CompTIA Security+ Question J-85

By default, which of the following uses TCP port 22? (Select THREE).

A. FTPS
B. STELNET
C. TLS
D. SCP
E. SSL
F. HTTPS
G. SSH
H. SFTP

Answer: D,G,H

Explanation:
G: Secure Shell (SSH) is a cryptographic network protocol for securing data communication. It establishes a secure channel over an insecure network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login, remote command execution, but any network service can be secured with SSH. SSH uses port 22.

D: SCP stands for Secure Copy. SCP is used to securely copy files over a network. SCP uses SSH to secure the connection and therefore uses port 22.

H: SFTP stands for stands for Secure File Transfer Protocol and is used for transferring files using FTP over a secure network connection. SFTP uses SSH to secure the connection and therefore uses port 22.

CompTIA Security+ Question G-91

A company wants to prevent end users from plugging unapproved smartphones into PCs and transferring data. Which of the following would be the BEST control to implement?

A. MDM
B. IDS
C. DLP
D. HIPS

Answer: C

CompTIA Security+ Question G-17

A large corporation has data centers geographically distributed across multiple continents. The company needs to securely transfer large amounts of data between the data center. The data transfer can be accomplished physically or electronically, but must prevent eavesdropping while the data is on transit. Which of the following represents the BEST cryptographic solution?

A. Driving a van full of Micro SD cards from data center to data center to transfer data
B. Exchanging VPN keys between each data center via an SSL connection and transferring the data in the VPN
C. Using a courier to deliver symmetric VPN keys to each data center and transferring data in the VPN
D. Using PKI to encrypt each file and transferring them via an Internet based FTP or cloud server

Answer: B

Explanation:
A virtual private network (VPN) is an encrypted communication tunnel that connects two systems over an untrusted network, such as the Internet. They provide security for both authentication and data transmission through a process called encapsulation. Secure Sockets Layer (SSL) can be used to exchange the VPN keys securely. SSL is used to establish secure TCP communication between two machines by encrypting the communication.

CompTIA Network+ Question B-71

A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP server. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO).

A. 20
B. 21
C. 22
D. 23
E. 67
F. 68

Correct Answer: AB

Explanation:
FTP (File Transfer Protocol) is used for transferring files between an FTP client and an FTP server. FTP uses TCP Ports 20 and 21.

CompTIA A+ Question H-87

During which of the following phases of the imaging process is the latent image exposed to toner?

A. Charging
B. Developing
C. Exposing
D. Transferring

Correct Answer: B

CompTIA A+ Question C-42

Which of the following are characteristics of transferring data using fiber as the medium? (Select TWO).

A. Fiber can transmit data the farthest distance without requiring a repeater
B. Fiber is the least susceptible to EMI
C. Fiber is the most susceptible to changes in temperature and humidity, which can cause varying transmission speeds
D. Fiber can transmit power as well as data, which will lead to cost savings
E. Fiber is the least expensive means of transmitting data