Related ports: 1000 3155 3163 7788
« back to SG Ports
External Resources SANS Internet Storm Center: port 1001
Notes: Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify a specific process, or network service. IANA is responsible for internet protocol resources, including the registration of commonly used port numbers for well-known internet services. Well Known Ports: 0 through 1023. Registered Ports: 1024 through 49151. Dynamic/Private : 49152 through 65535. TCP ports use the Transmission Control Protocol, the most commonly used protocol on the Internet and any TCP/IP network. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered in the same order in which they were sent. Guaranteed communication/delivery is the key difference between TCP and UDP. UDP ports use the Datagram Protocol. Like TCP, UDP is used in combination with IP (the Internet Protocol) and facilitates the transmission of datagrams from one computer to applications on another computer, but unlike TCP, UDP is connectionless and does not guarantee reliable communication; it's up to the application that received the message to process any errors and verify correct delivery. UDP is often used with time-sensitive applications, such as audio/video streaming and realtime gaming, where dropping some packets is preferable to waiting for delayed data. When troubleshooting unknown open ports, it is useful to find exactly what services/processes are listening to them. This can be accomplished in both Windows command prompt and Linux variants using the "netstat -aon" command. We also recommend runnig multiple anti-virus/anti-malware scans to rule out the possibility of active malicious software. For more detailed and personalized help please use our forums.
- SG Ports Database » Vulnerable Ports
- SG Security Scan » Scanned Ports » Commonly Open Ports
- SG Broadband Tools
- All Known Ports
- All Vulnerable Ports
- Scanned Ports
- Recently Updated Ports
- Popular Ports/Ranges
- SG Security Scan

Common Network Ports – CompTIA A+ 220-1001 – 2.1
The applications we use every day are usually associated with a set of well-known port numbers. In this video, you’ll learn about some of these applications and how they use port numbers to communicate.
<< Previous Video: Introduction to IP Next: Network Devices>>
One of the first ways to transfer a file from one device to the other uses a protocol called FTP, a File Transfer Protocol. This protocol uses TCP port 20. We call this the active mode data port, and there is a TCP port 21 that’s used to control the communication.
TCP does have security built in, so you can configure a username and a password that gains access to another system. FTP also supports a mode called anonymous log in where you can use the user name anonymous and then any password you’d like. As it transfers files, FTP provides what could be called full featured functionality. You can list the files available on a system. You can add files, delete, rename, and provide other file functions as well.
If you’ve ever communicated across the network to another device at the command line, then you’ve probably used a console connection that looks very similar to this one. If your console connection is over an encrypted channel, then it’s probably using SSH or Secure Shell over TCP port 22. Although this looks very similar to a console screen you might see if you use Telnet, Telnet would be over a nonencrypted channel, but SSH always uses an encrypted communication link.
You may find that some older equipment doesn’t support SSH and the only way to communicate to this device and use this terminal communication is by using Telnet. Telnet stands for Telecommunication Network, and it uses TCP port 23. Just like with SSH, we would use Telnet to log in remotely to this device at the console, but we have to keep in mind that this entire communication is in the clear. There’s no encrypted communication.
So if you type in your username and password, anyone capturing those packets on the network is able to view very plainly your user name and your password. For that reason, we don’t commonly see Telnet used on anyone’s network. And if you need to keep your system secure, you would probably only use SSH, instead of using Telnet.
In an earlier video, we talked about mobile devices sending email messages and the protocol that it used to send those messages was SMTP or the Simple Mail Transfer Protocol. SMTP can be used to send messages from a mobile device, or it can be used to send messages from one server to another. SMTP uses TCP port 25 to be able to send that data. If you’re receiving email messages, you’re probably using POP3 or IMAP. Whenever you’re sending email, it commonly uses SMTP.
If you’re typing a website into a browser, you’re probably using the name of the site. So if you type in www.professormesser.com, behind the scenes, there needs to be a conversion between that domain name and the IP address of my web server that’s where we would use DNS, which communicates over UDP port 53. This is converting those names to IP addresses and then back again. For example, if you type in in www.professormesser.com, that information is sent to a DNS server, which responds back with an IP address that’s associated with my web server.
We obviously rely on these DNS servers to be able to provide this resolution between domain name and IP address. And since we’re using mostly these domain names and we’re typing things in at a browser, we’ll probably have multiple DNS servers. So if we happen to lose a DNS server or it happens to become unavailable, we have other DNS servers that can provide that resolution.
If you’re in a web browser and you’re communicating to a web server, then you’re probably using HTTP or HTTPS as those protocols. HTTP stands for Hypertext Transfer Protocol, and HTTPS is the encrypted form of that or Hypertext Transfer Protocol Secure. These two protocols used two different port numbers to communicate. The in the clear, non-encrypted version of HTTP uses TCP port 80. The encrypted communication occurs with HTTPS and that commonly uses TCP port 443.
If you’re on a mobile device or desktop computer and you’re receiving emails, then you’re probably using POP or IMAP as those protocols. POP3 is the Post Office Protocol version 3. It uses TCP port 110, and it provides basic mail transfer functionality. Many of our modern mail transfers are using IMAP.
IMAP is the Internet Message Access Protocol version 4. It uses TCP port 143 to communicate. IMAP provides some enhanced features over POP3, such as having multiple folders and being able to access that email box from multiple devices.
If you’ve ever needed to view or take control of someone’s desktop across the network, then you’ve needed to use RDP or the Remote Desktop Protocol. This uses TCP port 3389 to provide that remote control functionality. You’ll find that RDP is available on many different Windows servers and allows you to either view the entire desktop of the remote system or view just a single application that’s running on that remote system.
There are many different clients available to access these remote desktop services. You can run it on a Windows workstation, Mac OS, Linux, and many others. Microsoft Windows doesn’t use FTP to transfer files from one system to another. Instead, it uses its own format to be able to transfer files called server message block.
This is a standard set of protocols that Windows uses that allows for file sharing, printer sharing. You might even see it referred to as CIFS or Common Internet File System. Older Windows systems may use NetBIOS that is inside of a UDP or TCP packet.
UDP port 137 is NetBIOS name services so that you can find the device on the network by its name. There’s also UDP port 138, which is the NetBIOS Datagram service. There’s a TCP version of this that runs on TCP port 139, which is the NetBIOS session service.
Modern Windows devices don’t need to parse out these different NetBIOS protocols and put them inside of TCP or UDP. Instead, they can communicate directly over TCP port 445. Just as Windows has its own protocols for transferring files, Mac OS also has its own protocols for the Apple Filing Protocol or AFP.
These file services in Mac OS use TCP port 548. To be able to view the list of available servers, you’re probably going to use the service location protocol in Mac OS or SLP. The service location protocol uses TCP port 427 and UDP port 427 to be able to populate a list of available locations. And very similar to SMB in Windows, the Apple filing protocol in Mac OS is also full feature. You have the ability to view the available list of files to copy files, move files, rename files, and more.
When you turn on your computer for the first time, it automatically configures itself with an IP address. It’s able to do this because it’s using DHCP, which is the Dynamic Host Configuration Protocol. There is a DHCP server somewhere on your network, and your client communicates that server using ports UDP 67 and UDP 68. Once your workstation receives this IP address, it’s available for a particular lease time.
And before that lease is up, it has to check back in with the DHCP server to make sure that it’s still able to use that IP address. The DHCP servers can also be configured with DHCP reservations. This means when a workstation or a server requests an IP address, the server can recognize the MAC address of that device and provide the same IP address to that device every time.
If you connect to a corporate network for the first time, you’re often asked to provide a username and password. The same thing occurs if you connect through a VPN or if you log into a web server that’s on the network. The process of providing that authentication is usually to a centralized database, and one very common form of database that’s used for this is LDAP.
This is the Lightweight Directory Access Protocol, and it uses TCP port 389 to provide that authentication. This means that you can store all of your credentials in one single database. And if you ever need to enable, disable, or make any changes, you simply need to make it in that centralized location.
Network administrators may have tens or hundreds or even thousands of devices they have to manage on a single network. In order to constantly monitor and gather statistics from these devices, these network administrators use a specialized protocol called SNMP. This is the Simple Network Management Protocol, and it uses UDP port 161 to query devices, and it can receive alarms or traps from those devices over UDP port 162. There may be three different versions of SNMP that could be running in an environment.
Version one was the original that provided a non-encrypted, in the clear method so that a device can communicate to a router and ask how many bytes have gone through a particular interface, and that router can respond back with that value. Version 2 of SNMP still communicated without any encryption, but this client could ask many different questions at the same time and receive a bulk transfer in response. Many organizations these days are using SNMP version 3, which provides message integrity and authentication method. And all of the information that’s sent between the client and the remote device is all encrypted.
- Skip to main content
- Skip to footer
Audit My PC - Free Internet Security Audit
Firewall Test and web tools to check your security and privacy
Looking for information on Protocol TCP 1001 ? This page will attempt to provide you with as much port information as possible on TCP Port 1001.
TCP Port 1001 may use a defined protocol to communicate depending on the application. A protocol is a set of formalized rules that explains how data is communicated over a network. Think of it as the language spoken between computers to help them communicate more efficiently.
Protocol HTTP for example defines the format for communication between internet browsers and web sites. Another example is the IMAP protocol that defines the communication between IMAP email servers and clients or finally, the SSL protocol which states the format to use for encrypted communications.
TCP Port 1001
Here is what we know about protocol TCP Port 1001 . If you have information on TCP port 1001 that is not reflected on this page, simply leave a comment and we’ll update our information.
PORT 1001 – Information
- Port Number: 1001
- TCP / UDP: TCP
- Delivery: Yes
- Protocol / Name: [Malware known as WebEx ]
- Port Description: [malware info: WebEx ]
- Virus / Trojan: Yes, Caution! Use our free Digital Footprint and Firewall Test to help verify you are not infected.
Side note: TCP port 1001 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered on port 1001 in the same order in which they were sent. Guaranteed communication over port 1001 is the key difference between TCP and UDP. UDP port 1001 would not have guaranteed communication in the same way as TCP.
Because protocol TCP port 1001 was flagged as a virus (colored red) does not mean that a virus is using port 1001, but that a Trojan or Virus has used this port in the past to communicate.
TCP 1001 – Disclaimer
We do our best to provide you with accurate information on PORT 1001 and work hard to keep our database up to date. This is a free service and accuracy is not guaranteed. We do our best to correct any errors and welcome feedback!
Reader Interactions
Dear Sir/Mam, we are RFID manufacturer in India, So we use a testing Instrument called reader, which connects to the computer via cross over cable and its IP address is 10.0.0.100 and port 1001.Its a make of Smart ID technology. so by using IP address, connectivity is showing over computer. but not recognizing port ,so can you help me that, this instrument start working.
Leave a Reply
Your email address will not be published. Required fields are marked *
Miscellaneous
- Free Address Finder
- HTML Encoder Decoder
- Website Monitoring
- Whats My IP Address?

Certification Success Tips:

A plus 220-1001 – Exam Objective 2.1
A+ exam objective 2.1, a plus 220-1001 – exam objective 2.1 – compare and contrast tcp and udp ports, protocols, and their purposes..
Click here to go back to the A+ Main Domain 2.0 Table of Content
In this installment of ExamNotes, we will look at A plus 220-1001 Exam Objective 2.1 “Compare and contrast TCP and UDP ports, protocols, and their purposes”. In the objectives, TCP vs. UDP is listed last. This topic should really be listed before protocols and ports in order to best help you understand what to expect when you use a particular protocol in terms of performance and reliability. That is why this review is starting with the last item on the list: TCP vs. UDP.
TCP vs. UDP
TCP (Transmission Control Protocol) is a protocol that rides on top of the IP protocol (Internet Protocol) and is designed to address the reliability issues of IP, which is inherently unreliable. This is the main reason why you see the TCP/IP protocol suite referenced as a single protocol in internet communication.
TCP is responsible for the connection and the continuity necessary for reliable communication on any network, most notably the Internet. TCP opens a reliable “socket” on each end of the transmission throughout the entire communication. To effectively do this, TCP needs to know the IP addresses and ports of both the client and the server. This action is known as connection-oriented and can be viewed much like a traditional telephone call consisting of the following actions: pickup, dial, connect, chat and hang up. This is why Port/Protocol information is significant.

With the connection sockets established, TCP becomes responsible for breaking the data into packets of up to 64K, however, the lower-level protocols that use TCP have much lower maximum packet sizes such as 1500K for Ethernet. TCP breaks the data down to the necessary size and adds its header. TCP is also responsible for delivery, meaning that all failed packets are retransmitted and that the packets arrive intact in the correct sequence. Most importantly each packet receipt is acknowledged, referred to as ACK. If it isn’t acknowledged, the packet will be retransmitted. In the end, all data is delivered to the correct host in sequence and complete.
UDP (User Datagram Protocol) is an unreliable, connectionless delivery system for communication that also rides on top of IP. The difference with UDP is that the packets are all individual and are all handled separately. This negates the flow control and other checks and balances offered by TCP. This means no solid connection, no inter-packet relationship like in the case of TCP where a packet will say “I’m the 7th packet of 90” to the system. This also means no error control and no acknowledgment of packet receipt let alone dropped or lost packets. The sender has no information as to whether their communication was received or not.
So why use UDP? UDP is fast due to the lack of ACK. UDP data streams continuously to the destination, regardless of whether the receiver is ready or not. TCP sends, waits for the ACK, then sends more. This could add a substantial amount of time to large transmissions.
Port Numbers and Protocols
We will list the related ports and protocols as they are listed in the A+ objectives. To download the objectives for A+ 1001 click here.

The File Transfer Protocol (FTP) is used in a client/server configuration to transfer files. FTP can operate in active or passive mode and uses TCP to control the connection. In active mode, the connection is initiated by the client and informs the server about which port it intends to use to receive data. In active mode (although port 21 is used for command and control), the data will be sent out on port 20 which serves as the FTP server’s data port. Passive mode is used in situations where inbound client TCP connections are not possible. Firewalls generally block inbound connections by default. In this case, the client sends a PASV command to the server and the server determines which client port can be used for the transfer.
Secure Shell (SSH) opens a secure network channel over an unsecured network using public key cryptography, providing confidentiality and integrity for network services. This makes SSH a cryptographic network protocol. SSH is used to secure remote network logins and other confidential data. Passwords cannot be intercepted because encryption is established before the login is required.
23 – TELNET
Developed in the late ’60s, Telnet was designed to support remote logins and communication between computers during what was a “kinder and gentler” time for networks. Telnet provides a functional command prompt on the remote host. However, these communication channels are in plaintext making them subject to interception. This is not acceptable for today’s networks and the internet. Since Telnet does not encrypt data, SSH has generally replaced Telnet for these connections.
The Simple Mail Transport Protocol (SMTP) uses TCP port 25 for internet mail transmission. SMTP is an internet standard protocol. Due to the proliferation of SPAM and other email-related vulnerabilities, other ports can be used for SMTP, most notably port 587. A secure, nonstandard implementation of this protocol is SMTPS. SMTPS is quite effective because it is one of the protocols that can utilize SSL. SMTP is responsible for the transmission of email between servers and for sending email from a client. Other protocols are used by the client to receive email.
The Domain Name System (DNS) is mostly known for its function of translating friendly domain name URLs such as www.mysite.com into its actual IP address which are much more difficult for humans to remember (think IPv6!).
DNS uses the two protocols TCP and UDP on port 53. DNS servers update themselves by maintaining a list of known host-to-address translations in a distributed database while also receiving and adding unknown or moved domains. This supports the hierarchical nature of domain naming of domains and sub-domains. Each domain has a designated authoritative name server that manages the domains and sub-domains. The name server also communicates that information to the database.
Web Browsers use the Hypertext Transfer Protocol (HTTP) for internet communications. HTTP can be considered the foundation of the World Wide Web. HTTP uses the client/server method where a client uses a Uniform Resource Locator (URL) to locate and request information from the target server of the resource. The response is more often than not an HTML page.
A typical URL begins with http:// (or increasingly https://) followed by the Fully Qualified Domain Name (FQDN) of the desired resource. URLs to websites can be distributed between parties using clickable links called hyperlinks, named in reference to the hypertext communication being used. HTTP uses TCP/UDP port 80 and sends unencrypted data by default. This is inherently un-secure.
Receiving email is done over several different protocols. There are two main protocols available depending on your service. The first is Post Office Protocol (POP) with the latest version being POP3. This protocol uses port 110 by default and is responsible for the management of messages on the server (saving and deleting). Deleting the message after delivery is the default mode. Leaving messages on the server is useful if you use multiple devices for messaging.
Today’s email user is probably using email over a collection of devices including Tablets, Smartphones, and Laptops. If your smartphone downloads and deletes a work-related email (POP3 default), you will have a problem when you check email on your PC or laptop. The Internet Message Access Protocol (IMAP) on TCP port 143 solves this problem by leaving the messages on the server regardless of the delivery status. Every device that checks the server will get the email. This is great unless you get spammed a lot. If 18 out of 20 emails are junk, your server space will fill up quite quickly. This calls for closer scrutiny of the undeleted messages on your server. You have to move spam emails to the trash folder and purge it or configure the client to purge trash. Despite this, IMAP is the preferred client messaging protocol.
This is for the old-timers that used Telnet and then Terminal Services. From Windows XP onward, the Remote Desktop Connection (RDC) was available. Using the Remote Desktop Protocol (RDP) on TCP/UDP port 3389, RDC is able to bring a fully functional remote machine’s desktop and its programs to your device. This requires that the client and server software be configured on Microsoft products but versions of Remote Desktop are available for most OS’s.
137-139 NetBIOS/NetBT
Server Message Block (SMB) predates Active Directory and was the foundation of Microsoft’s Windows for Workgroups networking capability. Based on NetBIOS, SMB can run on UDP ports 137 and 138, and TCP ports 137 and 139 as NetBIOS over TCP/IP (NetBT).
445 – SMB/CIFS
Server Message Block (SMB) runs directly on TCP port 445. While being one of the oldest networking protocols, it has been continuously improved. The 3.0 version implemented with Windows 8 (3.02 in 8.1) supports improved performance in virtualized data centers. It is pervasive in many network applications and embedded devices. However, newer versions support end-to-end AES encryption. The Windows 10 version of SMB, version 3.1.1, requires secure negotiation when connecting to earlier versions. You may also see this service named as Common Internet File System (CIFS) or Samba depending on the operating system.
SLP was designed to help networks grow from small networks to large enterprise networks. Operating on port 427 the (Service Location Protocol), SLP allows clients to locate servers and services on the network.
Apple File Protocol (AFP) version 3.0 and higher use TCP/IP ports 548 or 427 to support the proprietary Apple sharing protocol. This protocol uses URLs with the structure afp//server/path. At the time of this writing, AFP is migrating to SMB. This is probably not covered in the scope of the objectives.
67-68 – DHCP
The Dynamic Host Configuration Protocol (DHCP) has saved years of man-hours and countless misconfigurations. As the most common IPv4 or IPv6 TCP/IP addressing method, DHCP is responsible for complete client configuration on a TCP/IP network. On a work network, there is usually an assigned DHCP server. Residential or SOHO implementations use the router provided by the ISP to perform this function. DHCP assigns or leases a unique IP address to each host. The duration of the lease is determined by the network administrator or is weekly by default. DHCP will also define the internet gateway and Domain Name Server to be used. This means that your machine may not get the same IP address when rebooted or otherwise disconnected. However, the DNS and Gateway settings will remain.
The DHCP server has an available pool of IP addresses available to assign to clients (hosts) that attempt to connect to the network. The client broadcasts a UDP discovery packet for an address to all connected networks. All DHCP servers will offer an address to the client. The client will then accept the offer from the nearest server by requesting a lease. That server will lease that address to the client. The address assignment process is identical for both IPv4 and IPv6 addressing. For the sake of consistency, the ports used are UDP 67 for the server and UDP 68 for the client.
Think of the Lightweight Directory Access Protocol (LDAP) as a phonebook for network services. The protocol serves to maintain and provide access to a distributed directory of the users, applications, available network services, and systems throughout an IP network.
Based on the x.500 standard’s directory, services using the Directory Access Protocol (DAP), which relied on the 7 layer OSI model, LDAP uses only a portion of the x.500 standard set and uses the newer and more relevant four layer Internet protocol suite on port TCP/UDP 389 at the application layer. By containing all the required network information, including users and their credentials, LDAP servers can be used to quickly validate user access. LDAP can precisely fulfill specific and detailed responses to queries about the network. The more details specified in the request, the more concise the response. In addition to its own Distinguished Name (DN) object identification, LDAP can ask DNS servers to locate other LDAP servers.
161-162– SNMP
As one of the more popular network management protocols, Simple Network Management Protocol (SNMP) is used to monitor and configure network nodes such as printers, hosts, routers, and servers on TCP/UDP ports 161 and 162 using a network manager. SNMP agent software is used on the nodes to enable monitoring.
That’s all for A plus 220-1001 – Exam Objective 2.1. Stay with it! Good luck with the test!

- A+ Practice Test Bundle (220-1001 & 220-1002)
- A+ Practice Test 220-1001 – Core 1
- A+ Practice Test 220-1002 – Core 2
- CompTIA Network+ N10-007 Practice Test
- Security+ SY0-501 Practice Tests
- IT Fundamentals FC0-U61
- CompTIA Linux+ Practice Test Bundle (103 & 104)
- PMP 6th Edition Practice Tests
- MCSA 2016 – Exam 70–740
- 70–410 Practice Tests
- 70-411 Practice Tests
- 70-412 Practice Tests
- 70-413 Practice Tests
- 70-680 Practice Tests
- MCSA 2012 Practice Test Bundle
- 70-640 Practice Tests
- 70-642 Practice Tests
- 70-646 Practice Tests
- MCSA 2008 Practice Test Bundle
- LPIC-1 Practice Test Bundle V4.0
- Free Certification Resources
- Free A+ 220-1001 Practice Test
- Free A+ 220-1002 Practice Test
- ExamNotes for A+ 1001 & 1002
- ExamNotes for Network+ Exam N10-007
- Free Network+ N10-007 Practice Test
- Free Security+ Practice Test SY0-501
- IT Fundamentals Practice Test FC0-061
- Free PMP Practice Test – 6th Edition
- MCSA 70-740 Free practice test
- Free Linux+ Practice Test
- Free Practice Test MCSA 70-410
- Free Practice Test MCSA 70-411
- Free Practice Test MCSA 70-412
- Free Practice Test MCTS 70-680
- A+ Exam Objectives
- CompTIA Network+ Objectives
- CompTIA Security+ Objectives
- CompTIA Linux+ Objectives
- Exceptional First Try Guarantee!
- Guarantee Terms and Conditions
- CompTIA Authorized Partner
- Who Trusts CertBlaster?
- CertBlaster Test Engine
- About CertBlaster Practice Tests
- CertBlaster News
- Legal Stuff
- SYSTEM REQUIREMENTS
- Privacy Policy
- Become an Education Partner
- Education Partner Form
- Educational Institutions
CompTIA A+ 1001-1002 Port Numbers

Students also viewed
Comptia a+ 1001 ports.

CompTIA A+ 1101 Port Numbers

Recent flashcard sets
Spanish 2 - sports.
muscle tissue

männliche Genitalorgane
Sets found in the same folder
Comptia a+ 1001 abbreviations.
IT Wired Connections
Remote access technologies.

Other sets by this creator
Chapter 7 key terms, comptia a+ incident response steps, comptia a+ 7 step malware removal process, chapter 6 key terms, verified questions.
Fit versus cost. You're trying on shirts in a store. One shirt, priced at $ 30 \$ 30 $30 , fits very well. Another shirt also fits well, except the sleeves are a couple inches too long. It costs $ 21 \$ 21 $21 . Which shirt would you buy? List the reasons for your choice.
What results when people in society share similar clothing expectations?
How does a de bit card differ from a credit card?
Name four design features that help promote self-dressing in preschoolers.
Other Quizlet sets
Chapter 22 - antihypertensive drugs, elizabethan society.

Chapter 4 Test
History and Systems Test 2
- Training Program
- Study Materials
- Exam Vouchers
- Virtual Labs
- Practice Exams
- Affiliate Program

- ITF+ FC0-U61
- Hardware: 220-1101
- Software: 220-1102
- Sec+ SY0-601
TCP & UDP Ports and Protocols | CompTIA A+ 220-1001 | 2.1

In this video you will learn about TCP & UDP ports, protocols, and their purposes.
Share this:
- Share on Tumblr
CompTIA A+ 220-1101 (Hardware) Certification Overview
Email Address
IG: Tech_Gee

- Tweets by @TwitterDev

© 2022 Technology Gee, LLC. All Rights Reserved.
- Tech Gee Certification $400 Deposit
- Tech Gee Certification $450 Deposit
tcp port 1001,udp port 1001,udp tcp 1001 description,biggest ports library database
- IANA port numbers assignments library (database) - The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.
- WIKI port numbers assignments library (database) - Good known wikipedia ports library
- Gasmy library, Beta Library - good known manualy created port databases.
- IPv4 Subnet Calculator
- Password Generator/Decryptor
- MAC Address Finder
TCP/UDP Port Finder
Search results for "1001".
- Service Details Source
- ipcserver Mac OS X RPC-based services. Used by NetInfo, for example. Apple
- Unassigned IANA
- threat [threat] Ghoice Bekkoame
- threat [threat] Le Guardien Bekkoame
- threat [threat] Nibu Bekkoame
- threat [threat] Silencer Bekkoame
- threat [threat] W32.Dumaru Bekkoame
- threat [threat] WebEx Bekkoame
- threat [threat] Wortbot Bekkoame
- trojan [trojan] Der Spaeher. Remote Access / Keylogger / Virus dropper / ICQ trojan. Works on Windows 95, 98 and ME. Exists both in English and German versions. Aliases: DS3 Simovits
- trojan [trojan] GOTHIC Intruder. Works on Windows. Simovits
- trojan [trojan] Lula. Remote Access. Works on Windows. Aliases: Eljefe, Backdoor.Eljefe, Luladoor, Backdoor.Luladoor Simovits
- trojan [trojan] One Windows Trojan. Remote Access. Works on Windows. Simovits
- trojan [trojan] Theef. Anti-protection trojan / Remote Access / Keylogger / Port proxy / FTP server / Remote peeker. Works on Windows 95, 98, ME, NT and XP. Aliases: Backdoor.Theef, BackDoor.QW, Bkdr_Delf.AX Simovits
- threat [threat] Der Spaher / Der Spaeher Bekkoame
About TCP/UDP ports
Recent searches.
WATCH & LEARN
Now through March 31, save 70% on video courses when you use discount VIDEO during checkout. Shop now.
The Microsoft Press Store by Pearson
- Microsoft Office
- Programming
- Software Engineering
- Certification & Training
- Practice tests
- Best Practices - Developer
- Best Practices - IT Pro
- Business Skills
- Developer Reference
- MOS Study Guide
- Plain & Simple
- Step by Step
- Step by Step for Developers
- Training Guide
- Distribution & sales
- Register your book
- Sample chapters
- User groups
- Write for us
CompTIA A+ Rapid Review: Networking
Objective 2.1: identify types of network cables and connectors.
Objective 2.2: Categorize characteristics of connectors and cabling
Objective 2.3: Explain properties and characteristics of TCP/IP
Objective 2.4: Explain common TCP and UDP ports, protocols, and their purpose
Objective 2.5: Compare and contrast wireless networking standards and encryption types
Objective 2.6: Install, configure, and deploy a SOHO wireless/wired router using appropriate settings
Objective 2.7: Compare and contrast Internet connection types and features
Objective 2.8: Identify various types of networks
Objective 2.9: Compare and contrast network devices and their functions and features
Objective 2.10: Given a scenario, use appropriate networking tools
- Like us on Facebook
- Follow us on Twitter
The Networking domain covers approximately 27 percent of the A+ 220-801 exam. Almost every computer you’ll service will be connected to a network, so it’s important to understand some basic networking topics. This includes network cables and connectors, network devices such as routers and switches, wireless connections, and common protocols used to control traffic over a network. Many networks use both wired and wireless connections, along with a router for Internet access. Technicians are often asked to help configure connectivity for different types of networks, and they need to know the functions and features of various devices, along with appropriate networking tools.
This chapter covers the following objectives:
The first objective in this domain introduces the three most common types of cables used for networks: fiber, twisted-pair, and coaxial. The most important thing you should know for this objective is the types of connectors used with each type of cable. The next objective builds on these topics requiring you to know the characteristics of the cables.
Exam need to know...
For example: What types of connectors are used with fiber cable?
Twisted-pair
For example: What types of connectors are used with twisted-pair cable? What standards are used when wiring a twisted-pair cable?
For example: What are the two common connectors used with coaxial cable?
Fiber cable is made of a flexible glass material, and data is sent over the cable as light pulses. There are three primary connectors you’ll see with fiber cables.
True or false? An LC is one of the common connectors used with fiber cable.
Answer: True. A Lucent Connector (LC) is used with fiber cable.
Some additional connectors commonly used with fiber cable include the following:
Square connector (SC) . Just as its name implies, this connector is square shaped. The LC connector is a miniature version of the SC connector.
Straight tip (ST) . This is a round connector with a straight tip.
Common connectors used with fiber cable are LC, SC, and ST. You should be able to identify each by sight.
If you aren’t familiar with the different fiber connectors, check out http://www.bing.com/images . Enter search words such as fiber connectors , LC connector , SC connector , and ST connector . You can use the same procedure to view pictures for any type connectors introduced in this section. Chapter 19 of the CompTIA A+ Training Kit (Exam 220-801 and Exam 220-802), ISBN-10: 0735662681, covers all of the cable types and connectors in more depth.
Twisted-pair cable includes multiple pairs of wires twisted around each other. These twists are precise and determine the frequency capabilities of the cable. Cables that support higher frequencies allow the cable to transmit more data at a time.
True or false? RJ-11 connectors are used with twisted-pair cables to connect network devices.
Answer: False. RJ-45 connectors are used with twisted-pair cables when connecting network devices.
RJ-11 connectors are used with phone-based twisted-pair cables. For example, RJ-11 connectors are used with a plain old telephone system (POTS) modem or even a digital subscriber line (DSL) modem.
Modems can be used for Internet connectivity. Objective 2.7 “Compare and contrast Internet connection types and features”, covers various methods of connecting to the Internet, including standard dial-up modems and DSL modems. Twisted-pair cables come in several different categories, such as CAT 5, CAT 6, and so on. These are discussed in Objective 2.2, “Categorize characteristics of connectors and cabling”.
Twisted-pair cables used in networking have four pairs of wires. The colors of each pair are as follows:
Blue wire and white wire with a blue stripe
Orange wire and white wire with an orange stripe
Green wire and white wire with a green stripe
Brown wire and white wire with a brown stripe
Each wire should be connected to a specific pin on the RJ-45 connector, and there are two standards that can be used—T568A and T568B. When creating a standard cable, both ends should use the same standard. This ensures that the same wire is going to the same pin on each connector.
True or false? A cable wired with the T568A standard on one end and the T568B standard on the other end works as a crossover cable.
Answer: True. If different standards are used, certain wires are crossed over and the cable will function as a crossover cable. Crossover cables are used to connect similar devices together, such as two computers or two switches.
RJ-11 connectors are used for phone lines. RJ-45 connectors are used with network twisted-pair cables. When wiring RJ-45 connectors, you should use either the T568A or T568B standard on both ends of the cable.
Coaxial cable is commonly used to connect televisions with broadband cable, DVD players, and digital video recorders (DVRs). It isn’t used as often with networks, but it has been used in the past.
True or false? F-type screw-on connectors are used with coaxial cable.
Answer: True. Coaxial cable uses F-type screw-on or BNC twist-on connectors.
The primary connectors used with coaxial cable are BNC or F-type connectors.
Can you answer these questions?
You can find the answers to these questions at the end of this chapter.
What type of cable would an LC connector be used with?
What is the difference between an RJ-11 and an RJ-45 connector?
What type of cable is used with an F-type connector?
This chapter is from the book
CompTIA A+ Rapid Review (Exam 220-801 and Exam 220-802)
- Learn more Buy
Related resources
CompTIA A+ Training Kit (Exam 220-801 and Exam 220-802)
- By Darril Gibson
- eBook (Watermarked) $44.79
See related titles

IMAGES
VIDEO
COMMENTS
Port 1001 Details ... Notes: Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that
This is the Simple Network Management Protocol, and it uses UDP port 161 to query devices, and it can receive alarms or traps from those devices over UDP port
Because protocol TCP port 1001 was flagged as a virus (colored red) does not mean that a virus is using port 1001, but that a Trojan or Virus has used this port
This protocol uses port 110 by default and is responsible for the management of messages on the server (saving and deleting). Deleting the message after
Port is reserved by IANA, generally to prevent collision having its previous use removed. The port number may be available for assignment upon request to IANA.
CompTIA A+ 1001-1002 Port Numbers. 4.9 (9 reviews) ... Port 80. Post Office Protocol version 3 (POP3). TCP Port 110. Internet Message Access Protocol (IMAP).
TCP & UDP Ports and Protocols | CompTIA A+ 220-1001 | 2.1. By Tech Gee on July 14, 2020. In this video you will learn about TCP & UDP ports, protocols
On this page you can find tools for search TCP Port Numbers and UDP Port Numbers. Current service contain the biggest tcp udp port list. Port search going
TCP port 1001 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires
There are several port numbers you should know for the exam. They are: FTP (20 and 21), Telnet (23), SMTP (25), POP3 (110), IMAP (143)