Ports, Protocols, and Acronyms High-Yield Tables

Key Takeaways

  • Know common service ports well enough to recognize risky exposure and secure alternatives.
  • Port questions are usually scenario questions about what should be allowed, blocked, encrypted, or monitored.
  • Secure protocol choices are often tested against legacy or insecure options.
  • Acronyms matter most when they change the decision, such as SIEM versus SOAR or SAML versus OIDC.
  • For PBQs, read direction and business purpose before choosing a port or protocol.
Last updated: April 2026

High-Yield Ports and Protocols

Memorizing ports is not enough. The exam usually gives a business or security situation and expects you to identify which traffic is appropriate, which protocol is safer, or which exposed service creates risk.

Core Ports Table

PortProtocolServiceExam cue
20/21TCPFTPLegacy file transfer; credentials may be exposed
22TCPSSH/SFTP/SCPSecure remote shell and secure file transfer
23TCPTelnetInsecure remote administration
25TCPSMTPMail transfer between servers
53TCP/UDPDNSName resolution; UDP common, TCP for zone transfers and large responses
67/68UDPDHCPDynamic address assignment
69UDPTFTPSimple unauthenticated file transfer
80TCPHTTPUnencrypted web traffic
88TCP/UDPKerberosTicket-based authentication
110TCPPOP3Legacy mailbox retrieval
123UDPNTPTime synchronization
135TCPRPC endpoint mapperWindows service discovery; risky if exposed
137-139TCP/UDPNetBIOSLegacy Windows name/session services
143TCPIMAPMailbox access
161/162UDPSNMPMonitoring and traps; prefer SNMPv3
389TCP/UDPLDAPDirectory queries; unencrypted unless protected
443TCPHTTPSEncrypted web traffic
445TCPSMBWindows file sharing; do not expose to Internet
465/587TCPSMTPS/submissionEncrypted or authenticated mail submission use cases
514UDP/TCPSyslogCentral logging; secure transport may use TLS depending on design
636TCPLDAPSLDAP over TLS
993TCPIMAPSIMAP over TLS
995TCPPOP3SPOP3 over TLS
1433TCPMicrosoft SQL ServerDatabase access; tightly restrict
1521TCPOracle DatabaseDatabase access; tightly restrict
3306TCPMySQL/MariaDBDatabase access; tightly restrict
3389TCP/UDPRDPWindows remote desktop; avoid direct Internet exposure
5432TCPPostgreSQLDatabase access; tightly restrict
5985/5986TCPWinRMWindows remote management; 5986 uses HTTPS

Secure Alternatives

Insecure or risky choiceBetter choiceWhy
TelnetSSHProtects remote administration sessions
FTPSFTP, SCP, or FTPSProtects credentials and file contents depending on implementation
HTTP login pageHTTPSProtects session and credentials in transit
LDAP over 389 for sensitive authLDAPS or LDAP with StartTLSEncrypts directory traffic
SNMPv1/v2cSNMPv3Adds stronger authentication and privacy options
Direct RDP from InternetVPN, ZTNA, jump box, or PAM pathReduces attack surface
Public SMBNo public SMB; use controlled file sharingSMB exposure is a major risk

Acronym Table for Fast Review

AcronymMeaningExam decision clue
AAAAuthentication, authorization, accountingIdentity proof, permission decision, activity record
ACLAccess control listAllow or deny based on object, network, or identity
AESAdvanced Encryption StandardSymmetric encryption
APTAdvanced persistent threatSophisticated, patient, targeted attacker
CASBCloud access security brokerVisibility and policy control for cloud services
CSRCertificate signing requestRequest used when obtaining a certificate
DLPData loss preventionDetects or blocks sensitive data movement
EDREndpoint detection and responseEndpoint telemetry, detection, and response
FIMFile integrity monitoringDetects file changes
IdPIdentity providerAuthenticates identities for applications
IAMIdentity and access managementLifecycle, roles, policy, and access reviews
MDMMobile device managementDevice configuration and policy
NACNetwork access controlAllows or restricts network access based on posture or identity
NTPNetwork Time ProtocolTime sync for logs and Kerberos
OIDCOpenID ConnectIdentity layer commonly used with OAuth 2.0
PAMPrivileged access managementControls privileged elevation and sessions
PKIPublic key infrastructureCertificates, keys, trust chains
RADIUSRemote Authentication Dial-In User ServiceAAA for VPN, Wi-Fi, and network access
SAMLSecurity Assertion Markup LanguageFederation and SSO assertions
SIEMSecurity information and event managementLog collection, correlation, and alerting
SOARSecurity orchestration, automation, and responseAutomated or semi-automated response playbooks
SPF/DKIM/DMARCEmail authentication controlsReduce spoofing and improve mail trust decisions
TLSTransport Layer SecurityEncryption in transit
TPMTrusted Platform ModuleHardware-backed key storage and measured boot support
ZTNAZero trust network accessApp-specific access without broad network trust

PBQ Port Pattern

If the prompt says "allow customers to access the public ordering site," think TCP 443 to the web tier. If it says "allow the web tier to query the database," allow only the web tier source to the database destination on the required database port. If it says "allow administrators to manage Linux servers," prefer SSH from an admin subnet or jump box, not Telnet or broad Internet access.

Mini Scenario

A company publishes a customer portal, runs a database behind it, and uses a jump box for administration.

FlowGood rule
Internet to portalAllow TCP 443 to web server
Web server to databaseAllow required database port from web server only
Admin subnet to jump boxAllow SSH or RDP as required by platform
Jump box to internal serversAllow management ports from jump box only
Internet to databaseDeny
Internet to SMB/RDP/SSH on serversDeny unless a specific secure remote access design is stated

The exam likes broad answers that sound convenient. Prefer the narrow answer that meets the business goal.

Test Your Knowledge

A PBQ shows TCP 445 allowed from the Internet to an internal file server. What is the best interpretation?

A
B
C
D
Test Your KnowledgeMatching

Match the protocol or acronym to the best exam cue.

Match each item on the left with the correct item on the right

1
LDAPS
2
SIEM
3
PAM
4
NTP
Test Your Knowledge

Which option is the best secure replacement for Telnet administration?

A
B
C
D