Chapter 10 Flashcards
As a network administrator, you are asked to recommend a secure method for transferring data between hosts on a network. Which of the following protocols would you recommend? (Select two.)
SCP
RCP
SFTP
TDP
FTP
SCP
SFTP
Which of the following protocols uses port 443?
S-HTTP
SSH
S/MIME
HTTPS
HTTPS
Which TCP/IP protocol is a secure form of HTTP that uses SSL as a sub-layer for security?
SSH
DNS
SMTP
HTTPS
HTTPS
Which of the following tools allow remote management of servers? (Select two.)
SSL
Telnet
FTP
SSH
POP3
Telnet
SSH
SFTP uses which mechanism to provide security for authentication and data transfer?
SSH
Token devices
SSL
IPsec
SSH
When using SSL authentication, what does the client verify first when checking a server’s identity?
The certificate must be non-expiring and self-signed by the sysadmin.
The current date and time must fall within the server’s certificate-validity period.
All DNS resolution must point to the corporate intranet routers.
Master secrets are verifiable from asymmetric keys.
The current date and time must fall within the server’s certificate-validity period.
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)
TLS
SNMP
SMTP
HTTPS
SSL
TLS
SSL
Which of the following protocols can TLS use for key exchange? (Select two.)
RSA
Diffie-Hellman
KEA
IKE
ECC
RSA
Diffie-Hellman
IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)
AH
SSL
EPS
L2TP
ESP
AH
ESP
What is the primary function of the IKE Protocol used with IPsec?
Provide authentication services.
Provide both authentication and encryption.
Create a security association between communicating partners.
Encrypt packet contents.
Ensure dynamic key rotation and select initialization vectors (IVs).
Create a security association between communicating partners.
Which of the following is a technology that tries to detect and stop sensitive data breaches, or data leakage incidents, in an organization?
Data transmission security
Data loss prevention
Public key cryptography
Data hashing
Data loss prevention
Which rights management category is applied to music, videos, and software that is sold to consumers?
Static
Dynamic
IRM
DRM
DRM
Your organization is having a third party come in and perform an audit on the financial records. You want to ensure that the auditor has access to the data they need while keeping the customers’ data secure. To accomplish this goal, you plan to implement a mask that replaces the client names and account numbers with fictional data.
Which masking method are you implementing?
Encryption
Tokenization
Static
Dynamic
Dynamic
Which of the following BEST describes dynamic data masking? (Select two.)
It is helpful for data at rest in a database and can be specified by field or column.
It replaces original information with a mask that mimics the original in form and function.
Original data is made irretrievable through reverse-engineering.
It can be used to control which users can see the actual data.
It is good to use when making copies of a database for testing.
It replaces original information with a mask that mimics the original in form and function.
It can be used to control which users can see the actual data.
Which of the following DLP implementations can be used to monitor and control access to physical devices on workstations or servers?
File-level DLP
Cloud DLP
Endpoint DLP
Network DLP
Endpoint DLP
DLP can be used to identify sensitive files in a file system and then embed the organization’s security policy within the file.
Which of the following DLP implementations travels with sensitive data files when they are moved or copied?
Endpoint DLP
File-level DLP
Network DLP
Cloud DLP
File-level DLP