when using TFTP?

You are the administrator at Certkiller Inc. and you need to mitigate threats to the network. How do you mitigate the threats presented when using TFTP?

You are the administrator at Certkiller Inc. and you need to mitigate threats to the network. How do you mitigate the threats presented when using TFTP?

A.
TFTP traffic should use peer authentication for each session.

B.
IP packet inspection should be enabled on all routers.

C.
TFTP traffic should be encrypted within an IPSec tunnel.

D.
IP verify reverse path should be enabled on all routers.

Explanation:
Where possible, TFTP traffic should be encrypted within an IPSec tunnel in order to mitigate the chance of its being intercepted.
REF;Safe white papers;page72
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks



Leave a Reply 0

Your email address will not be published. Required fields are marked *