Hello and welcome back to Sai Berries. 2019 Comp Tia Security Plus Certification
We'll continue our discussion of marginal to
and the top of discussion will be Domain number two, which is titled Technologies and Tools.
Our very last objective for this particular domain will be 2.6, which is titled Given a Scenario, Implement Secure Protocols.
This brings us to our first pre assessment question.
What you need to do is turn on whether or not this particular statement here
is either true or is it false?
And it reasons follows FTP s that uses TCP Port 9 89 last 9 90 can download very large files quickly. Is that true or false?
If you select the two, you're absolutely correct.
Let's not take a look again at the
topics of concern or topics of hot that we need to highlight in regards to this last objective with this title. Given a scenario, implement secure protocols.
First day we need to begin by first defining exactly what is a protocol. Now, when you think about a protocol, it's a set of rules and guidelines for communicating data.
Here are some protocols that you need to be a way off
which we have DNS sick, which is a specifications for securing your DNS information
s stands for secure shell, which is be invented back in 1992 to replace telling that so they could run command securely. It's common use when you want to perform remote access onto your writers.
Then we have to secure multi purpose and that male extension which the five they stand about what you can secure to communicate between two or more parties over email.
Then we have a secure riel time protocol which you see miss it here,
which again it uses a cure video constant traffic. It normally uses TCP Port
Then we have the lightweight directory access protocol. Air naps
basically performed. The same function is their debt. However, it's not secure and could be attacked by L DAP injection, where the attacker tries to gain information from your director services.
Obviously, we have empty PS, which is basically a secure fire transport protocol, is much fascinating what we call secure file transfer protocol, as it uses to ports 9 89 and 1990 it's used for Donald very large fouls very quickly.
Next, I don't want to take a look at
some additional One is S F T P,
which stands for ssh
file transfer protocol or secure file transfer protocol. It's a separate protocol packing ssh that works in a similar way over a secure connection.
Then we have It s in the MPV version three, which is a cure aversion off simple network management protocol that collects reports and statistics from your network devices.
Then we have ssl slash TLS, which is a transport layer security. And now, obviously the SSL is for the most part, is a legacy type,
which most nowadays is being replaced by TLS because it much more secure.
They use a cryptographic protocol designed to provide communications securely over your computer network.
Https. Which stands were hypertext transport protocol.
Basically, it's when you use http and Adam to your shopping cart. You were *** being converted to a secure server that uses what we call https so that your session and secure and you condense into your your creditors credit card and so forth.
Then we have secure pop
post office protocol and Internet message access protocol protocol used by your email clients. to communicate with your various email servers.
Continue on with this particular objective here again, we would be turned out teaching toward use cases ranging from voice and video all way down to your subscription services.
Now be unknown. A general meeting and functionality of the protocol. You need to know the scenarios in which you would applaud him,
and we're going to highlight some of these in the next video. The first where we need to be aware of is a very important concept called boards and video Voice translates to phone calls while video translate, video calls or video conferences.
Then we have the time synchronization. Your SIM server relies on times organization from scratch UM zero or atomic clock.
It's time so so that the time can be synchronized and the events can be put into what we call chronological order
email and, well, Web mail is a type of email that you access via your Web browser, but desktop or desktop based email programs and mobile email APS are also popular choices as well.
We also have power transfer, which is a transmission of your computer files. Do a communication channel from one computer system to another
directors, services or name service. What it does. Essentially, it maps the name your network resource is to their respective what we call your network address.
Basically, that means is the ability to access computer or your network remotely through a network connection? DNS. With stands with domain name and services, basically is a process by what your Internet user receives the address of the domain. They're looking for
routing and switching for routing and switching. There are several protocol to be aware of. Rip
Open, Shortest Path first and Be GP, or what we call common examples off routing and switching type that we need to be aware of.
Then we have a term called network address allocation.
Basic. This deal with the A si fi or dynamic host configuration protocol is most commonly used. This be works via what we call broadcast traffic initially
subscription services where you pay a monthly fee and you can download applications opposite in this case immediately.
This brings us to our post assessment quiz,
and the question is asked follows what you need to determine whether or not the statement is true. Off balls
and it reads as follows.
Post up with protocol and Internet messages, Access protocol or I'm map or protocol used by your email clients. Communicate with your email service. Is that true or false?
If you said to you absolutely correct.
Now it's time to turn our attention towards the key takeaways from this particular video presentation
we learned that FTP s that uses TCP Port 1989 and 19 Ken Doll. Oh, very large files quickly.
We also discussed S MP version three, which is a secure version of your simple network management protocol that collects reports and statistics from your network devices.
Domain naming resolution is a process in which the Internet user receives the address of the domain.
They were looking for
hypertext transport protocol or a CPS when you using the https. For example, when you engaged in shopping on the Internet
and adding items in your shopping cart, you would then be diverted to a secure server that uses 80 TVs so that your session is secure and you can then enter your credit card detail information. At that point, time
and our upcoming video would be taking a look at a brand new domain
in the next video, Siri's and it's titled Domain three. Architecture and design
look forward to seeing you in a very next videos.