10.4 Data Defenses

10 September 2022
4.7 (114 reviews)
15 test answers

Unlock all answers in this set

Unlock answers (11)
question
What is the default encryption algorithm use by SSH (secure shell) to protect data traffic between a client and the controlled server?
answer
IDEA
question
As network administrator you are asked to recommend a secure method of transferring data between hosts on a network. Which of the following protocols would you recommend? (select two)
answer
SFTP, SCP
question
Which of the following network layer protocols provides authentication and encryption services of IP based network traffic?
answer
IPSec
question
SSL (secure Sockets Layer) operates at which layer of the OSI model?
answer
Session
question
Which of the following protocols can be used to securely manage a network device from a remote connection?
answer
SSH
question
Which of the following is a secure alternative to FTP that uses SSL for encryption?
answer
FTPS
question
Which of the following protocols are often added to other protocol to provide secure transmission of data? (select two)
answer
TLS, SSL
question
SFTP uses which mechanism to provide security for authentication and data transfer?
answer
SSH
question
When using SSL authentication, what does the client verify first when checking a server's identity?
answer
The current date and time must fall within the server's certificate validity period
question
IPsec is implemented through two separate protocols. What are these protocols called? (select two)
answer
AH, ESP
question
You are purchasing a hard disk over the Internet from an online retailer. What does your browser use to ensure that others cannot see your credit card number on the Internet?
answer
SSL
question
Which protocol is used for securely browsing a Web site?
answer
HTTPS
question
What is the primary function of the IKE protocol used with IPsec?
answer
Create a security association between communication partners
question
Which protocol does HTTPS use to offer greater security in Web transactions?
answer
SSL
question
Which of the following protocols can TLS use for key exchange? (select two)
answer
Diffie-Hellman, RSA