Additional Info Flashcards
Port 20 and 21
FTP, File Transfer Protocol
22
ssh, secure shell
23
telnet
25
SMTP, Simple Mail Transport Protocol
53
DNS
69
TFTP, Trivial File Transfer Protocol
80
HTTP, HyperText Transfer Protocol
110
POP3
124
NTP, Network Time Protocol
143
IMAP, Internet Message Access Protocol (version 4)
161
SNMP, Simple Network Management Protocol
3389
RDP, Remote Desktop Protocol
RC-4, AES, 3DES are examples of what type of Cryptography? Symmetric or Asymmetric
Symmetric
RC-4 is a certain type of Symmetric Cryptography. What type?
Stream
What encryption algorithm is the default standard for most applications?
AES
The process of hashing a message, encrypting the hash with the senders private key, the receiver decrypting it with the sender’s public key and then hashing the message to make sure the hashes match is called what?
A digital signature.
Formula to determine the amount of keys needed for Asymmetric crypto
2N
Formula to determine the amount of keys needed for Symmetric crypto
(N*(N-1))/2
Six common Asymmetric algorithms that might be on the test. (Everything else is Symmetric)
DSA, RSA, ECC (Eliptical Curve) EL Gamal, Diffie Hellman, Knapsack
MD-5 Hashing Algorithm length
128 bit
SHA-1 Hashing Algorithm length
160 bit
SHA-256 Hashing Algorithm length
256 bit
A digital signature gives you integrity and authentication which equals non repudiation. What does it not give you?
Privacy of the message is not protected by a digital signature.
Digital Certs follow which standard
X.509 v.4 standard
Two ways to check and see if a certificate has been revoked
CRL or OCSP (Online Certificate Status Protocol)
government standard hash functions developed by the National Institute of Standards and Technology (NIST) and specif ed in an official governmentpublication—the Secure Hash Standard (SHS), also known as Federal Information Processing Standard (FIPS) 180
SHA-1 and SHA-2
Name the four variants of SHA-2
SHA-256, SHA-512, SHA-224, SHA-384
What part of IPSec provides integrity, authenticity and non repudiation
AH (Authentication Header) through the use of an ICV (Integrity Check Value)