Which of the following protocols allow S for secure file transfer Select all that apply?

Free

Delhi Police Constable 2020: Full Mock Test

100 Questions 100 Marks 90 Mins

Latest Delhi Police Constable Updates

Last updated on Sep 21, 2022

The SSC (Staff Selection Commission) released its exam calendar on 6th July 2022. The candidates must note that the Delhi Police Constable Application Window will open on 2nd March 2023 and it will remain open till 31st March 2023. The exam is scheduled to be conducted in the month of April-May 2023. Candidates can refer to the Delhi Police Constable Previous Year Papers to improve their preparation. The selected candidates will get a salary range between Rs. 5,200 - Rs. 20,200.

With the aim of helping you gain knowledge, Testbook brings various chapters from Computer Awareness to help you ace your government job preparations. Stay tuned for more.

A group of computers used together to provide increased computing power for its users

A technique used to test software applications and is conducted by sending random data to the application to determine what type of response the application will provide. 

an administrative control used to inform users of what they are allowed to do and not allowed to do on company computer assets, as well as what the consequences for their actions will be.

a standardized set of configuration items that must be maintained across operating systems and platforms throughout the infrastructure.

alternative processing site that allows a business to resume immediate operations after a disaster. It contains all of the equipment, utilities, and data necessary for a very fast recovery.

best protection against man-in-the-middle attacks

system administrator, runs a packet sniffer that has identified a device trying to communicate to TCP port 23. Which of the following is probably occurring?

Someone is attempting to communicate across the network using the Telnet protocol, which uses TCP port 23.

Attackers sometimes spoof the hardware address of their network interface cards. Which of the following wireless security measures are they attempting to defeat when they do this?

to bypass MAC filtering, since computers can be allowed or denied access to the network based upon their wireless network card’s hardware (MAC) address.

protocol are considered non-secure and should be disabled.

Secure Sockets Layer (SSL)

three common information security goals

confidentiality, integrity, and availability (CIA)

software is used to centrally collect and analyze logs from a wide variety of sources and hosts across an organization’s entire network.

Security Information Event Management (SIEM)

Which of the following is the default port number used by the Kerberos authentication system?

Remote Desktop Protocol (RDP) 

3389 is the default port number for:

Running a web server requires a firewall rule that allows network traffic on TCP port:

File Transfer Protocol (FTP) runs by default on port(s): (Select all that apply)

A technician uses an RDP client on their Windows OS in order to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection?

Hypertext Transfer Protocol over TLS/SSL (HTTPS) 

Which of the following default port numbers is not used by a remote administration tool?

Unblocking port number 22 enables what type of traffic?

An SNMP management station receives SNMP notifications on UDP port:

In order to be able to run a secure web server, the server needs to be configured to accept connections on port:

Internet Message Access Protocol (IMAP)

A network administrator has been asked to establish secure network link for exchanging files between two remote hosts. Which of the following ports should be in use to enable this type of network connection?

An SNMP Agent receives requests on UDP port

Which of the following ports are used by NetBIOS? (Select all that apply)

A network administrator wants to replace service running on port 23 with a more reliable solution. Which of the following ports would be in use after implementing this change?

Which of the following TCP port numbers is used by the Simple Mail Transfer Protocol (SMTP)?

Which of the ports listed below are used by client applications designed to retrieve email messages from mail servers? (Select 2 answers)

The NetBIOS session service runs by default on UDP port 139.

A network administrator has been asked to set up a VPN link on a connecting host with no dedicated VPN client application installed. Which of the following ports should be in use to enable this type of connection?

Which of the following statements are true? (Select all that apply)

Secure File Transfer Protocol (SFTP) runs by default on port 22 Secure Copy (SCP) runs by default on port 22 Secure Shell (SSH) runs by default on port 22

Network traffic on port 389 indicates existence of an active:

Which of the following ports is used by DNS?

Which of the answers listed below refers to a port number for a lightweight protocol typically used for transferring boot files and configuration files between hosts in a secure Intranet environment?

A hacker has captured network traffic with cleartext commands sent from the client to the server console. Which of the following ports is being used by the network admin for the client-server communication?

Which of the port numbers listed below is used by the Trivial File Transfer Protocol (TFTP)?

FTPS is an extension to the Secure Shell protocol (SSH) and runs by default on port number 22.

A network administrator wants to secure the existing access to a directory service with SSL/TLS encryption. Which of the following ports would be in use after implementing this change?

Secure Copy (SCP) runs on port:

Which of the ports listed below is used by TACACS+?

Secure File Transfer Protocol (SFTP) is an extension to the Secure Shell protocol (SSH) and runs by default on port number 22.

Allowing a connection through a firewall is known as creating:

A network device designed for managing the optimal distribution of workloads across multiple computing resources is called:

A device designed to forward data packets between networks is called:

A computer network service that allows clients to make indirect network connections to other network services is called:

Which of the terms listed below refers to a security solution implemented on an individual computer host monitoring that specific system for malicious activities or policy violations?

ensures the privacy of a VPN connection?

refers to a dedicated device for managing secure connections established over an untrusted network, such as the Internet?

acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?

A software tool used for monitoring and examining contents of the network traffic is known as

Packet sniffer Protocol analyzer

protocol and port number used by a spam filter?

acronyms refers to a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection?

URL filtering restricts access to Internet sites based on which of the following criteria?

inspects network traffic in real-time and has the capability to stop the ongoing attack?

protects against switching loops

provides a countermeasure against denial-of-service attack characterized by increasing number of half-open connections?

access control model in which access to resources is granted or denied depending on Access Control List (ACL) entries is also known as:

Rule-Based Access Control 

802.1x is an IEEE standard defining:

Port-based network access control

actions can be taken by passive IDS?

a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

acronyms refers to a firewall controlling access to a web server?

Which of the following protocols allow for the secure transfer of files?

Secure File Transfer Protocol (SFTP) is a network protocol for securely accessing, transferring and managing large files and sensitive data. Designed by the Internet Engineering Task Force as an extension of Secure Shell (SSH), SFTP enables access, transfer and management of files over a network.

Which protocol is used to send data secure?

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) provide a secure protocol by which two networked peers may perform encrypted communications. SSL is most commonly used for sending private data from a web browser to a web server.

What are the protocols used for secure information transfer over the Internet?

Hypertext transfer protocol secure (HTTPS) is the secure version of HTTP, which is the primary protocol used to send data between a web browser and a website. HTTPS is encrypted in order to increase security of data transfer.

Which of these protocols use TLS to provide secure communication select two?

TLS is normally implemented on top of TCP in order to encrypt Application Layer protocols such as HTTP, FTP, SMTP and IMAP, although it can also be implemented on UDP, DCCP and SCTP as well (e.g. for VPN and SIP-based application uses).