If Kara's primary concern is preventing eavesdropping attacks, which port should she block?

Prepare for the CISSP Risk Identification Exam with targeted flashcards and multiple choice questions. Each question offers hints and in-depth explanations to boost your understanding and confidence. Get exam-ready today!

Multiple Choice

If Kara's primary concern is preventing eavesdropping attacks, which port should she block?

Explanation:
To understand why blocking port 80 is the best choice for preventing eavesdropping attacks, it’s essential to consider the nature of the protocol associated with that port. Port 80 is used for HTTP (Hypertext Transfer Protocol), which transmits data in plaintext. This means that any data sent over this port can be intercepted and read by unauthorized parties, making eavesdropping attacks easier to execute. In contrast, other ports listed correspond to protocols that provide a layer of security. For example, port 22 is used for SSH (Secure Shell), which encrypts traffic to prevent eavesdropping. Port 443 is used for HTTPS (HTTP over SSL/TLS), which also secures data transmission through encryption. Additionally, port 1433 is typically associated with MS SQL Server, which can also implement encrypted connections depending on the configuration. By blocking port 80, Kara can eliminate the risk associated with unencrypted HTTP traffic, significantly reducing the likelihood of eavesdropping attacks. Thus, controlling access to this port is a crucial step in safeguarding data during transmission.

To understand why blocking port 80 is the best choice for preventing eavesdropping attacks, it’s essential to consider the nature of the protocol associated with that port. Port 80 is used for HTTP (Hypertext Transfer Protocol), which transmits data in plaintext. This means that any data sent over this port can be intercepted and read by unauthorized parties, making eavesdropping attacks easier to execute.

In contrast, other ports listed correspond to protocols that provide a layer of security. For example, port 22 is used for SSH (Secure Shell), which encrypts traffic to prevent eavesdropping. Port 443 is used for HTTPS (HTTP over SSL/TLS), which also secures data transmission through encryption. Additionally, port 1433 is typically associated with MS SQL Server, which can also implement encrypted connections depending on the configuration.

By blocking port 80, Kara can eliminate the risk associated with unencrypted HTTP traffic, significantly reducing the likelihood of eavesdropping attacks. Thus, controlling access to this port is a crucial step in safeguarding data during transmission.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy