This preview shows page 4 - 6 out of 7 pages.
Question 8:CorrectSFTP uses which mechanism to provide security for authentication and data transfer?SSLToken devicesIPSecSSHMulti-factor authentication
ExplanationSSH File Transfer Protocol uses Secure Shell [SSH] to provide security for authentication and datatransfer.FTPS uses SSL to secure FTP traffic. You can also secure FTP traffic by establishing an IPSectunnel between the client and the server, but IPSec is established independently of FTP.ReferencesLabSim for Security Pro, Section 10.4.[Questions.exm SP02_2-5 [5]]Question 9:CorrectWhich of the following is a secure alternative to FTP that uses SSL for encryption?Explanation
Get answer to your question and much more
ReferencesLabSim for Security Pro, Section 10.4.[Questions.exm SP08_3-4 1]
11/24/2017TestOut LabSimQuestion 10:CorrectWhich protocol does HTTPS use to offer greater security in Web transactions?
Get answer to your question and much more
5/7ReferencesLabSim for Security Pro, Section 10.4.[Questions.exm NP05_2-10 #272]
ExplanationHTTPS uses Secure Sockets Layer [SSL] to offer greater security in Web transactions.Kerberos allows individuals communicating over a non-secure network to prove their identity toone another in a secure manner. IPsec [IP security] is a suite of protocols for securing InternetProtocol [IP] communications by authenticating and/or encrypting each IP packet in a datastream.ReferencesLabSim for Security Pro, Section 10.4.[Questions.exm APTECH_5-1 MC [113]]Question 11:CorrectAs network administrator you are asked to recommend a secure method of transferring databetween hosts on a network. Which of the following protocols would you recommend? [Selecttwo.]
Get answer to your question and much more
Upload your study docs or become a
Course Hero member to access this document
Upload your study docs or become a
Course Hero member to access this document
End of preview. Want to read all 7 pages?
Upload your study docs or become a
Course Hero member to access this document
How does SFTP work?
When you need to secure server-to-server file transfers between yourself, your trading partners, and enterprise servers, SFTP [which stands for SSH File Transfer Protocol or Secure File Transfer Protocol] is a more secure option than FTP.
Secure File Transfer Protocol [SFTP] works over the Secure Shell [SSH] data stream to establish a secure connection and provide organizations with a higher level of file transfer protection. This is because SFTP uses encryption algorithms to securely move data to your server and keep files unreadable during the process, and authentication prevents unauthorized file access during the operation.
While Secure File Transfer Protocol [SFTP] doesn’t require two-factor authentication, you do have the choice to require both a user ID and password, as well as SSH keys, for a more secure connection. Creating SSH keys helps prevent imposters from connecting to the SFTP server. SSH key pairs must be generated beforehand.
Secure File Transfer Protocol [SFTP] gives you the option to perform a wide variety of tasks for sensitive files, from removing files to resuming paused transfers. Unlike FTP over SSL/TLS [FTPS], SFTP only needs a single port number [port 22] to establish a server connection.
Related Reading:
- Which is Better: SFTP vs. FTPS?
- Which is Better: SFTP vs. MFT?
- SFTP vs. FTPS: The Key Differences
- SFTP: The Smart Way to Transfer Your Cloud Data
- Two-factor Authentication Using SSH Keys and Passwords for SFTP
- What are SFTP Servers?
- What is Enterprise SFTP Software?
- Five Secure File Transfer Alternatives to FTP