101-150 Flashcards
A recent vulnerability scan found that Telnet is enabled on all network devices.
Which of the following protocols should be used instead of Telnet?
B. SSH
SSH transmits both authentication traffic and data in a secured encrypted form, whereas Telnet transmits both authentication credentials and data in clear text.
Which of the following is BEST used as a secure replacement for TELNET?
D. SSH
SSH transmits both authentication traffic and data in a secured encrypted form, whereas Telnet transmits both authentication credentials and data in clear text.
A security analyst needs to logon to the console to perform maintenance on a remote server.
Which of the following protocols would provide secure access?
B. SSH
Secure Shell (SSH) is a tunneling protocol originally used on Unix systems. It’s now available for both Unix and Windows environments. SSH is primarily intended for interactive terminal sessions. SSH is used to establish a command-line, text-only interface connection with a server, router, switch, or similar device over any distance.
A UNIX administrator would like to use native commands to provide a secure way of connecting to other devices remotely and to securely transfer files.
Which of the following protocols could be utilized? (Choose two.)
C. SCP
E. SSH
SSH is used to establish a command-line, text-only interface connection with a server, router, switch, or similar device over any distance.
Secure Copy Protocol (SCP) is a secure file-transfer facility based on SSH and Remote Copy Protocol (RCP). SCP is commonly used on Linux and Unix platforms.
A network technician is on the phone with the system administration team. Power to the server room was lost and servers need to be restarted. The DNS services must be the first to be restarted. Several machines are powered off.
Assuming each server only provides one service, which of the following should be powered on FIRST to establish DNS services?
A. BIND server
BIND (Berkeley Internet Name Domain) is the most widely used Domain Name System (DNS) software on the Internet. It includes the DNS server component contracted for name daemon. This is the only option that directly involves DNS.
When reviewing security logs, an administrator sees requests for the AAAA record of www.comptia.com.
Which of the following BEST describes this type of record?
D. IPv6 DNS record
The AAAA Address record links a FQDN to an IPv6 address.
Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?
C. Secure zone transfers
A primary DNS server has the “master copy” of a zone, and secondary DNS servers keep copies of the zone for redundancy. When changes are made to zone data on the primary DNS server, these changes must be distributed to the secondary DNS servers for the zone. This is done through zone transfers. If you allow zone transfers to any server, all the resource records in the zone are viewable by any host that can contact your DNS server. Thus, you will need to secure the zone transfers to stop an attacker from mapping out your addresses and devices on your network.
A security engineer, Joe, has been asked to create a secure connection between his mail server and the mail server of a business partner.
Which of the following protocol would be MOST appropriate?
D. TLS
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. It uses X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom it is communicating, and to exchange a symmetric key. The TLS protocol allows client-server applications to communicate across a network in a way designed to prevent eavesdropping and tampering.
Which of the following protocols is used to authenticate the client and server’s digital certificate?
C. TLS
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. It uses X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom it is communicating, and to exchange a symmetric key.
An administrator configures all wireless access points to make use of a new network certificate authority.
Which of the following is being used?
C. EAP-TLS
The majority of the EAP-TLS implementations require client-side X.509 certificates without giving the option to disable the requirement.
An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols?
B. SSL
SSL (Secure Sockets Layer) is used for establishing an encrypted link between two computers, typically a web server and a browser. SSL is used to enable sensitive information such as login credentials and credit card numbers to be transmitted securely.
Which of the following is the MOST secure protocol to transfer files?
B. FTPS
FTPS refers to FTP Secure, or FTP SSL. It is a secure variation of File Transfer Protocol (FTP).
Which of the following TCP ports uses FTP/S by default?
D. 989 and 990
FTPS uses ports 989 and 990.
Which of the following protocols allows for secure transfer of files? (Choose two.)
C. SFTP
D. SCP
Standard FTP is a protocol often used to move files between one system and another either over the Internet or within private networks. SFTP is a secured alternative to standard FTP.
Secure Copy Protocol (SCP) is a secure file-transfer facility based on SSH and Remote Copy Protocol (RCP).
After a network outage, a PC technician is unable to ping various network devices. The network administrator verifies that those devices are working properly and can be accessed securely.
Which of the following is the MOST likely reason the PC technician is unable to ping those devices?
A. ICMP is being blocked
ICMP is a protocol that is commonly used by tools such as ping, traceroute, and pathping. ICMP offers no information If ICMP request queries go unanswered, or ICMP replies are lost or blocked.
A security administrator wishes to change their wireless network so that IPSec is built into the protocol and NAT is no longer required for address range extension.
Which of the following protocols should be used in this scenario?
C. IPv6
IPSec security is built into IPv6
A system administrator attempts to ping a hostname and the response is 2001:4860:0:2001::68.
Which of the following replies has the administrator received?
D. IPv6 address
IPv6 addresses are 128-bits in length. An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). The hexadecimal digits are case-insensitive, but IETF recommendations suggest the use of lower case letters. The full representation of eight 4-digit groups may be simplified by several techniques, eliminating parts of the representation.
Which of the following protocols is used by IPv6 for MAC address resolution?
A. NDP
The Neighbor Discovery Protocol (NDP) is a protocol in the Internet protocol suite used with Internet Protocol Version 6 (IPv6).
Which of the following protocols allows for the LARGEST address space?
C. IPv6
The main advantage of IPv6 over IPv4 is its larger address space. The length of an IPv6 address is 128 bits, compared with 32 bits in IPv4.
Pete, a network administrator, is implementing IPv6 in the DMZ.
Which of the following protocols must he allow through the firewall to ensure the web servers can be reached via IPv6 from an IPv6 enabled Internet host?
B. TCP port 80 and TCP port 443
HTTP and HTTPS, which use TCP port 80 and TCP port 443 respectively, are necessary for Communicating with Web servers. They should therefore be allowed through the firewall.