A Linux administrator is hardening a server based on a recent security audit report. The report mandates the removal of all weak and deprecated cryptographic protocols to mitigate known vulnerabilities. Which of the following should the administrator prioritize for disablement?
The correct answer is SSLv3. The SSLv3 protocol is deprecated and has significant known vulnerabilities, most notably the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack. This vulnerability allows an attacker to decrypt sensitive information from within an encrypted session. Modern security standards require that SSLv3 be disabled. TLS 1.3 is the latest and most secure version of the Transport Layer Security protocol and should be enabled, not disabled. AES-256-GCM is a strong, modern, and widely recommended authenticated encryption cipher. SHA-256 is a secure hashing algorithm from the SHA-2 family and is a current standard for many applications, such as digital signatures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is POODLE, and why does it make SSLv3 vulnerable?
Open an interactive chat with Bash
How does TLS 1.3 differ from SSLv3?
Open an interactive chat with Bash
What role do AES-256-GCM and SHA-256 play in securing systems?
Open an interactive chat with Bash
CompTIA Linux+ XK0-006 (V8)
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access