CompTIA Security+ SY0-501 Exam Preparation (Latest Version) Set 7

2) An FTP data transfer connection is established through a TCP port number:


Options are :

  • a) 23
  • b) 25
  • c) 21
  • d) 20

Answer :d) 20

CompTIA Security+ Cert. (SY0-501): Practice Tests 2019 Set 1

3) Which of the port numbers listed below are used by FTP over TLS/SSL (FTPS)?

(Select 2 answers)


Options are :

  • a) 20
  • b) 989
  • c) 5060
  • d) 21
  • e) 990

Answer :b) 989 e) 990

4) Which of the following statements are true?

(Select all that apply)


Options are :

  • a) Secure File Transfer Protocol (SFTP) runs by default on port 22
  • b) Secure Copy (SCP) runs by default on port 22
  • c) Secure Shell (SSH) runs by default on port 22
  • d) File Transfer Protocol over TLS/SSL (FTPS) runs by default on port 22
  • e) Trivial File Transfer Protocol (TFTP) runs by default on port 22

Answer :a) Secure File Transfer Protocol (SFTP) runs by default on port 22 b) Secure Copy (SCP) runs by default on port 22 c) Secure Shell (SSH) runs by default on port 22

5) Dynamic Host Configuration Protocol (DHCP) runs on:

(Select 2 answers)


Options are :

  • a) UDP port 65
  • b) UDP port 66
  • c) UDP port 67
  • d) UDP port 68
  • e) UDP port 69

Answer :c) UDP port 67 d) UDP port 68

CompTIA JK0-801 A+ Certification Part 2 Practice Exam Set 7

6) Which UDP port number is used by DNS?


Options are :

  • a) 53
  • b) 67
  • c) 110
  • d) 389

Answer :a) 53

7) TCP port 80 is assigned to:


Options are :

  • a) Hypertext Transfer Protocol (HTTP)
  • b) Hypertext Transfer Protocol over TLS/SSL (HTTPS)
  • c) Internet Message Access Protocol (IMAP)
  • d) Lightweight Directory Access Protocol (LDAP)

Answer :a) Hypertext Transfer Protocol (HTTP)

8) HTTPS runs on:


Options are :

  • a) TCP port 80
  • b) TCP port 443
  • c) UDP port 53
  • d) TCP port 143

Answer :b) TCP port 443

CompTIA Cloud Essentials CLO-001 Certified Practice Exam Set 7

9) Which of the TCP port numbers listed below is assigned to the Internet Message Access Protocol (IMAP)?


Options are :

  • a) 143
  • b) 389
  • c) 443
  • d) 636

Answer :a) 143

10) What are the characteristic features of IMAPS?

(Select all that apply)


Options are :

  • a) TCP port 143
  • b) Secure Sockets Layer (SSL)
  • c) TCP port 993
  • d) Transport Layer Security (TLS)
  • e) TCP port 995

Answer :b) Secure Sockets Layer (SSL) c) TCP port 993 d) Transport Layer Security (TLS)

11) Which protocols use port 500?

(Select 2 answers)


Options are :

  • a) L2TP
  • b) IKE
  • c) POP3S
  • d) SIP
  • e) ISAKMP

Answer :b) IKE e) ISAKMP

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 5

12) Which of the following answers refers to a port number assigned to the Kerberos authentication system?


Options are :

  • a) 49
  • b) 88
  • c) 1645
  • d) 1723

Answer :b) 88

13) Port 1701 is used by:


Options are :

  • a) L2TP
  • b) RADIUS
  • c) PPTP
  • d) SMTPS

Answer :a) L2TP

14) TCP port 389 is the default network port for:


Options are :

  • a) RDP
  • b) LDAP
  • c) SMB
  • d) LDAPS

Answer :b) LDAP

CompTIA CA1-001 Advanced Security Practitioner Practice Exam Set 7

15) A network administrator has been asked to secure directory service access with an SSL/TLS encryption. Which of the following TCP ports needs to be opened to implement this change?


Options are :

  • a) 636
  • b) 389
  • c) 443
  • d) 1720

Answer :a) 636

16) TCP port 119 is assigned to:


Options are :

  • a) Internet Message Access Protocol (IMAP)
  • b) Post Office Protocol v3 (POP3)
  • c) Network Time Protocol (NTP)
  • d) Network News Transfer Protocol (NNTP)

Answer :d) Network News Transfer Protocol (NNTP)

17) Network Time Protocol (NTP) runs on UDP port:


Options are :

  • a) 123
  • b) 110
  • c) 161
  • d) 137

Answer :a) 123

CompTIA Security+ Cert. (SY0-501): Practice Tests 2019 Set 1

18) Post Office Protocol version 3 (POP3) uses:


Options are :

  • a) TCP port 110
  • b) UDP port 123
  • c) TCP port 143
  • d) UDP port 161

Answer :a) TCP port 110

19) Which of the answers listed below refer(s) to POP3S encrypted communication?

(Select all that apply)


Options are :

  • a) TCP port 993
  • b) Secure Sockets Layer (SSL)
  • c) TCP port 995
  • d) Transport Layer Security (TLS)
  • e) TCP port 110

Answer :b) Secure Sockets Layer (SSL) c) TCP port 995 d) Transport Layer Security (TLS)

20) Which of the following statements are true?

(Select all that apply)


Options are :

  • a) Point-to-Point Tunneling Protocol (PPTP) runs on TCP port 1723
  • b) Port 1701 is used by Layer 2 Forwarding Protocol (L2F) and Layer 2 Tunneling Protocol (L2TP)
  • c) Port number 88 is used by Kerberos authentication system
  • d) Hypertext Transfer Protocol over TLS/SSL runs on TCP port 143
  • e) Port number 443 is used by Internet Message Access Protocol (IMAP)

Answer :a) Point-to-Point Tunneling Protocol (PPTP) runs on TCP port 1723 b) Port 1701 is used by Layer 2 Forwarding Protocol (L2F) and Layer 2 Tunneling Protocol (L2TP) c) Port number 88 is used by Kerberos authentication system

JK0-019 CompTIA E2C Network + Certification Exam Set 9

21) Which of the ports listed below are used by RADIUS?

(Select 2 answers)


Options are :

  • a) 989
  • b) 1812
  • c) 5060
  • d) 990
  • e) 1813

Answer :b) 1812 e) 1813

22) A network technician uses Remote Desktop Protocol (RDP) client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection?


Options are :

  • a) TCP port 389
  • b) TCP port 636
  • c) TCP port 3389
  • d) TCP port 993

Answer :c) TCP port 3389

23) Unblocking port number 22 enables what type of traffic?

(Select all that apply)


Options are :

  • a) SSH
  • b) SFTP
  • c) FTP
  • d) TFTP
  • e) SCP

Answer :a) SSH b) SFTP e) SCP

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

24) Which of the following ports are assigned to the Session Initiation Protocol (SIP)?

(Select 2 answers)


Options are :

  • a) 989
  • b) 1812
  • c) 5060
  • d) 990
  • e) 1813
  • f) 5061

Answer :c) 5060 f) 5061

25) Secure File Transfer Protocol (SFTP) is an extension to the Secure Shell protocol (SSH) and runs on TCP port number 22.


Options are :

  • True
  • False

Answer :True

26) TCP port 25 is used by:


Options are :

  • a) SNMP
  • b) Telnet
  • c) FTP
  • d) SMTP

Answer :d) SMTP

LX0-104 CompTIA Linux + Powered by LPI Practice Exam Set 1

27) What are the characteristic features of SMTPS?

(Select all that apply)


Options are :

  • a) TCP port 143
  • b) Secure Sockets Layer (SSL)
  • c) TCP port 443
  • d) Transport Layer Security (TLS)
  • e) TCP port 465

Answer :b) Secure Sockets Layer (SSL) d) Transport Layer Security (TLS) e) TCP port 465

28) An SNMP management station receives SNMP notifications from Agents on UDP port:


Options are :

  • a) 161
  • b) 137
  • c) 162
  • d) 138

Answer :c) 162

29) An SNMP Agent receives requests on UDP port:


Options are :

  • a) 161
  • b) 137
  • c) 162
  • d) 138

Answer :a) 161

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 9

30) The Secure Shell (SSH) protocol uses TCP port:


Options are :

  • a) 23
  • b) 25
  • c) 21
  • d) 22

Answer :d) 22

31) A network administrator has been asked to set up a VPN link on a connecting host with no dedicated VPN client application installed. Which of the following ports needs to be opened to enable this type of connection?


Options are :

  • a) 443
  • b) 22
  • c) 143
  • d) 3389

Answer :a) 443

32) Which of the answers listed below refer to ports used by syslog servers?

(Select 2 answers)


Options are :

  • a) UDP port 514
  • b) TCP port 465
  • c) TCP port 6514
  • d) UDP port 500

Answer :a) UDP port 514 c) TCP port 6514

CompTIA Cloud Essentials Cert Exam Prep CL0-002 Set 1

33) TACACS+ runs on TCP port:


Options are :

  • a) 389
  • b) 49
  • c) 636
  • d) 88

Answer :b) 49

34) Port number 23 is assigned to:


Options are :

  • a) Secure Shell (SSH)
  • b) File Transfer Protocol (FTP)
  • c) Telnet
  • d) Simple Mail Transfer Protocol (SMTP)

Answer :c) Telnet

35) Trivial File Transfer Protocol (TFTP) uses:


Options are :

  • a) UDP port 66
  • b) UDP port 67
  • c) UDP port 68
  • d) UDP port 69

Answer :d) UDP port 69

JK0-019 CompTIA E2C Network + Certification Exam Set 8

CompTIA Security+ Exam SY0-501 Cryptography Quiz (Question 1-45)


1) Which of the following terms illustrate(s) the security through obscurity concept?

(Select all that apply)


Options are :

  • a) Code obfuscation
  • b) Steganography
  • c) SSID broadcast suppression
  • d) Encryption
  • e) Substitution ciphers

Answer :a) Code obfuscation b) Steganography c) SSID broadcast suppression e) Substitution ciphers

2) Which of the answers listed below refers to a solution designed to strengthen the security of session keys?


Options are :

  • a) ECB
  • b) PFS
  • c) EFS
  • d) PFX

Answer :b) PFS

3) In cryptography, the term "Key stretching" refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks.


Options are :

  • True
  • False

Answer :True

CD0-001 CDIA+ Certification Practice Exam Set 4

4) Which of the three states of digital data requires data to be processed in an unencrypted form?


Options are :

  • a) Data-in-transit
  • b) Data-at-rest
  • c) Data-in-use

Answer :c) Data-in-use

5) In cryptography, the term "Secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner workings.


Options are :

  • True
  • False

Answer :True

6) The term "Ephemeral key" refers to an asymmetric encryption key designed to be used only for the duration of a single session or transaction.


Options are :

  • True
  • False

Answer :True

NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 8

7) What are the characteristic features of a session key?

(Select 2 answers)


Options are :

  • a) Used during a single session
  • b) Asymmetric key
  • c) Reused during multiple sessions
  • d) Symmetric key

Answer :a) Used during a single session d) Symmetric key

8) In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key size determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security.


Options are :

  • True
  • False

Answer :True

9) Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate fragments and encrypt each fragment separately.


Options are :

  • True
  • False

Answer :True

CD0-001 CDIA+ Certification Practice Exam Set 4

10) Which of the following terms is used in conjunction with the assumption that the output of a cryptographic function should be considerably different from the corresponding plaintext input?


Options are :

  • a) Confusion
  • b) Obfuscation
  • c) Collision
  • d) Diffusion

Answer :a) Confusion

11) Which of the terms listed below is used to describe a situation where a small change introduced to the input data before encryption causes large changes in its encrypted version?


Options are :

  • a) Diffusion
  • b) Confusion
  • c) Obfuscation
  • d) Collision

Answer :a) Diffusion

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions