13 Flashcards

1
Q

The lack of entropy in the process of generating cryptographic keys improves the security of cryptographic algorithms.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A suite of security extensions for an Internet service that translates domain names into IP addresses is known as:

A

** DNSSec **

DNSSEC is a suite of extensions that improve Domain Name System (DNS) security by verifying that DNS results have not been tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refers to a non-proprietary cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multipurpose Internet Mail Extensions (MIME) specification extends the email message format beyond simple text, enabling the transfer of graphics, audio, and video files over the Internet mail system. Secure MIME (S/MIME) is an enhanced version of the MIME protocol that enables email security features by providing encryption, authentication, message integrity, and other related services.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which protocol enables secure, real-time delivery of audio and video over an IP network?

A

** SRTP **

SRTP (Secure Real-time Transport Protocol). SRTP is an extension of the Real-time Transport Protocol (RTP) that adds security features for real-time communication, including encryption and authentication, to protect the confidentiality and integrity of audio and video streams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

LDAPS is an example of:

A

Secure directory access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following protocols allow(s) for secure file transfer? (Select all that apply)

A
  • FTPS
    -> FTPS (File Transfer Protocol Secure) is an extension of the popular File Transfer Protocol that supports Transport Layer Security (TLS) and the new defunct Secure Sockets Layer (SSL).
  • SFTP
    -> SFTP stands for SSH File Transfer Protocol or Secure File Transfer Protocol.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure File Transfer Protocol (SFTP) is an extension to the FTP protocol that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network protocol for secure file transfer over Secure Shell (SSH) is called:

A
  • SFTP
    -> SFTP stands for SSH File Transfer Protocol or Secure File Transfer Protocol.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FTPS is an extension to the Secure Shell (SSH) protocol and runs by default on port number 22

A

False

-> FTPS (File Transfer Protocol Secure) is an extension of the popular File Transfer Protocol that supports Transport Layer Security (TLS) and the new defunct Secure Sockets Layer (SSL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which version(s) of the SNMP protocol offer(s) authentication based on community strings sent in an unencrypted form?

A
  • SNMPv1
  • SNMPv2
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Of the three existing versions of the Simple Network Management Protocol (SNMP), versions 1 and 2 (SNMPv1 and SNMPv2) offer authentication based on community strings sent in an unencrypted form (in cleartext). SNMPv3 provides packet encryption, authentication, and hashing mechanisms that allow for checking whether data has changed in transit (i.e. validation of data integrity).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

A

** HTTPS **

HTTPS uses an encryption protocol to encrypt communications. The protocol is called Transport Layer Security (TLS), although formerly it was known as Secure Sockets Layer (SSL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the protocols listed below enables remote access to another computer on the network via web browser?

A

** HTTPS **

HTTPS uses an encryption protocol to encrypt communications. The protocol is called Transport Layer Security (TLS), although formerly it was known as Secure Sockets Layer (SSL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which part of the IPsec protocol suite provides authentication and integrity?

A

** AH **

The Authentication Header (AH) protocol provides data origin authentication, data integrity, and replay protection. However, AH does not provide data confidentiality, which means that all of your data is sent in the clear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which part of IPsec provides authentication, integrity, and confidentiality?

A

** ESP **

Encapsulating Security Payload (ESP) is a member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data between computers using a Virtual Private Network (VPN)

17
Q

Which of the IPsec modes provides entire packet encryption?

A

Tunnel

18
Q

An IPsec mode providing encryption only for the payload (the data part of the packet) is known as:

A

Transport mode

19
Q

POP3 is used for:

A

Email retrieval

20
Q

Which of the following answers refer to IMAP? (Select 2 answers)

A
  • Offers improved functionality in comparison to POP3
  • Serves the same function as POP3
21
Q

Which of the answers listed below refers to a deprecated TLS-based method for securing SMTP?

A

** SMTPS **

22
Q

Which of the following answers refer(s) to POP3S encrypted communication? (Select all that apply)

A
  • Secure Sockets Layer (SSL)
  • TCP port 995 ( Missed)
  • Transport Layer Security (TLS)
23
Q

What are the characteristic features of the secure version of IMAP? (Select all that apply)

A
  • Secure Sockets Layer (SSL)
  • TCP port 993
  • Transport Layer Security (TLS)
24
Q

Which of the following is a secure implementation of a protocol used for synchronizing clocks over a computer network?

A

NTPsec

25
Q

A network protocol providing an alternative solution to the manual allocation of IP addresses is called:

A

DHCP