CompTIA Security+ SY0-601 – 3.1 Implement secure protocols Part 3
March 30, 2023


In this video, we’re going to be talking about a variety of different secure protocols that you may see appear on your exam. And particularly we’ll talk about SRPC FTPS SFTP SNMP version three. And then we’ll take a look at secure pop and IMAP for emails. So let’s get into this. The first thing I want to talk about is going to be the protocol, secure real time protocol. Now, first of all, let’s talk about real time protocol. Real time protocol. RTP is a protocol that you interact with when you’re doing void communications. So basically, it’s a protocol that allows quick, efficient delivery of information, generally over the Internet or over networks, and mostly associated with VoIP.

 So setting up VoIP systems and using VoIP systems in order to make calls is generally where RPT lives. Now, in order to provide encryption authentication and integrity, and also to protect against replay attack, you would implement and know this for your exam, SRPC. So SRPC is what you’re going to use to secure VoIP. All right? So remember that for your exam. So SRPC we’re going to use to secure VoIP information or voice information. Now, the next two we want to mention here are SFTP and FTPS. Now, if you watch the previous videos where I show you how to set up wireshark, I show you how to sniff FTP traffic, and then I showed you how to enable SFTP.

 Well, I’m sorry, FTPS. Remember, FTPS basically uses SSL with certificates, if you remember that one, right? So, just a quick reminder. In those videos, we took a look at how to set up this FTP server. Here where we went to settings and we have generated a new certificate. And then we had Bob connect and you saw how the wireshark was capturing encrypted packets. So you want to make sure if you’re using FTP to at least use FTPS. Or the other one that we could have used was using FTP with SSH.

So this here basically would encrypt FTP with the SSH encryption, which would be very secure. And I remember most people associate SSH with replacement of telnet, which it is, but you can also use it to encrypt FTP traffic. Under no circumstances should we ever use FTP as it’s done in clear text. Now, the other one we want to mention is something called Simple Network Management Protocol. In particular, you only want to use version three, since this one is encrypted PT. So you want to make sure you use this. So if you’re using SNMP, now what exactly is this? SNMP is a protocol that you install on devices across your network. And basically what it does is that it allows the SMTP servers to gather statistical information about your network and devices, how long they’ve been up, they’ve been down, diagnostic information about them, useful in managing networks. Now, for your exam, I want you to remember that at no point should you ever use any other version of SNMP, except version three. Version three is the encrypted version of SNMP, and that’s the only one you should be using. Okay? And finally we’ll take a look at how to look at email protocols.

 Now there are secure versions of Pop and IMAP. And secure pop and IMAP is basically when you run pop and IMAP over SSL now, just for your knowledge, in case you forgot, pop allows you to receive emails, but it takes them off the email server. IMAP allows you to basically get the email, like synchronize it with the server. So depending on what your email server supports, I’m going to show you guys something here. I’m going to open up my control panel and I’m going to show you guys that I have an email provider that does support secure Pop and IMAP. So I’m going to go here to my email. This is control panel. I’m going to go here to email. I’m going to say email accounts.

And here I have instructor at Tie du. com. So it’s a one on one from a provider called One on One. And I’m going to go to more settings here. And you’ll notice that here we have the IMAP. So this is using IMAP, but notice how it’s connected using SSL. You can see that outgoing SMTP servers also using SSL. So it’s nine nine three is a port number. I think nine nine five is a Pop number and the SMTP is four. But you notice how they’re both using SSL. So this really encrypts the traffic being sent between my computer and that email server using SSL encryption, that’s something you want because remember in previous video we talked about email security with SSI and PGP. Email is insecure.

Well, this is another way to get encryption out of it. Instead of using S, Mine, or PGP, you can just use SSL or TLS. Okay? So these here were some protocols. Don’t forget, SRPT is used for VoIP encryption. Don’t forget, if you’re doing FTP, at least use FTPS. You saw how easy that was to configure in FileZilla or used SFTP, that’s FTP over SSH. If you’re using SNMP, make sure to use version three. And if you’re using Imapprop, make sure you use secure version of them over SSL also.

8. SSH

In this video, we’re going to be talking about SSH secure shell. Now, before we get to SSH, you got to understand that SSH is basically a secure version of Telnet. Telnet is a famous utility that we use to log into devices to control them through a command line. So for example, controlling your Cisco routers or your General routers, your switches, especially Linux and Unix boxes, not so much so on Windows. So the way to get into these systems was you would tell net them. But the problem is Telnet is not encrypted. Remember, for your example, do not use Telnet. I can’t stress that enough. You use SSH. SSH is the encrypted version basically, of Telnet.

Now, SSH is relatively easy to set up on most devices, including routers. I’m going to show you guys how to set it up on Kali Linux that I have here. And then I’m going to log into it using a utility called Putty. So for your exam, remember, do not use SSH. I’m sorry, telnet. Don’t use telnet. Use SSH. It’s the encrypted version. If you use Telnet, you sniff all of your data. Let’s take a look here really quickly. Now, it doesn’t come install. We’re going to run a few commands. We’re going to install it. We edit some files. We use this software called Putty to connect just to make sure it works and see how to do that. Okay, so I got my colleague box here and I’m just going to open up a shell here. And first you got to install it. Now, it doesn’t come install by default, okay? So we’re going to have to install it.

We’re going to say app get install SSH. Simple as that. We’ll just press enter. Now I already have it installed. That’s why it’s in newly installed at zero. So we install it the next thing. Now it’s basically it all you got to do right now. If you want to start running it, you would just type service SSH start. And it basically starts it and it’s running. But here’s my thing. I’m using the root account and I’m going to change its configuration to allow the root access. So to do that I’m going to minimize that and open up my file system and type etc here because I’m looking for the SSH folder and the etc. Okay? So we’re going to go into this SSH folder and we’re going to change this SSHD document. And what we’re looking for is something, an authentication here. See how this authentication, see how this one says permit root login.

We’re going to remove this so that way it’s not just a comment, but it’s an actual config. And we’re going to say change this to yes. All right, change that to yes. That way we do allow root logins. We’re going to close that, we’re going to save that. I don’t need this anymore. I’m going to open back this and I’m going to say service SSH restart to restart that service. That’s it. It’s basically done. We can now log in into this machine. Now I got to find out its IP address. So we’re going to do ifconfig okay, so what do we got? IP addresses, 192-16-8117. It’s the IP address. Go to the windows.

 So this is my Windows server. Okay, here’s my Windows ten box. And I have downloaded a software called Putty. Now this is do you guys know what’s the most famous search term in Bing? Do you guys know what that is? Google. All right, that’s a tech joke. If you laughed at that, you’re a pretty big nerd. Let’s look for Putty. So I’m just showing you how to find it. Literally, just type Putty in the first link there. Putty is a very famous utility, especially in SSH utility that we use. So you would click on download. Now I’ve already downloaded it. You just go to download it. You would download one of these, either 32 or 64 bit, depending on your OS. So I’ve downloaded a 64 bit and I put a shortcut on my desktop, download it and install it. So let’s go in here. I’m going to give it an IP address, 1207.

 We’re going to open this up once in a hole. Who are you logging in as? The root and kali. And there you go. That’s it. This is my Kali Linux box. If you just run of config, you can see that all the commands, everything like that would execute. So basically now I can remotely connect and control my Kali box from anywhere in this network. And the good thing here is that it’s fully encrypted, right? No worries, no worries. If somebody’s sniffing my traffic and they can steal my data, I have to anything to worry about because now it’s all fully encrypted. These are just some basic configs to it. There’s more configuration to this SSH, but this is just a basic set up to it. So for your exam, remember, do not use telnet that’s in clear text. Use SSH.

9. VPN and IPSEC

In this video I’m going to be talking about VPN and IPsec. So let’s get started. The first thing we’re going to talk about is something called a VPN. Now you’re probably familiar with a VPN if you’re working from home and your workplace gives you a piece of software and you install it and you connect to it, and then you can access resources at your workplace. VPNs are very popular in today’s time. It allows people to work from home, but it also allows organizations to connect sites with each other. So let me give you a good example of it. So when I want to work from home, I don’t want to be at the workplace every single day to week. So generally on a Friday I may decide to work from home.

But when I’m working from home, I want to be able to access all the resources in the workplace network. I want to be able to access the file server, the database server, the print server. I want to be able to remote desktop one of the computers that is there. So how do I do that? Well, that’s done with a VPN, particularly a user access VPN. And by me connecting to this VPN, it’s basically like I’m there. It’s basically like I’m actually at work, except I’m not at work. Now the only drawback is going to be if my Internet speed is slow, but my Internet speed is very fast. So it’s the workplace and it’s very quickly. The VPN tunnel that we’re using, or that you guys should know for your exam, is called L two TP. L two TP stands for Layer two Tunnel and Protocol as the VPN technology that we’re using.

 Now the L two TP VPNs are not just to connect users to a workplace. You can also set up VPNs between different sites. So that way resources between networks can traverse. So let’s say users at one location can then access resources or talk to users at another location. You basically connect in two different physical locations network across the Internet as if they’re one network. So people can actually ping each other across this VPN tunnel. So you have this User access VPNs and then you have this site to site VPNs. I’ll draw you guys a quick diagram to illustrate them. Then we’re actually going to talk about the security behind it IPsec. We’ll talk about what you need to know there. Then I’ll actually set one up on my sonic wall.

 I’ll set up a User Access VPN and set it up to configure it on my sonic wall router should say Firewall. That has a VPN built into it. Okay, so let’s take a look here at a VPN. So let’s say you have a LAN, and this LAN here is going to be connected to a VPN device. Now the VPN device is going to be this box. And this box has a switch, has a port on a switch. That we are going to connect off into our land. So let’s say I have this cable going to a giant switch. And off of that giant switch, maybe I have a database server. Maybe I have a web server. Maybe I have a workstation that I want to do some raw desktop to. So this sonic wall is also not just a VPN device. It’s also my firewall. But this sonic wall connects to the Internet. And then there is me and I’m home.

 So I want to be able to connect to the Internet right from home to connect to the ZPN box and then being able to access the database, the web server and so on. So the tunneling technology that we are using in order to create the ZPN is called L two TP. It stands for layer two, tunnel and protocol and the security. Now of course, if we’re, if I’m home and I’m transporting data between the land and my house, but my house here, we want to make sure it’s encrypted. We want to make sure that it’s highly secure. So hackers on the Internet won’t be able to read my information. And that’s done with a protocol called IPsec. So internet Protocol security. Basically, it’s IPsec. I’m going to talk about IPsec in a minute. But this is just basically like a user access VPN.

The other VPN that we have is, let’s say you have two physical locations. Let’s say this is your main location. This is your company’s corporate office. And then you have a branch office, let’s say in Washington DC. So they’re also going to have a VPN here that’s also going to be their firewall. And then that’s going to connect to a land also. So let’s say you have a user on this side, or maybe they have a database on this side also. So now you have the main site and you have the DC site. And this user can actually ping and use this database or use this website right across the internet. It’s almost like this LAN and this LAN are connected together, except it’s being done through two devices like this. And this device is made to do these types of things. And I’ll show you. It’s really easy to configure.

 It’s actually harder to explain it than it is to configure it. You’ll see what I mean? But just as long as you get the concept of what these VPNs are doing, maybe you guys are already using a VPN at home. Maybe you already have a VPN from your workplace that you’re set up and you’re using and you’re connecting to your workplace. So what we need to know for our exams, we need to know what these VPNs are, but we need to know the tech that it’s run and the terms. So the first thing is L two TP, right? So l two TP VPNs. This is mostly what these types of sonic wall devices, but just not sonic Wall. You have Cisco ASA devices, checkpoint are also very popular and a bunch of other different providers.

 I’m a big fan of Sonic Wall devices. I’ve been using these things forever and they’re good for SMB small to mid sized businesses, uses this. You heard me mention earlier in the video, this thing costs about $500. And this is like the cheapest, one of the cheapest version of these devices out there. I’m actually going to use this in my house. I’m going to update it after this video series is done because these devices are very good and secure.

Okay, so l two TP VPNs is pretty common. I do want to mention that another way of doing a VPN is not just with L two TP, but by using SSL VPNs. And this here is going to use SSL in order to create and encrypt the traffic between different sites. SSL VPN is mostly done for users. VPNs, when they’re connecting different sites, they mostly use L two TP, but L two TP could be used for users also. Okay, so let’s go and talk about IPsec, right? IPsec is a hot topic for your exam. You’re going to want to make sure you know it really well. And I got a little data here on it that I want to talk about. So we’re talking about IPsec. IPsec. So IPsec SEC that’s my C looks like a G. My handwriting is so bad, right? Yeah, it’s so bad.

Okay, so IPsec, when we configure IPsec on these devices, what we need to do is we need to look at a couple of different things and that’s going to be its encryption modes. Now it does have two ways transport and Tunnel mode. Notice for your exam exactly where I have them here. So in transport mode, it basically encrypts only the data payload of each packet, but leaves the header on touch. The more secure tunnel mode encrypts both the data and the header. So remember, IPsec runs in either tunnel mode or transport mode.

 If you’re doing tunnel mode, you’re going to encrypt the IP headers that includes its IP address and the entire data is encrypting the IP header, which includes its source destination, IP address. That means that if you’re using like native networks on native network, private IP, it will encrypt all of that. It will encapsulate all of that into its encryption. And the other one is Transport mode. A transport mode is just the data, only encrypts the data. So you got to be careful when using some of these modes because sometimes some networks cannot use tunnel mode because of the way that the encryption is done at hiding all the header. The other thing that we want to mention, and this is the part that your exam is probably going to test you on is the protocols.

 And it basically uses what is called ah. And you’ll see me configure it in the box later. Ah, which does integrity and authentication and ESP which provides confidentiality and authentication. So Ah can tell you if your data has been modified and it allows you to do authentication to the device. ESP provides that authentication and it provides confidentiality. So confidentiality means encryption. If you’re using Ah authentication header, you’re not getting encryption. It doesn’t make sense. I don’t see why you would want to use that. Yeah, you’re going to get authentication integrity, but ESP gives you authentication and it gives you data encryption.

I have never seen someone configure IPsec with just Ah. We always use ESP. Remember for your exam, when configuring IPsec you must enable ESP to get encryption. Okay, we’ve been talking a lot. Let’s go set it up. This is literally going to be a very quick setup. It’s not difficult to set up, especially when you have devices like this. That just makes it a lot easier. This device can support a lot of users. You can put this in an organization and they can be VPN in right away. Except that you have to buy licenses for it.

It doesn’t have any license on it right now. It only has a one user license and after they’ve got to purchase more, but it’s good enough to get through this video. Okay, so let’s go and log into the device here and we’re going to log into its Wang interface. Okay, so it’s Wang interface, it’s LAN interface. It’s 192-16-8168. Now these are default. I haven’t changed anything here. Okay, so we’re going to log into it and we’re basically going to set up the VPN. But we’re going to have to find out some information from it first. We’re going to go down here. So here’s what it looks like. Again. This is this device right now I’m logging into it. So this device right here, I’m going to go down here to actually I want to go down to network and I want to make sure I get the Wang interface IP address. So the Wang interface is 1192-1681 dot two one six is its Wang interface.

So the cable plug it into this Wang interface is a 2161 dot two one six. And we got to remember that because when we set it up the VPN, we got to make sure that we give it that two one six IP address. Okay, so to set up the VPN, I’m just going to do a quick config on it. So we’re going to say quick config. We’ll say VPN guide. And I’m going to click on next and we’ll see. Now notice how this thing has a site to site VPN. So this is the one where I was telling you you would select this option if you wanted to do this one. The sonic wall we’re setting up right here. Let’s say this one here is in New York and this is my sonic wall right now.

 And DC we have another device like this or another sonic wall. And following that wizard, we can then connect land users in this physical network to the land users in the DC physical network. So that would be using this option here. But what I’m going to do is I’m going to use the option just to connect. This here allows us to accept incoming VPN connections from people with the global VPN client. So the global VPN client is a piece of software we’re going to have to download on our Windows machine in order to connect to it. So we’re going to click on next.

 So I already set this up. So you got to put an appreciated key. So that way if anybody tried to connect, they’re going to need a key in order to connect. I just put his password for now. And notice this is the grouping. So DH defy hellman group. Notice they have this here encryption. We have triple des. You could use AES. I’m just going to leave it as default. Remember, triple des you should not be using. Okay, I’m just leaving everything as default, it’s fine. But ideally des and triple days should not be used. Remember for your example, des and triple days are protocols that are crackable. Triple days is fine. Authentication notice we have shall one. You can even select the Shaw 256. That’s fine. And we’re going to allow Everyone, right, people in the Everyone group. This thing has groups on it. We’re going to make a user in a minute and we’re going to say next we don’t need a virtual, it’s going to apply that okay, congratulations. It’s all set up. It’s all done. Let’s go back to it.

 So this is a VPN right here. Now I want to show you. You see it’s enabled, right? I want to show you something. So it configured, this VPN for me. And I want to go into the configuration options and I want to show you guys something. You see if I go to proposals, you notice now I didn’t do this. This is configured itself. You notice how I have this option, ESP. This is what I was telling you guys about earlier, ESP. Now the other one that you could have had would have been ah, but if you do, ah, you couldn’t have got encryption.

So we want encryption. So it’s leaving it as ESP. There is another one here that it did not configure. And this one is also supporting ESP. But let me add one and I want to show you guys something. See if I add one. Now I have that option if I want to manually configure something, but watch what happens. So I added a manual VPN policy. Remember, the policy here was configured through that wizard. But if I go here and I say, ah, you notice how the encryption is grayed out so you can’t get encryption. So why would you want that? Why would you want to set up a VPN without encryption? The only thing is maybe you’re passing data across the network that is considered public data and you only care about its integrity. No one is modifying it.

You want the authentication. That’s the only reason I can think about why you’re going to want this. The other thing I want you guys to know is the Ike Internet Key exchange. There’s a protocol that’s going to help exchange the keys across the network. All right? So to set this up, I’m going to go to users, local users and groups. I’m going to add a new user to our VPN box. Let’s add mary. I’m going to give Mary a password. My password is always password. All right, mary has a password. We’re going to give her a VPN access on all IP interfaces. So she has access. Basically she can come in from the VPN, from the land. The way I said, it doesn’t matter. Okay. So we’re going to add Mary. Okay, that’s it. The VPN is all set up. So the next thing I’m going to do now is I’m going to basically use my Windows Ten. So remember, it’s with a wizard. It says a global VPN client.

So what we’re going to have to do is you’re going to have to download, we’re going to go to Google and we’re going to search for sonic VPN client. Because you have to download a software and connect to this device. And we are looking for the global VPN client. You’re supposed to download this and install it. And the good news is I already did that. I already downloaded this thing and installed it. And here it is. I haven’t configured it though, but here it is. This is what it looks like after it’s installed. So anybody that’s using a sonic wall have to use this particular VPN client. So I’m going to go here and I’m going to say let’s make a brand new connection. And this is where I need that IP address.

 So now the scenario would be like, I’m home, right? So this windows ten would be like I’m home. And I’m putting the Wang IP address, the Internet IP address from its Wang interface on my computer at home. And it’s 1216. And we’ll just say finish right now. We’ll just double click on it. Now remember that preshare key that it access to put in during the wizard? So we’ll put that in and now it wants the user. So let’s say Mary and it’s provisioned and it’s connected. So now this Windows Ten has like full access to that VPN, completely full access to that Lance. If there was a land connected to the land port here, like maybe this plug was plugged into a switch and we got a lot of different computers on the network. This windows. Ten can access it.

 This is a big VM environment I have going on here, but this is what it would look like. So as an administrator, as an administrator when you set up the VPN, you would have to install the clients on their computer. Now there are, these are mobile clients you can install on phones too. So you’d install the global VPN client on their machines. And what would happen is they would connect just like I did here. And then they have full access to the network. They can connect to your web server, they can connect to your database server. So full access throughout the network. Okay, that concludes this video. How long is it? 17 minutes.

Going on to 18 minutes now. Very long video. Let’s just do a quick recap before I leave you on this topic. So VPNs, generally you have two types of VPNs user access, VPNs. This is when, like I configured here, users at home could access resources at your network, at your land, at your workplace. Then you have the site to site VPNs, where you can connect two different sites together, or multiple sites together. And then users from the different sites can then access and talk to each other like they’re in the same lab. Now the tunnel we’re using is the L two Tpvpn.

The l two Tpvpn basically uses IPsec. Now remember how IPsec works. IPsec comes in tunnel mode and transport mode. In tunnel mode, it encrypts the data including the IP headers. And transport mode is just the data. Now, remember ah and ESP. Remember, if you’re using Ah, you’re not going to get data encryption, you’re going to get authentication, get integrity. If you’re using ESP though, you can get encryption confidentiality and you’re going to get authentication. Make sure to use ESP. Very rarely do you ever use Ah by itself. You should always just use ESP, okay? A lot of stuff there to digest. Watch this video again.

 You know what? Before I leave you, if you guys want to practice this lab at home and you don’t have $500 to spend on a sonic wall, which I actually don’t recommend you do this unless you work for a business and you have access to a device like this. If you want to go down a rabbit hole and you want to set up a VPN that you can use throughout on your phone to connect to your home network, Right? If you want to have a VPN server in your home network that you can connect to from anywhere in the world, or maybe you want to leave on your computer, or maybe you have a server, maybe you have an Ads at home that you want to connect to.

 Try open VPN. You know what, I’ll show you that before I cut this video off. If you want to set up a VPN right at your home, you don’t need to buy a sonic wall for this. And it’s free. You can set this up. I’m not going to show you set it up. A lot of tutorials on how to set up VPN. It is free. You guys can set this up and it works amazing. I do use it in some places. I’ve set it up for some people. It works really well. There’s clients for your phone that you can set up from your phone. You can then access all your stuff at home. So you guys can try open VPN. All right, that concludes this video. Let’s keep going.

10. Use Cases for secure protocols

In this video, I’m going to be talking about use cases for secure protocols. Now, when it comes to using secure protocols in a secure network, it’s pretty much mandatory. You should never use protocols that are insecure if there is a secure version of it. Not all times are you going to have a secure version of a protocol or something running over SSL. I’m not sure if you guys saw that theme. And throughout this section of the different protocols, whether it was FTP or was IMAP or Pop, through a variety of others, you notice how we could use SSL for quite a lot of stuff, but not all the time. You’re going to have a secure protocol for this.

So this you might have to use other ways to mitigate those particular risks. So if there is a secure version of it, make sure you use it. For example, never used FTPs. You saw how easy I was able to crack that. You want to make sure you use SFTP or FTPs in order to secure that and encrypt it. You saw when I encrypted it, they couldn’t see anything. Let’s take a look at some things to think about when it comes to use cases. So, first of all, voice and video, if you guys remember, SRtP is how we were able to secure VoIP protocols. I had mentioned this in an earlier video. When it comes to video based things, you could use SSL like you would on YouTube if it’s embedded on HTML page, or use an Http time synchronization. So time synchronization is done with a protocol called NTP Network Time Protocol.

This is a protocol that is used to synchronize the clock across your network. Now, NTP really doesn’t have a secure version of it. You just make sure you just keep your systems up to date on this. There were some attacks against NTP a while back, but they generally fix and you want to make sure you keep it up to date. When it comes to email, we talked about quite a lot. Use things like use things like PGP, use things like IMAP or pop three over SSL. When it comes to web, we talked about using Https. That’s what you want to use in securing web information when it comes to file transfer protocol, right? FTP, you can use FTPs or SFTP, one over SSL, or the other one is going to be over SSH. Directory Services we talked about LDAP.

So remember in LDAP, you want to secure that. I show you how to install a certificate on an LDAP server. And this year you do LDAP like a directory access protocol. S, right? With SSL. Now, when it comes to remote access, we did talk about using IPsec. So we talked about IPsec ah ESP. This is mostly using VPNs, especially when connecting to a network. Now, DNS, when it comes to DNS, you want to make sure you use DNS SEC I showed you how to secure that and sign the zone so there wouldn’t be any kind of DNS, spoofing or poison him. Now routed and switching router and switching protocols within your network. The best way to secure them or gather network devices SNMP version three we talked about, this is going to help to gather SNMP version three is going to help to gather all of the different router and switching information throughout your network and making sure that that is secure.

The other thing here is network address allocation and subscription services. So let’s talk about these two. Network address allocation. Sometimes security devices can require a certain amount of IP addresses allocated to them, such as firewalls, or require a certain set of IP addresses. For example, Nap is a good one that’s on firewall. That helps to secure your network. That is a good thing that we should all have on our network in today’s world. The other one subscription services. A lot of times these particular security services will be subscription, in which case you’re paying for them almost anything. Most things that include some kind of SSL certificate, you’re going to have to pay for it.

 You’re going to have to subscribe and get it. Most SSL public SSL certificates you put on servers are basically going to be a yearly fee that you pay to certificate authorities. Publicly trusted certificate authorities such as Komodo GoDaddy, DigiCert are some famous ones. So there will be some fees associated with these things. Okay, so these are a variety of use cases when it comes to secure protocols.

Leave a Reply

How It Works

Step 1. Choose Exam
on ExamLabs
Download IT Exams Questions & Answers
Step 2. Open Exam with
Avanset Exam Simulator
Press here to download VCE Exam Simulator that simulates real exam environment
Step 3. Study
& Pass
IT Exams Anywhere, Anytime!