Information Technology /Security+ (SY0-701): Enhance Application Security Capabilities Part 2
Security+ (SY0-701): Enhance Application Security Capabilities Part 2
This deck covers key concepts related to enhancing application security capabilities, focusing on email protocols, security frameworks, and data protection measures.
Define a 'mailbox protocol'
Stores messages for users and allows them to download them to client computers or manage them on the server.
Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/30
Key Terms
Term
Definition
Define a 'mailbox protocol'
Stores messages for users and allows them to download them to client computers or manage them on the server.
How does a mail server locate a recipient?
Uses the domain name of the recipient to discover an IP address that is registered in DNS as an MX record.
What are the two secure versions of Simple Mail Transfer Protocol (SMTP)?
STARTTLS
SMTPS
Define 'STARTTLS'
Explicit TLS; A command that upgrades an existing unsecure SMTP connection to use TLS.
Define 'SMTPS'
Implicit TLS; Using PKI, establishes the secure connection before any SMTP commands are exchanged.
What is the preferred method of implementing SMTP over TLS?
STARTTLS
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Define a 'mailbox protocol' | Stores messages for users and allows them to download them to client computers or manage them on the server. |
How does a mail server locate a recipient? | Uses the domain name of the recipient to discover an IP address that is registered in DNS as an MX record. |
What are the two secure versions of Simple Mail Transfer Protocol (SMTP)? |
|
Define 'STARTTLS' | Explicit TLS; A command that upgrades an existing unsecure SMTP connection to use TLS. |
Define 'SMTPS' | Implicit TLS; Using PKI, establishes the secure connection before any SMTP commands are exchanged. |
What is the preferred method of implementing SMTP over TLS? | STARTTLS |
Define 'Post Office Protocol v3 (POP3)' | Application mailbox protocol that stores messages on a server and enables a client to download email messages from a server mailbox to a client. |
What port does Post Office Protocol v3 (POP3) use? | TCP port 110 |
Describe the function of Post Office Protocol v3 (POP3) | Client application, such as Microsoft Outlook, establishes a TCP connection to the POP3 server over port 110; After authenticating with the server the mailbox is downloaded. |
What is the secure version of Post Office Protocol v3 (POP3) and the port it uses? | POP3S; TCP port 995 by default. |
Define 'Internet Message Access Protocol (IMAP)' | Application mailbox protocol providing a means for a client to access and manage email messages stored in a mailbox on a remote server. |
What are the differences between Internet Message Access Protocol (IMAP) and Post Office Protocol v3 (POP3)? | IMAP supports permanent connections to a server and connects multiple clients to the same mailbox simultaneously; Clients can manage mail folders. |
What port does Internet Message Access Protocol (IMAP) use? | TCP port 143 |
What port does IMAP over TLS use? | TCP port 993 |
Define 'Sender Policy Framework (SPF)' | A DNS record identifying hosts authorized to send mail for the domain. |
What is the purpose of Sender Policy Framework (SPF)? | Helps detect and prevent sender address forgery commonly used in phishing and spam emails. |
How does Sender Policy Framework (SPF) function? | By verifying the sender's IP address against a list of authorized sending IP addresses published in the DNS TXT records of the email sender's domain. |
Define 'DomainKeys Identified Mail (DKIM)' | A cryptographic authentication mechanism for mail utilizing a public key published as a DNS record. |
What is the purpose of DomainKeys Identified Mail (DKIM)? | Leverages encryption features to enable email verification by allowing the sender to sign emails using a digital signature. |
How does DomainKeys Identified Mail (DKIM) leverage encryption? | The receiving email server uses a DKIM record that acts as a public key in the sender's DNS record to verify the signature and the email's integrity. |
Define 'Domain-based Message Authentication, Reporting & Conformance (DMARC)' | Framework combining SPF and DKIM for authentication of senders; Specifies the actions to be taken when an email fails authentication; A DMARC policy is published as a DNS record. |
What actions can Domain-based Message Authentication, Reporting & Conformance (DMARC) enact when authentication fails? | Moving messages to quarantine or spam, rejecting them outright, or tagging the message. |
Does Domain-based Message Authentication, Reporting & Conformance (DMARC) offer reporting? | Yes, giving the owner of a domain visibility into which systems are sending emails on their behalf, including unauthorized activity. |
Define an 'email gateway' | Control point for all incoming and outgoing email traffic. |
What is the purpose of an email gateway? | To audit all emails removing potential threats before they reach inboxes. |
What security measures does a typical email gateway use to secure mail? | Anti-spam filters, antivirus scanners, and sophisticated threat detection algorithms to identify phishing attempts, malicious URLs, and harmful attachments as well as attachment blocking, content filtering, and data loss prevention. |
Define 'Secure/Multipurpose Internet Mail Extensions (S/MIME)' | Protocol for securing mail communications using encryption and digital signature to encrypt data and verify identities. |
Define 'Data loss prevention (DLP)' | Software that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks. |
How can Data loss prevention (DLP) be used to secure email communications? | DLP scans emails and attachments for certain types of sensitive information defined by the organization's DLP policies; If an email contains these types of information, the DLP system can take several actions based on predefined rules. |
What actions can Data loss prevention (DLP) software take to prevent data loss via email? | Blocking the email, alerting the sender or administrator, or automatically encrypting it before transmission. |