Chapter 12 Flashcards
an encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links
Data Link layer
PPP
Point-to-Point Protocol
this authentication protocol transmits usernames and passwords in cleartext
PAP - Password Authentication Protocol
this authentication protocol uses a challenge-response and periodically reauthenticates the remote system
CHAP - Challenge Handshake Authentication Protocol
an authentication framework that allows customized authentication solutions that can support smartcards, tokens, or biometrics
EAP - Extensible Authentication Protocol
a legacy Cisco proprietary alternative to TKIP for WPA
LEAP - Lightweight Extensible Authentication Protocol
this authentication protocol encapsulates EAP in a TLS tunnel and supports mutual authentication
PEAP - Protected Extensible Authentication Protocol
a means of authenticating mobile devices using SIM cards
EAP-SIM
Subscriber Identity Module
An obsolete Cisco protocol that was designed to replace LEAP
EAP-FAST
Flexible Authentication via Secure Tunneling
this deprecated authentication protocol hases passwords using MD5
EAP-MD5
this authentication protocol uses OTP tokens in MFA for both one-way and mutual authentication
EAP-POTP
this authentication protocol is an IETF standard that is an implementation of the TLS protocol for use in protecting authentication traffic
EAP-TLS
this authentication protocol creates a VPN-like tunnel between endpoints prior to authentication
EAP-TTLS
formal name for IEEE 802.1X standard
Port-Based Network Access Control
what attacks are 802.1X vulnerable to?
MITM and hijacking
the oversight and management of the efficiency and performance of network communications
QoS - Quality of service
5 telephony protocols
POTS - plain old telephone service
PSTN - public switched telephone network
PBX - private branch exchange
mobile/cell services
VOIP - voice over IP
PBX and PSTN vulnerabilities
interception, eavesdropping, tapping
7 VOIP vulnerabilities
MiTM
hijacking
pharming
DoS
vishing
phreaking
fraud and abuse
telephone switching or exchange system deployed in private orgs to enable multistation use of a small number of PSTN lines
PBS - Private Branch Exchange
this security feature adds authentication requirements to all external connections to a PBX
Direct inward system access (DISA)
sus -.-
this type of remote access gives users the ability to remotely connect to and manipulate or interact with a single service
service specific remote access
this type of remote access grants a remote user the ability to fully control another system that is physically distant from them
remote control
this type of remote access is just another name for when a remote client establishes a direct connection to a LAN such as with wireless or VPN
remote note operation