Security Protocols Flashcards

1
Q

A security solution that translates domain names into IP addresses

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which version(s) of the SNMP protocol offer(s) authentication based on community strings sent in an unencrypted form?

A

SNMP V1 and V2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocol enables remote access to another computer on the network via web browser?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port is RDP

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which part of the IPsec protocol suite provides authentication and integrity?

A

AH - authentication header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which part of IPsec provides authentication, integrity, and confidentiality?

A

ESP - encapsulating security payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the IPsec modes provides entire packet encryption?

A

Tunnel Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Does POP3S use SSL or TLS? What port?

A

TLS, 995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What port is IMAPS?

A

993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a secure implementation of a protocol used for synchronizing clocks over a computer network?

A

NTPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security feature of a network switch that provides countermeasures against rogue DHCP servers is called:

A

DHCP Snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network protocol for secure file transfer over Secure Shell (SSH) is called:

A

SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is S/MIME

A

Secure Multipurpose Internet Mail Extensions - standard that provides cryptographic security for electronic messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a downgrade attack?

A

A common way to attack TLS where a protocol is tricked into using a downgraded, less secure, version of itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network protocol providing an alternative solution to the manual allocation of IP addresses is called:

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the characteristic features of the secure version of IMAP?

A

TLS, SSL, TCP port 993

17
Q

IMAP Secure uses TLS or SSL?

A

Both

18
Q

What are the characteristic features of POP3 Secure?

A

TLS, SSL, TCP port 995

19
Q

Which of the following refers to IMAP?

  1. Offers improved functionality in comparison to POP3 ( Your answer)
  2. Serves the same function as POP3 ( Your answer)
  3. Enables sending email messages from client devices
  4. Offers less functions than POP3
  5. Enables email exchange between mail servers
A

1 and 2

20
Q

Is POP3 used for email sending or retrieval?

A

Email retrieval

21
Q

An IPsec mode providing encryption only for the payload (the data part of the packet) is known as:

A

Transport Mode

22
Q

The lack of entropy in the process of generating cryptographic keys improves the security of cryptographic algorithms. True or False?

A

False

23
Q

What does SFTP use ?

A

SSH