Which port uses TLS to secure web traffic?
a. TCP 443
b. UDP 553
c. UDP 443
d. TCP 1080
Which port uses TLS to secure web traffic? a. TCP 443 b. UDP 553 c. UDP...
Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. A signed applet can be hijacked. The spiral model is an iterative model designed to enable the construction of increasingly complex versions of a project. The generation of a real random number is a trivial task. Buffer overflow is one of the most common web attack methodologies. Compilers create runtime code that can be executed via an interpreter engine, like a Java virtual machine (JVM),...
. Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 37 and destination port number 61. What are the source and destination port numbers for the segments traveling from Host B to Host A? . Suppose a process in Host C has a UDP socket with port number 6789. Sup- pose both Host A and Host B each send a UDP segment to...
TCP headers and segmentation (B) 10. Which of the following flelds in the UDP header Is NOT found in the TCP header? source port destination port checksum length 11. The value of the acknowledgement field in a TCP segment defines Number of bytes to retransmit Number of bytes to receive Starting point of next bytes to receive in sequence Total number of bytes left 12. Suppose Host A sends one segment with sequence number 38 and 4 bytes of data...
1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...
The Session Initiation Protocol (SIP) can run over____. A. Only UDP B. Only TCP C. TCP and UDP D. DHCP
Which of the following statements are true? (2) a. SSL was derived from TLS. b. HTTP is less expensive than HTTPS. c. HTTPS and HTTP operate on the same default port. d. HTTP uses SSL, while HTTPS uses TLS.
Which of the following port numbers could appear in the source port field of a TCP header leaving a requesting system? A. 1022 B. 1023 C. 49172 D. 80
A security analyst wants to create a NIDS rule to detect when anomalous DNS traffic takes place on the network. Which of the following items should the analyst take into consideration? (Select TWO). A DNS uses TCP over port 53. B DNS Traffic must be decrypted before being inspected. C UDP queries are usually bigger than 1024 bytes. D Zone transfers are public and can be accepted from any source. E Zone transfers should only be sent to approved destinations.
You are a security consultant for a new company that is going to selling products online. Customers will be expected to pay for product on the company website. It is necessary for a secure connection between two TCP-based machines to ensure web communications for financial transactions. You have been asked to suggest some type of extensible authentication protocol to help secure this traffic. Which version would you consider the most secure but also the most costly? A. EAP-LEAP B. EAP-MD5...
After reviewing wireless network traffic logs a security analyst notices an unusual number of handshakes. Which of the following is MOST likely happening? a. TCP reset of connections b. Rainbow table decryption c. Forced TLS downgrading d. Forced deauthorization