Lesson 11

Lesson 11

University

40 Qs

quiz-placeholder

Similar activities

Data/Digital Communications

Data/Digital Communications

University

40 Qs

KUISA #2: NO KA HALE KŪʻAI

KUISA #2: NO KA HALE KŪʻAI

KG - University

43 Qs

RIA Mock ver 3

RIA Mock ver 3

University - Professional Development

40 Qs

Setup Computer Networks

Setup Computer Networks

University

40 Qs

Modul 9 SIM

Modul 9 SIM

University

40 Qs

TKJ Kelas XII

TKJ Kelas XII

University

40 Qs

....

....

University

40 Qs

Câu hỏi về giao thức mạng

Câu hỏi về giao thức mạng

University

38 Qs

Lesson 11

Lesson 11

Assessment

Quiz

Other

University

Medium

Created by

Benjamin Fenton

Used 3+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST explains why Telnet should be replaced with SSH for device administration across a routed network?

Telnet uses a non-standard port that firewalls commonly block.

Telnet transmits credentials and session data in plaintext.

SSH consumes less bandwidth than Telnet for the same tasks.

SSH does not require user authentication by default.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security engineer is configuring a web server to support TLS. Which item MUST the engineer install before clients can establish an HTTPS session on port 443?

A valid CRL distribution point

A public root certificate in the server trust store

A server digital certificate signed by a trusted CA

An OCSP stapling service on the firewall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization wants to harden its directory service so that user credentials are never sent in clear text. Which protocol and port combination satisfies this requirement?

LDAP over TCP 389

LDAPS over TCP 636

LDAP with anonymous bind over TCP 389

Kerberos over UDP 88

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During an LDAP security review, an auditor discovers several service accounts using simple bind. What is the PRIMARY risk of continuing to use simple bind?

Passwords are hashed with weak ciphers.

Passwords are transmitted without encryption.

The server cannot verify a user’s distinguished name.

Anonymous access to all directory objects is enabled.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network device currently accepts SNMPv1 queries from any host that knows the community string. Which remediation will MOST improve the security of the management plane?

Change the default community string to “public2”.

Enable SNMPv2c and limit access to port 162.

Disable SNMP entirely and rely on Syslog.

Upgrade to SNMPv3 and enforce user-based authentication with encryption.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator needs to secure file transfers while keeping the control connection on port 21. Which solution should the administrator deploy?

SFTP

FTPS implicit TLS

FTPES (explicit TLS)

TFTP with IPSec tunnel

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An email gateway submits messages to the organization’s SMTP server over port 587. Which statement BEST describes how STARTTLS is typically used in this scenario?

The SMTP server automatically encrypts every session before greeting the client.

The client requests to upgrade the plaintext connection to TLS after the initial HELO/EHLO.

Port 587 is reserved exclusively for SMTP over implicit TLS.

STARTTLS provides end-to-end message encryption that replaces S/MIME.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?