I applied to Your application has been received by County of San Diego for the Information Technology Engineer–Application Development & Support–25242012ADS position at 01/24/2026 01:56 PM Pacific Time, and I’m continuing my Security+ exam prep by studying Secure Protocols (CompTIA Security+ SY0-701 4.5) from Professor Messer. This section is focused on one of the most important cybersecurity fundamentals: unencrypted data in transit. If network traffic is not protected, attackers can capture it with a packet sniffer and read what’s inside. The packet header usually stays visible so the network can route traffic, but the payload should be encrypted so your login credentials, sensitive data, and communication cannot be stolen through network monitoring, man-in-the-middle attacks, or basic packet capture tools like Wireshark.
A big concept here is that common protocols such as Telnet, FTP, SMTP, and IMAP can send data unencrypted, which means usernames and passwords may travel in cleartext. This is one reason cybersecurity conferences like DEF CON talk about the “Wall of Sheep,” where insecure logins are publicly displayed to prove how easy it is to intercept weak traffic. The solution is to use secure alternatives and encrypted versions of these protocols: SSH instead of Telnet, SFTP instead of FTP, IMAPS instead of IMAP, and HTTPS instead of HTTP. Port numbers can give quick hints during troubleshooting and Security+ practice (like port 80 for HTTP and port 443 for HTTPS), but the real best practice is to verify encryption by checking the server configuration and confirming with a packet capture. If traffic is truly encrypted, the content should not be readable in plain text even if someone is watching the packets.
Wireless security connects directly to this topic, because open 802.11 Wi-Fi can expose traffic to anyone nearby, while WPA3 encryption protects wireless communication. Another major defense is a VPN (Virtual Private Network), which creates an encrypted tunnel between the remote user and the VPN concentrator to protect traffic across public networks. In some cases, using a trusted third-party VPN service may be necessary, but the overall Security+ lesson is simple: encrypt data in transit, use secure protocols, validate encryption, and reduce risk from eavesdropping and credential theft.
R88DDB71E-T2Phal-002-51
Leave a comment