Which of the following ports are used by the NetBIOS protocol to share files and printers on a Windows network?
NetBIOS is a protocol used for File and Print Sharing under all current versions of Windows. While this in itself is not a problem, the way that the protocol is implemented can be. There are a number of vulnerabilities associated with leaving this port open. NetBios services: Show By default, when File and Print Sharing is enabled it binds to everything, including TCP/IP (The Internet Protocol), rather than just the local network, meaning your shared resources are available over the entire Internet for reading and deletion, unless configured properly. Any machine with NetBIOS enabled and not configured properly should be considered at risk. The best protection is to turn off File and Print Sharing, or block ports 135-139 completely. If you must enable it, use the following guidelines: 1. Use strong passwords, containing non-alphanumeric
characters. Keep in mind that you might still be leaking out information about your system that can be used against you (such as your computer and workgroup names) to the entire Internet, unless ports are filtered by a firewall. There is also a Critical Windows RPC vulnerability affecting ports 135,139 and 445, as detailed here: MS Technet Security Bulletin [MS03-026] The following trojans/backdoors also use these ports: W32.HLLW.Moega [Symantec-2003-080813-3234-99] W32.Reidana.A [Symantec-2005-032515-4042-99] (2005.03.27) - worm that spreads using the MS DCOM RPC vulnerability (MS Security Bulletin [MS03-026]) on port 139. The worm attempts to download and execute a remote file via FTP. Opens TCP port 4444. W32.Klez worm [Symantec-2002-031910-1028-99] - a class of worms that collects email addresses from an infected computer's Windows address book and propagates using its own SMTP server. As of April 26, 2002, there are nine variants of the Klez worm that all exploit the "Microsoft Internet Explorer Incorrect MIME header" vulnerability, which causes an email attachment to be automatically executed when an HTML email is previewed by a Microsoft Outlook or Outlook Express user. The worm can arrive as an email attachment with one of the following file extensions: asp, bak, c, cpp, doc, htm, html, jpg, mp3, mpg, mpeg, pas, rtf, wab, or xls. W32.Sircam.Worm [Symantec-2001-071720-1640-99] - a computer worm that propagates by e-mail from Microsoft Windows systems. It also spreads via open shares on a network. Sircam scans the network for computers with shared drives and copy itself to a machine with an open (non-password protected) drive or directory. Buffer overflow in a certain driver in Cisco Security Agent 4.5.1 before 4.5.1.672, 5.0 before 5.0.0.225, 5.1 before 5.1.0.106, and 5.2 before 5.2.0.238 on Windows allows remote attackers to execute arbitrary code via a crafted SMB packet in a TCP session on port (1) 139 or (2) 445. Server Message Block (SMB) also uses this port. It is used by Microsoft Windows file and print services, such as Windows Sharing in Mac OS X. What is the port for outbound email traffic 25 SMTP Which of the following ports is used by the service location protocol when organizing and locating printers databases and other resources in a network? 427 Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 54 Mbps? 802.11a Which type of wireless network utilizes the 2.4 GHz frequency band and reaches up to 11 Mbps speeds? 802.11b You are building a new server and want to ensure that its memory can allow the server to continue working even if there is an issue that corrupts data held within the memory modules. Which of the following types of memory should you select for the server? ECC (Error correcting code memory) Which of the following network configurations on a virtual machine are used to prevent the VM from accessing the internet, but still allows it to communicate with other VMs on the host and the host itself? External
You want to create a website for your new technical support business. You decide to purchase an on-demand cloud-based server and install Linux, Apache, and WordPress on it to run your website. Which of the following best describes which type of service you have just purchased? Daas What are the 6 steps to CompTIA Troubleshooting Method
Identify the problem Jennifer just moved from France to the United States. She unpacks her computer and plugs it into the wall using a power adapter to ensure the plug connects properly. When she tries to power on the computer, the screen remains blank, she doesn't hear the fans spinning, and nothing appears to be happening. What is MOST likely the problem? The psu output is set to 115V A computer technician is trying to set up a shared printer on the corporate network. The users must send print jobs directly to the printer, and the printer will be used by multiple operating systems, including Windows, macOS, and Linux. Which of the following should the technician configure to meet these requirements best? Virtual printer Which of the following is the MOST dangerous type of threat when using virtualization? VM escape (Answer) During a disaster recovery, which of the following statements is true? A vm has more downtime than a physical server If you can connect to a website using the name and it doesn't work but the IP address for that same website does work what command should be used to fix the issue? ipconfig/all Josie from Human Resources was just issued a new laptop from the company. When she plugs the laptop into the network's wall jack and turns it on, she receives an error message. She calls the service desk to report that the error message being displayed states, "There is an IP address conflict with another system on the network." You are working as a field service technician and have been asked to resolve this error. What should you do? Replace the wired network adapter on the laptop Disable the wired network adapter and require the laptop to use the wireless network adapter instead Choose a new IP address and assign it to laptop Configure the laptops network connection to use DHCP instead of a static IP (Answer) A customer is complaining that they cannot connect to the local network share drive. You run the command 'ipconfig /all' from their workstation, and it returns an IP of 169.254.34.12. Which of the following is the problem with this workstation? The
workstation couldnt reach the gateway The Chief Financial Officer has asked Maria for a recommendation on how the company could reduce its software licensing costs while still maintaining the ability to access its application server remotely. Which of the following should Maria recommend? Use a remote desktop protocol (RDP) application on a windows 10 desktop Which of the following hard drive form factors would be connected to your laptop internally using a Micro SATA connection? 1.8 (Answer) Which of the following laptop displays requires an inverter? LED You are configuring a SOHO network that will contain 7 devices, but you only have a single public IP address. Which of the following concepts should be configured to allow the 7 devices to share that single IP when connecting to the internet? DMZ Which of the following devices should be installed as an intermediary between your clients and the web servers they want to connect to make an HTTP request from the client, check it, and then forward it to its destination? DNS server Which of the following ports should you unblock at the firewall if your workstation cannot access http://www.diontraining.com but can access https://www.diontraining.com? 445 You believe that one of the ports on a switch is defective. To prove your hypothesis, which of the following tools should you use? Crimper Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device? Syslog Which type of internet connection allows for high-speed bi-directional data communication over a hybrid fiber-coaxial (HFC) connection? ISDN When using an impact printer, what is used to transfer the ink to a piece of paper? Toner What describes how many times the image on the monitor changes per second? Refresh rate (Answer) John connected his MacBook to the corporate network and is trying to print to the office's large network printer. John notices that the print job is failing to print. The other employees in the office are having no issues printing from their Windows workstations. Which of the following should be done to resolve John's issue? Restart the print spooler on the print server Install the print drivers for OS X on the print server (Answer) Enable bonjour on johns macbook Install and enable the OS X printing option on the network printer Which port is used to connect to an IMAP server? 25 Which of the following types of laptop displays would utilize a fluorescent backlight to illuminate the image? LED Your email client has been acting strangely recently. Every time you open an email with an image embedded within it, the image is not displayed on your screen. Which of the following is the MOST likely cause of this issue? Incorrect email settings in the anti virus software Incorrect settings in the host-based firewall Incorrect settings in your web browsers trusted site configuration Incorrect settings in your email proxy server Incorrect security settings in the email client (Answer) Which of the following ports should you unblock at the firewall if your workstation cannot access https://www.diontraining.com but can access http://www.diontraining.com? 53 You are trying to select the best device to install to proactively stop outside attackers from reaching your internal network. Which of the following devices would be the BEST for you to select? IDS You are setting up a hotel ballroom for a training workshop. Which of the following devices would BEST allow the conference attendees to connect their laptops to the hotel's network when inside the conference areas? Switch Which of the following ports is used by SNMP by default? 25 Which network technology is used to prioritize certain types of network traffic over others? Qos (Answer) aka quality of service What is the name of a computer system that is designed to perform a specific and dedicated function? UTM system Which of the following ports is used by the native file and printer sharing protocol for Mac computers and supports many unique Mac attributes that are not supported by other protocols? 427 Which of the following protocols operates over port 3389 by default? POP3 Which of the following devices could be used to extend transmissions of a signal over longer distances by receiving and retransmitting a given signal? Switch Which of the following ports should you block at the firewall if you want to prevent a remote login to a server from occurring? 23 (Answer) You see some fading across your papers when you are printing things using your office's laser printer. It appears that the black is more faded than the colors on your documents. What is the BEST solution to this problem? Change the feed rate of the paper You see streaks of toner across your papers when you print things using your office's laser printer. What is the MOST likely cause of this problem? Change the feed rate of the paper
Your office has a legacy wide format printer that must be connected to your network. The connection on the printer is an older DB-9 serial connection. What is the BEST option for connecting this legacy device to your corporate network? Purchase a RS-232 to RJ-45 adapter so that you can connect it to the network (Answer) Purchase a wireless print server and connect it to the printer via usb Purchase an inexpensive RS-232 to USB adapter to connect it to the network Configure a reverse proxy on the printer as a DNS workaround How do you get to the boot order menu? F2 You have been asked to install a network cable in the crawl space between the ceiling in your office and the roof. You need to choose the right type of cable to ensure you do not violate the local fire codes. Which of the following cable types should you choose? Fiber An auto mechanic needs to purchase a new printer for their shop. The printer will be used to create estimates and invoices for their customers. The printer must support the ability to create duplicate invoices using multiple sheets of paper separated by carbon paper using tractor-fed paper. Which of the following types of printers should be used? Laser A computer technician is building a server that will run multiple virtual machines simultaneously. Which CPU technology should be selected so that the processor can utilize two logical cores? 32-bit CPU What type of cable is most commonly used to terminate a serial connection to a modem? RJ-45 Your desktop computer is currently running out of internal storage space. You want to upgrade the workstation with more internal storage to store additional videos, photos, and backups. Which of the following is the BEST storage solution to avoid having to expand again next year while still meeting your need to store more data? 1 TB SSD Which option would you MOST likely use to configure PXE (Preboot Execution Environment) to set up remote imaging on a computer during a deployment? BIOS boot option (Answer) Which of the following requires the use of a physical printer to print a document? Print to image Which of the following virtualization concepts refers to a VM's ability to have memory allocated for its use? Synchronization A user wants to run Windows 10 on their new Macbook without dual booting with Boot Camp. What software would allow the user to run Windows inside of OS X by using a Type 2 hypervisor? Virtual box (Answer) Which of the following cloud computing resources are MOST important when determining a cloud file-storage synchronization application's performance? CPU utilization What type of services can allow you to get more storage and more resources added to the cloud as fast as possible? Rapid elasticity (Answer) You are building a virtualization environment to host public-facing servers that must connect to the internet. This will require that you install several secured Linux distributions as VMs. The VMs need to have access to a virtualized network and communicate with the host operating system and the internet. Which of the following types of network connections should you configure for each VM? Internal OBJ-4.2: If you select external, the VMs would have internet access. If you select internal, each VM can communicate between the host and the other VMs. The private network connection type will create a switch that is usable only by the VMs. The VMs cannot use the switch to communicate with the host. If you select localhost, each VM could only communicate with itself. Which type of technology imitates hardware without relying on the CPU being able to run the software code directly? Hypervisor Which of the following is used when a CDMA smartphone attempts to connect to the cellular network while traveling? (Select ANY that apply) PRI (Answer) Which port is used to connect to a POP3 server? 110 (Answer) Which port is used to connect to an SMTP server? 110 Which of the following types of networks would be created if a wireless access point, a microwave link, and a satellite link were combined in a mesh? PAN Which cellular technology is compromised of LTE and LTE-A to provide higher data speeds than previous cellular data protocols? 3g You have just set up an FTP server to allow users to download the new open-source application your company is releasing. Which port should be opened to allow users to connect to this server? 21 (Answer) AKA FTP port (file transfer protocol) Which cellular technology utilizes new frequency bands to reach proposed speeds of up to 70 Gbps? 3g
What port is port 110? DNS Which cellular technology is compromised of HSPA+ and EV-DO to provide higher data speeds than previous cellular data protocols? 3g (Answer) Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps? 802.11a Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 1.7 Gbps? 802.11a You are configuring a SOHO network for a small coffee shop. They have found that certain customers will buy a single coffee cup and then sit at the coffee shop all day to use the WiFi. The owner has asked you to block this customer's laptop from connecting by placing it on a blacklist. Which of the following configurations would you use to blacklist this customer's device based on its unique hardware identifier? Enforce a WPA2 PW You are installing some new hard drives in a legacy Novell NetWare server in a closed IPX network. The hard drive has a 4-bit set of jumpers that must be configured to represent the device's ID number (0-15) in the storage device chain. Which of the following types of connectors would you use for data transfer with these hard drives? SCSI (Answer) The ONLY hdds that use ID numbers
The large multi-function printer in your office is shared between 12 people. Unfortunately, it has stopped working, and the technicians have determined it must be replaced. A new printer has been ordered, but it will be 2 weeks until it arrives. The only other printer available in your office is the manager's printer, but it is connected via USB to their workstation. One of the technicians would like to share the manager's printer with the other 12 employees for the next 2 weeks as a temporary workaround. Unfortunately, there are no spare wired network jacks available in the office to connect the printer to the network directly, but there is a wireless access point nearby. Which of the following is the BEST way for the technician to allow the 12 employees to access the manager's printer Provide a USB thumb drive to each employee so that they can transfer their files to the manager's computer for direct printing Purchase a portable wireless print server and connect the printer to it using USB (Answer) Configure a new printer on each users workstation and point it to the managers IP address Share the printer directly from the managers computer by creating a share and giving the other employees access rights to the share What type of network cable should be used to prevent crosstalk? UTP You are building a virtualization environment to host several secured Linux distributions as VMs. The VMs need to have access to the local corporate network and communicate with the host operating system, the other VMs, and the internal network clients. Still, they should not have access to the internet. Which of the following types of network connections should you configure for each VM? External When using a Type 1 hypervisor virtualized environment, which of the following hardware types is necessary to connect the VMs to the corporate network? VNC Which of the following operating systems cannot be installed as a guest inside of a virtual machine on a Windows 10 laptop running Virtual Box? Kali Linux Which cloud computing concept is BEST described as focusing on replacing the hardware and software required when creating and testing new applications and programs from a customer's environment with cloud-based resources? PaaS (Answer) Tom is running some new CAT 5e cabling in an office building to connect a few offices. The ceiling is constructed as a drop' ceiling with fluorescent lights and does not have any cable trays. Due to the proximity of the fluorescent lights to the cable being run, what type of CAT 5e cable should be run? UTP A user called the help desk to complain about an issue with their laptop's keyboard. Every time they type a word like "help" or "none," it is displaying as something cryptic like "he3p" or "n6ne". Which of the following is the MOST likely cause of this issue with the laptop keyboard? The keyboard is faulty You are troubleshooting a Windows 10 workstation for a customer. You have identified the problem and performed a quick backup of the system. What is the NEXT step in the troubleshooting methodology? establish a theory of probable cause You have just finished building a Windows server, installing its operating system, updating its security patches, formatting a dedicated data partition, and creating accounts for all of the company's employees. What is the next thing that must be configured to provide users with the ability to access large multifunction devices across the network? Print server (Answer) You want to replace an old CRT display with the type of screen that produces less voltage and is more energy-efficient. Additionally, the screen should not contain a backlight. What type of display technology should you select? LED You have been asked to set up the corporate email on several mobile devices for Dion Training's employees. The employees will use their mobile devices to check their email when out of the office, but they will also need to check their email from their desktop computers. Which of the following mail protocols should you configure to allow the employees to receive their mail? POP3 Which of the following devices commonly use an ARM-based processor? (Select TWO) Tablet (answer) Your son has a gaming laptop in his bedroom. He loves his laptop since it allows him to take it over to his friend's houses when desired, but his laptop only has 1 USB port. When he gets home, though, he prefers to use a USB mouse, keyboard, and webcam when he is playing games on his laptop. He only has $20 saved up but wants to buy a device that would allow him to connect all 3 of these peripherals with one USB connector. Which of the following do you recommend he purchase? Port
replicator Which of the following technologies is commonly used to inventory the organization's equipment by attaching a tag to the device containing a chip programmed with the assets data, allowing one-way communication to occur from the tag to the reader? NFC You are configuring a print server on the network. Which type of IP address should you configure it with? Static(answer) easy to locate Your network is running extremely slow. You have troubleshot the issue and determined that there are too many collisions on the network. Your network currently has 20 computers, all connected to a single 24-port hub on the network. Which of the following devices should you install to decrease the number of collisions? Repeater Which of the following ports should you block at the firewall if you want to prevent a remote login to a server from occurring? 21 Which of the following protocols operates over port 143 by default? POP3 Which of the following wireless technologies allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button? WPA Which of the following is an open-source wireless communication protocol operating in the 2.4 GHz frequency band and is primarily used for home automation? Zigbee (Answer) Which of the following ports is NOT used by the NetBIOS protocol to share files and printers on a Windows network? 137 Which of the following types of data should you transmit over UDP? Stream videos on netflix (Answer) Uswer datagram protocol. Tracks data Which of the following ports is used for the request and distribution of DHCP configuration information? 53 Which of the following ports is used by the Server Message Block (SMB) protocol to share files and printers on a Windows network? 445 (answer) Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function? DMZ Your company's printer is displaying an error of "Replace cartridge 1. Filament is empty." Based on this error, what kind of printer is your company using? thermal How many volts of electrical charge is applied to the drum of a laser printer? -1200 volts What are the dimensions of a MicroATX motherboard? 11x9.6 You are attempting to install a full-sized PCIe network interface card into a 1U server, but it is too tall to fit into the machine. Which of the following do you need to install first to install the full-sized PCIe network interface card into the server? AGP card Which motherboard form factor measures 6.7" x 6.7" (17 cm x 17cm) in size? mAtx A technician needs to upgrade the RAM in a database server. The server's memory must support maintaining the highest levels of integrity. Which of the following type of RAM should the technician install? ECC (Error correction code) ANSWER A user wants to print 2 copies of a 3-page report at once. The user would like the pages to come out of the printer in the order of pages 1, 2, 3, 1, 2, 3 instead of pages 1, 1, 2, 2, 3, 3. What printer setting should the user enable for this print job to achieve this result? Duplex What type of wiring standard is used with POTS? RJ-11 (ANSWER) pots is plain old telephone system You want to build a virtualization workstation that will be used to run four different server operating systems simultaneously to create a test lab environment. Each guest operating system only requires 20 GB of storage on the host workstation. Which of the following is the MOST important piece of hardware needed for this system to run efficiently? ATX mobo What is SHADOW considered? DaaS(answer) Your child's school issues an Office 365 account to each student to use for their school projects. Your child needs to install the proper software on their Windows 10 laptop for their school work folder to remain synced between the laptop and the cloud service. Which software should you install? Google drive Which of the following refers to using virtual machines as a method of provisioning workstations for corporate users? SaaS Which type of cloud service provides users with an end to end application solution for a recurring monthly or yearly fee?
SaaS(answer) Which of the following is the virtualization technology supported by most modern Intel processors? HT Which of the following resources is used by virtual machines to communicate with other virtual machines on the same network but prevents them from communicating with resources on the internet? DNS You are working as a laptop repair technician. You just received a laptop that was reported to have a glass of water spilled on it. You want to examine the components in the laptop to begin troubleshooting it. What are the first steps you should take as part of your troubleshooting process? Put laptop in rice A client states that their computer is experiencing slow performance when reading or writing to the hard drive. You have already verified that it is not a system (software) performance issue, and the system is not overheating. Which of the following would be the BEST action to take in attempting to fix this problem? Upgrade the memory You have been assigned a trouble ticket for a workstation that is unable to boot. When you arrive at the workstation, you recognize an error message on the screen that reads, "Error loading operating system, BOOTMGR is missing, Press Ctrl+Alt+Del to restart." Which of the following actions should you take first? Reboot the computer and allow it to load back into windows Reboot the computer into the BIOS to see if the boot order is set to HDD Reboot the computer press F8 and enter "Bootrec/fixmbr" from the command prompt (Answer) This boots into safe mode and the commands will fix the HDD Reboot the computer into recovery mode and initiate the disk restoral process A penetration tester wants to build a workstation that will be used to brute force hash digests. Which of the following is the BEST option to ensure sufficient power and speed to crack them? Multi core CPU Which of the following is NOT a common voltage produced by the power supply of a computer? 3.3 VDC Which of the following storage types utilize a NAND chipset mounted directly onto the motherboard instead of a mechanical spinning drive to store data? SSD You have been asked to install a network cable inside a conduit that will be placed underground and connected to two buildings located about 1 KM apart. Which of the following cable types should you choose? Fiber(answer) these cables contain glass fiber and are made for long distance and high performance data. Anything over a few 100 meters u should use
this A computer technician is configuring a NAS for a company to store their corporate data. The technician has installed four 10 TB hard drives operating at 5400 RPM in a RAID 10 configuration. How much usable storage space is contained in this NAS? 10 TB What type of cloud service would provide you with a complete development and deployment environment in the cloud for you to create customized cloud-based apps? PaaS(answer) You are building a virtualization server that runs on Windows Server 2016. The server will host multiple virtual machines, each with a different operating system. Which type of hypervisor should you select for this environment? Type 2(answer) Jason teaches a CompTIA A+ course at a large company, but they do not allow non-employees to connect to their network. Since Jason needs the Internet for an in-class demonstration, he connects his laptop to his iPhone using a USB cable. He essentially connects to the Internet using the smartphone as a modem. Which of the following terms best describes this configuration? Hotspot The speed at which the cursor moves across the screen can sometimes make it difficult to control. Which setting could be used to slow down the cursor when using a Windows 10 laptop with a touchpad? Settings devices touchpad touchpad sensitivity Your company just installed a new webserver within your DMZ. You have been asked to open up the port for secure web browsing on the firewall. Which port should you set as open to allow users to access this new server? 21 You have been asked to configure your neighbor's SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server? WAN Demilitarized zone used so no intrusions can get in A technician is troubleshooting an issue with a workstation. The workstation can ping 8.8.8.8 successfully, but it is unable to access Facebook.com. Which internal network server is MOST likely causing these issues? DNS(ANSWER) Domain name
service in charge of converting ping Which of the following describes the IP address of a router to which packets destined for a remote network should be sent by default? Subnet mask Which of the following devices is installed in a communication closet to connect network wall jacks to a network switch using pre-wired RJ-45 ports? Access point Which of the following is a digital circuit-switched technology that combines voice, video, and data over one connection? Dial up Which of the following ports should you unblock at the firewall if your workstation cannot access diontraining.com but can access the website by its IP address? 80 Which of the following ports is used by LDAP by default? 389 (Answer) You have been asked to verify that a server rack has been properly installed and grounded. Which tool should you utilize to verify that the server rack is properly grounded? Voltmeter You are trying to select the best device to install to detect an outside attacker trying to reach into your internal network. The device should log the event, but it should not take any action to stop it. Which of the following devices would be the BEST for you to select? Proxy server What is a tool that would allow you to easily identify a network cable that was not labeled in the wiring closet during its installation? Cable tester A customer tried to install a PCIe x8 expansion card into a PCIe x16 slot on the motherboard. While the expansion card fits into the slot without any issues, it does not perform as the customer expected. How fast will a PCIe x8 expansion card run if installed in a PCIe x16 slot? It will run at x16 speed A computer technician is configuring a NAS for a company to store their corporate data. The technician has installed three 6 TB hard drives operating at 7200 RPM in a RAID 5 configuration. How much usable storage space is contained in this NAS? 3tb You have been asked to install a network cable to run a television signal between two buildings. Which of the following cable types should you choose? Fiber Your company received a large bill for file storage from your online cloud provider this month. Upon investigation, you noticed that one of your employees has uploaded over 1 TB of data to the service. What type of plan is your company utilizing? An on demand plan Which of the following requirements should you consider when selecting the type of processors, storage, and RAM to utilize in a virtualization environment? Network requirements What type of cloud service provides instant access to servers and switches, quickly provisioned, and available for management over the internet? PaaS Which cloud computing concept allows users to store files on a cloud-based server when necessary and copy that data from the cloud, and put it back on the device when space once again becomes available on the device? Resource pooling You are building a virtualization environment to practice your penetration testing skills. This will require that you install several vulnerable Linux distributions as VMs. The VMs need to have access to a virtualized network but should not communicate with the host operating system or the internet. Which of the following types of network connections should you configure for each VM? External A customer is trying to configure an 802.11b wireless card in an old laptop to connect to an 802.11g wireless router. When the customer scans for the wireless network's SSID (Dion-Corp), it is not displayed within Windows. What is the MOST likely reason that the SSID is not being displayed? 802.11g and b use different frequencies Write down 73 test 6 ... What ports are used by NetBIOS?NetBIOS over TCP traditionally uses the following ports:. NBName: 137/UDP.. NBName: 137/TCP.. NBDatagram: 138/UDP.. NBSession: 139/TCP.. What are ports 139 and 445 used for?Port 139: SMB originally ran on top of NetBIOS using port 139. NetBIOS is an older transport layer that allows Windows computers to talk to each other on the same network. Port 445: Later versions of SMB (after Windows 2000) began to use port 445 on top of a TCP stack. Using TCP allows SMB to work over the internet.
What are ports 137 and 138 used for?Microsoft Windows Networking Services
UDP ports 137 and 138 are used for local NetBIOS browser, naming, and lookup functions.
What is port 139 commonly used for?Port 139 is utilized by NetBIOS Session service. Enabling NetBIOS services provide access to shared resources like files and printers not only to your network computers but also to anyone across the internet.
|