Chapter 10 Securing TCP/IP Flashcards
How does Asymmetric encryption work
uses a public and private key to encrypt and decrypt
What do public keys do
encrypt
What do private keys do
decrypt
What are Hashes used for
Verifying data, not for encryption
What are two common hashes
MD5 and SHA-1
What is identification
claiming an identity
What is authentication
proving your identity
What is authorization
permitting specific actions once a user has been authenticated
What are authentication factors
something you know , have, or are
What are authentication attributes
something you do, know, or somewhere you are
What is Mandatory access control
Uses labels to identify level of security
What s Discretionary access control
gives the creators control over permissions
What is Role-based access control
uses groups
What protocol and port does TACACS+ use
TCP and 49
For Local area networks what should you use for single sign-on
Active directory