B.3.3 Security+ SY0-601 Domain 3: Implementation Flashcards
338 questions (plus some of my own)
For Milestone 4 (Reach Your Network), which of the following would be considered a secure protocol to use to reach your network?
SSH
Which of the following file transfer protocols use SSH to provide confidentiality during the transfer? (Select two.)
SSH File Transfer Protocol (SFTP)
Secure Copy Protocol (SCP)
You’ve just deployed a new Cisco router that connects several network segments in your organization.
The router is physically located in a server room that requires an ID for access. You’ve backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a username of admin and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password.
What should you do to increase the security of this device? (Select two.)
Use an SSH client to access the router configuration
Change the default administrative username and password
You’ve just deployed a new Cisco router that connects several network segments in your organization.
The router is physically located in a locked server closet. You use an FTP client to regularly back up the router configuration to a remote server in an encrypted file. You access the router configuration interface from a notebook computer that is connected to the router’s console port. You’ve configured the device with the username admin01 and the password P@ssW0rd. You have used the MD5 hashing algorithm to protect the password.
What should you do to increase the security of this device?
Use SCP to back up the router configuration to a remote location
Which of the following protocols can be used to securely manage a network device from a remote connection?
SSH
SFTP uses which mechanism to provide security for authentication and data transfer?
SSH
Telnet is inherently insecure because its communications is in plaintext and easily intercepted. Which of the following is an acceptable alternative to Telnet?
SSH
What is the default encryption algorithm used by SSH (Secure Shell) to protect data traffic between a client and the controlled server?
International Data Encryption Algorithm (IDEA)
What is IDEA?
It’s designed to securely encrypt digital data and is used in various applications, including secure communications, financial transactions, and electronic voting systems
Which of the following mechanisms can you use to add encryption to email? (Select two.)
S/MIME
PGP
Which ports does LDAP use by default? (Select two.)
636
389
You want to deploy SSL to protect authentication traffic with your LDAP-based directory service. Which port does this action use?
636
Your LDAP directory-services solution uses simple authentication. What should you always do when using simple authentication?
Use SSL
To transfer files to your company’s internal network from home, you use FTP. The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible.
Now, you can no longer make the FTP connection. You suspect the firewall is causing the issue. Which ports need to remain open so you can still transfer the files? (Select two.)
20
21
FTPS uses which mechanism to provide security for authentication and data transfer?
SSL
Which of the following is a secure alternative to FTP that uses SSL for encryption?
FTPS
As a network administrator, you are asked to recommend a secure method for transferring data between hosts on a network. Which of the following protocols would you recommend? (Select two.)
SFTP
SCP
To increase security on your company’s internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions.
Which port needs to be enabled to allow secure transactions?
443
Which of the following protocols uses port 443?
HTTPS
Which TCP/IP protocol is a secure form of HTTP that uses SSL as a sub-layer for security?
HTTPS
Which protocol is used to securely browse a website?
HTTPS
Which utility would you MOST likely use on OS X to encrypt and decrypt data and messages?
GNU Privacy Guard (GPG)
IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)
Encapsulating Security Payload (ESP)
Authentication Header (AH)
Which of the following network layer protocols provides authentication and encryption services for IP-based network traffic?
IPsec