If Kara's primary concern is preventing eavesdropping attacks, which port should she block?

Master CISSP Domain 3 with our expert-designed quiz! Dive into risk identification, monitoring, and analysis with hints and detailed explanations. Prepare effectively for your exam!

To understand why blocking port 80 is the best choice for preventing eavesdropping attacks, it’s essential to consider the nature of the protocol associated with that port. Port 80 is used for HTTP (Hypertext Transfer Protocol), which transmits data in plaintext. This means that any data sent over this port can be intercepted and read by unauthorized parties, making eavesdropping attacks easier to execute.

In contrast, other ports listed correspond to protocols that provide a layer of security. For example, port 22 is used for SSH (Secure Shell), which encrypts traffic to prevent eavesdropping. Port 443 is used for HTTPS (HTTP over SSL/TLS), which also secures data transmission through encryption. Additionally, port 1433 is typically associated with MS SQL Server, which can also implement encrypted connections depending on the configuration.

By blocking port 80, Kara can eliminate the risk associated with unencrypted HTTP traffic, significantly reducing the likelihood of eavesdropping attacks. Thus, controlling access to this port is a crucial step in safeguarding data during transmission.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy