Which of the following is a network protocol that supports file transfers and is a combination of RCP and SSH?
a. HTTPS
b. FTPS
c. SFTP
d. SCP
Answer: D
The Secure Copy Protocol (SCP) is a network protocol that supports file transfers. SCP is a combination of RCP and SSH. It uses the BSD RCP protocol tunneled through the Secure Shell (SSH) protocol to provide encryption and authentication. Answer A is incorrect because HTTPS is used for secured web-based communications. Answer B is incorrect. FTPS, also known as FTP Secure and FTP-SSL, is an FTP extension that adds support for TLS and SSL. Answer C is incorrect because SFTP, or secure FTP, is a program that uses SSH to transfer files. Unlike standard FTP, it encrypts both commands and data, preventing passwords and sensitive information from being transmitted in the clear over the network.
Learn More :
Operating System and Application Security
- Which of the following is needed to establish effective security baselines for host systems? (Select two correct answers.)
- Which of the following will help track changes to the environment when an organization needs to keep legacy machines?
- An organization is looking to add a layer of security and maintain strict control over the apps employees are approved to use. Which of the following fulfills this requirement?
- Which of the following is the name assigned to a chip that can store cryptographic keys, passwords, or certificates?
- Which of the following involves unauthorized commands coming from a trusted user to the website?
- What is the term used when the item used to validate a user's session, such as a cookie, is stolen and used by another to establish a session with a host that thinks it is still communicating with the first party?
- If an attacker is able to gain access to restricted directories (such as the root directory) through HTTP, it is known as:
- What is it known as when an attacker manipulates the database code to take advantage of a weakness in it?
- Which systems monitor the contents of systems (workstations, servers, networks) to make sure key content is not deleted or removed?
- Which of the following is the technique of providing unexpected values as input to an application to try to make it crash?
- You're redesigning your network in preparation for putting the company up for sale. The network, like all aspects of the company, needs to perform the best that it possibly can in order to be an asset to the sale. Which model is used to provide an intermediary server between the end user and the database?
- The flexibility of relational databases in use today is a result of which of the following?
- Your company is growing at a tremendous rate, and the need to hire specialists in various areas of IT is becoming apparent. You're helping to write the newspaper ads that will be used to recruit new employees, and you want to make certain that applicants possess the skills you need. One knowledge area in which your organization is weak is database intelligence. What is the primary type of database used in applications today that you can mention in the ads?
- LDAP is an example of which of the following?
- Users are complaining about name resolution problems suddenly occurring that were never an issue before. You suspect that an intruder has compromised the integrity of the DNS server on your network. What is one of the primary ways in which an attacker uses DNS?
- What is the process of applying manual changes to a program called?
- Your company does electronic monitoring of individuals under house arrest around the world. Because of the sensitive nature of the business, you can't afford any unnecessary downtime. What is the process of applying a repair to an operating system while the system stays in operation called?
- Which of the following statements is not true?
- The administrator at MTS was recently fired, and it has come to light that he didn't install updates and fixes as they were released. As the newly hired administrator, your first priority is to bring all networked clients and servers up-to-date. What is a bundle of one or more system fixes in a single product called?
- Which filesystem was primarily intended for desktop system use and offers limited security?
- What tool is used in Windows to encrypt an entire volume?
- You've been chosen to lead a team of administrators in an attempt to increase security. You're currently creating an outline of all the aspects of security that will need to be examined and acted upon. Which of the following terms describes the process of improving security in an NOS?
- Which of the following terms refers to the process of establishing a standard for security?