3.1 Implement secure protocols Flashcards

1
Q

What is SRTP ?

A

Secure Real Time Protocol (or Secure RTP) use AES to encrypt the conversation over voice/video flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is NTP & NTPsec ?

A
  • Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems
  • NTPsec: NTP secure version
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is S/MIME ?

A

Secure/ Multipurpose Internet Mail Extensions is a public key encryption mechanism that allows to protect the information using encryption and to provide digital signatures for integrity. It require PKI in place in order to manage these keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Secure POP and Secure IMAP ?

A

It use a STARTTLS extension to encrypt POP3 with SSL or use IMAP with SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is MIME protocol?

A

Multipurpose Internet Mail Extensions is an extension of the original Simple Mail Transport Protocol (SMTP) email protocol. It lets users exchange different kinds of data files, including audio, video, images and application programs, over email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are POP and IMAP protocol?

A
  • POP: post office protocol is the most commonly used message request protocol in the Internet world for transferring messages from an e-mail server to an e-mail client. With POP3, the e-mail client requests new messages from the e-mail server, and the server “pops” all new messages out to the client.
  • IMAP: POP3 downloads emails from a server to a single computer, making those emails only accessible on that specific computer. IMAP stores emails on a server and then syncs them across multiple devices. IMAP is more advanced than POP3 and allows you to access your email from anywhere, and on any device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between POP and SMTP ?

A

SMTP (“Simple Mail Transfer Protocol”) is used for sending and delivering from a client to a server via port 25: it’s the outgoing server. On the contrary, POP (“Post Office Protocol”) allows the user to pick up the message and download it into his own inbox: it’s the incoming server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is web protocol to make it secure ?

A

SSL/TLS which is use with HTTP protocol (HTTPS). It uses public key encryption methods and use public and private key paired in order to transfer symmetric key across the network so that a session key can then be used symmetrically during the communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is IPsec ?

A

Security for OSI Layer 3 and provide authentication and encryption for every packet.
It also provide packet signing for integrity and anti replay features.
IPsec use 2 protocols for its implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 2 protocols used to implement IPsec ?

A
  • Authentication Header (AH) which provides the integrity
  • Encapsulation Security Payload (ESP) that provides the encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is FTPS and SFTP ?

A
  • FTPS: FTP over SSL (FTP-SLL), it uses SSL to provide the encryption
  • SFTP: SSH File Transfer Protocol and use SSH to provide the encryption. SFTP also provide file system functionality such as resuming interrupted transfers, directory listings, remote file removal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is LDAP & LDAPS ?

A
  • Lightweight Directory Access Protocol is a protocol for reading and writing directories over an IP network. It is used in Windows Active Directory, Apple OpenDirectory, Open LDAP etc
  • LDAPS: LDAP over SSL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SASL ?

A

Simple Authentication and Security Layer provides authentication using many different methods (i.e Kerberos or client certificate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SSH ?

A

Secure Shell encrypt terminal communication and replaces Telnet (and FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Domain name resolution ?

A

DNS had no security in the original design making it an easy target for attackers. To fix this DNSSEC was created and it validate DNS responses to provide the origin of the authentication to the DNS and data integrity. This is allow thanks to public key cryptography: hence DNS records are signed w/ trusted 3rd party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to connect securely to switches and routers?

A

By using SSH or SNMPv3 (Simple Network Managment Protocol version 3) which provide confidentiality (encrypted data), integrity (no tempering of data), authentication (verifies the source)

17
Q

How to secure network adress allocation?

A

Network address are allocated using the DHCP protocol which do not include any built-in security. To enhance the security of DHCP, an additional control outside the DHCP protocol was added using for example with the Active Directory, switches that allow DHCP from trusted interfaces.