Implementing Secure Protocols
What TCP service port does SSL/TLS most commonly use?
443
Which mode of SNMPv3 uses a cryptographic HMAC to secure authentication credentials and provide integrity but not data encryption?
AuthNoPriv
Which statements are true regarding Secure File Transfer Protocol (SFTP)?
Both the commands and data are encrypted, It is slower than SCP but platform independent, It is also called SSH File Transfer Protocol
Which options are true concerning DNSSEC?
DNSSEC protects users from DNS attacks and forces systems to detect DNS attacks, Validation is done using chain of trust where each response is signed, DNSSEC stands for DNS Security Extensions
Which security services are provided by the S/MIME?
Digital signatures, Message encryption
Which statement is false regarding FTPS?
It is an IETF designed version of FTP that provides secure data transfer over a SSH2 channel
What does the green lock on the address bar of the web browser mean?
It signifies that the web site has presented your browser with an Extended Validation Certificate (EV)
Which protocal is based on X.500 but is a lighter cross platform and standard=based solution that runs securely over SSL/TLS
LDAP
Which protocol is vulnerable to the MONLIST attack in the recent past?
NTPv3
Which protocol connects to the serer using SSL/TLS on well-known TCP port 995?
POPS
Which protocol released in 2004 by Cisco Systems and Ericsson uses variants of the Advanced Encryption Standard algorithm to encrypt and decrypt all incoming and outgoing data?
SRTP
Which statement is false regarding the SSH2?
SSH2 uses asymmetric encryption for the bulk data and symmetric algorithms for the key management processes
You are configuring routing protocol authentication for two OSPF neighbor routers. When the sender needs to send an advertisement, what is originally combined with the message to generate the MAC
The senders copy of the shared secret