PrepAway - Latest Free Exam Questions & Answers

Which of the following are secure infrastructure management protocols used in WLAN?

Which of the following are secure infrastructure management protocols used in WLAN? Each correct answer represents a complete solution. Choose all that apply.

PrepAway - Latest Free Exam Questions & Answers

A.
SNMPv3

B.
Telnet

C.
HTTPS

D.
SCP

Explanation:
The secure infrastructure management protocols used in WLAN are as follows:
HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encryption and secure (website security testing) identification of the server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems. Difference from HTTPAs opposed to HTTP URLs which begin with “http://” and use port 80 by default, HTTPS URLs begin with “https://” and use port 443 by default. HTTP is insecure and is subject to man-in-the-middle and eavesdropping attacks which can let attackers gain access to website accounts and sensitive information. HTTPS is designed to withstand such attacks and is considered secure.
SNMPv3: SNMPv3 is the current standard version of SNMP which primarily added security and remote configuration enhancements to SNMP. The IETF has designated SNMPv3 a full Internet Standard, the highest maturity level for an RFC. SNMPv3 provides important security features:
Message integrity is one of the features which ensures that a packet has not been tampered with in transit.
Authentication verifies that the message is from a valid source. Encryption of packets is done to prevent snooping by an unauthorized source. SCP: The SCP protocol sends data in encrypted format. It is used to prevent potential packet sniffers from extracting usable information from data packets. The protocol itself does not provide authentication and security; it relies on the underlying protocol, SSH, to provide these features. SCP can interactively request any passwords or passphrases required to make a connection to a remote host, unlike rcp that fails in this situation.
The SCP protocol implements file transfers only. It does so by connecting to the host using SSH and there executes an SCP server (scp).
The SCP server program is typically the same program as the SCP client. Answer option B is incorrect. Telnet (Telecommunication network) is a network protocol used on the Internet or local area networks to provide a bidirectional interactive communications facility. Typically, Telnet provides access to a command-line interface on a remote host via a virtual terminal connection which consists of an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). User data is interspersed in-band with TELNET control information. Typically, the Telnet protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23.

One Comment on “Which of the following are secure infrastructure management protocols used in WLAN?


Leave a Reply