During a recent security audit, a contracted penetration tester discovered the organization uses a number of insecure protocols. Which of the following ports should be disallowed so only encrypted protocols are allowed? (Choose two.)
During a recent security audit, a contracted penetration tester discovered the organization uses a number of insecure protocols. Which of the following ports should be disallowed so only encrypted protocols are allowed? (Choose two.)
To ensure that only encrypted protocols are allowed, it is necessary to disallow ports commonly used by protocols that do not provide encryption. Port 23 is used by Telnet, which is an unencrypted protocol for terminal connections. Port 69 is used by TFTP (Trivial File Transfer Protocol), which is also unencrypted and lacks authentication mechanisms. Both of these protocols can expose data to interceptions and should be disallowed.
Telnet, 23, nothing but net. Michael Jordan number.
love it !!! :)
Lots of people misunderstanding the question here! Which ports should be dissallowed? Choose 2: B. 23 = Telnet C: 69 = Insecure FTP The rest are secure ports so they should be left alone. Peace!
Should be B and F. Telnet and Port 8080 is a common port used for web servers. It is an alternative to the default HTTP port 80. It is not encrypted and should be disallowed.
this guy doesn't know his port numbers
The answer is B and C, but 8080 is an alternative to 80...so why the port number comment?
Says the guy who is obviously wrong. lol. 8080 is typically unencrypted, and according to the terms of the question, should be disallowed.
Hey clown, port 8080 is not encrypted and neither is port 80. This shows me that you just used this braindump but didn't actually learn anything in the process. That piece of paper won't help you in the real world when you're confronted with real world network problems but don't know shit.
The reason F is wrong is because 8080 could be used for http OR https
I'm go with BF
D. 443 (HTTPS) - HTTPS is a secure protocol that provides encryption for data in transit over the internet. Disallowing other insecure protocols on this port will ensure that all communication is encrypted. E. 587 (SMTPS) - SMTPS is a secure protocol used for sending email. Disallowing other insecure protocols on this port will ensure that email communication is encrypted.
Read the Question
Right answers are A and C. Port 23 is SSH so its a secure protocol. The only two unencrypted protocols are Telnet (22) and TFTP (69).
port 23 is telnet btw
SSH is Port 22. Telnet is Port 23, hence the answers being "BC".
A. 22 - SSH B. 23 - telnet C. 69 - FTP D. 443 - HTTPS E. 587 -Smtp (secure) F. 8080 - Proxy HTTP (i guess its secure)
69 = TFTP = Used as a lightweight file transfer method for sending configuration files, or network booting of an OS. 23 = Unencrypted CLI data transfer tool. Telnet is a client/server application protocol that provides access to virtual terminals of remote systems on local area networks or the Internet. Telnet consists of two components: the protocol itself which specifies how two parties are to communicate and (2) the software application that provides the service. https://en.wikipedia.org/wiki/Telnet
The answer is B,F TFTP is still use to upgrade CISCO ios on routers and switches.
To disallow insecure protocols and allow only encrypted ones, we should block ports that are commonly used for unencrypted traffic. Here are the two options from the given list: D. 443: This port is used for HTTPS traffic, which is encrypted by default. Allowing only this port will ensure that all web traffic is encrypted. E. 587: This port is used for SMTP with TLS, which is a secure email protocol. By blocking the standard SMTP port (25), and allowing only port 587, we can ensure that all email traffic is encrypted. So, the correct options are D and E.
I think you misunderstood the question. It's asking which ports should be disallowed.
TFTP (Trivial File Transfer Protocol) is not considered a secure protocol. It does not provide any encryption or authentication mechanisms, making it vulnerable to man-in-the-middle attacks and unauthorized access to transferred data. It is mainly used for transferring files over local networks and is not recommended for sensitive information or data transmission over the internet.