Lesson 11 - Questions Flashcards
What vulnerabilities does a rogue DHCP server expose users to?
Why is it vital to ensure the security of an organization’s DNS service?
True or false? The contents of the HOSTS file are irrelevant as long as a DNS service is properly configured.
What is DNS server cache poisoning?
True or false? DNSSEC depends on a chain of trust from the root servers down.
What are the advantages of SASL over LDAPS?
What steps should you take to secure an SNMPv2 service?
What type of attack against HTTPS aims to force the server to negotiate weak ciphers?
A client and server have agreed on the use of the cipher suite ECDHE-ECDSA-AES256- GCM-SHA384 for a TLS session. What is the key strength of the symmetric encryption algorithm?
What security protocol does SFTP use to protect the connection and which port does an SFTP server listen on by default?
Which port(s) and security methods should be used by a mail client to submit messages for delivery by an SMTP server?
When using S/MIME, which key is used to encrypt a message?
Which protocol protects the contents of a VoIP conversation from eavesdropping?
True or false? A TLS VPN can only provide access to web-based network resources.
What is Microsoft’s TLS VPN solution?