2025/2026) WITH QUESTIONS AND VERIFIED ANSWERS.
What is port 25 used for?
A) SMTP
B) HTTP
C) HTTPS
D) DNS - ---Answers---A) SMTP
What is port 110 used for?
A) DNS
B) LDAP
C) NetBIOS
D) POP - ---Answers---D) POP
What is port 143 used for?
A) NetBIOS
B) SSH
C) IMAP
,D) SMTP - ---Answers---C) IMAP
What is port 80 used for?
A) HTTP
B) HTTPS
C) FTP
D) RDP - ---Answers---A) HTTP
What is port 443 used for?
A) HTTP
B) HTTPS
C) FTP
D) RDP - ---Answers---B) HTTPS
Wi-Fi Protected Access (WPA) changes keys with the
______________ Key Integrity Protocol (TKIP).
A) Traditional
B) Temporary
C) Temporal
D) Tailored - ---Answers---C) Temporal
,Wi-Fi Protected Access v2 (WPA2) adds security with
_____________.
A) ICMP
B) PNP
C) CCMP
D) RMPT - ---Answers---C) CCMP
What new authentication technology is introduced with Wi-Fi
Protected Access v3 (WPA3)?
A) Blockchain
B) SAE
C) RKIP
D) Blowfish - ---Answers---B) SAE
What is it known when a ping request is successfully received?
A) ICMP Echo Reply
B) ICMP Echo Response
C) ICMP Echo Request
D) ICMP Echo Init - ---Answers---A) ICMP Echo Reply
What is it known when a ping request is successfully sent?
, A) ICMP Echo Reply
B) ICMP Echo Response
C) ICMP Echo Request
D) ICMP Echo Init - ---Answers---C) ICMP Echo Request
What TCP flag indicates that a packet is requesting a new
connection?
A) PSH
B) SYN
C) RST
D) URG - ---Answers---B) SYN
What type of network is most often used to connect
peripherals to computers and mobile devices?
A) Wi-Fi
B) Bluetooth
C) WAN
D) LAN - ---Answers---B) Bluetooth
Which one of the following ports is not normally used by email
systems?
A) 25