3.1 Implement secure protocols Flashcards

1
Q

A security improvement to the existing DNS infrastructure. Its primary function is to provide mutual certificate authentication an encrypted sessions between devices during DNS operations.

A

Domain Name System Security Extension (DNSSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A secure replacement for Telnet (TCP port 23) and many of the Unix “r” tools, such as rlogin, rsh, rexec, and rcp. All SSH transmissions (both authentication and data exchange) are encrypted over TCP port 22.

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An Internet standard for encrypting and digitally signing email. It uses X.509 v3 standard certificates issued by a trusted CA.

A

Secure/Multipurpose Internet Mail Exchanger (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security improvement over Real-Time Transport Protocol (RTP) that is used in many Voice over Internet Protocol (VoIP) communications. It aims to minimize the risk of VoIP DoS through robust encryption and reliable authentication.

A

Secure Real-Time Protocol (SRTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

accomplished by enabling the Simple Authentication and Security Layer (SASL) on LDAP, which implements Transport Layer Security (TLS) on the authentication of clients as well as all data exchanges.

A

Lightweight Directory Access Protocol Over SSL (LDAPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An in-the-clear file-exchange solution. An FTP server system is configured to allow authenticated or anonymous FTP clients to log on to upload or download files. FTP employs TCP ports 20 and 21.

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A secured alternative to standard FTP that uses SSH to encrypt both authentication and data traffic.

A

Secured File Transfer Protocol (SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The current standard network-management protocol supported by most network devices and TCP/IP compliant hosts. It allows for encrypted communications between devices and the management console, as well as robust authentication protection customized authentication factors.

A

Simple Network Management Protocol, version 3 (SNMPv3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When TLS is used to secure HTTP transactions, It can operate (with TLS) over TCP ports 443 or 80. It uses digital certificates to perform single-sided (i.e., web server only) or mutual authentication.

A

Hypertext Transfer Protocol over SSL/TLS (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A VPN protocol for IPv4 derived from the security features of IPv6. It uses public-key cryptography and symmetric cryptography to provide encryption, secure key exchange, access control, non-repudiation, and message authentication, all using standard Internet protocols and algorithms.

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A primary protocol of IPSEC that provides encryption of the transferred data as well as limited authentication.

A

Encapsulated Security Payload (ESP) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In this mode IPSec provides encryption protection for both the payload and the message header by encapsulating the entire original LAN protocol packet and adding its own temporary IPSec header.

A

Tunnel Mode - IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These protocols are secured by implementing TLS (or SSL in the past) encryption. This converts these protocols into POPS (or POP3S) and IMAPS (or IMAP4S) and also alters their ports from 110 to 995 and 143 to 993, respectively.

A

Secure Post Office Protocol (POP) / Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FTP Secure/Secured, which indicates that it’s a variation of FTP secured by TLS (previously SSL).

(Page 261).

A

File Transport Protocol, Secured (FTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FTP Secure/Secured, which indicates that it’s a variation of FTP secured by TLS (previously SSL).

A

File Transport Protocol, Secured (FTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In this mode IPSec provides encryption protection for just the payload and leaves the original message header intact.

A

Transport Mode - IPSEC

17
Q

Ensures the secure exchange of secret keys between communication partners to establish an encrypted VPN tunnel.

A

Internet Key Exchange (IKE)

18
Q

Used to organize and manage the encryption keys that have been generated and exchanged by Oakley and SKEME. A security association is the agreed-on method of authentication and encryption used by two entities (a bit like a digital keyring).

A

Internet Security Association and Key Management Protocol (ISAKMP)

19
Q

A primary protocol of IPSec. It provides authentication of the sender’s data.

A

Authentication Header (AH)

20
Q
-Voice and Video
=Time synchronization
-Email and Web
-File Transfer
-Directory Services
-Remote Access
-Domain Name Resolution
-Routing and Switching
=Network Address Allocation 
-Subscription Services
A

Use Cases