Chapter 10: Securing TCP/IP Flashcards

1
Q

Define: Integrity

A

The process that guarantees that the data received is the same as originally sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define: Nonrepudiation

A

Means that a person cannot deny he or she took a specific action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define: Authentication

A

Means to verify that whoever is trying to access the data is the person you want accessing that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define: Authorization

A

Defines what an authenticated person can do with the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any encryption that uses the same key for both encryption and decryption is called:

A

symmetric-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any encryption that uses different keys for encryption and decryption is called:

A

asymmetric-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symmetric-key algorithms are either ____ ciphers or ____ ciphers.

A

block
stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do block ciphers encrypt data?

A

In single chunks of a certain length at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do stream ciphers encrypt data?

A

They take a single bit at a time and encrypt on-the-fly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is one serious weakness that symmetric-key encryption has?

A

Anyone who intercepts the key can encrypt or decrypt data with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does asymmetric-key encryption solve the weakness of symmetric-key encryption?

A

The public key of the receiver is used to encrypt the symmetric-key before it is sent, and the receiver uses their private key to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public-key cryptography, the primary asymmetric implementation, generates a key pair. What are these keys called?

A

private key
public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three asymmetric algorithms used today?

A

RSA (Rivest, Shamir, Adleman)
DSA (Digital Signature Algorithm)
ECDSA (Elliptic Curve DSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a one-way function that you run on a string of binary digits of any length that results in a value of some fixed length (often called a checksum or message digest)?

A

A cryptographic hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Can you recreate the original data from its hash if you know the hashing algorithm used?

A

No, a hash is irreversible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do operating systems and applications store passwords?

A

They only store the hashes of passwords and not the passwords themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the primary family of cryptographic functions and which two are currently recommended?

A

SHA (Secure Hash Algorithm)
SHA-2 (six variants)
SHA-3 (six variants)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In network security, nonrepudiation is typically enabled by a combination of encryption and hashing called a:

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does a sender of a message create a digital signature?

A

The sender hashes all or part of a message and then encrypts the hash with their private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The system for creating and distributing digital certificates issued by trusted third party certificate authorities (CA) such as DigiCert, GoDaddy, or Sectigo is called:

A

PKI (Public-Key Infrastructure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What three things are included in a PKI certificate?

A
  1. Public Key
  2. Info about the certificate
  3. The digital signature of a trusted third party
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In a PKI encryption method, which key encrypts the data?

A

The public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In order to have a PKI you must have a/an ____.

A

root authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What two jobs does a NAC (Network Access Control) application do?

A
  1. It usually prevents computers lacking anti-malware and patches from accessing the network.
  2. It creates policies that define what individual systems can do on the network.
25
Q

What is an ACL (Access Control List)?

A

A list of permissions that specifies what an authenticated user may perform on a shared resource.

26
Q

Which type of access control assigns a security level label on every resource?

A

MAC (Mandatory Access Control)

27
Q

Which type of access control is based on the idea that a resource has an owner who may at their discretion assign access to that resource?

A

DAC (Discretionary Access Control)

28
Q

Which type of access control defines a user’s access to a resource based on the roles the user plays in the network environment?

A

RBAC (Role-Based Access Control)

29
Q

____ enables two devices to connect, authenticate with a username and password, and negotiate the network protocol the two devices will use.

A

PPP or Point-to-Point Protocol

30
Q

Originally used by PPP for authentication, ____ transmits the username and password over the connection in plaintext to authenticate a user.

A

PAP or Password Authentication Protocol

31
Q

PPP switched from PAP to ____ for a secure authentication routine using hashes.

A

CHAP or Challenge Handshake Authentication Protocol

32
Q

Microsoft invented a more detailed and secure version of CHAP for authentication called:

A

MS-CHAPv2

33
Q

What does AAA stand for in network security?

A

Authentication
Authorization
Accounting

34
Q

____ servers provides AAA for remote users accessing a network using point-to-point connections.

A

RADIUS or Remote Authentication Dial-In User Service

35
Q

RADIUS consists of these three devices:

A
  1. The RADIUS server
  2. NASs (Network Access Servers)
  3. Systems that connect to the network
36
Q

RADIUS
Port #s

A

UDP port 1812 (authentication)
UDP port 1645 (authentication)

UDP port 1813 (accounting)
UDP port 1646 (accounting)

37
Q

The ____ protocol supports AAA in a network with many routers and switches that need administration. It is similar to RADIUS in function.

A

TACACS+ or Terminal Access Controller Access Control System Plus

38
Q

TACACS+
Port #

A

TCP port 49

39
Q

The authentication protocol ____ is used for TCP/IP networks with many clients all connected to a single authenticating server. Microsoft Windows domains rely on it for authentication.

A

Kerberos

40
Q

Kerberos
Port #

A

UDP or TCP port 88

41
Q

The ability to log in only one time and use the same token to access any resource you’re allowed to access on an entire network is called:

A

SSO (Single Sign-On)

42
Q

What is a SSH tunnel?

A

An encrypted link between SSH processes on two separate computers.

43
Q

What does the authentication and encryption protocol suite IPsec (Internet Protocol Security) do and at what OSI layer does it work?

A

It creates secure tunnels between two computers and works at the Network layer.

44
Q

What does IPsec Transport mode do?

A

It encrypts the payload of the IP packet.

45
Q

What does IPsec Tunnel mode do?

A

It encrypts the entire IP packet and encapsulates it inside another IP packet at an endpoint.

46
Q

Who generates CRLs (Certificate Revocation Lists) that a web browser can check certificates against?

A

Root authorities

47
Q

What does SMTPS (Simple Mail Transport Protocol Secure) do?

A

It wraps SMTP communication with TLS (Transport Layer Security).

48
Q

SMTPS (SMTP TLS)
Port #

A

TCP port 587

49
Q

What does the POP3S (Post Office Protocol 3 over SSL) extension do?

A

It adds a TLS (Transport Layer Security) wrap to POP3 e-mail retrieval.

50
Q

POP3S
Port #

A

port 995

51
Q

What does the IMAPS (Internet Message Access Protocol over SSL) extension do?

A

It adds a TLS (Transport Layer Security) wrap for encryption.

52
Q

IMAPS
Port #

A

port 993

53
Q

What protocol offers secure file transfers, resumption of interrupted file transfers, deletion of files on the server, and more?

A

SFTP or SSH File Transfer Protocol

54
Q

SFTP
Port #

A

TCP port 22

55
Q

What protocol queries the state of network devices and reports whatever device-specific information the devices provide?

A

SNMP or Simple Network Management Protocol

SNMPv3 is the standard version used today.

56
Q

SNMP
Port #s

A

UDP ports 161 and 162

57
Q

What protocol do programs use to query and change a database used by the network (ie. Active Directory)? Domain controllers will use it automatically in the background to keep your databases in good order.

A

LDAP or Lightweight Directory Access Protocol

58
Q

LDAP
Port #s

A

TCP port 389
UDP port 389