What is one of the best ways to protect network traffic?
Encrypting all of your data
Encryption ensures that sensitive information is not easily accessible during transmission.
Which protocols are commonly used that send traffic in clear across the network?
These protocols do not provide encryption, making transmitted data vulnerable.
How can you determine if traffic on your network is encrypted?
By capturing the packets themselves
Inspecting packet contents can reveal whether data is sent in clear or encrypted form.
What happens if you see information contained within a packet?
You’re probably using a protocol that does not encrypt this data
This indicates potential security risks in data transmission.
What is the ‘wall of sheep’ at DEFCON?
A list of attendees using insecure protocols
It displays usernames, parts of passwords, IP addresses, and the protocols in use.
What should you use instead of Telnet for remote console access?
Secure Shell (SSH)
SSH provides a secure method for remote access compared to Telnet.
What is the secure version of HTTP?
HTTPS
HTTPS encrypts data exchanged between the web browser and server.
What should be used instead of standard FTP for file transfer?
SFTP
SFTP offers a secure method for transferring files over a network.
Which port number is commonly associated with HTTP?
Port 80
Traffic on this port is typically unencrypted.
Which port number is typically used for HTTPS?
Port 443
This port indicates secure, encrypted traffic.
Does the use of a specific port guarantee encrypted traffic?
No
You must verify the security settings on the server.
What can be done to encrypt traffic on an open 802.11 wireless network?
Configure WPA3 or a similar encryption protocol
This ensures all data sent over the wireless network is encrypted.
What does a VPN provide for network security?
An encrypted tunnel between your device and the VPN concentrator
This protects all traffic sent over the network.
What may be required to use a VPN?
Installation of additional software and possibly a VPN concentrator
Accessing third-party VPN services may also incur costs.