What is the default encryption algorithm use by SSH (secure shell) to protect data traffic between a client and the controlled server?
As network administrator you are asked to recommend a secure method of transferring data between hosts on a network. Which of the following protocols would you recommend? (select two)
Which of the following network layer protocols provides authentication and encryption services of IP based network traffic?
SSL (secure Sockets Layer) operates at which layer of the OSI model?
Which of the following protocols can be used to securely manage a network device from a remote connection?
Which of the following is a secure alternative to FTP that uses SSL for encryption?
Which of the following protocols are often added to other protocol to provide secure transmission of data? (select two)
SFTP uses which mechanism to provide security for authentication and data transfer?
When using SSL authentication, what does the client verify first when checking a server’s identity?
The current date and time must fall within the server’s certificate validity period
IPsec is implemented through two separate protocols. What are these protocols called? (select two)
You are purchasing a hard disk over the Internet from an online retailer. What does your browser use to ensure that others cannot see your credit card number on the Internet?
Which protocol is used for securely browsing a Web site?
What is the primary function of the IKE protocol used with IPsec?
Create a security association between communication partners
Which protocol does HTTPS use to offer greater security in Web transactions?
Which of the following protocols can TLS use for key exchange? (select two)