CH10 - Course Quiz Flashcards

1
Q

Which term refers to a cipher’s underlying mathematical formula?

algorithm
encryption
authentication
hash

A

algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which term refers to an encrypted link between SSH processes on two separate computers?

PKI
SSH Tunnel
802.1x
Kerberos

A

SSH Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which term means to scramble, mix up, or change data in such a way that bad guys cannot read it but the intended recipient of the data can descramble it?

authentication
encryption
authorization
nonrepudiation

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which term refers to a standardized type of file that includes a public key and the digital signature of a trusted third party?

hash
certificate
encryption
password

A

certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When performing a binary XOR (eXclusive OR) calculation with a plaintext value of 0 and a key value of 0, what is the result?

0
1
2
4

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which protocol is the tool that programs use to query and change a database used by the Network?

LDAP
EAP
Kerberos
NTP

A

LDAP (Lightweight Directory Access Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which term refers to the result of running plaintext through cipher algorithm using a Key?

key pair
digital signature
plaintext
ciphertext

A

ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LDAP uses TCP and UDP Ports 389 by default?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which authentication method is commonly used for more-secure Wireless Networks?

PPP
EAP-PSK
EAP-TLS
LEAP

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Network Time Protocol (NTP) does one thing: it gives you the current time?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You won’t get an HTTPS connection without a good ________ exchange?

hash
token
certificate
ticket

A

certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authorization means to verify that whoever accesses the data is the person you want accessing the data?

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric-Key Encryption has one serious weakness: anyone who gets a hold of the key can encrypt or decrypt data with it?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which term is used for data that hasn’t been encrypted yet?

ciphertext
cleartext
cipher
hash

A

cleartext (Or Plaintext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which authentication protocol is used in TCP/IP network where many clients all connect to a single authenticating server with no point-to-point involved?

MS-CHAP
PPP
TACACS+
Kerberos

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Authorization and describe the classic scheme that Windows uses for Authorization?

A

Defines what an Authenticated person “CAN DO” once they are IN.
Windows uses Rights/Permission based Roles to user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Authentication and provide an example of the most classic form of Authentication?

A

What does it take for a user to “Get In”?
What do you “Need to Get In?
Examples are Usernames/Passwords, others could be Smartcards, Tokens, Biometrics and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe the concept of Nonrepudiation with TCP/IP and provide an example?

A

Ensures that no party can deny that he/she took a specific action.
Example is Digital Signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define Port Authentication?

A

Port Authentication is the concept of allowing remote user Authentication to a particular point of entry (A Port) to another Network.
AAA = Authentication, Authorization, Accounting is designed for the idea of Port Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do modern Web Browsers indicate if the Web Page is Secure?

A
  1. The address begins with https://

2. Before the Address Bar there’s a Lock Icon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When applying the binary math ____________ calculation, a cleartext value of 0 combined with a key value of 1 equals 1, as does a cleartext value of 1 combined with a key value of 0?

A

XOR (eXclusive OR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A Windows domain is a group of computers that defers all Authentication to a ___________, a special computer running some version of Windows Server (with the appropriate role installed)?

A

domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Mircosoft adopted ________ as the Authentication Protocol for all Windows Networks using a domain controller?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

__________ defines what an Authenticated person “Can Do” with data?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CHAP relies on __________ based on a shared secret, usually a password that both ends of the connection know?

A

hashes

26
Q

What causes the most common problems with HTTPS Connections?

PKI
revoked certificates
bad certificates
bad URLs

A

bad certificates

27
Q

Which port does Kerberos authentication protocol use?

22
23
53
88

A

88

28
Q

_______ defines a newer series of protection applications that combine the features of what traditionally was done by separate applications?

RADIUS
Network Access Control (NAC)
Network Attached Storage (NAS)
Network Access Server (NAS)

A

Network Access Control (NAC)

29
Q

Which enables secure data transfers between two hosts and thus might have replaced FTP?

Secure Copy Protocol (SCP)
Telnet
HTTPS
Kerberos

A

Secure Copy Protocol (SCP)

30
Q

Most modern operating systems use Digital Signatures to verify installed programs come from their registered developers?

True
False

A

True

31
Q

Which term desribes a mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length?

authentication
encryption
hash
nonrepudiation

A

hash

32
Q

Which protocol offers a method for querying the state of certain Network devices?

SFTP
NTP
SNMP
SCP

A

SNMP (Simple Network Management Protocol)

33
Q

Which standard offers authentication, authorization, and accounting?

Terminal Access Control Access Control System Plus (TACACS+)
Data Encryption Standard (DES)
MS-CHAP
Network Access Servers (NAS)

A

Terminal Access Control Access Control System Plus (TACACS+)

34
Q

Which is the best RADIUS Server chocie for UNIX/Linux?

Data Encryption Standard
Rivest Cipher
FreeRADIUS
Internet Authentication Service

A

FreeRADIUS

35
Q

Describe the Mandatory Access Control (MAC) Security Model?

A

Every resource is assigned a label that defines its security level.
If the user lacks that security level, he or she does not get access.

36
Q

What are the two modes of Internet Protocol Security (IPSec) and the differences between them?

A

Transport Mode - Only the actual Payload of the IP Packet is Encrypted.
Tunnel Mode - The entire IP Packet is Encrypted and is encapsulated inside another IP Packet at an endpoint.

37
Q

What two elements must be known to decrypt data?

A

Algorithm

Key

38
Q

When using Public/Private Keys for Authentication, after the initial steps of generating the Keys and sending the appropriate Key to the Server, what happens after you connect to the server?

A

Your client generates a signature using its Private Key and sends it to the Server.
The Server then checks the signature with its copy of the Public Key, and if everything checks out, you will be Authenticated to the Server.

39
Q

Describe Lightweight Directory Access Protocol (LDAP) and explain how it is used by Windows Active Directory?

A

LDAP is used to query and change a database used by the Network.

These are databases that track aspects of Networks - such as Users Logged into the Network, active DHCP Clients, or the location of all printers in the Local Network.

Active Directory is one of the most complex and most used, in part because of the power of Single Sign-On and Network information.

LDAP can talk to Active Directory and other directory service provides to query and modify items.

40
Q

Every Web Browser today uses _________ for HTTPS - secured Web Sites?

A

TLS (Transport Layer Security)

41
Q

When you connect to a Server, your client generates a __________ using its Private Key and sends it to the Server?

A

signature

42
Q

Of the Three - PAP, CHAP, and MS-CHAP, ___________ is the most current and common Authentication method for the few using dial-up connections?

A

MS-CHAPv2

43
Q

When a _____________ comes in from an HTTPS Web Site, your computer checks the expiration date to verify it is still valid and checks the Web Sites URL to make sure it’s the same as the site you are on?

A

certificate

44
Q

An example of a ___________ is a simple Cipher that takes the letters of the alphabet and transposes them?

A

Ceasar Cipher or Substituion

45
Q

The SSH File Transfer Protocol (SFTP) is designed to run over an FTP Session?

True
False

A

False

46
Q

_________ is a type of dedicated File Server used in many Networks?

RADIUS
Network Access Control (NAC)
Network Attached Storage (NAS)
Network Access Server (NAS)

A

Network Attached Storage (NAS)

47
Q

When performing a binary XOR (eXclusive OR) calculation with a plaintext value of 1 and a key value of 1, what is the result?

0
1
2
4

A

0

48
Q

You have to use public-key infrastructure (PKI) to use Certificates?

True
False

A

False

49
Q

In Network Security, nonrepudiation is typically enabled by a combination of encrypting and hashing?

True
False

A

True

50
Q

Which Protocol was developed as a secure replacement for Telnet?

Telnet II
Secure Shell (SSH)
AES
IPSec

A

Secure Shell (SSH)

51
Q

Which is the oldest ACL Access Method?

Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
Public-Key Cryptography

A

Mandatory Access Control (MAC)

52
Q

Encryption is a process that guarantees that the data received is the same as originally sent?

True
False

A

False

53
Q

Which term refers to any Encryption that uses different keys for Encryption and Decryption?

Advanced Encryption Standard (AES)
Data Encryption Standard (DES)
Symmetric-Key Encyrption
Asymmetric-Key Encryption

A

Asymmetric-Key Encryption

54
Q

Define Hash?

A

Mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length.

55
Q

Once a remote user is Authenticated to a particular point-of-entry (a Port) on another Network, describe a few types of actions that user may be allowed through Authorization?

A

Once Authenticated, Authorization determines what you can or cannot do on the Network.
Might only be allowed a certain amount of bandwidth, or be limited to working only certain times of day, or be limited to using only a certain set of Apps, among many other things.

56
Q

Explain the connection between Role-Based Access Control (RBAC) and groups?

A

Defines a user’s access to a resource based on the roles the user plays in the network environment.
This leads to the idea of creating groups. A group in most networks is nothing more than a name that has clearly defined access to different resources.

57
Q

A _________ is a clearly defined list of permissions that specifies what an Authenticated user may perform on a shared resource?

A

Access Control List (ACL)

58
Q

The public-key cryptography keys generated at the same time and designed to work together are called __________?

A

key pair

59
Q

A __________ is a general term for a way to encrypt data?

A

cipher

60
Q

SSH servers can use a number of ____________ algorithms such as RSA or ECDSA?

A

public-key