Module 27 - Internet Service Hardening - Q&A Flashcards

1
Q

Which of the following are methods used to secure DNS? (Choose three.)
A. Using a split DNS
B. Using DNS built-in encryption capability
C. Restricting zone transfers only to authorized, authenticated servers
D. Using DNSSEC

A

A, C, D. All of these are valid methods of securing DNS except choice B, because DNS does not have any built-in encryption capabilities, as it is a non-secure protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following ports does both SSL and TLS use?
A. UDP443
B. TCP 465
C. TCP443
D. TCP 22
A

C. Both SSL and TLS use TCP port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following protocols uses SSL and TLS to secure their traffic?
A. SFTP
B. S-HTTP
C. HTTPS
D. SCP
A

C. HTTPS uses SSL and TLS to secure its traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Your manager wants you to implement a secure file transfer solution so that customers can log in and download files appropriate to your company's products. The solution must offer secure authentication and encryption and must be available whenever they need it to be. Which of the following protocols should you use?
A. FTPS
B. FTP
C. SCP
D. HTTP
A

A. In this scenario, FTPS is the best secure solution, since it uses the built-in capabilities of encryption and authentication of SSL or TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following remote administration protocols is inherently non-secure and exposes user credentials to sniffing and interception because they are transmitted in plaintext?
A. SSH
B. Telnet
C. HTTPS
D. FTP
A

B. Telnet is a remote administration protocol that is inherently non-secure and exposes user credentials to sniffing and interception because they are transmitted in plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All of the following characteristics describe Secure Shell (SSH), except.
A. Consists of a protocol and suite of utilities
B. Native to Linux distributions
C. Provides for encryption and authentication
D. Uses TCP port 23

A

D. SSH uses TCP port 22; Telnet uses TCP port 23.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following would be considered an appropriate utility to use when a user needs to send a few files securely to another host during a single SSH session?
A.SCP
B. SFTP
C.FTP
D. FTPS
A

A. SCP would be considered an appropriate utility for use when a user needs to send a few files securely to another host during a single SSH session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following e-mail protocols uses TCP port 995 when tunneled through SSL or TLS?
A.SMTP
B. POP3
C. IMAP
D. SSMTP
A

B. POP3 uses TCP port 99 5 when tunneled through SSL or TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following e-mail protocols allows multiple client connections to the user's account and uses TCP port 993 in conjunction with a secure SSL/TLS connection?
A.SMTPS
B. SMTP
C. POP3
D.IMAP4
A

D. IMAP4 allows multiple client connections to the user’s account and uses TCP port 993 in conjunction with a secure SSL/TLS connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following best describes the SMTP protocol?
A. A non-secure client e-mail protocol that uses TCP port 995
B. A secure server-side e-mail protocol that uses TCP port 143
C. A secure client e-mail protocol that uses TCP port 110
D. A non-secure server protocol used to send e-mail traffic, which uses TCP port 25

A

D. SMTP is non-secure server protocol used to send e-mail traffic, which uses TCP port 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly