A third-party security consultant is performing a vulnerability assessment on the network and informs you that there is an open port which, by default, is used for unencrypted remote administration, and advises it should either be closed or secured. Which port should the consultant be referring to?
21 – FTP
23 – Telnet
80 – HTTP
22 – SSH