Implementing Secure Protocols Flashcards

1
Q

Which of the following accurately describes the purpose of computer protocols?

They allow developers to use any programming language on any platform.

They define the state of a virtual machine at a point in time.

They act as a common language to allow different components to communicate.

A

They act as a common language to allow different components to communicate.

Computer protocols act as a common language to allow different components to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of the DNS protocol?

It provides a function for charging SaaS on a per-use basis.

It translates names into IP addresses.

It supports the networking infrastructure.

A

It translates names into IP addresses.

Domain Name Service (DNS) translates names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user reports to the help desk that he is getting “cannot resolve address” error messages from his browser. Which port is likely a problem on his firewall?

22

53

440

A

53

Domain Name Service (DNS) uses TCP and UDP port 53 for standard queries and responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a weakness of the DNS protocol?

Requests and replies are sent in plaintext.

It doesn’t provide billing standardization in cloud infrastructures.

TCP can be used for large transfers such as zone transfers.

A

Requests and replies are sent in plaintext.

A major weakness of the DNS protocol is that requests and replies are sent in plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a benefit of DNSSEC?

Scalability

Lower expenditures from operations capital (OpsCap) expenditures

Enables origin authentication, authenticated denial of existence, and data integrity

A

Enables origin authentication, authenticated denial of existence, and data integrity

A major benefit of DNSSEC is that it enables origin authentication, authenticated denial of existence, and data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Secure Shell (SSH) protocol?

It is an encrypted remote terminal connection program used for remote connections to a server.

It provides dynamic network address translation.

It provides Software as a Service (SaaS).

A

It is an encrypted remote terminal connection program used for remote connections to a server.

The SSH protocol is an encrypted remote terminal connection program used for remote connections to a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol?

It optimizes the use of ports 80 and 443.

It encrypts HTTP traffic.

It provides cryptographic protections to e-mails.

A

It provides cryptographic protections to e-mails.

The purpose of the S/MIME protocol is to provide cryptographic protections to e-mail attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of Secure Real-time Transport Protocol (SRTP)?

It encrypts SMTP traffic.

It encrypts port 22.

It securely delivers audio and video over IP networks.

A

It securely delivers audio and video over IP networks.

The purpose of SRTP is to deliver audio and video securely over IP networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of Lightweight Directory Access Protocol Secure (LDAPS)?

It leverages encryption protections of SSH to secure FTP transfers.

It uses an SSL/TLS tunnel to connect LDAP services.

It digitally signs DNS records.

A

It uses an SSL/TLS tunnel to connect LDAP services.

LDAPS uses an SSL/TLS tunnel to connect LDAP services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which port does FTPS use?

53

990

991

A

990

FTPS uses port 990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are a security admin for XYZ company. You suspect that company e-mails using default POP and IMAP e-mail protocols and ports are getting intercepted while in transit. Which of the following ports should you consider using?

Port 995 and 993

Port 53 and 22

Port 110 and 143

A

Port 995 and 993

The default POP3 and IMAP ports are 110 and 143 respectively. These are not secure. As a security admin, you should consider using secure POP using port 995 and secure IMAP using port 993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the Simple Network Management Protocol (SNMP)?

It achieves specific communication goals.

It provides a common language for developers.

It is used to manage devices on IP-based networks.

A

It is used to manage devices on IP-based networks.

The purpose of SNMP is to manage devices on IP-based networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of the Secure Sockets Layer (SSL) protocol?

It provides static network address translation.

It supports the implementation of a private cloud.

It provides encryption for transport-layer protocols across the Web.

A

It provides encryption for transport-layer protocols across the Web.

The purpose of SSL is to provide encryption for transport-layer protocols across the Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following correctly describes Transport Layer Security (TLS)?

It replaces SSL.

It extends SNMP.

It provides Port Address Translation.

A

It replaces SSL.

TLS replaces SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of HTTPS?

To allow enumeration and monitoring of network resources

To use SSL or TLS to encrypt a channel over which HTTP traffic is transmitted

To implement single sign-on

A

To use SSL or TLS to encrypt a channel over which HTTP traffic is transmitted

HTTPS uses SSL or TLS to encrypt a channel over which HTTP traffic is transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly