Lesson 11 - Questions Flashcards

1
Q

What vulnerabilities does a rogue DHCP server expose users to?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is it vital to ensure the security of an organization’s DNS service?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or false? The contents of the HOSTS file are irrelevant as long as a DNS service is properly configured.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is DNS server cache poisoning?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or false? DNSSEC depends on a chain of trust from the root servers down.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages of SASL over LDAPS?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What steps should you take to secure an SNMPv2 service?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of attack against HTTPS aims to force the server to negotiate weak ciphers?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A client and server have agreed on the use of the cipher suite ECDHE-ECDSA-AES256- GCM-SHA384 for a TLS session. What is the key strength of the symmetric encryption algorithm?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What security protocol does SFTP use to protect the connection and which port does an SFTP server listen on by default?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which port(s) and security methods should be used by a mail client to submit messages for delivery by an SMTP server?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When using S/MIME, which key is used to encrypt a message?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which protocol protects the contents of a VoIP conversation from eavesdropping?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false? A TLS VPN can only provide access to web-based network resources.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Microsoft’s TLS VPN solution?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What IPSec mode would you use for data confidentiality on a private network?

A
17
Q

Which protocol is often used in conjunction with IPSec to provide a remote access client VPN with user authentication?

A
18
Q

What is the main advantage of IKEv2 over IKE v1?

A
19
Q

What bit of information confirms the identity of an SSH server to a client?

A