CompTIA Network + 1.5 Networking Fundamentals – Ports and Protocols

Posted by:

|

On:

|

Ports and Protocols – Networking

1 / 30

Which protocol and port number should be used for transferring small files between network devices without authentication?

2 / 30

Which protocol and port number should be used for transferring files without encryption?

3 / 30

Which protocol and port number should be used for secure web browsing?

4 / 30

Which protocol and port number are used by web servers to deliver web pages to browsers over an unencrypted connection?

5 / 30

Which protocol and port number are used for querying directory services securely?

6 / 30

Which protocol and port number should be used to remotely manage a network device in an unencrypted manner?

7 / 30

Which protocol and port number are used for synchronizing time across devices on a network?

8 / 30

Which protocol and port number are used for the remote desktop connection?

9 / 30

Which protocol and port number are used to establish a secure session for browsing the web?

10 / 30

Which protocol and port number are used by email clients to retrieve messages from a mail server using an encrypted connection?

11 / 30

Which protocol and port number are used to establish a secure session for browsing the web?

12 / 30

Which protocol and port number are used for synchronizing time across devices on a network?

13 / 30

Which protocol and port number are used for querying directory services securely?

14 / 30

Which protocol and port number are used by email clients to retrieve messages from a mail server using an encrypted connection?

15 / 30

A technician needs to set up a database connection to a MySQL server. Which port number should they configure?

16 / 30

A technician needs to configure a network device to listen for incoming network management requests. Which protocol and port number should they configure?

17 / 30

Which protocol and port number are used to download email messages from a mail server using an encrypted connection?

18 / 30

A technician needs to configure a network device to listen for incoming network management requests. Which protocol and port number should they configure?

19 / 30

A technician needs to set up a database connection to a MySQL server. Which port number should they configure?

20 / 30

A network administrator is configuring a secure remote access service for employees to access the company’s internal resources from home. Which protocol and port number should they use?

21 / 30

Which protocol and port number should be used to remotely manage a network device in an unencrypted manner?

22 / 30

Which protocol and port number should be used for sending emails securely?

23 / 30

Which protocol and port number should be used for secure web browsing?

24 / 30

Which protocol and port number should be used for transferring small files between network devices without authentication?

25 / 30

Which protocol and port number should be used for network logging?

26 / 30

Which protocol and port number are used to download email messages from a mail server using an encrypted connection?

27 / 30

Which protocol and port number should be used for transferring files without encryption?

28 / 30

Which protocol and port number are used by web servers to deliver web pages to browsers over an unencrypted connection?

29 / 30

Which protocol and port number should be used for network logging?

30 / 30

Which protocol and port number are used for resolving domain names to IP addresses?

Your score is

Exit