Common Network+ Port / Terms

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Cmontes14
C
Cmontes14
Community Contributor
Quizzes Created: 1 | Total Attempts: 452
Questions: 43 | Attempts: 452

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Acronyms - It'll help you remember what the letters actually mean
Terms - It isn't enough to just know what each acronym means, know the definition
Ports - Have to be able to understand each port related


Questions and Answers
  • 1. 

    Port 3389

    • A.

      RDP

    • B.

      TFTP

    • C.

      DHCP

    • D.

      DNS

    Correct Answer
    A. RDP
    Explanation
    Remote Desktop Protocol - A proprietary protocol developed by Microsoft. It allows you to connect to another computer and run programs. RDP operates similar to Telnet with the key difference being that it is NOT command line based, instead you view and operate through the graphical user interface of the remote computer.

    Rate this question:

  • 2. 

    Port 23?

    • A.

      Telecommunication

    • B.

      Teleport

    • C.

      Telnet

    • D.

      Telephone

    Correct Answer
    C. Telnet
    Explanation
    Telnet is the correct answer because it is a network protocol that allows remote access to computers or devices over a network. Port 23 is the default port used by Telnet for communication. The other options, Telecommunication, Teleport, and Telephone, are not specifically related to port 23 or the Telnet protocol.

    Rate this question:

  • 3. 

    What is HTTP/S and where is it commonly seen?

    • A.

      Hypertheme Transfer Protocol / Server - Internet

    • B.

      Hypertext Transfer Protocol / Server - Internet

    • C.

      Hypertext Transfer Protocol / Secure - Internet

    • D.

      Hypertheme Transfer Protocol / Secure - Internet

    Correct Answer
    C. Hypertext Transfer Protocol / Secure - Internet
    Explanation
    http://www.google.com - Look familiar?
    https://www.bankofamerica.com - Secure used for sensitive data.

    Rate this question:

  • 4. 

    Port 20, 21?

    • A.

      SFTP

    • B.

      PFT

    • C.

      NTP

    • D.

      FTP

    Correct Answer
    D. FTP
    Explanation
    Port 20 and 21 are commonly used for FTP (File Transfer Protocol) communication. Port 20 is used for data transfer, while port 21 is used for control commands and responses. FTP is a standard network protocol used to transfer files between a client and a server on a computer network. It provides a simple and reliable way to exchange files over the internet.

    Rate this question:

  • 5. 

    Port 67, 68?

    • A.

      DNS

    • B.

      DHPC

    • C.

      DHCP

    • D.

      FTP

    Correct Answer
    C. DHCP
    Explanation
    Port 67 and 68 are commonly associated with the DHCP (Dynamic Host Configuration Protocol) service. DHCP is responsible for automatically assigning IP addresses and other network configuration parameters to devices on a network. Port 67 is used by DHCP servers to receive client requests, while port 68 is used by DHCP clients to send requests to the server. Therefore, the correct answer is DHCP.

    Rate this question:

  • 6. 

    What is DHCP?

    • A.

      Dynamic Host Configuration Protocol

    • B.

      Dynamic Help Control Protocol

    • C.

      Dynamic Host Control Protocol

    • D.

      Dynamic Help Configuration Protocol

    Correct Answer
    A. Dynamic Host Configuration Protocol
    Explanation
    DHCP is used on IP networks to automatically assign network configuration parameters such as IP addresses.

    Rate this question:

  • 7. 

    Telnet is being replaced with?

    • A.

      SHS

    • B.

      STS

    • C.

      SSH

    • D.

      SFTP

    Correct Answer
    C. SSH
    Explanation
    SSH (Secure Shell) is being used as a replacement for Telnet. Telnet is an insecure protocol that transmits data in plain text, making it vulnerable to eavesdropping and unauthorized access. On the other hand, SSH provides a secure encrypted connection between a client and a server, ensuring confidentiality and integrity of the transmitted data. It also offers various authentication methods, making it a safer alternative to Telnet for remote access and file transfer. Therefore, SSH is the preferred choice for secure remote administration and file transfer, replacing the outdated and insecure Telnet protocol.

    Rate this question:

  • 8. 

    What port does Secure Shell use?

    • A.

      67

    • B.

      443

    • C.

      161

    • D.

      22

    Correct Answer
    D. 22
    Explanation
    Secure Shell (SSH) is a cryptographic network protocol that allows secure remote login, remote command execution, and other secure network services over an insecure network. It uses port 22 as the default port for communication. Therefore, the correct answer is 22.

    Rate this question:

  • 9. 

    Why is Telnet being replaced?

    • A.

      Lack of security

    • B.

      Lack of bandwidth

    • C.

      Support stopped

    • D.

      Command line broke

    Correct Answer
    A. Lack of security
    Explanation
    Telnet is being replaced due to its lack of security. Telnet is a protocol that allows remote access to servers and network devices, but it transmits data in plain text, making it vulnerable to eavesdropping and unauthorized access. As a result, it is no longer considered a secure method for remote access. To address these security concerns, alternative protocols such as SSH (Secure Shell) have been developed, which encrypt the data transmission and provide stronger authentication mechanisms, making them more suitable for secure remote access.

    Rate this question:

  • 10. 

    HTTP

    • A.

      161

    • B.

      443

    • C.

      80

    • D.

      67

    Correct Answer
    C. 80
    Explanation
    Port 80 is the correct answer because it is the default port for HTTP (Hypertext Transfer Protocol) communication. HTTP is the protocol used for transmitting and receiving web pages and other resources on the internet. When a user types a website address into their browser, the browser sends a request to the web server using port 80. The server then responds with the requested web page, which is displayed in the user's browser. Other ports mentioned (161, 443, and 67) are used for different protocols such as SNMP, HTTPS, and DHCP respectively.

    Rate this question:

  • 11. 

    HTTPS

    • A.

      443

    • B.

      80

    • C.

      161

    • D.

      23

    Correct Answer
    A. 443
    Explanation
    HTTPS is a secure communication protocol used for secure transfer of data over the internet. It uses port 443 as the default port for establishing secure connections. This port is specifically dedicated to handling HTTPS traffic. Other ports mentioned in the question, such as 80, 161, and 23, are used for different protocols like HTTP, SNMP, and Telnet respectively, but they are not associated with secure communication like HTTPS.

    Rate this question:

  • 12. 

    RDP

    • A.

      500

    • B.

      3389

    • C.

      23

    • D.

      443

    Correct Answer
    B. 3389
    Explanation
    The correct answer is 3389. This is because RDP (Remote Desktop Protocol) uses port 3389 as its default port for communication. RDP allows users to remotely access and control a computer over a network connection. By using the correct port, users can establish a remote desktop session and interact with the remote computer as if they were physically present at the machine.

    Rate this question:

  • 13. 

    What is SFTP?

    • A.

      Server File Transfer Protocol

    • B.

      Secure File Transport Protocol

    • C.

      Secure File Transfer Protocol

    • D.

      Server File Transport Protocol

    Correct Answer
    C. Secure File Transfer Protocol
    Explanation
    SFTP stands for Secure File Transfer Protocol. It is a network protocol that provides a secure and encrypted method for transferring files between a client and a server. Unlike regular FTP, which is unsecured, SFTP uses encryption to protect the data being transferred, ensuring confidentiality and integrity. Therefore, the correct answer is "Secure File Transfer Protocol".

    Rate this question:

  • 14. 

    Port 53?

    • A.

      DHCP

    • B.

      DSN

    • C.

      DSL

    • D.

      DNS

    Correct Answer
    D. DNS
    Explanation
    Port 53 is commonly used for DNS (Domain Name System) communication. DNS is responsible for translating domain names into IP addresses, allowing users to access websites using human-readable names instead of numerical IP addresses. Therefore, the correct answer is DNS, as it is the protocol associated with Port 53.

    Rate this question:

  • 15. 

    Port 25?

    • A.

      SMTP

    • B.

      TFTP

    • C.

      POP3

    • D.

      IMAP4

    Correct Answer
    A. SMTP
    Explanation
    SMTP stands for Simple Mail Transfer Protocol and is a communication protocol used for sending and receiving email messages between servers. Port 25 is the default port used by SMTP to transmit email messages. Therefore, the correct answer is SMTP as it is the protocol associated with port 25.

    Rate this question:

  • 16. 

    Port 110?

    • A.

      POP3

    • B.

      IMAP4

    • C.

      SMTP

    • D.

      HTTP

    Correct Answer
    A. POP3
    Explanation
    Port 110 is used for the POP3 (Post Office Protocol version 3) protocol. POP3 is an internet standard protocol used by email clients to retrieve email from a remote server. It allows users to download their emails onto their local devices and manage them offline. Therefore, the correct answer is POP3.

    Rate this question:

  • 17. 

    What is POP3?

    • A.

      Post Offer Protocol 3

    • B.

      Personal Office Property 3

    • C.

      Post Office Protocol v3

    • D.

      Post Office Protocol 3

    Correct Answer
    C. Post Office Protocol v3
    Explanation
    POP3 stands for Post Office Protocol version 3. It is a standard protocol used for receiving email messages from a mail server. It allows users to download their email messages from the server to their local devices, such as computers or mobile devices, and then delete them from the server. POP3 is widely used by email clients to retrieve email messages and is an essential component of email communication.

    Rate this question:

  • 18. 

    What is POP3 used for?

    • A.

      Receiving mail

    • B.

      Sending mail

    • C.

      Transferring mail

    • D.

      Transporting mail

    Correct Answer
    A. Receiving mail
    Explanation
    POP3 (Post Office Protocol version 3) is a standard protocol used for receiving mail from a mail server to a client device. It allows users to download their emails from the server to their local device, such as a computer or smartphone. Unlike SMTP (Simple Mail Transfer Protocol) which is used for sending mail, POP3 is specifically designed for the purpose of receiving mail. Therefore, the correct answer is "Receiving mail."

    Rate this question:

  • 19. 

    If POP3 is used to receive mail, SMTP is used to?

    • A.

      Transfer mail

    • B.

      Send mail

    • C.

      Receive mail

    • D.

      Transport mail

    Correct Answer
    B. Send mail
    Explanation
    SMTP (Simple Mail Transfer Protocol) is used to send mail. When a user composes an email and clicks on the send button, the SMTP server is responsible for delivering that email to the recipient's email server. It establishes a connection between the sender's email client and the recipient's email server and transfers the email from the sender to the recipient. Therefore, SMTP is the correct answer for the given question.

    Rate this question:

  • 20. 

    What is replacing POP3?

    • A.

      SMTP

    • B.

      IMAP4

    • C.

      SFTP

    • D.

      NTP

    Correct Answer
    B. IMAP4
    Explanation
    IMAP4 is replacing POP3 as the correct answer. IMAP4 (Internet Message Access Protocol version 4) is an internet standard protocol used by email clients to retrieve email messages from a mail server. It offers more advanced features compared to POP3, such as the ability to access and manage email messages on the server without downloading them to the client device. IMAP4 allows for better synchronization between multiple devices and provides more flexibility in organizing and managing emails. Therefore, it is considered a more modern and efficient replacement for POP3.

    Rate this question:

  • 21. 

    Port 143

    • A.

      POP3

    • B.

      SMTP

    • C.

      FTP

    • D.

      IMAP4

    Correct Answer
    D. IMAP4
    Explanation
    Port 143 is associated with the IMAP4 (Internet Message Access Protocol version 4) protocol. IMAP4 is used for retrieving and managing email messages from a mail server. It allows users to access their email accounts and keep the messages stored on the server, providing synchronization across multiple devices. Unlike POP3 (Post Office Protocol version 3) which is another email retrieval protocol, IMAP4 allows users to view and manage their email messages without downloading them to their local device. SMTP (Simple Mail Transfer Protocol) is used for sending email messages, while FTP (File Transfer Protocol) is used for transferring files over a network.

    Rate this question:

  • 22. 

    IMAP4

    • A.

      Internet Message Abnormal Protocol 4

    • B.

      Internet Message Access Protocol 4

    • C.

      Internet Message Abnormal Protocol v4

    • D.

      Internet Message Access Protocol v4

    Correct Answer
    D. Internet Message Access Protocol v4
    Explanation
    IMAP4 stands for Internet Message Access Protocol version 4. It is a protocol used by email clients to retrieve emails from a mail server. IMAP4 allows users to access their emails from multiple devices while keeping the emails stored on the server. This protocol provides advanced features such as folder management, message search, and synchronization between devices. Therefore, the correct answer is "Internet Message Access Protocol v4".

    Rate this question:

  • 23. 

    Port 500

    • A.

      SMTP

    • B.

      NTP

    • C.

      IPsec

    • D.

      SNMP

    Correct Answer
    C. IPsec
    Explanation
    Port 500 is associated with IPsec (Internet Protocol Security), which is a protocol suite used for securing Internet Protocol (IP) communications. IPsec provides encryption, authentication, and integrity for IP packets, ensuring secure communication over an IP network. It operates at the network layer of the OSI model and can be used for VPN (Virtual Private Network) connections. Therefore, IPsec is the correct answer for this question.

    Rate this question:

  • 24. 

    SNMP

    • A.

      Single Network Management Protocol

    • B.

      Single Network Master Protocol

    • C.

      Simple Network Master Protocol

    • D.

      Simple Network Management Protocol

    Correct Answer
    D. Simple Network Management Protocol
    Explanation
    SNMP stands for Simple Network Management Protocol. It is a widely used protocol for network management and monitoring. SNMP allows network administrators to manage and monitor network devices, such as routers, switches, and servers, by collecting and organizing information about these devices. It provides a standardized way to communicate with network devices and retrieve information such as device status, performance data, and configuration details. SNMP is an essential tool for network administrators to ensure the smooth operation and optimal performance of their networks.

    Rate this question:

  • 25. 

    SNMP

    • A.

      161

    • B.

      80

    • C.

      443

    • D.

      23

    Correct Answer
    A. 161
  • 26. 

    Telnet port + 100

    • A.

      123

    • B.

      125

    • C.

      167

    • D.

      261

    Correct Answer
    A. 123
    Explanation
    The given answer, 123, is obtained by adding 100 to the telnet port number. The telnet port number is not explicitly mentioned in the question, but it is implied that the telnet port number is 23. Adding 100 to 23 gives us 123, which is the correct answer.

    Rate this question:

  • 27. 

    Port 123

    • A.

      SFTP

    • B.

      TFTP

    • C.

      DNS

    • D.

      NTP

    Correct Answer
    D. NTP
    Explanation
    Port 123 is associated with NTP (Network Time Protocol). NTP is a protocol used for synchronizing the time on computer systems. It allows devices connected to a network to maintain accurate time by synchronizing with a reference time source. NTP uses the User Datagram Protocol (UDP) on port 123 to communicate. SFTP (Secure File Transfer Protocol) uses port 22, TFTP (Trivial File Transfer Protocol) uses port 69, and DNS (Domain Name System) uses port 53. Therefore, the correct answer is NTP.

    Rate this question:

  • 28. 

    NTP is?

    • A.

      Network Transport Protocol

    • B.

      Network Transfer Protocol

    • C.

      Network Trivial Protocol

    • D.

      Network Time Protocol

    Correct Answer
    D. Network Time Protocol
    Explanation
    NTP stands for Network Time Protocol, which is a networking protocol used to synchronize the clocks of computer systems over a network. It allows computers to maintain accurate time even if they are located in different time zones or have different clock settings. NTP is widely used in computer networks to ensure that all devices have consistent time, which is crucial for various applications such as file synchronization, network security, and distributed systems.

    Rate this question:

  • 29. 

    Port 69

    • A.

      SFTP

    • B.

      DHCP

    • C.

      TFTP

    • D.

      IPsec

    Correct Answer
    C. TFTP
    Explanation
    TFTP (Trivial File Transfer Protocol) is a network protocol used for transferring files between systems. It operates on port 69, making it the correct answer. SFTP (Secure File Transfer Protocol) is a different protocol that provides secure file transfer over SSH, so it is not the correct answer. DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses to devices on a network, and IPsec is a suite of protocols used for securing internet communications. Neither of these protocols uses port 69, so they are not the correct answers.

    Rate this question:

  • 30. 

    TFTP is

    • A.

      Transport File Transfer Protocol

    • B.

      Trivial File Transfer Protocol

    • C.

      Targeted File Transfer Protocol

    • D.

      Telnet File Transfer Protocol

    Correct Answer
    B. Trivial File Transfer Protocol
    Explanation
    TFTP stands for Trivial File Transfer Protocol. It is a simple and lightweight file transfer protocol used for transferring files between client and server on a network. TFTP is commonly used in scenarios where a minimalistic and fast file transfer solution is required, such as in booting devices over a network or transferring firmware updates to network devices. Unlike other file transfer protocols, TFTP does not provide authentication or encryption mechanisms, making it less secure but more efficient for certain applications.

    Rate this question:

  • 31. 

    What is the secure version of Telnet?

    • A.

      FTP

    • B.

      RDP

    • C.

      SSH

    • D.

      NTP

    Correct Answer
    C. SSH
    Explanation
    The secure version of Telnet is SSH. Telnet is a protocol used for remote login and command execution on a network. However, Telnet does not provide encryption, making it vulnerable to security threats. SSH (Secure Shell) is a cryptographic network protocol that provides secure communication over an unsecured network. It encrypts the data transmitted over the network, ensuring confidentiality and integrity of the information exchanged between the client and server. Therefore, SSH is the recommended secure alternative to Telnet.

    Rate this question:

  • 32. 

    HTTP manages communications between web browsers and web servers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    HTTP (Hypertext Transfer Protocol) is a protocol used for communication between web browsers (clients) and web servers. It enables the exchange of data, such as web pages, images, and other resources, over the internet. HTTP requests are made by browsers to retrieve information from servers, and servers respond with the requested data. Therefore, the statement "HTTP manages communications between web browsers and web servers" is true.

    Rate this question:

  • 33. 

    HTTPS employs a multitude of security features for keeping a connection secure when you shop online or sign into applications.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that uses encryption to protect the data exchanged between a user's browser and a website. It employs several security features such as encryption, data integrity, and authentication to ensure a secure connection. This is important when shopping online or signing into applications because it helps to prevent unauthorized access, protect sensitive information, and ensure that the data transmitted between the user and the website remains confidential. Therefore, the statement that HTTPS employs a multitude of security features for keeping a connection secure when shopping online or signing into applications is true.

    Rate this question:

  • 34. 

    Telnet is being replaced with Secure Shell because it offers poor transfer rates.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Telnet is not being replaced with Secure Shell because it offers poor transfer rates. In fact, Telnet is being replaced with Secure Shell primarily due to security concerns. Telnet is an unencrypted protocol that transmits data in clear text, making it vulnerable to eavesdropping and unauthorized access. On the other hand, Secure Shell (SSH) provides secure encrypted communication between two systems, ensuring confidentiality and integrity of the data being transferred. While transfer rates can vary depending on various factors, it is not the main reason for the replacement of Telnet with SSH.

    Rate this question:

  • 35. 

    Telnet is GUI based.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Telnet is not GUI based. It is a command-line protocol used to establish a remote connection to a device or server. It allows users to access and manage remote systems using text-based commands. Unlike GUI-based applications, Telnet does not provide a graphical user interface with icons, menus, and windows. Instead, it relies on a command-line interface where users input commands and receive text-based responses. Therefore, the correct answer is False.

    Rate this question:

  • 36. 

    RDP is GUI based.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    RDP stands for Remote Desktop Protocol, which is a proprietary protocol developed by Microsoft. It allows users to connect to and control a remote computer or virtual machine over a network. One of the main advantages of RDP is that it provides a graphical user interface (GUI) for the remote computer, allowing users to interact with it as if they were physically present. Therefore, the statement "RDP is GUI based" is true, as RDP enables the transmission of graphical information between the local and remote machines.

    Rate this question:

  • 37. 

    SFTP uses SSH to transfer files.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    SFTP (Secure File Transfer Protocol) is a network protocol that allows secure file transfer over a secure shell (SSH) connection. SSH provides a secure channel for transmitting data, including file transfers, over an unsecured network. Therefore, SFTP does indeed use SSH to transfer files, making the statement true.

    Rate this question:

  • 38. 

    DNS resolves internet names, such as google.com, to their corresponding MAC addresses.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    DNS (Domain Name System) resolves internet names, such as google.com, to their corresponding IP addresses, not MAC addresses. MAC addresses are used for identifying devices on a local network, while IP addresses are used for identifying devices on the internet. Therefore, the given statement is incorrect, and the correct answer is False.

    Rate this question:

  • 39. 

    IMAP4 is superior to POP3 because it allows you to control how you download your mail. For added security, it allows you to peek at the message header or view part of the message before you access it completely.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    IMAP4 is indeed superior to POP3 because it offers more control over downloading emails. With IMAP4, users can choose how they want to download their mail, which provides flexibility and convenience. Additionally, IMAP4 allows users to preview the message header or view a portion of the message before fully accessing it, enhancing security by enabling users to identify potential spam or malicious content. Therefore, the statement is true.

    Rate this question:

  • 40. 

    NTP syncs the clocks on our computers to one standard time source, typically an atomic clock.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    NTP (Network Time Protocol) is a protocol used to synchronize the clocks on computers to a standard time source. This standard time source is usually an atomic clock, which is known for its high accuracy. By syncing the clocks on our computers to this standard time source, we ensure that all devices are using the same time reference, which is important for various network operations and time-sensitive applications. Therefore, the given statement is true.

    Rate this question:

  • 41. 

    TFTP is a stripped down lesser unsecured version of FTP.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    TFTP, or Trivial File Transfer Protocol, is indeed a stripped-down and less secure version of FTP. Unlike FTP, TFTP does not support authentication or encryption, making it less secure for transferring files over a network. It is commonly used in situations where simplicity and speed are more important than security, such as for booting diskless workstations or transferring firmware updates to network devices. Therefore, the statement that TFTP is a stripped down lesser unsecured version of FTP is true.

    Rate this question:

  • 42. 

    Secure Shell sets up an encrypted remote server to perform operations.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Secure Shell (SSH) is a cryptographic network protocol that allows secure remote login, file transfer, and other network services. It does not set up an encrypted remote server, but rather provides a secure channel over an unsecured network. Therefore, the given statement is false.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 08, 2014
    Quiz Created by
    Cmontes14
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.