Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/25

Click to flip

25 Cards in this Set

  • Front
  • Back
Which of the following is an example of a valid subnet mask?
None of the above is a valid subnet mask
Which of the answers listed below refers to a CIDR notation for 255.255.224.0 subnet mask?
/19
What is the binary representation of 255.255.128.0 subnet mask?
11111111.11111111.10000000.00000000
Which of the following answers lists a CIDR notation for 255.255.128.0 subnet mask?
/17
Information required for manual configuration of network adapter settings in MS Windows includes: (Select all that apply)

IP address


Subnet mask


Default gateway


DNS server address

The File Transfer Protocol (FTP) Control Connection for administering a session is established through port number:
21
The File Transfer Protocol (FTP) Data Connection for sending file data is established through port number:
20
The Secure Shell (SSH) protocol uses:
Port 22
Port number 23 is assigned to:
Telnet
Simple Mail Transfer Protocol (SMTP) operates with the use of port:
25
Which of the following port numbers is used by Domain Name System (DNS)?
53
Port number 80 is used by:
Hypertext Transfer Protocol (HTTP)
Post Office Protocol v3 (POP3) runs on port:
110
Port 143 is assigned to:
Internet Message Access Protocol (IMAP)
Which of the port numbers listed below is used by Hypertext Transfer Protocol over TLS/SSL (HTTPS)?
443
A network technician uses a Remote Desktop Protocol (RDP) client on their Windows OS in order to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection?
3389
Which of the following port numbers are reserved for NetBIOS services? (Select all that apply)

137


138


139

Port 445 is used by: (Select 2 answers)

Server Message Block (SMB)


Common Internet File System (CIFS)

What is the port number for Service Location Protocol (SLP)?
427
Which of the port numbers listed below is used by an Apple-proprietary file sharing protocol?
548
What is the function of POP3?
Retrieving email messages from a mail server
IMAP4 is used for:
Retrieving email messages from a mail server
A secure version of the HTTP protocol offering traffic encryption is known as: (Select all that apply)

HTTP over SSL


HTTP over TLS


HTTPS

A Microsoft-proprietary protocol providing a user with a graphical interface for connecting to another computer over a network is known as:
RDP
Which of the following would be in use when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN?
NetBIOS