CompTIA Security+ SY0-501: Implementing Secure Protocol
Which statements are true regarding Securing File Transfer Protocol (SFTP)?
It is also called SSH File Transfer Protocol. Both the commands and data are encrypted. It is slower than SCP but platform independent.
Which statement is false regarding FTPS?
It is an IEFT designer version of FTP that provides secure data transfer over a SSH2 channel.
What TCP service port does SSL/TLS most commonly use?
443
Which mode of SNMPv3 uses a cryptographic HMAC to secure authentication credentials and provide integrity but not data encryption?
AuthNoPriv
What does the green lock icon on the address bar of the web browser mean?
It signifies that the web site has presented your browser with an Wxtended Validation Certificate (EV).
Which protocol is based on X.500 but is lighter cross-platform and standard-based solution that runs securely over SSL/TLS?
LDAP
Which security services are provided by the S/MIME?
Message encryption Digital signatures
Which protocol is vulnerable to the MONLIST attack in the recent past?
NTPv3
Which protocol connects to the server using SSL/TLS on well-known TCP port 995?
POPS
Which protocol-released In 2004 by Cisco Systems and Ericsson-uses variants of the Advanced Encryption Standard algorithm to encrypt and decrypt all incoming and outgoing data?
SRTP
Which statement is false regarding the SSH2?
SSH2 uses asymmetric encryption for the bulk data encryption and symmetric algorithms for the key management processes.
You are configuring routing protocol authentication for two OSPF neighbor routers. When the sender needs to send an advertisement, what is originally combined with the message to generate the MAC?
The sender's copy of the shared secret.
Which options are true concerning DNSSEC?
Validation is done using chain of trust where each response is signed. DNSSEC protects users from DNS attacks and forces systems to detect DNS attacks. DNSSEC stands for DNS Security Extensions.