Secure Protocols, OS & Email Security Flashcards

(15 cards)

1
Q

Secure equivalent of Telnet

A

Secure shell (SSH) → encrypted remote access protocol that replaces Telnet by protecting credentials and session data from interception while allowing secure command-line management of systems.

tcp/22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Secure equivalent of HTTP

A

Hypertext transfer protocol secure (HTTPS) → secure version of HTTP that uses transport layer security encryption to protect web traffic from eavesdropping, tampering, and man-in-the-middle attacks.

tcp/443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure equivalent of IMAP

A

Internet message access protocol secure (IMAPS) → encrypted version of IMAP that protects email messages and credentials while mail is accessed from a server. Allows you to sync email across different devices securely

tcp/993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure equivalent of FTP

A

Secure file transfer protocol (SFTP) → secure file transfer protocol that runs over secure shell to encrypt authentication and file data, replacing insecure FTP.

tcp/22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Active Directory

A

Active Directory → centralized directory service that stores information about network resources such as users, computers, groups, printers, and file shares, and manages authentication and access control, commonly used by help desk teams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Group Policy

A

Group Policy → centralized management feature used with Active Directory that enforces security settings, configurations, and restrictions across users and computers in a domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SELinux

A

Security-enhanced Linux (SELinux) → Linux security module that enforces mandatory access control policies to restrict what processes and users can do, even if they are compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MAC in Linux

A

Mandatory access control (MAC) in Linux → access control model where permissions are enforced by the system admin using security policies rather than user ownership, providing stronger protection against privilege misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DAC in Linux

A

Discretionary access control (DAC) in Linux → access control model where resource owners control permissions, allowing flexibility but increasing risk if users misconfigure access.

This is the default in Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mail Gateway

A

Mail gateway → security system that evaluates inbound and outbound email at the network edge or in the cloud, blocking malicious messages before they reach user inboxes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS Records

A

Domain name system records → configuration entries that define how domain-related services such as email, websites, and authentication behave on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TXT Record

A

Text record (TXT record) → domain name system record used to store arbitrary text, commonly used to support email authentication and domain verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SPF Record

A

Sender policy framework (SPF) record → domain name system record that specifies which mail servers are authorized to send email on behalf of a domain, helping prevent spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DKIM Record

A

Domain keys identified mail (DKIM) record → email authentication method that uses digital signatures to verify message integrity and confirm the sending domain has not been altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DMARC Record

A

Domain-based message authentication, reporting, and conformance (DMARC) record → policy that ties sender policy framework and domain keys identified mail together to tell receiving servers how to handle unauthenticated email and provide reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly