Enterprise Infrastructure Security Principles Flashcards
Which assigned port is used for HTTPS?
A. 990
B. 465
C. 443
D. 563
C. 443
Port 443 is the standard port used for HTTPS, which provides secure communication over the internet
Which term describes all possible attack vectors that a threat actor can leverage to access a system and extract data?
A. Attack surface
B. Kill chain
C. Restricted Zone
D. Indicator of compromise
A. Attack surface
An attack surface refers to the sum of all the different points where an attacker can try to enter a system, extract data, or cause harm. It includes all potential vulnerabilities, weaknesses, and entry points that an attacker can exploit.
What is the preferred security solution to support mobile devices, embedded components and IoT?
A. mutual TLS
B. Electronic codebooks
C. Elliptic curves
D. Software defined networking
C. Elliptic curve
What is the most ubiquitous certificate-based peer authentication in use on the Internet? (HTTPS)?
A. TLS
B. SDN
C. SSL
D. IPsec
A. TLS
TLS (Transport Layer Security) is the successor to SSL (Secure Sockets Layer) and is the most widely used protocol for securing communication over the internet, including HTTPS. It uses digital certificates to authenticate servers and encrypt data, ensuring secure and private communication.
Which IPsec protocol has two phases and two separate security associations?
A. IKEv2
B. IKEv1
C. AH
D. ESP
A. IKEv1
IKEv1 uses a two-phase approach to establish secure communication channels:
Phase 1: Establishes a secure, authenticated channel between devices.
Phase 2: Establishes IPsec SAs for data encryption and authentication.
Separating these phases allows for flexibility, efficient rekeying, and scalability in securing IP network communications.
What is an architecture that delivers converged network and security capabilities such as secure web gateways, cloud access security brokers, firewall as-a-service, and zero-trust network access (ZTNA)?
A. TLS
B. SD-MAN
C. SMTP
D. SASE
D. SASE.
SASE (Secure Access Service Edge) is an architecture that delivers converged network and security capabilities such as secure web gateways, cloud access security brokers, firewall as-a-service, and zero-trust network access (ZTNA).
Which service offers multiple security features and services on a single network device to protect email, webmail, fax, voice, conferencing, streaming, peer-to-peer file transfer services and more?
A. UTM
B. VPN
C. ACL
D. SDP
A. UTM
A UTM (Unified Threat Management) appliance is a network security device that combines multiple security functions into a single platform. This consolidated approach simplifies network management and offers comprehensive protection against a wide range of threats, including those targeting email, webmail, fax, voice, conferencing, streaming, peer-to-peer file transfer, and more.
Which actions can an intrusion detection service perform?
A. Drop packets inline
B. Block attacker address inline
C. Alerts and alarms
D. TCP resets
E. Verbose dumps
F. SNMP traps
C. Alerts and alarms
D. TCP resets
E. Verbose dumps
F. SNMP traps