7-2 Flashcards
policies that determine the parameters of a valid password including minimum length, age , complexity
password policies
this attack involves recoding the authenticacion sessions of a legitimate user, and them simply playing tahtt backto gain access
playback attack
a somewhat older connection protocol
PPP
an extension to PPP for VPNs
PPTP Point to Point Tunelling protocol
a propriety version of PAP
SPAP Shiva Password Authetication protocol
one of two IPSec Modes tje transport mode works by encrypting the data in each packet but leaves the header unencrypted
transport mode
one of 2 ipsec modes. the tunnel mode encrypts both the header and the data and thus more secure than thetransport mode but can work a bit slower
tunnel mode
one of the primary protocols used in netowrking
IP
a method used to secure VPNs
IPSec
a combination of tunneling, encryption, authentication, and access control technologies and service used to carry traffic over the internet, a managed IP Network, or a providers backbone
VPN
a _____ dows not require seperate technology, leased lines, or direct vabling
VPN
2 of the most commonly used protocols used to achieve VPN encryption needs are ___________
PPTP and L2TP
an older connection protcol. has its packets encapsulated with IP packets and forwarded over any IP{ network including the internet itself. often used to create VPNs. its an older and less secure protocol L2TP or IPSec.
PPTP
PPTP originally proposed as a standard in 1996 by the PPTP Forum including Ascend Communications, ECI Telematics, Microsoft, 3Com, and US robotics. the groups purpose was to design a protocol that would allow remote users to communicate ________ over the internet
Securely
although newer VPN protocols exist, PTPP is still widely available used because in part almost all VPN equipment vendors ____
support PPTP