Security Protocols Flashcards
A security solution that translates domain names into IP addresses
DNSSEC
Which version(s) of the SNMP protocol offer(s) authentication based on community strings sent in an unencrypted form?
SNMP V1 and V2
What protocol enables remote access to another computer on the network via web browser?
HTTPS
What port is RDP
3389
Which part of the IPsec protocol suite provides authentication and integrity?
AH - authentication header
Which part of IPsec provides authentication, integrity, and confidentiality?
ESP - encapsulating security payload
Which of the IPsec modes provides entire packet encryption?
Tunnel Mode
Does POP3S use SSL or TLS? What port?
TLS, 995
What port is IMAPS?
993
Which of the following is a secure implementation of a protocol used for synchronizing clocks over a computer network?
NTPsec
A security feature of a network switch that provides countermeasures against rogue DHCP servers is called:
DHCP Snooping
A network protocol for secure file transfer over Secure Shell (SSH) is called:
SFTP
What is S/MIME
Secure Multipurpose Internet Mail Extensions - standard that provides cryptographic security for electronic messaging
What is a downgrade attack?
A common way to attack TLS where a protocol is tricked into using a downgraded, less secure, version of itself
A network protocol providing an alternative solution to the manual allocation of IP addresses is called:
DHCP
What are the characteristic features of the secure version of IMAP?
TLS, SSL, TCP port 993
IMAP Secure uses TLS or SSL?
Both
What are the characteristic features of POP3 Secure?
TLS, SSL, TCP port 995
Which of the following refers to IMAP?
- Offers improved functionality in comparison to POP3 ( Your answer)
- Serves the same function as POP3 ( Your answer)
- Enables sending email messages from client devices
- Offers less functions than POP3
- Enables email exchange between mail servers
1 and 2
Is POP3 used for email sending or retrieval?
Email retrieval
An IPsec mode providing encryption only for the payload (the data part of the packet) is known as:
Transport Mode
The lack of entropy in the process of generating cryptographic keys improves the security of cryptographic algorithms. True or False?
False
What does SFTP use ?
SSH