PrepAway - Latest Free Exam Questions & Answers

Which of the following would be the MOST efficient meth…

A systems administrator is working with a third party to establish the automated transfer of large amounts of proprietary data. The interface will need to use secured
credentials and the transmission will consist of data that has been encrypted prior to transit and needs no additional protection. Which of the following would be the
MOST efficient method of data transmission given the established requirements?

PrepAway - Latest Free Exam Questions & Answers

A.
SSH

B.
TFTP

C.
FTP

D.
FTPS

4 Comments on “Which of the following would be the MOST efficient meth…

    1. ikam says:

      TFTP is FTP without authentication so that’s not the answer. For FTP, authentication is in clear text so that won’t provide the “secure credentials” as stated in the question. SSH will provide the secure authentication requested by the question, but I don’t think SSH should be the answer either as SSH itself does not provide file transfer functions. Both SFTP and FTPS provide secure authentication and file data transfer, but SFTP is not listed as an option in the answers. I think the question is poorly worded – what do they imply by “data has been encrypted prior to transit and needs no additional protection”? Even if SSH is the correct answer, once the SSH connection is established, all communication data is encrypted – so the statement “data has been encrypted prior to transit and needs no additional protection” doesn’t really add to anything. In summary, I think this question and its list of answer options are not well thought out.




      0



      0
  1. Bryan says:

    I would go for “FTPS”

    FTPS is Secure FTP, much like HTTPS is secure HTTP, and runs over SSL (Secure Sockets Layer) and TLS (Transport Layer Security). The user credentials and data are no longer sent in the clear; instead they are encrypted before they’re transmitted.

    Client software also has the flexibility, if it’s allowed by the server, to encrypt only parts of the communication, not all of it. This might seem counterintuitive based on the discussion so far.

    But if the files being transferred are already encrypted, or if no information of a sensitive nature is being transferred, then it’s likely ok not to incur the overhead that encryption requires.




    0



    0

Leave a Reply