3 Flashcards

1
Q

What is DNSSEC?

A

Domain Name System Security Extensions (DNSSEC)

helps to mitigate against spoofing and poisoning attacks. The authoritative server for the zone creates a package or resource records, called an RRset, signed with a private key known as the zone signing key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does TLS mean and what is the difference between TLS 1.1 TLS 1.2?

A

Transport Layer Security (TLS) 1.2

added support for the strong Secure Hash Algorithm (sha)-256 cipher. That is the primary difference between TLS 1.1 and TLS 1.2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does FTPS mean?

A

File Transfer Protocol over SSL (FTPS)

implicitly negotiates a Secure Sockets Layer/Transport Layer Security (SSL/TLS) tunnel before exchange of any File Transfer Protocol (FTP) commands. This mode uses the secure port 990 for the control connection?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does FTPES?

A

Explicit FTP over SSL (FTPES)

uses the Auth TLS command to upgrade an unsecure connection established over port 21 to a secure one. This negotiates a SSL/TLS tunnel explicitly and is preferred over FTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is POP3?

A

Secure Post Office Protocol v3 (POP3)

is a mailbox protocol designed to allow mail to be stored on a server and downloaded to the recipient’s email client at their convenience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SFTP?

A

Secure Shell File Transfer Protocol (SFTP)

addresses the privacy and integrity issues of FTP by encrypting the authentication and data transfer between a client and server. A secure link is created using Secure Shell over Transmission Control Protocol port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is AH protocol?

A

Authentication Header (AH) protocol

performs a cryptographic has on the whole packet, including the IP header, plus a shared secret key (known only to the communicating hosts) and adds this HMCA in its header as an Integrity Check Value (ICV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ESP protocol?

A

Encapsulation Security Payload (ESP) protocol

provides confidentiality and/or authentication and integrity. It encrypts the data payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Transport mode?

A

Transport mode secure communications between hosts on a private network (an end-to-end implementation).

AH and ESP running transport mode provides confidentiality, integrity, and authentication for internal secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is S/MIME?

A

Secure/Multipurpose Internet Mail Extensions (S/MIME)

is a widely accepted method for sending digitally signed and encrypted messages. It allows the sender to encrypt the emails and digitally sign them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SNMPv3?

A

Simple Network Management Protocol (SNMP) v3

supports encryption and strong user-based authentication. Instead of community names, the agent is configured with a list of usernames and access permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DHCP?

A

Dynamic Host Configuration Protocol (DHCP)

provides an automatic method for network address allocation. As well, an IP address and subnet mask can include optional parameters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is LDAPS?

A

Lightweight Directory Access Protocol Secure (LDAPS)

enables secure queries to a directory by its use over port 636. An unsecure version (LDAP) would utilize port 389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is HIPS?

A

Host Intrusion Prevention System (HIPS)

is software located on the host system and has an active response to threats. In the example of an unknown IP range trying to gain access to a server, the HIPS at the server level will block the connection.

Can also prevent malicious software from traveling between VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is HIDS?

A

Host Intrusion Detection System (HIDS)

is software located on the host system. It can log and notify admins or users about intrusion attempts without an active response, like denying or blocking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is fuzzing?

A

Fuzzing is a dynamic analysis technique that checks code as it is running.

When using fuzzing, the system is attacked with random data to check for code vulnerabilities.

17
Q

What is SED?

A

Self-Encrypting Drive (SED)

includes both the hardware and software to encrypt data on a drive. Keys are securely stored within for decryption. SED requires credentials to be entered for decryption.

18
Q

What is GLBP?

A

Gateway Load Balancing Protocol

is Cisco’s proprietary service to providing a load-balanced service with a VIP. The infrastructure is Cisco-based, so this service will most likely be implemented

19
Q

What is VIP?

A

Virtual IP (VIP)

Each server node has its own IP address, but externally a load-balanced service is advertising a Virtual IP (VIP) address. Clients go to an IP address or FQDN (fully qualified domain name) and will be routed accordingly between the servers in the cluster.