4.5 Secure Protocols Flashcards

(14 cards)

1
Q

What is one of the best ways to protect network traffic?

A

Encrypting all of your data

Encryption ensures that sensitive information is not easily accessible during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which protocols are commonly used that send traffic in clear across the network?

A
  • Telnet
  • FTP
  • SMTP
  • IMAP

These protocols do not provide encryption, making transmitted data vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you determine if traffic on your network is encrypted?

A

By capturing the packets themselves

Inspecting packet contents can reveal whether data is sent in clear or encrypted form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens if you see information contained within a packet?

A

You’re probably using a protocol that does not encrypt this data

This indicates potential security risks in data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the ‘wall of sheep’ at DEFCON?

A

A list of attendees using insecure protocols

It displays usernames, parts of passwords, IP addresses, and the protocols in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should you use instead of Telnet for remote console access?

A

Secure Shell (SSH)

SSH provides a secure method for remote access compared to Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the secure version of HTTP?

A

HTTPS

HTTPS encrypts data exchanged between the web browser and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should be used instead of standard FTP for file transfer?

A

SFTP

SFTP offers a secure method for transferring files over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which port number is commonly associated with HTTP?

A

Port 80

Traffic on this port is typically unencrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which port number is typically used for HTTPS?

A

Port 443

This port indicates secure, encrypted traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Does the use of a specific port guarantee encrypted traffic?

A

No

You must verify the security settings on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can be done to encrypt traffic on an open 802.11 wireless network?

A

Configure WPA3 or a similar encryption protocol

This ensures all data sent over the wireless network is encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a VPN provide for network security?

A

An encrypted tunnel between your device and the VPN concentrator

This protects all traffic sent over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What may be required to use a VPN?

A

Installation of additional software and possibly a VPN concentrator

Accessing third-party VPN services may also incur costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly