Topic 3.0 Flashcards

1
Q

Identity if a secure protocol uses SSH or TLS

A

If a secure protocol starts with S (I.e.: SFTP) the protocol uses SSH. Protocols ending in S (I.e.: HTTPS) use TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which cryptographic operations use an asymmetric private key?
(Choose two.)

A. Creating a digital signature
B. Verifying a digital signature
C. Encrypting a message
D. Decrypting messages

A

A and D. Digital signatures assure the recipient of a message that it is authentic. Message decryption requires public key and private key.

B and C are incorrect.
D
ivate keys create a digital signature and the related public key is used to verify the signature.
The sender of an
encrypted message must have access to the public key of message recipients in order to encrypt the message for them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which cryptographic operation does not use a cryptographic key?

A. Encrypting
B. Hashing
C. Decrypting
D. Creating digital signatures

A

B. Hashing

Hashing is used to verify that a file or message has not changed. The origin data is fed into a one-way cryptographic algorithm resulting in a unique value called a hash; a cryptographic key is not used. One-way algorithms are easy to compute given input, but it is very difficult to take a hash and determine the original value.

A, C, and D are incorrect. Encryption uses a cryptographic key and algorithm to convert plain text into encrypted data or cipher text to provide data confidentiality. Decryption required a cryptographic key and algorithm to convert cipher text back to the original plain text. Digital signatures assure the recipient of a message that it is authentic and has not been modified. The message sender’s private key is used to create a digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of key is used by an IPSec VPN configured with a pre-shared key (PSK)?

A. Public
B. Private
C. Asymmetric
D. Symmetric

A

D. With symmetric encryption, the same key is used for encryption and decryption. The IPSec
VPN PSK must be
configured on both ends of the VPN tunnel.

A, B, and Care
incorrect. PSKs do not use asymmetric encryption, which uses public and private key pairs. With asymmetric encryption, the public key encrypts and the related private key decrypts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. You are evaluating a secure network
    management solution that will be used to monitor and configure network infrastructure devices remotely. Which of the following is the best choice?

A. SFTP
B. FTPS
C. SNMPv3
D. HTTPS

A

C. The Simple Network
Management Protocol
(SNMP) version 3
supports authenticated and encrypted messages when remotely monitoring and managing devices running an SNMP agent such as routers, switches, and server operating systems. SNMP normally uses UDP port
161.

A, B, and D are incorrect. SSH File Transfer Protocol (SFTP) uses remote encrypted
SSH sessions to transfer files securely between
SSH hosts, which normally listen on TCP port 22. File Transfer
Protocol Secure (FTPS)
uses Transport Layer
Security (TLS) to enable the secure transfer of files between FTP hosts over
TCP port 21 (explicit
FTPS) or 990 (implicit
FTPS): traditional FTP passes credentials and data over the network in clear text. Hypertext Transfer Protocol Secure (HTTPS) secures transmissions between clients and web servers using the TLS network security protocol. Due to security vulnerabilities,
Secure Sockets Layer
(SSL) has been deprecated and
superseded by TLS (with the latest version being
1.3).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your company provides remote word processing and spreadsheet file access using FTP. After a security audit, the findings suggest
employing TLS to harden
FTP access. Which protocol should you configure to address this concern?

A. SFTP
B. FTPS
C. SNMPv3
D. HTTPS

A

B. FTPS uses TLS to enable the secure transfer of files between
FTP hosts over TCP port
21 (explicit FTPS) or 990 (implicit FTPS); traditional
FTP passes credentials and data over the network in clear text.

A, C, and D are incorrect. SFTP uses remote encrypted SSH sessions to transfer files securely between SSH hosts, which normally listen on TCP port 22.
SNMP version 3 supports authenticated and encrypted messages when remotely monitoring and managing devices running an SNMP agent such as routers, switches, and server operating systems.
HTTPS secures transmissions between clients and web servers using the TLS network security protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly