Chapter 10 - Securing TCP/IP Flashcards

1
Q

_______ defines what a person accessing data can do with that data.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______ is the act of verifying you are who you say you are.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ is the process of guaranteeing that data is as originally sent.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A(n) _______ encrypts data in fixed-length chunks at a time.

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ is a secure replacement for Telnet.

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n) _______ uses one key to encrypt data and a different key to decrypt the same data.

A

asymmetric-key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSL has been replaced by the more robust _______.

A

transport layer security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SCP has been replaced by _______, a secure protocol for copying files to a server.

A

Secure FTP (SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______ is the default authentication protocol for Windows domains and is extremely time sensitive

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______ uses a 128-bit block, up to a 256-bit key, and is a virtually uncrackable encryption algorithm.

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Justin wants his team to be able to send him encrypted e-mails. What should he do?

A. Send each team member his private key.

B. Send each team member his public key.

C. Ask each team member for his or her private key.

D. Ask each team member for his or her public key.

A

Justin should send each team member a copy of his public key. He can then decrypt the messages with his private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a popular cryptographic hashing function?

A. SHA-1

B. SHA-2

C. RADIUS

D. TACACS+

A

SHA-1 & SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A public and private key pair is an example of what?

A. Symmetric-key algorithm

B. Asymmetric-key algorithm

C. Certificate

D. RADIUS

A

Asymmetric-key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which authentication protocol is time sensitive and is the default authentication protocol on Windows domains?

A. PPP

B. MS-CHAP

C. IPsec

D. Kerberos

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What helps to protect credit card numbers during online purchases? (Select two.)

A. Certificates

B. TLS

C. SCP

D. NTP

A

Certificates and TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Emily wants to remotely and securely enter commands to be run at a remote server. What application should she use?

A. Telnet

B. SSH

C. SFTP

D. RSA

A

SSH

17
Q

A hash function is by definition

A. A complex function

B. A PKI function

C. A one-way function

D. A systematic function

A

A one-way function

18
Q

In order to have a PKI you must have a(n)

A. Web server

B. Web of trust

C. Root authority

D. Unsigned certificate

A

Root authority

19
Q

Which term describes the process of guaranteeing that the sender of the data cannot later deny having sent it?

A. Authentication

B. Authorization

C. Encryption

D. Nonrepudiation

A

Nonrepudiation

20
Q

If you saw some traffic running on TCP port 49, what AAA standard would you know was running?

A. PPP

B. RADIUS

C. MS-CHAP

D. TACACS+

A

TACACS+

21
Q

What is the difference between RADIUS and TACACS+?

A. RADIUS is the authentication control for Windows networks, whereas TACACS+ is the authentication control for UNIX/Linux networks.

B. RADIUS is an implementation of an authentication control, whereas TACACS+ is an implementation of authorization control.

C. RADIUS is a generic name for authentication control, and there are implementations for Windows, UNIX, and Linux servers. TACACS+ is authentication control for Cisco routers and switches.

D. RADIUS supports encryption; TACACS+ does not and is, therefore, less desirable in a network.

A

RADIUS is a generic name for authentication control, and there are implementations for Windows, UNIX, and Linux servers. TACACS+ is authentication control for Cisco routers and switches.

22
Q

AES is a(n) _________________ cipher.

A. block

B. forwarding

C. stream

D. asymmetric

A

block

23
Q

If you saw some traffic running on UDP ports 1812 and 1813, what AAA standard would you know was running?

A. PPP

B. RADIUS

C. MS-CHAP

D. TACACS+

A

RADIUS

24
Q

Digital signatures and certificates help which aspect of computer security?

A. Accounting

B. Authentication

C. Authorization

D. Nonrepudiation

A

Nonrepudiation

25
Q

Which authorization model grants privileges based on the group membership of network users?

A. MAC

B. DAC

C. RBAC

D. GAC

A

RBAC