Blocking Ports to Secure Your Datacenter | N10-007 Exam Question | CompTIA Network+

Which Ports to Block in Firewall Configuration? | N10-007 Exam Question

Prev Question Next Question

Question

A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter.

Which of the following ports should be blocked when checking firewall configuration?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

B.

The correct answer to the question is B. 23.

Telnet is an outdated protocol that enables remote access to a device using a command-line interface. However, telnet does not encrypt data, which makes it vulnerable to eavesdropping and other forms of malicious attacks. Therefore, it is not recommended to use telnet to access servers or other sensitive network devices.

To prevent outside users from telnetting into servers at the datacenter, the network technician needs to configure the firewall to block the telnet port. The telnet port is TCP port 23.

The other answer options are as follows:

A. 22 - This is the SSH port, which is used to establish secure remote connections to a device. SSH is a more secure alternative to telnet, so blocking this port is not necessary to prevent telnet access.

C. 80 - This is the HTTP port, which is used for web traffic. Blocking this port would prevent web access to the servers, but it would not prevent telnet access.

D. 3389 - This is the RDP port, which is used for remote desktop connections to Windows servers. This port does not allow telnet access, so blocking it would not prevent telnet access.

E. 8080 - This is a common port used for web traffic, but it does not allow telnet access. Blocking this port would prevent web access to servers, but it would not prevent telnet access.

In conclusion, to prevent outside users from telnetting into servers at the datacenter, the network technician needs to block TCP port 23.