10.4 Data Defenses

What is the default encryption algorithm use by SSH (secure shell) to protect data traffic between a client and the controlled server?
IDEA
As network administrator you are asked to recommend a secure method of transferring data between hosts on a network. Which of the following protocols would you recommend? (select two)
SFTP, SCP
Which of the following network layer protocols provides authentication and encryption services of IP based network traffic?
IPSec
SSL (secure Sockets Layer) operates at which layer of the OSI model?
Session
Which of the following protocols can be used to securely manage a network device from a remote connection?
SSH
Which of the following is a secure alternative to FTP that uses SSL for encryption?
FTPS
Which of the following protocols are often added to other protocol to provide secure transmission of data? (select two)
TLS, SSL
SFTP uses which mechanism to provide security for authentication and data transfer?
SSH
When using SSL authentication, what does the client verify first when checking a server’s identity?
The current date and time must fall within the server’s certificate validity period
IPsec is implemented through two separate protocols. What are these protocols called? (select two)
AH, ESP
You are purchasing a hard disk over the Internet from an online retailer. What does your browser use to ensure that others cannot see your credit card number on the Internet?
SSL
Which protocol is used for securely browsing a Web site?
HTTPS
What is the primary function of the IKE protocol used with IPsec?
Create a security association between communication partners
Which protocol does HTTPS use to offer greater security in Web transactions?
SSL
Which of the following protocols can TLS use for key exchange? (select two)
Diffie-Hellman, RSA