Ch12 - Ch14 Flashcards

1
Q

standards‐based mechanism for providing encryption for point‐to‐point TCP/IP traffic; operates at the Network layer (layer 3)

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

needed to allow an outside entity to initiate communications with an internal system behind a NAT proxy

A

static mode NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the least important aspect of security systems for Internet‐delivered email.

A

Availability, but yet in general availability is important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

use of email as an attack mechanism by flooding a system with messages causing a denial of service

A

Mail-Bombing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it difficult to stop spam

A

because source of messages are usually spoofed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

encryption tool used to protect sessionless datagram protocols; was designed to integrate with IPSec. replaced by IKE

A

Simple Key Management for Intenet Protocol (SKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

provides authentication, integrity, and confdentiality using an encapsulation protocol.

A

Software IP Encryption (SWIPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

authentication service and is simply a means to prevent unauthorized execution of code on remote systems.

A

Secure Remote Procedure Call (S-RPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

encryption protocol developed by Netscape to protect the communications between a web server and a web browser; used to secure web, email, FTP, or even Telnet traffc. deployed using a 40-bit key or a 128-bit key

A

Secure Sockets Layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

security protocol for the transmission of transactions over the Internet; based on RSA encryption and DES; not been widely accepted by the Internet in general; instead, SSL/TLS encrypted sessions are the preferred mechanism for secure e-commerce.

A

Secure Electronic Transaction (SET)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What tool is used to crack LEAP protocol

A

asLEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

used to manipulate line voltages to steal long-distance services. They are often just custom-built circuit boards with a battery and wire clips

A

Black Boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

used to simulate tones of coins being deposited into a pay phone. They are usually just small tape recorders

A

Red Boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

used to simulate 2600 Hz tones to interact directly with telephone network trunk systems (that is, backbones). This could be a whistle, a tape recorder, or a digital tone generator

A

Blue Boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

used to control the phone system. can use a dual-tone multifrequency (DTMF) generator (that is, a keypad). It can be a custom-built device or one of
the pieces of equipment that most telephone repair personnel use.

A

White Boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SMTP server that does not authenticate senders before accepting and relaying mail.

A

open relay agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what standard is used standard for email addressing and message handling.

A

X.400

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

email security standard that offers authentication and confidentiality to email through public key encryption and digital signatures.

A

Secure Multipurpose Internet Mail Extensions (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

can provide authentication, confidentiality, integrity, and nonrepudiation for email messages; employs MD2, MD5 algorithms; RSA public key; and DES to provide authentication and encryption services.

A

MIME Object Security Services (MOSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

email encryption mechanism that provides authentication, integrity, confdentiality, and nonrepudiation. uses RSA, DES, and X.509.

A

Privacy Enhanced Mail (PEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

assert that valid mail is sent by an organization through verifcation of domain name identity

A

DomainKeys Identified Mail (DKIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

another name for dial-up connectivity

A

Remote Node Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what security border devices support NAT

A

firewalls, routers, proxies & gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Most WAN technologies require a “WAN switch”

A

channel service unit/data service unit CSU/DSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

some WAN technologies require additional specialized protocols to support specialized systems or devices. what are they

A

SDLC, HDLC, HSSI

26
Q

offered no authentication, supported only half-duplex communications, had no error detection capabilities, and required manual link establishment and teardown

A

Serial Line Internet Protocol (SLIP)

27
Q

encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links.

A

Point to Point protocol (PPP)

28
Q

PPP was originally designed to support CHAP and PAP for authentication. However, recent versions of PPP
also support 3 newer protocols…

A

MS-CHAP, EAP & SPAP

29
Q

What security issues are related to VoIP

A

caller ID spoofing, vishing, SPIT, call manager software/firmware attacks, phone hardware attacks, DoS, MitM,

30
Q

Are plain old telephone service (POTS) and public switched telephone network (PSTN) the same

31
Q

is NAT directly compatible with IPSec

A

No because it modifies packet headers

32
Q

What version of NAT proxies are designed to support IPSec over NAT.

A

NAT-Traversal (RFC 3947) was designed to support IPSec VPNs through the use of UDP encapsulation of IKE

33
Q
active entities (such as users) that access
passive objects (such as files)
34
Q

Does accountability include authorization

35
Q

Does accountability require proper identification and authentication

36
Q

to stop unwanted or unauthorized activity from occurring

A

Preventative

37
Q

to discover unwanted or unauthorized activity

38
Q

restore systems to normal after an unwanted or unauthorized activity has occurred

A

Corrective

39
Q

attempt to discourage violation of security policies, by encouraging people to decide not to take an unwanted action

40
Q

attempt to repair or restore resources, functions, and capabilities after a security policy violation

41
Q

attempt to direct, confine, or control the action of

subjects to force or encourage compliance with security policy

42
Q

provide options or alternatives to existing controls to aid in enforcement and support of a security policy

A

Compensation

43
Q

generates and displays one‐time passwords, which work with an authentication server

A

synchronous token

44
Q

uses a challenge‐response process to generate the one‐time password

A

asynchronous token

45
Q

XML‐based framework used to exchange user information for single sign‐on (SSO) between organizations within a federated identity management system

A

Security Assertion Markup Language (SAML)

46
Q

supports SSO in a single organization, not a federation.

47
Q

combination of effective identification, authentication, and auditing provides for

A

accountability

48
Q

most common SSO method used within organizations, and it uses symmetric cryptography and tickets to prove identification and provide authentication.

49
Q

Other SSO methods include

A

scripted access, SESAME and KryptoKnight. OAuth and OpenID are two newer SSO technologies

50
Q

uses UDP and encrypts passwords only to provide AAA services

51
Q

uses TCP and encrypts entire session to provide AAA services

52
Q

becoming more popular with smart phones, but is not compatible with RADIUS

53
Q

principle ensures that access to an object is denied unless access has been explicitly granted to a subjec

A

Implicit Deny not explicit

54
Q

table that includes subjects, objects, and assigned privileges

A

Access Control Matrix

55
Q

another way to identify privileges assigned to subjects. focused on subjects (such as users, groups, or roles)

A

Capability Table

56
Q

list all the users and/or groups that are authorized

access to the file and the specific access granted to each; focused on objects

A

Access Control List

57
Q

restricted interfaces to restrict what users can do or see based on their privileges

A

Constrained Interface

58
Q

restrict access to data based on the content within an object

A

Content-Dependent Control

59
Q

require specific activity before granting users access such as going thru the purchasing process on a website

A

Context-Dependent Control

60
Q

access control model is prohibitive and it uses an implicit‐deny philosophy (not an explicit‐deny philosophy). It is not permissive and it uses labels rather than rules.

A

Mandatory Access control model

61
Q

should threat modeling or asset value be done first?

A

Asset value, so that the focus on threats are set to high value items

62
Q

what is an effective tool to prevent the success of social-engineering

A

user education