01 - Flash Cards

1
Q

Tunneling

A
  • Encapsulation of protocol-deliverable message within a second protocol.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Transmission Control Protocol/Internet Protocol

A
  • Communication protocols used to interconnect network devices on the internet. They can also be used for intranet or extranet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPSec

A
  • Is is a secure network protocol suite that authenticates and encrypts the packets of data sent over an internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kerberos

A
  • It is a computer network authentication protocol developed by MIT that offers sign on solution for users and provides protection for logon credentials.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSH

A
  • Secure Shell is an end to end encryption technique that can be used to encrypt plaintext utilities as well as to serve as protocol encryption and VPN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Signal Protocol

A
  • Protocol that provides end to end encryption for voice and text messages.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure Remote Procedure Call

A
  • An authentication service meant to prevent unauthorized code use on remote services.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure Socket Layer

A
  • It is a cryptographic protocol designed to provide communications security over a computer network – between a web server and a web browser.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transport Layer Security

A
  • It is a cryptographic protocol designed to provide communications security over a computer network – between a web server and a web browser.
  • It is similar to SSL but uses stronger authentication and encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List Authentication Protocols

A
  • Challenge Handshake Authentication Protocol
  • Password Authentication Protocol
  • Extensible Authentication Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Voice Over Internet Protocol

A
  • It is a transmission of voice and multimedia content over Internet Protocol (IP) networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Voice Communication Threats

A
  • Caller ID falsification, DoS attacks, man in the middle attacks…
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social Engineering

A
  • In the context of cybersecurity it is the use of deception to manipulate individuals into revealing confidential or personal information that may be used for fraudulent purposes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multimedia Collaboration

A
  • Use of multimedia communication options to improve distance collaboration– for example a group of people working on a project remotely.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote Meeting Technology

A
  • Umbrella term used for any type of technology that allows for interaction among remote parties.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Instant Messaging

A
  • It is a technology that allows exchange of near real-time messages through a stand-alone application or embedded software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Email Security Goals

A
  • Provide for nonrepudiation
  • Restrict access to message
  • Maintain integrity of a message
  • Verify source of a message
  • Classify sensitive content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Email Security Solutions

A
  • Secure Multipurpose Internet Mail Extensions
  • MIME Object Security Purposes
  • Privacy Enhanced Mail
  • DomainKeys Identified Mail
  • Pretty Good Privacy
  • Sender Policy Framework
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Remote Access and Telecommuting Techniques

A
  • Service Specific
  • Remote Control
  • Screen Scraper
  • Remote Node Operation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Issues to Consider When Planning Remote Access Security

A
  • Remote Connectivity Technology
  • Transmission Protection
  • Authentication Protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Dial-Up Protocols

A
  • Point to Point Protocol
  • Serial Line Internet Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RADIUS

A
  • Remote Authentication Dial-In User Service is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate users and authorize their access to the requested system or service.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Virtual Private Network

A
  • It is a technology that creates a safe and encrypted connection over a less secure network, such as the internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Common VPN Protocols

A
  • Point to Point Tunneling Protocol
  • IP Security Protocol
    • ? Authentication Header
  • ? Encapsulating Security Payload Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Virtual LAN

A
  • Virtual LAN (Local Area Network) is a logical subnetwork that can group together a collection of devices from different physical LANs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Virtualization

A
  • Technology used to hose one or more operating systems within a memory of a single host computer.
27
Q

Virtual Software

A
  • Virtual Application
  • Virtual Desktop
28
Q

Virtual Application

A
  • It is a technology where the application is separated from its underlying operating system and is streamed to an isolated environment on a target device, but is executed on the server.
29
Q

Virtual Desktop

A
  • Virtual desktops is an operating system that is a accessible through client software installed directly on an endpoint, which presents the desktop to the user and allows them to interact with it using a keyboard, mouse.
30
Q

Virtual Networking

A
  • It is a technology that enables data communication between two or more virtual machines (VM) in a virtualized computing environment.
31
Q

Network Address Translation

A
  • It is a process where a network device assigns a public address to a computer or group of computers inside a private network.
32
Q

Static NAT

A
  • Specific internal clients IP address is assigned a permanent mapping to a specific external public IP address.
33
Q

Dynamic NAT

A
  • It is a technique in which multiple public Internet Protocol (IP) addresses are mapped and used with an internal or private IP address.
34
Q

Automatic Private IP Addressing

A
  • Assignment of an IP address to a system in the event of Dynamic Host Configuration Protocol failure.
  • APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is either permanently or temporarily unavailable.
35
Q

Switching Technologies

A
  • Circuit Switching
  • Packet Switching
36
Q

Circuit Switching

A
  • Concept in telecommunications that refers to a communication system that involves circuit establishment, data transfer, and circuit disconnect to be fully functional.
37
Q

Packet Switching

A
  • Concept in telecommunications that refers to data transmission in which a message is broken into a number of parts which are sent independently, over whatever route is optimum for each packet, and reassembled at the destination.
38
Q

Virtual Circuits

A
  • It is a concept that refers to transporting data over a packet switched computer network so that it appears as there is a dedicated physical layer link between the source and destination end systems.
39
Q

WAN Technologies

A
  • Wide Area Network Technologies are used to connect distant networks, nodes, and individual devices together.
40
Q

Integrated Services Digital Networks

A
  • Integrated Services Digital Network (ISDN) is a set of communication standards for digital telephone connection and the transmission of voice and data over a digital line.
41
Q

Basic Rate Interface

A
  • Telecommunications interface used on an Integrated Services Digital Network (ISDN) that offers customers connection with two B channel and one D channel.
  • B channel is used for data transmission while D channel is used for call establishment and management.
42
Q

Primary Rate Interface

A
  • It is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying voice and data transmissions between the network and a user.
43
Q

WAN Connection Technologies

A
  • X.25 WAN
  • Frame Relay
  • ATM
  • SMDS
44
Q

X.25 WAN Connection

A
  • It is a standard set protocols used for packet-switched communications over a wide area network-a WAN.
  • It uses permanent virtual circuits to establish point to point connection between two systems or networks.
45
Q

Frame Relay Connection

A
  • It is a data link layer, digital packet switching network protocol technology designed to connect Local Area Networks (LANs) and transfer data across Wide Area Networks (WANs).
46
Q

ATM

A
  • Asynchronous transmission mode is a cell switching WAN communication technology by fragmenting communication into 53-byte cells..
47
Q

SMDS

A
  • Switched Multimegabit Data Service is a connectionless packet switching technology. Used to connect multiple LANs.
48
Q

Synchronous Digital Hierarchy and Synchronous Optical Network

A
  • Fiber optic high speed networking standards.
49
Q

Specialized Protocols

A
  • Synchronous Data Link Control
  • High Level Data Link control
50
Q

Dial-Up Encapsulation Protocols

A
  • Point to Point Protocol us an encapsulation protocol designed to support transmission of IP traffic over dial up point to point protocols.
51
Q

Transparency

A
  • Feature of a service or security control that ensures it is unseen by users.
52
Q

Transmission Integrity Verification

A
  • Done by using a checksum called a hash total.
53
Q

Hash Total

A
  • Hash total is a function that represents numerical sum of one or more fields in the file, including data not normally used in calculations.
54
Q

Transmission Logging

A
  • It is a form of communications focused auditing.
55
Q

Security Boundary

A
  • Division between one secured area and another or a division between secured and unsecured area.
56
Q

Denial of Service

A
  • It is an attack where the attackers attempt to prevent legitimate users from accessing the service.
57
Q

Distributed Denial of Service

A
  • It is an attack that occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
58
Q

Eavesdropping Attack

A
  • Attack where someone tries to steal information that computers, smartphones, or other devices transmit over a network.
59
Q

Replay Attacks

A
  • Network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed.
60
Q

Modification Attacks

A
  • In this type of attack, captured packets are altered and then played against a system.
61
Q

Hyperlink Spoofing

A
  • Falsifying information, including falsifying relationship between a URL and its trusted, original destination.
62
Q

Phreaker

A
  • Attack meant to breaks into the telephone network illegally to make free long-distance phone calls or to tap phone lines.
63
Q

Fax Security

A
  • Fax security is improved by using encryption and training users to counter social engineering. The goal is to prevent interception.
64
Q
A