Section 21.207 Selecting Secure Protocols Flashcards

Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.

1
Q

Secure Protocols

A

■ Choose secure protocols to protect data in transit from unauthorised access

Examples include HTTP vs. HTTPS, FTP vs. SFTP, Telnet vs. SSH

■ Secure protocols use encryption to safeguard data during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocol

A

Set of rules or procedures for transmitting data between electronic devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Telnet

A

Application layer protocol that allows a user on one computer to log onto another computer that is part of the same network

● Transmits in plaintext

● This is vulnerable so you should use SSH instead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Always use the encrypted version of the protocol

A

Examples:
○ HTTPS
○ SFTP
○ SSH
○ IMAPS
○ POP3S
○ SMTPS
○ SNMPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port Selection

A

Ports are logical constructs used to identify processes or services on a system

Categorised into the following:
● Well-known ports (0-1023)
● Registered ports (1024-49151)
● Dynamic/private ports (49152-65535)

■ Default port numbers often indicate whether a protocol is secure (e.g., HTTP on port 80 vs. HTTPS on port 443)

■ Additional security considerations:
● Follow the principle of least privilege by opening only necessary ports to
minimize the attack surface
● Changing port numbers can add a layer of obscurity but should not
replace robust security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transport Methods

A

Choose a transport method (TCP or UDP) based on the application’s needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Transport Methods

TCP (Transmission Control Protocol)

A

Connection-oriented, ensuring data delivery without errors

● Ideal for applications where data accuracy is crucial, like web and email
servers

● Uses acknowledgments, retransmission, and sequencing for data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transport Methods

UDP (User Datagram Protocol)

A

Connectionless and faster, but doesn’t guarantee data delivery

● Suitable for applications prioritizing speed over accuracy, like streaming
video or gaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly