01 - Flash Cards
1
Q
Tunneling
A
- Encapsulation of protocol-deliverable message within a second protocol.
2
Q
Transmission Control Protocol/Internet Protocol
A
- Communication protocols used to interconnect network devices on the internet. They can also be used for intranet or extranet.
3
Q
IPSec
A
- Is is a secure network protocol suite that authenticates and encrypts the packets of data sent over an internet.
4
Q
Kerberos
A
- It is a computer network authentication protocol developed by MIT that offers sign on solution for users and provides protection for logon credentials.
5
Q
SSH
A
- Secure Shell is an end to end encryption technique that can be used to encrypt plaintext utilities as well as to serve as protocol encryption and VPN.
6
Q
Signal Protocol
A
- Protocol that provides end to end encryption for voice and text messages.
7
Q
Secure Remote Procedure Call
A
- An authentication service meant to prevent unauthorized code use on remote services.
8
Q
Secure Socket Layer
A
- It is a cryptographic protocol designed to provide communications security over a computer network – between a web server and a web browser.
9
Q
Transport Layer Security
A
- It is a cryptographic protocol designed to provide communications security over a computer network – between a web server and a web browser.
- It is similar to SSL but uses stronger authentication and encryption.
10
Q
List Authentication Protocols
A
- Challenge Handshake Authentication Protocol
- Password Authentication Protocol
- Extensible Authentication Protocol
11
Q
Voice Over Internet Protocol
A
- It is a transmission of voice and multimedia content over Internet Protocol (IP) networks.
12
Q
Voice Communication Threats
A
- Caller ID falsification, DoS attacks, man in the middle attacks…
13
Q
Social Engineering
A
- In the context of cybersecurity it is the use of deception to manipulate individuals into revealing confidential or personal information that may be used for fraudulent purposes.
14
Q
Multimedia Collaboration
A
- Use of multimedia communication options to improve distance collaboration– for example a group of people working on a project remotely.
15
Q
Remote Meeting Technology
A
- Umbrella term used for any type of technology that allows for interaction among remote parties.
16
Q
Instant Messaging
A
- It is a technology that allows exchange of near real-time messages through a stand-alone application or embedded software.
17
Q
Email Security Goals
A
- Provide for nonrepudiation
- Restrict access to message
- Maintain integrity of a message
- Verify source of a message
- Classify sensitive content
18
Q
Email Security Solutions
A
- Secure Multipurpose Internet Mail Extensions
- MIME Object Security Purposes
- Privacy Enhanced Mail
- DomainKeys Identified Mail
- Pretty Good Privacy
- Sender Policy Framework
19
Q
Remote Access and Telecommuting Techniques
A
- Service Specific
- Remote Control
- Screen Scraper
- Remote Node Operation
20
Q
Issues to Consider When Planning Remote Access Security
A
- Remote Connectivity Technology
- Transmission Protection
- Authentication Protection
21
Q
Dial-Up Protocols
A
- Point to Point Protocol
- Serial Line Internet Protocol
22
Q
RADIUS
A
- Remote Authentication Dial-In User Service is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate users and authorize their access to the requested system or service.
23
Q
Virtual Private Network
A
- It is a technology that creates a safe and encrypted connection over a less secure network, such as the internet.
24
Q
Common VPN Protocols
A
- Point to Point Tunneling Protocol
- IP Security Protocol
- ? Authentication Header
- ? Encapsulating Security Payload Protocol
25
Q
Virtual LAN
A
- Virtual LAN (Local Area Network) is a logical subnetwork that can group together a collection of devices from different physical LANs.