A third-party security consultant is performing a vulnerability assessment on the network and informs you that there is an open port which, by default, is used for unencrypted remote administration, and advises it should either be closed or secured. Which port should the consultant be referring to?
23 – Telnet
21 – FTP
80 – HTTP
22 – SSH