A third-party security consultant is performing a vulnerability assessment on the network and informs you that there is an open port which, by default, is used for unencrypted remote administration, and advises it should either be closed or secured. Which port should the consultant be referring to?
80 – HTTP
21 – FTP
23 – Telnet
22 – SSH