Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 204 discussion

Actual exam question from ISC's CISSP
Question #: 204
Topic #: 1
[All CISSP Questions]

An organization wants to share data securely with their partners via the Internet. Which standard port is typically used to meet this requirement?

  • A. Setup a server on User Datagram Protocol (UDP) port 69
  • B. Setup a server on Transmission Control Protocol (TCP) port 21
  • C. Setup a server on Transmission Control Protocol (TCP) port 22
  • D. Setup a server on Transmission Control Protocol (TCP) port 80
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Skittle4710
5 months, 2 weeks ago
Selected Answer: C
C. SSH (Secure Shell) is indeed the only protocol among the listed options that inherently provides secure transmission of data. It encrypts the data transmitted between the client and server, which ensures confidentiality, integrity, and authenticity.
upvoted 2 times
...
klarak
7 months, 1 week ago
LOL. Is this actually part of the test? This isn't how data's shared in 2024...
upvoted 1 times
...
gjimenezf
10 months, 1 week ago
SFTP Secure FTP on port 22
upvoted 1 times
...
John520
1 year, 7 months ago
ecure Shell (SSH) is a good example of an end-to-end encryption technique. This suite of programs provides encrypted alternatives to common internet applications such as the File Transfer Protocol (FTP), Telnet, and rlogin. There are actually two versions of SSH. SSH1 (which is now considered insecure) supports the Data Encryption Standard (DES), Triple DES (3DES), International Data Encryption Algorithm (IDEA), and Blowfish algorithms. SSH2 drops support for DES and IDEA but adds several security enhancements, including support for the Diffie–Hellman key exchange protocol and the ability to run multiple sessions over a single SSH connection. SSH2 provides added protection against man-in-the-middle (on-path) attacks, eavesdropping, and IP/DNS spoofing.
upvoted 2 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
DJOEK
1 year, 10 months ago
Selected Answer: C
C. Setup a server on Transmission Control Protocol (TCP) port 22. The Secure Shell (SSH) protocol, which is used for secure remote login and other secure network services, uses TCP port 22 as its default port. It is a common choice for securely exchanging data between organizations over the Internet.
upvoted 4 times
...
Jamati
2 years ago
Selected Answer: C
Easy-peasy
upvoted 1 times
...
franbarpro
2 years, 1 month ago
Yep - SSH
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...