Q+A Flashcards
You want to use a more secure version of FTP for transferring files. What are two options?
SFTP and FTPS
What is known as when traffic to a website is redirected to another illegitimate site?
Pharming
In an attempt to gain access to discarded company documents, what social engineering attack would a person implement?
Dumpster Diving
What is the more advanced replacement for RADIUS?
Diameter
What port does TACACS+ use?
Port 49
What port does SSH use?
Port 22
What port does TFTP use?
Port 69
You surmise that a user;s session was interrupted by an attacker who inserted malicious code into the network traffic. What attack has occurred?
Man-in-the-middle (MITM)
What algorithm depends on the inability to factor large prime numbers?
RSA (Rivest, Shamir, Adleman)
Greg needs to centralize the authentication of multiple networking systems against a single user database. What is he trying to implement?
Single sign-on (SSO)
What fire extinguisher should be used to put out metal fires suck as the kind created by magnesium or titanium?
Class D
What protocol uses port 443?
HTTPS (SSL and TLS)
You work as a network admin for your organization and use a tool to capture ICMP, HTTP, and FTP, and other packets of information. Which tool should you use.
Protocol Analyzer
You are in charge of recycling computers. Some of the computers have hard drives that contain personally identifiable information (PII). what should be done to the hard drive before it is recycled.
The hard drive should be sanitized.
What port and transport mechanism does TFTP use by default?
69 and UDP
A user receives an encrypted message that was encrypted using asymmetric cryptography. What does this recipient deed to decrypt the messagae
Recipient’s private key
What tool should you use to identify network spike activity?
Protocol Analyzer
One of your database servers is mission-critical. You cannot afford any downtime. What is the best item to ensure minimal downtime of the server and ensure fault tolerance of the data stored on the database server?
RAID (Redundant Array of Inexpensive Disks)
You get an automated call from what appears to be your bank. The recording asks you to state your name and birthday and enter you account number to validate your identity. what type of attack has been perpetuated against you.
Vishing
Which network authentication protocol uses symmetric key cryptography, stores a shared key for each network resource and uses a Key Distribution Center (KDC)?
Kerberos
What port does PPTP use?
Port 1723
Which service uses port 49?
Terminal Access Controller Accesses-Control System Plus (TACACS+)
What port does RDP use?
port 3389
What port does L2TP use?
Port 1701