600 Flashcards
92 - 128 - 256 bit bit/key strength
AES
168 bit/key strength
3DES
160 bit/key strength
SHA-1 bit/key strength
128 bit/key strength
MD5 bit/key strength
MSCHAPv2
Microsoft’s authentication protocol
a legacy suite of Microsoft security protocols that provides authentication - integrity - and confidentiality
NTLM
Stop gap replacement for WEP while hardware was upgraded to support full WPA
TKIP(Temporal Key Integrity Protocol)
Allows single file encryption
EFS
Social media sites fuel what type of attacks?
Cognitive password attacks
encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.
PEAP(Protected Extensible Authentication Protocol)
encrypts a chunk of bits at a time before sending them over the network.
Block cipher
a client or user authenticating themselves to a server and that server authenticating itself to the user in such a way that both parties are assured of the others’ identity
mutual authentication
Strongest access control
MAC
limiting MAC addresses to a port prevents what?
Rogue access points
Where
Bitlocker
Plain text and cipher text are always the same size
block cipher
Secure a router in an unsecured closet?
disable the console port
a system that is designed to detect potential data breach
DLP(data loss prevention)
Personal Electronic Device
PED
Disable what to prevent a web server from being used as a mail relay?
SMTP
Mitigate ARP spoofing attacks?
Flood guards
Cisco: block tftp and record it?
deny udp any server eq 69 log
Protect from zero day attacks?
HIPS
Triple A Services
Authorization - Authentication - Accounting
Query packet for remote identification - lights up multiple flag fields?
XMAS
Username - password & PIN?
single factor authentication
Smartcards vs key punch?
eliminates shoulder surfing
Keys needed to decrypt encrypted data are held in escrow so that an authorized third party may gain access to those keys.
key escrow
A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain - runs on each domain controller
Kerberos Key Distrobution Center
Deploys quickly and cleanly and won’t leave behind oily residue - particulate - or water.
FM-200
Separation of duties is often implemented between developers and administrators in order to separate which of the following?
Changes to code and the ability to deploy
used to encrypt plaintext or to verify a digital signature
public key
the use of different keys to perform these opposite functions - each the inverse of the other
asymmetric
the same key to perform both encryption & decryption
symmetric cryptography
Provides centralized Authentication - Authorization - and Accounting (AAA). Layer 7 UDP -
radius
the most widely used software stream cipher and is used in popular protocols such as Secure Sockets Layer (SSL)
rc4
Chap (challenge-handshake authentication protocol)
Server sends a challenge the host - who responds with a value obtained by using a one-way hash function. The server compares it to its own calculation of the expected hash value
Key length of 168 bits (three 56-bit DES keys) - but due to the meet-in-the-middle attack - the effective security it provides is only 112 bits.
3des
Configuring mode - encryption methods and security associations are part of?
IPSec
Authentication to TCP 49?
TACACS+