Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR).
A. 21 B. 22 C. 23 D. 69 E. 3389 F. SSH G. Terminal services H. Rlogin I. Rsync J. Telnet |
Answer: B,C,F,J |
|
Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall? A. TCP 23 B. UDP 69 C. TCP 22 D. TCP 21 |
Answer: C |
|
Which of the following is the default port for TFTP? A. 20 B. 69 C. 21 D. 68 |
Answer: B |
|
FTP |
21 |
|
Telnet |
23 |
|
SMTP |
25 |
|
SNMP |
161 |
|
SCP |
22 |
|
TFTP |
69 |
|
Which of the following uses port 22 by default? (Select THREE). A. SSH B. SSL C. TLS D. SFTP E. SCP F. FTPS G. SMTP H. SNMP |
Answer: A,D,E |
|
Which of the following ports should be opened on a firewall to allow for Net BIOS communication? (Select TWO). A. 110 B. 137 C. 139 D. 143 E. 161 F. 443 |
Answer: B,C |
|
Which of the following ports is used for SSH, by default? A. 23 B. 32 C. 12 D. 22 |
Answer: D |
|
Which of the following ports should be used by a system administrator to securely manage a remote server? A. 22 B. 69 C. 137 D. 445 |
Answer: A |
|
Which of the following ports is used to securely transfer files between remote UNIX systems? A. 21 B. 22 C. 69 D. 445 |
Answer: B |
|
Ann, a technician, is attempting to establish a remote terminal session to an end user’s computer using Kerberos authentication, but she cannot connect to the destination machine. Which of the following default ports should Annen sure is open?
A. 22 B. 139 C. 443 D. 3389 |
Answer: D
|
|
A security technician wishes to gather and analyze all Web traffic during a particular time period.Which of the following represents the BEST approach to gathering the required data?
A. Configure a VPN concentrator to log all traffic destined for ports 80 and 443. B. Configure a proxy server to log all traffic destined for ports 80 and 443. C. Configure a switch to log all traffic destined for ports 80 and 443. D. Configure a NIDS to log all traffic destined for ports 80 and 443. |
Answer: B
|
|
A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to unauthorized file transfers,and wants to configure a firewall to block all TFTP traffic. Which of the following would accomplish this task?
A. Deny TCP port 68 B. Deny TCP port 69 C. Deny UDP port 68 D. Deny UDP port 69 |
Answer: D
|
|
Which of the following ports would be blocked if Pete, a security administrator, wants to deny access to websites? A. 21 B. 25 C. 80 D. 3389 |
Answer: C |
|
Which of the following secure file transfer methods uses port 22 by default?
A. FTPS B. SFTP C. SSL D. S/MIME |
Answer: B |
|
A company has implemented PPTP as aVPN solution. Which of the following ports would need to be opened on the firewall in order forthis VPN to function properly? (Select TWO).
A. UDP 1723 B. TCP 500 C. TCP 1723 D. UDP 47 E. TCP 47 |
Answer: C,D |
|
FTP/S uses which of the following TCP ports by default? A. 20 and 21 B. 139 and 445 C. 443 and 22 D. 989 and 990 |
Answer: D
|
|
A security technician needs to open ports on a firewall to allow for domain name resolution. Which of the following ports should be opened? (Select TWO). A. TCP 21 B. TCP 23 C. TCP 53 D. UDP 23 E. UDP 53 |
Answer: C,E |
|
After a new firewall has been installed, devices cannot obtain a new IP address. Which of thefollowing ports should Matt, the security administrator,open on the firewall? A. 25 B. 68 C. 80 D. 443 |
Answer: B |