Secure Protocols Flashcards
Cache poisoning is directed against which of the following servers?
DHCP
Web
DNS
DNS
Cache poisoning attacks DNS servers
Which two of the following are secure FTP protocols?
SSL
FTPS
SFTP
TFTP
SSH
FTPS
SFTP
The two secure FTP protocols are FTP over SSL and SSH FTP
The four-step process that initiates an SSL/TLS session is called a(n) ______________.
initialization
authentication
handshake
handshake
The four-step process that initiates an SSL/TLS session is called a handshake
Encrypted IMAP uses which TCP port number?
995
993
465
993
Encrypted IMAP uses TCP port number 993
Scott receives an e-mail from Mike with a digital signature attachment. Mike is probably using which of the following protocols?
Secure SMTP
SFTP
S/MIME
S/MIME
E-mail attachments of all sorts use MIME; the secure version is S/MIME
Inserting unexpected text into a URL is what form of attack?
Command injection
SQL injection
LDAP injection
Command injection
A command injection attack inserts unexpected text into a URL
What kind of attack manipulates a token on an established Web session?
Buffer overflow
LDAP injection
Cross-site scripting
Cross-site scripting
A cross-site scripting attack manipulates a token on an established Web session
A new attack that is previously unknown to the security world is called a ______________ attack.
birthday
proto-malware
zero-day
zero-day
A zero-day attack pounces on a previously unknown vulnerability in software or operating systems
Which of the following is a minimum set of performance values that define a certain aspect of what the application must do?
Requirements
Agile
Baseline
Baseline
A baseline documents a minimum set of performance values that define aspects of an application
Scrum is a ____________ based on the Agile philosophy.
timing system
DevOps cycle
process framework
process framework
A Scrum is a process framework based on the Agile program development philosophy