Term
________ is a worldwide system of connected computer networks. Connected computers use the _______ protocol suite. |
|
Definition
|
|
Term
The Internet is not controlled by any one governing body except in two technical aspects.
First, the IP classification system is defined by the _______. Second, DNS is defined by the ________. Otherwise, the Internet is “controlled” by various ISPs and network providers depending on the location. |
|
Definition
Internet Assigned Numbers Authority (IANA)
Internet Engineering Task Force (IETF) |
|
|
Term
________ is an enormous system of interlinked hypertext documents that are accessed with a web browser. _______ is the current stage. |
|
Definition
World Wide Web (WWW)
Web 2.0 |
|
|
Term
________ is a private computer network that an organization implements to share data with employees. |
|
Definition
Intranet
TCP/IP protocols, such as HTTP and FTP, and email protocols, such as POP3 and SMTP, are all utilized in the same way that they are on the Internet. Again, the only difference is this is a privatized version of the Internet, and any company can have one. |
|
|
Term
________ is a private computer network that extends to users outside a company in order to share data. |
|
Definition
|
|
Term
________ a connection between two or more computers or devices that are not on the same private network. In effect creating a tunnel through LANs and WANs connecting the 2 devices together. |
|
Definition
VPN (Virtual Private Network) |
|
|
Term
________ has widespread support with nearly all versions of Windows. It uses the Microsoft Point‐to‐Point Encryption (MPPE) protocol with RC4 (128‐bit key) to protect data that is in transit. |
|
Definition
Point‐to‐Point Tunneling Protocol (PPTP)
PPTP provides confidentiality, it prevents data from being viewed, but does not provide data integrity. It doesn't protect the packet from being intercepted and modified.
Uses Port 1723 |
|
|
Term
________, is a type of tunneling protocol that requires that the computers mutually authenticate themselves to each other. |
|
Definition
Layer 2 Tunneling Protocol over IPsec (L2TP/IPsec)
Uses UDP port 1701 |
|
|
Term
_________ is the native authentication protocol for Windows Server 2003 and later and provides the easiest way to secure VPN connections in a domain‐based environment. It provides mutual authentication, anti‐replay, and non-repudiation just like digital certificates. |
|
Definition
|
|
Term
_________, is a type of tunneling protocol that works by sending PPP or L2TP traffic through an SSL 3.0 channel |
|
Definition
Secure Socket Tunneling Protocol (SSTP)
SSTP uses SSL and TCP port 443 to relay traffic. It is designed for remote access VPNs; works over IPv4 and IPv6 networks; and traverses NAT, firewalls, and web proxies. It uses a generic port that is rarely blocked by firewalls. It uses PPP for user authentication and RC4/AES for data confidentiality. |
|
|
Term
VPN Reconnect also known as ________, is a feature introduced with Routing and Remote Access Service (RRAS) in Windows Server 2008 R2 and Windows 7. |
|
Definition
Internet Key Exchange version 2 (IKEv2)
It differs from other VPN protocols in that it will not drop the VPN tunnel associated with the session. Its designed for remote access VPNs. It works well over IPv4 and IPv6 networks and traverses NAT. It also supports user or machine authentication via IKEv2 and uses 3DES and AES for data confidentiality. IKEv2 uses UDP port 500. |
|
|
Term
________, also known as pure packet filtering, does not retain memory of packets that have passed through the firewall. Due to this it can be vulnerable to IP spoofing attacks. |
|
Definition
|
|
Term
A firewall running ________, is normally not vulnerable to IP Spoofing because it keeps track of the state of network connections by examining the header in each packet. |
|
Definition
Stateful Packet Inspection (SPI)
This function operates at the Network Layer of the OSI model. |
|
|
Term
_______, filters traffic per ports (TCP or UDP). This can be done in three ways: by way of basic endpoint connections, by matching incoming traffic to the corresponding outbound IP address connection, or by matching incoming traffic to the corresponding IP address AND port |
|
Definition
|
|
Term
________, supports address and port translation and checks if they type of application traffic is allowed. |
|
Definition
Application-level Gateway (ALG) |
|
|
Term
________ works at the Session Layer of the OSI model, when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. |
|
Definition
Circuit-level Gateway
Circuit‐level gateways hide information about the private network, but they do not filter individual packets. |
|
|
Term
__________ acts as an intermediary between the LAN and the Internet. Can also cache pages in order to increase speed of commonly accessed websites. |
|
Definition
|
|
Term
________ attempts to detect malicious network activities, for example port scans and DoS attacks, by constantly monitoring network traffic, then reports any issues that it finds to a network administrator as long as it is configured properly. |
|
Definition
Network Intrusion Detection System (NIDS) |
|
|
Term
_________ is designed to inspect traffic and based on the configuration or security policy, it can remove, detain, or redirect malicious traffic in addition to simply detecting it. |
|
Definition
Network Intrusion Prevention System (NIPS) |
|
|
Term
________ is a group of computers, that exchange data, usually confined to a small geographic area. |
|
Definition
|
|
Term
________ is the device that enables the sending and receiving of data to and from a computer. |
|
Definition
Network Adapter aka. Network Interface Card (NIC) |
|
|
Term
________ means the network card can send and receive data simultaneously |
|
Definition
|
|
Term
__________ is a set of rules that govern the transmission of data between network adapters and various central connecting devices. All network adapters and central connecting devices must be compatible in order to communicate with each other. |
|
Definition
|
|
Term
__________ is when information is sent to one host only. This reduces network traffic greatly, and helps with packet loss and duplicates |
|
Definition
|
|
Term
what is the loopback address for a computer? What commands are used to ping? |
|
Definition
127.0.0.1
ping localhost ping loopback ping 127.0.0.1 |
|
|
Term
________ acts as the central connecting device for the wireless network and allows laptops, PDAs and handheld computers to communicate with each other. |
|
Definition
Wireless Access Point (WAP) |
|
|
Term
__________ is a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location |
|
Definition
|
|
Term
__________ is a small network that is set up separately from a company’s private local area network and the Internet. It is called this because it is usually on the edge of the LAN |
|
Definition
Perimeter Network aka Demilitarized Zone (DMZ)
DMZ has become the more popular way to reference it. |
|
|
Term
The configuration for a DMZ that has it situated between two firewall devices. |
|
Definition
Back-to-back configuration |
|
|
Term
When the DMZ is attached to a separate connection of the company firewall. So, the firewall would have three connections: one to the company LAN, one to the DMZ, and one to the internet. |
|
Definition
3-leg perimeter configuration |
|
|
Term
__________ define the physical connections of hosts in a computer network. |
|
Definition
|
|
Term
When a __________ topology is used, each computer is individually wired to a central connecting device with twisted-pair cabling. |
|
Definition
|
|
Term
In a ________ topology, every computer connects to every other computer; no central connecting device is needed. |
|
Definition
|
|
Term
In a ________ topology, each computer is connected to two other computers in a circular path. |
|
Definition
|
|
Term
The _________ network architecture sends data logically in a ring fashion, however the computers are physically connected in a star fashion. |
|
Definition
|
|
Term
_________ topology describes how the data is actually sent from one computer to the next. |
|
Definition
|
|
Term
__________ is a dynamic protocol that uses distance-vector routing algorithms to decipher which route to send data packets. |
|
Definition
Routing Information Protocol (RIP) |
|
|
Term
__________ is a link-state protocol that monitors the network for routers that have a change in their link-state, meaning whether they were turned off or on or restarted. |
|
Definition
Open Shortest Path First (OSPF) |
|
|
Term
__________ refers to the networks ability to use maximum bandwidth while reducing latency, error rates, and downtime. |
|
Definition
|
|
Term
The maximum throughput of a T1 line. The maximum throughput of a T3 line. |
|
Definition
|
|
Term
________ is a digital technology developed to combat the limitations of PSTN. Users can send data, talk on the phone, and fax simultaneously from one line. |
|
Definition
Integrated Services Digital Network (ISDN) |
|
|
Term
__________ is a standard for transmitting data on optical fiber cables at a rate of around 100 Mbps. |
|
Definition
Fiber Distributed Data Interface (FDDI) |
|
|
Term
_________ is a family of technologies that provide data transmissions over local telephone networks. |
|
Definition
Digital Subscriber Lines (DSL) |
|
|
Term
__________ is used to send packets from one network to another network. |
|
Definition
|
|
Term
__________ cable is used to connect like devices to each other; for example, a computer to another computer or a switch to another switch. |
|
Definition
|
|
Term
__________ cable is the most common type of patch cable, and is the type that you would use to connect a computer to a central connecting device like a switch. |
|
Definition
|
|
Term
When a signal degrades as it runs through a wire, you have _________. |
|
Definition
|
|
Term
What is the most common adapter or connector used to connect a computer to a wired network. |
|
Definition
|
|
Term
To test a cable, you would use a _________. |
|
Definition
|
|
Term
You need to connect a twisted-pair cable to the back of a patch panel. What tool would you use. |
|
Definition
|
|
Term
What are the speeds of the following Cable Types.
1. Category 3 2. Category 5 3. Category 5e 4. Category 6 5. Category 7A |
|
Definition
1. 10 Mbps
2. 100 Mbps
3. 100 Mbps and Gigabit networks
4. Gigabit networks
5. 10 Gigabit networks |
|
|
Term
What are two types of interference for signals traveling along a wire. |
|
Definition
Electormagnetic Interference (EMI) Radio Frequency Interference (RFI) |
|
|
Term
What is it called when a signal transmitted on one copper wire or pair of wires creates an undesired effect on another wire or pair of wires. |
|
Definition
|
|
Term
Cables that are installed inside walls or above drop ceilings where sprinkler systems cannot access in the case of a fire should be __________ or low smoke rated. |
|
Definition
|
|
Term
__________ transmits light instead of electricity. The light (photons) is transmitted over glass and plastic. |
|
Definition
|
|
Term
__________ is a cable with an optical fiber that is meant to carry a single ray of light: one ray of light, one mode. This type of cable is normally used for longer distance runs, generally 10 km, and up to 80 km. |
|
Definition
Single-mode fiber optic (SMF) |
|
|
Term
__________ is a cable with a larger fiber core, capable of carrying multiple rays of light. This type of cable is used for shorter distance runs, up to 600 meters. Though much shorter than single‐mode fiber runs, this is still six times the length of twisted‐pair cable runs. |
|
Definition
Multi-mode fiber optic (MM) |
|
|
Term
________ acts as the central connecting device for the wireless network and allows laptops, PDAs and handheld computers to communicate with each other. |
|
Definition
Wireless Access Point (WAP) |
|
|
Term
_________ is used to extend the coverage of a wireless network. |
|
Definition
|
|
Term
Similar to a wireless repeater, a __________ can connect different 802.11 standards together. |
|
Definition
|
|
Term
__________, which is the EM field that is generated by a network cable or network device that can be manipulated to eavesdrop or steal data. |
|
Definition
|
|
Term
Max Data transfer rate and frequency for the following 802.11 standards.
1. 802.11a 2. 802.11b 3. 802.11g 4. 802.11n |
|
Definition
1. 54 Mbps at 5GHz
2. 11 Mbps at 2.4 GHz
3. 54 Mbps at 2.4 GHz
4. 600 Mbps (300 Mbps Typical) at 5 or 2.4 GHz |
|
|
Term
What is the least secure wireless encryption protocol and which is the most secure. |
|
Definition
WEP (Wired Equivalent Privacy) Least
WPA2 (Wi-Fi Protected Access) Most |
|
|
Term
__________ is a Port-based Network Access Control (PNAC) it provides strong authentication to devices that want to connect to the WLAN. |
|
Definition
|
|
Term
The two primary ways to connect to a wireless network are __________ and _________. |
|
Definition
Infrastructure mode - Uses WAP and SSID to connect
ad hoc mode - Also referred as P2P as all clients communicate directly with eachother, there is no base (WAP) |
|
|
Term
|
Definition
|
|
Term
__________ is a reference model used to define how data communications occur on computer networks. |
|
Definition
Open Systems Interconnection reference model (OSI)
The OSI model was created as a set of seven layers, each of which houses different protocols within one of several protocol suites, the most common of which is TCP/IP. The OSI model categorizes how TCP/IP transactions occur. It is invaluable when it comes to installing, configuring, maintaining, and, especially, troubleshooting networks. |
|
|
Term
What are the 7 Layers of the OSI model |
|
Definition
Layer 1 - Physical Layer 2 - Data Link Layer 3 - Network Layer 4 - Transport Layer 5 - Session Layer 6 - Presentation Layer 7 - Application
Mnemonic - Please Do Not Throw Sausage Pizzas Away |
|
|
Term
Layer 1: Physical layer: This is the physical and electrical medium for data transfer. It includes but is not limited to cables, jacks, patch panels, punch blocks, hubs, and multistation access units (MAUs). It is also known as the physical plant. If you can touch it, it is part of the Physical layer.
The unit of measurement used on this layer is bits.
|
|
Definition
Layer 2: Data Link layer: This layer establishes, maintains, and decides how transfer is accomplished over the Physical layer. Devices that exist on the DLL are network interface cards, bridges, WAP, layer 2 switches and network adapters. Just about any device that makes a physical connection to the network and can move data is on the Data Link layer.
The unit of measurement used on this layer is frames.
|
|
|
Term
Layer 3: Network layer: The Network layer is dedicated to routing and switching information between different networks, LANs, or internetworks. This can be on the LAN or WAN. Devices that exist on the Network layer are routers and IP switches. Now we are getting into the logical addressing of hosts.
Now you can see that a typical computer really has two addresses: a physical or hardware‐based address, such as a MAC address, and a logical or software‐based address, such as an IP address. Part of the trick in networking is to make sure the two get along together!
The unit of measurement used on this layer is packets.
|
|
Definition
Layer 4: Transport layer: This layer ensures error‐free transmission between hosts through logical addressing. Therefore, it manages the transmission of messages through Layers 1 through 3. The protocols that are categorized by this layer break up messages, send them through the subnet, and ensure correct reassembly at the receiving end, making sure there are no duplicates or lost messages. This layer contains both connection‐oriented and connectionless systems. Inbound and outbound ports are controlled by this layer. When you think ports, think the Transport layer.
The unit of measurement used on this layer is sometimes referred to as segments, or messages. All layers above this use the terms data and messages.
|
|
|
Term
Layer 5: Session layer: This layer governs the establishment, termination, and synchronization of sessions within the OS over the network and between hosts-—for example, when you log on and log off. It is the layer that controls the name and address database for the OS or NOS. NetBIOS (Network Basic Input/Output System) works on this layer. |
|
Definition
Layer 6: Presentation layer: This layer translates the data format from sender to receiver in the various operating systems that may be used. Concepts include code conversion, data compression, and file encryption. Redirectors work on this layer, for example, mapped network drives that enable a computer to access file shares on a remote computer. |
|
|
Term
Layer 7: Application layer: This is where message creation—and, therefore, packet creation—begins. DB access is on this level. End‐user protocols, such as FTP, SMTP, Telnet, and RAS, work at this layer. This layer is not the application itself, but the protocols that are initiated by this layer. |
|
Definition
|
|
Term
_________ is the most common type of switch that is used on a LAN. They are hardware based and they use the MAC address of each host computer’s network adapter when deciding where to direct frames of data; every port on the switch is mapped to the specific MAC address of the computer that physically connects to it. |
|
Definition
Layer 2 Switch
Layer 2 Switches do not normally modify frames as they pass through the switch. Can also allow for a VLAN. |
|
|
Term
__________ determines paths for data using logical addressing (IP addresses) instead of physical addressing (MAC addresses), they are very similar to routers. Can be managed by utilizing the Simple Network Management Protocol (SNMP). |
|
Definition
Layer 3 Switch
Layer 3 switches forward packets, whereas Layer 2 forward frames. |
|
|
Term
__________ switches are the least expensive and are used in homes and Small Office/Home Office environments. You just connect AC power to the switch and connect your network devices. |
|
Definition
|
|
Term
__________ switches include more advanced features, including supporting Spanning Tree Protocol, port mirroring, setting port bandwidth, and creating and modifying virtual LANs. |
|
Definition
|
|
Term
Ports in the 0-1023 range are known as _________, and defines commonly used protocols; FTP, SMTP, and HTTP are some examples. |
|
Definition
|
|
Term
Ports above 29,152 are known as __________. |
|
Definition
|
|
Term
What ports do the following use:
1. FTP 2. Telnet 3. SMTP 4. HTTP 5. POP3 |
|
Definition
1. File Transfer Protocol 21
2. TErminaL NETwork -23
3. Simple Mail Transfer Protocol -25
4. Hypertext Transfer Protocol -80
5. Post Office Protocol Version 3 -110 |
|
|
Term
What is the difference between Layer 2 and Layer 3 switches |
|
Definition
Switches reside on the Network layer. A Layer 3 switch differs from a Layer 2 switch in that it determines paths for data using logical addressing (IP addresses) instead of physical addressing (MAC addresses). Layer 3 switches are very similar to routers |
|
|
Term
|
Definition
netstat (the original command, shows basic connections)
netstat –a (shows in‐depth TCP and UDP connections)
netstat –an (shows TCP and UDP connections numerically)
arp -a (displays MAC addresses of other hosts that your computer has recently connected to) |
|
|
Term
What are the Layers of the TCP model |
|
Definition
Layer 1: Data Link layer (aka Link layer)
Layer 2: Network layer (aka Internet layer)
Layer 3: Transport layer
Layer 4: Application layer - Comprises the OSI Application, Presentation and Session Layers. |
|
|
Term
TCP/IP protocol that is connection-oriented |
|
Definition
Transmission Control Protocol (TCP)
Example would be a web browser. Using TCP ensures that data gets to its final destination. If a packet is lost along the way, it is resent until the destination computer acknowledges delivery or ends the session |
|
|
Term
TCP/IP protocol that is connectionless |
|
Definition
User Datagram Protocol (UDP)
Example would be streaming media. But with streaming media, we are either watching or listening in real time. So, if a packet is lost, we don’t really care because that time frame of the video or music has already passed. |
|
|
Term
If the binary digit is a 0, it is ________, meaning the corresponding IP address bit is part of the Host ID. |
|
Definition
|
|
Term
If the binary digit is a 1, it is ________, meaning the corresponding IP address bit is part of the Network ID. |
|
Definition
|
|
Term
__________ is the act of dividing a network into smaller logical subnetworks. |
|
Definition
|
|
Term
_________ is the first IP address of the device that a client computer will look for when attempting to gain access outside the local network. |
|
Definition
|
|
Term
If a Windows client cannot get an IP address from a DHCP server, and has not been configured statically, it will auto‐assign 169.254.0.0 this is called _______. |
|
Definition
APIPA (Automatic Private IP Addressing) |
|
|
Term
________ is a way of allocating IP addresses and routing internet Protocol packets. It was intended to replace classful IP addressing to slow the exhaustion of IPv4 addresses. |
|
Definition
CIDR (Classless Interdomain Routing) |
|
|
Term
The process of modifying an IP address while it is in transit across a router, computer, or similar device. |
|
Definition
NAT (Network Address Translation) |
|
|
Term
IP resides on which layer of the OSI model. |
|
Definition
|
|
Term
What is the default subnet mask and IP Range for Class A, B, and C and what is the IP range for D and E. |
|
Definition
Class | IP Range | Default Subnet Mask
A | 0-127 | 255.0.0.0 B | 128-191 | 255.255.0.0 C | 192-223 | 255.255.255.0 D | 224-239 | Multicasting E | 240-255 | |
|
|
Term
________ allows a Network to be divided into different Subnets and make an IP Network to appear to be a different Class |
|
Definition
VLSM (Variable-Length Subnet Masking) |
|
|
Term
Link-local addresses in IPv6 can be broken down into two types they are |
|
Definition
Windows auto-configured address start with - FE80, FE90, FEAO, FEBO Loopback Address which is know as ::1 |
|
|
Term
FE80::5efe:10.0.0.2%2 is an example of what |
|
Definition
|
|
Term
________ is when there is two internet Protocol software implementations in an operating system, one for IPv4 another for IPv6 |
|
Definition
|
|
Term
|
Definition
|
|
Term
The __________ command displays information pertaining to your network adapter, namely TCP/IP configurations. |
|
Definition
|
|
Term
The __________ command is used to test connectivity to other hosts; it tells you by way of command‐line results whether a remote host is “alive” on the network |
|
Definition
|
|
Term
__________ provides information and statistics about protocols in use and current TCP/IP network connections on a local host. |
|
Definition
Netstat
(The name derives from the words network and statistics.) |
|
|
Term
netstat –a This displays TCP and UDP connections.
netstat –an
This displays TCP and UDP connections in numeric format
netstat –r
This displays the route table and produces the same results as executing route print, which is covered in more depth later. |
|
Definition
|
|
Term
The __________ command is used to show NetBIOS over TCP/IP statistics for local and remote computers. |
|
Definition
|
|
Term
__________ command shows the paths to a destination on another network, it does this by showing each hop and displays the host name and IP address along with the amount of time for each hop. |
|
Definition
|
|
Term
__________ command is similar to tracert in the information displayed, but will also show you the degree of packet loss |
|
Definition
|
|
Term
__________ displays information about DNS names and their corresponding IP addresses, and can be used to diagnose DNS servers |
|
Definition
|
|
Term
__________ is used to take control of a remote computer via the command line. |
|
Definition
|
|
Term
__________ is an error-reporting protocol, network devices like routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets. |
|
Definition
Internet Control Message Protocol (ICMP) |
|
|
Term
Dynamic Host Configuration Protocol (DHCP) allows properly configured client computers to obtain IP addresses automatically from a DHCP server. This is done so that a network administrator does not have to manually configure IP addresses on all of the computers on the network individually. The DHCP server takes care of this task quickly and automatically. |
|
Definition
DHCP sessions use a four‐step process known as DORA. The four steps are:
Discovery: The client computer broadcasts out to the network in order to find a DHCP server.
Offering: The DHCP server sends out a unicast “offering” of an IP address to the client computer.
Request: The client broadcasts to all servers that it has accepted the offer.
Acknowledge: The DHCP server sends a final unicast to the client, including the IP information that the client will use.
|
|
|
Term
Which two ports does DHCP use |
|
Definition
|
|
Term
Which tool allows you to access a machine remotely, including programs, the desktop, and the command prompt? |
|
Definition
|
|
Term
__________ is a network service in Windows servers, including Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016. It allows an administrator to configure dial‐up remote access servers, VPN servers, IP routing, and NAT. |
|
Definition
Routing and Remote Access Service (RRAS) |
|
|
Term
Internet Protocol Security (IPsec) is a protocol within the TCP/IP suite that encrypts and authenticates IP packets. It is designed to secure any application traffic because it resides on the Network layer (or Internet layer as TCP/IP programmers refer to it). |
|
Definition
There are three main protocols that IPsec uses to perform its necessary functions:
Security association (SA): This generates the encryption and authentication keys that are to be used by IPsec.
Authentication header (AH): This provides connectionless integrity and the authentication of data. It also provides protection versus replay attacks.
Encapsulating Security Payload (ESP): This provides the same services as AH but also provides confidentiality when sending data.
|
|
|
Term
__________ is a worldwide service that resolves host names to IP addresses. This facilitates proper communication between computers. |
|
Definition
|
|
Term
__________ is a service that resolves NetBIOS names to IP addresses. It is the Microsoft version of the NetBIOS Name Service (NBNS) combined with a name server. |
|
Definition
Windows Internet Naming Service (WINS) |
|
|
Term
__________ is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. |
|
Definition
Network Address Translation (NAT) |
|
|
Term
__________ is a local file stored on the computer that translates domain names or NetBIOS names into an IP addresses. |
|
Definition
|
|
Term
___________ file is used to enable Domain Name Resolution under Windows when other methods, such as WINS, fail. It is used in conjunction with workgroups and domains. |
|
Definition
|
|
Term
_________ is used to connect to a terminal server. |
|
Definition
Remote Desktop Connection (RDC) |
|
|
Term
|
Definition
Port 21
File Transfer Protocol |
|
|
Term
What port does telnet use? |
|
Definition
|
|
Term
|
Definition
Port 25
Simple Mail Transfer Protocol |
|
|
Term
|
Definition
Port 53
Domain Name System |
|
|
Term
What ports do HTTP and HTTPS use? |
|
Definition
HTTP uses Port 80
HTTPS uses Port 443
Hypertext Transfer Protocol |
|
|
Term
|
Definition
Port 110
Post Office Protocol Version 3 |
|
|
Term
|
Definition
Port 1701
Layer 2 Tunneling Protocol |
|
|
Term
|
Definition
Port 1723
Point-to-Point Tunneling Protocol |
|
|
Term
|
Definition
Port 389
Lightweight Directory Access Protocol |
|
|
Term
|
Definition
|
|