Security+ 501 Test 1 Flashcards
(156 cards)
- What do you use to encrypt a message to send to someone? 2. What do they use to decrypt it?
- Public Key
2. Private Key
What following secure e-mail protocols is carried over an SSL or TLS connection and uses TCP port 993?
IMAPS
What is a server-side e-mail protocol and is not used over SSL or TLS?
SMTP (Simple Mail Transfer Protocol)
What is is a non-secure client-side e-mail protocol that uses TCP port 110?
POP3 (Post Office Protocol 3)
What is is a non-secure client-side e-mail protocol that uses TCP port 143?
IMAP4 (Internet Mail Access Protocol version 4)
What form of Load Balancing assigns to each server in order, then returns to the first server assigns to each server in order, then returns to the first server?
Round Robin
What form of Load Balancing keeps a client’s sessions connected to the server that’s keeping the session?
Affinity Scheduling
What is a point-in-time backup of certain key configuration settings of a virtual machine, allowing the VM to be restored back to that point in time if it suffers a crash or other issue?
Snapshot
What is a Microsoft Windows type of backup that backs up critical files used by the operating system to restore it in the event of a system crash or other issue?
System State Backup
What protocols would you use to encrypt VPN traffic?
IPsec
What port does DNS use?
TCP and UDP port 53
What port does SSH use?
22
What port does SMTP use?
25
What port is HTTP used?
80
What technique separates applications from one another and does not allow them to share execution, user, or data space?
Sandboxing
What technique enables an administrator to determine which applications and other software the user is allowed to install and execute?
Whitelisting
What technique is used to separate different sensitivities of data, such as corporate and personal data on a mobile device?
Containerization
What is a method that enables administrators to restrict users from installing and executing certain applications?
Blacklisting
Which of the following is a key agreement protocol used in public-key cryptography?
Elliptic Curve Diffie-Hellman (ECDH)
What is the most common public-private key generation algorithm used in public-key cryptography? It is used to generate a public and private key pair.
RSA (Rivest-Shamir-Adleman)
What is used to generate message digests for plaintext? It is not used in public-key cryptography to exchange keys or establish secure sessions.
SHA-2
Which of the following concepts should be the most important consideration when determining how to budget properly for security controls?
Risk and Impact
What form of authentication passes credentials in clear text and is not recommended for use?
PAP
What form of authentication uses password hashes and challenge methods to authenticate to the system. Passwords are not passed in clear text with this protocol.
CHAP (Challenge Handshake Authentication Protocol)