Q1: In order to allow for secure remote login using SSH, which of the following port number needs to be allowed by the firewall?
Select one:
A. 21
B. 80
C. 443
D. 22
Solution: 22
Q2: The following statements are true about port numbers EXCEPT:
Select one:
A. Port numbers can provide an indication on the network services running on a host
B. Scanning for open port numbers on a host is considered an active attack
C. Both client and server port numbers need to be set to a fixed number based on the specification in the RFC document
D. Port numbers are among the attack surfaces of a host
Solution: Both client and server port numbers need to be set to a fixed number based on the specification in the RFC document
Q3: Which of the following is the use of the Change Cipher Spec Protocol in TLS?
Select one:
A. To tell the receiver that subsequent data transfer will be protected using the negotiated cipher spec
B. To tell the receiver that the cipher spec need to be changed and re-negotiated
C. To tell the receiver that a new TLS session need to be established
D. To tell the receiver that a new encryption key need to be generated
Solution: To tell the receiver that subsequent data transfer will be protected using the negotiated cipher spec
Q4: Which of the following security objectives are NOT addressed by the SSH protocol?
Select one:
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
Solution: Availability
Q5: As of the year 2020, which of the following TLS versions are still considered secure? Check all that apply.
Select one or more:
A. TLSv1.2
B. TLSv1.1
C. TLSv1.0
D. TLSv1.3
Solution: TLSv1.2
TLSv1.3
Q6: Assume that you have developed a new network application that uses its own application-layer protocol. As it is, the application-layer protocol sends data in clear text. Which of the following protocols can be used to ensure secure data transmission? Check all that apply.
Select one or more:
A. TLS
B. TCP
C. SSH
D. UDP
Solution: TLS
SSH
No comments:
Post a Comment