3.1 Implement Secure Protocols Flashcards
Protocol used for secure real-time transport of voice and video communications.
SRTP (secure real-time protocol)
Secure protocol used for time syncronization.
NTPsec
Public key encryption and digital signing of mail content. Requires a PKI or similar key organization.
S/MIME (secure/multipurpose internet mail extensions)
What protocol is used to encrypt email that is browser based?
SSL/TLS
What are the 2 protocols used for secure web traffic?
SSL/TLS
HTTPS
Security protocol for OSI layer 3, encrypting every network packet.
IPSec
What are the two core IPSec protocols?
AH (Authentication header)
ESP (encapsulation security payload)
File transfer protocol that utilizes SSL for secure transmission.
FTPS (File transfer protocol secure)
File transfer protocol that uses SSH and supports directory listings, remote file removal, and provides file system functionality.
SFTP (SSH file transfer protocol)
Protocol utilized to secure and encrypt directory information using SSL
LDAPS
Secure authentication method using many different authentication methods (kerberos, client certificate, etc.)
SASL (Simple authentication and security layer)
Encrypted terminal communication for remote console access. Replaces the unsecure Telnet.
SSH (secure shell)
Protocol used for securing domain name resolutions. Utilizes public key cryptography.
DNSSec
Routing and switching protocol that is used for the secure management of networks. Allows CIA verification.
SNMPv3 (Simple network management protocol version 3)
True or false: The secure form of DHCP is DHCPSec.
False: there is no secure form of DHCP