution. Which of the following ports should be opened? (Select TWO).




A. TCP 21


B. TCP 23


C. TCP 53


D. UDP 23


E. UDP 53

Answer: C,E

After a new firewall has been installed, devices cannot obtain a new IP address. Which of thefollowing ports should Matt, the security administrator,open on the firewall?




A. 25


B. 68


C. 80


D. 443

Answer: B