Chapter 12 Flashcards

1
Q

This is an encryption tool
used to protect sessionless datagram protocols.

Transport Layer Security (TLS)
Simple Key Management for Internet Protocol (SKIP)
Secure Sockets Layer (SSL)
Secure Remote Procedure Call (S-RPC)

A

Simple Key Management for Internet Protocol (SKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is an authentication service and is
simply a means to prevent unauthorized execution of code on remote systems.

Transport Layer Security (TLS)
Simple Key Management for Internet Protocol (SKIP)
Secure Sockets Layer (SSL)
Secure Remote Procedure Call (S-RPC)

A

Secure Remote Procedure Call (S-RPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is an encryption protocol developed by Netscape to
protect the communications between a web server and a web browser.

Transport Layer Security (TLS)
Simple Key Management for Internet Protocol (SKIP)
Secure Sockets Layer (SSL)
Secure Remote Procedure Call (S-RPC)

A

Secure Sockets Layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ functions in the same general manner as SSL, but it uses stronger authentication and encryption protocols.

Transport Layer Security (TLS)
Simple Key Management for Internet Protocol (SKIP)
Secure Sockets Layer (SSL)
Secure Remote Procedure Call (S-RPC)

A

Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ encrypts usernames and passwords.
It performs authentication using a challenge-response dialogue that cannot be replayed.

Lightweight Extensible Authentication Protocol (LEAP).
Protected Extensible Authentication Protocol (PEAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)

A

Challenge Handshake Authentication Protocol (CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

________ a standardized authentication protocol for PPPand transmits usernames and passwords in the clear. It offers no form of encryption;

Lightweight Extensible Authentication Protocol (LEAP).
Protected Extensible Authentication Protocol (PEAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)

A

Password Authentication Protocol (PAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is a framework for authentication
instead of an actual protocol.

Lightweight Extensible Authentication Protocol (LEAP).
Protected Extensible Authentication Protocol (PEAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ encapsulates EAP in a TLS tunnel and is used for securing communications over 802.11 wireless connections.

Lightweight Extensible Authentication Protocol (LEAP).
Protected Extensible Authentication Protocol (PEAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)

A

Protected Extensible Authentication Protocol (PEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ was Cisco’s initial response to insecure WEP.

Lightweight Extensible Authentication Protocol (LEAP).
Protected Extensible Authentication Protocol (PEAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)

A

Lightweight Extensible Authentication Protocol (LEAP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

______ abuse phone systems in much the same way that attackers abuse computer networks.

A

phreakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ is designed to help manage external access and external control of a PBX by assigning access codes to users.

A

Direct Inward System Access (DISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____________ are used to manipulate line voltages to steal long-distance services. They
are often just custom-built circuit boards with a battery and wire clips.

A

Black boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___________ are used to simulate tones of coins being deposited into a pay phone. They
are usually just small tape recorders.

A

Red boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____________ are used to simulate 2600 Hz tones to interact directly with telephone network trunk systems (that is, backbones). This could be a whistle, a tape recorder, or a digital tone generator.

A

Blue boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____________ are used to control the phone system. A white box is a dual-tone
multifrequency (DTMF) generator (that is, a keypad). It can be a custom-built device
or one of the pieces of equipment that most telephone repair personnel use.

A

White boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___________ is an email security standard that offers authentication and confidentiality to email through public key encryption and digital signatures.
Authentication is provided through X.509 digital certificates. Privacy is provided through
the use of Public Key Cryptography Standard (PKCS) encryption.

Secure Multipurpose Internet Mail Extensions (S/MIME)
MIME Object Security Services (MOSS)
DomainKeys Identified Mail (DKIM)
Pretty Good Privacy (PGP)

A

Secure Multipurpose Internet Mail Extensions (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__________ can provide
authentication, confidentiality, integrity, and nonrepudiation for email messages and
employs Message Digest 2 (MD2) and MD5 algorithms; Rivest, Shamir, and Adelman
(RSA) public key; and Data Encryption Standard (DES) to provide authentication and
encryption services.

A

MIME Object Security Services (MOSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

________ is a means to assert that valid mail is

sent by an organization through verification of domain name identity.

A

DomainKeys Identified Mail (DKIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___________ is a public-private key system

that uses a variety of encryption algorithms to encrypt files and email messages.

A

Pretty Good Privacy (PGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The two primary examples of dialup

protocols _________.

A

Point-to-Point Protocol (PPP), Serial Line Internet Protocol (SLIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_______ is a replacement for SLIP and can support any LAN protocol, not just TCP/IP.

A

Point-to-Point Protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

____________ is a full-duplex protocol used for transmitting TCP/IP packets over various non-LAN connections, such as modems, ISDN, VPNs, Frame
Relay, and so on.

A

Point-to-Point Protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

___________ is an older technology developed to
support TCP/IP communications over asynchronous serial connections, such as serial
cables or modem dial-up.

A

Serial Line Internet Protocol (SLIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Centralized remote authentication services are ______ & ________

A

RADIUS and TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

______ used to centralize

the authentication of remote dial-up connections.

A

Remote Authentication Dial-In User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

______ keeps the authentication, authorization, and

accounting processes separate.

A

XTACACS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

XTACACS used UDP port _____

A

49

28
Q

TACACS+ uses Transmission Control Protocol (TCP) port ______

A

49

29
Q

__________ is the network communications process that protects the contents of protocol packets by
encapsulating them in packets of another protocol.

A

Tunneling

30
Q

The initial tunnel negotiation process used by PPTP is ( not or is not) encrypted.

A

not

31
Q

______ creates a point-to-point tunnel between two

systems and encapsulates PPP packets.

A

Point-to-Point Tunneling Protocol (PPTP)

32
Q

Does L2F does offer encryption.

A

No

33
Q

The most commonly used VPN protocol is _________

A

IP Security (IPSec)

34
Q

IPSec has two primary components, or functions:

A
Authentication Header (AH) AH provides authentication, integrity, and
nonrepudiation.

Encapsulating Security Payload (ESP) ESP provides encryption to protect the confidentiality of transmitted data, but it can also perform limited authentication

35
Q

Encapsulating Security Payload (ESP) and can be used in what modes ?

A

transport mode and tunnel mode

36
Q

______ mode, the IP packet data is encrypted but the header of the packet is not.

A

Transport mode

37
Q

______ mode, the entire IP packet is encrypted and a new header is added to the packet to govern transmission through the tunnel.

A

Tunnel mode

38
Q

___________ occurs when the message or
communication is broken up into small segments (usually fixed-length packets,
depending on the protocols and technologies employed) and sent across the intermediary
networks to the destination.

A

Packet switching

39
Q

Within packet-switching systems are two types of virtual circuits:

A

Permanent virtual circuits (PVCs)

Switched virtual circuits (SVCs)

40
Q

A _______ is like a dedicated leased line; the logical circuit always exists and is waiting for the
customer to send data. A PVC is a predefined virtual circuit that is always available.

A

Permanent virtual circuits (PVCs)

41
Q

A _____ is more like a dial-up connection because a virtual circuit has to be created using the best paths currently available before it can be used and then
disassembled after the transmission is complete.

A

Switched virtual circuits (SVCs)

42
Q

________ offers consumers a connection with multiple 64 Kbps B channels (2 to 23 of them) and a single 64 Kbps D channel. Thus can
be deployed with as little as 192 Kbps and up to 1.544 Mbps.

A

Primary Rate Interface (PRI)

43
Q

_______ uses permanent virtual circuits to establish specific point-to-point connections between two
systems or networks.

A

X.25

44
Q

____ is a layer 2 connection mechanism
that uses packet-switching technology to establish virtual circuits between communication
endpoints.

A

Frame Relay

45
Q

Frame Relay’s cost is primarily based on _____ .

A

the amount of data transferred

46
Q

What is committed information rate (CIR)?

A

The CIR is the guaranteed minimum bandwidth a service provider grants to its customers.

47
Q

Frame Relay operates the ___ layer 2 of the OSI model as a connection-oriented packet-switching transmission
technology.

A

the Data Link layer

48
Q

______ is a cell-switching WAN communication technology that fragments communications into fixed-length 53-byte cells.

A

Asynchronous transfer mode (ATM)

49
Q

A _________ is the line of intersection between any two areas, subnets, or environments
that have different security requirements or needs.

A

security boundary

50
Q

■Disable echo replies on external systems.
■ Disable broadcast features on border systems.
■ Block spoofed packets from entering or leaving your network.
■ Keep all systems patched with the most current security updates from vendors.

All prevent what ?

A

DDOS

51
Q

_______ an entity puts forth a false

identity but without any proof.

A

Spoofing

52
Q

_____________ is the act of pretending to be someone or something you are not to gain unauthorized access to a system. This usually implies that authentication credentials have been stolen
credentials have been stolen.

A

Impersonation, or masquerading

53
Q

______ is simply listening to communication traffic for the purpose of duplicating it.

A

eavesdropping

54
Q

__________ attempt to reestablish a communication

session by replaying captured traffic against a system.

A

Replay attacks

55
Q

___________ occurs when an attacker sends false replies to a requesting system, beating
the real reply from the valid DNS server.

A

DNS spoofing

56
Q

__________ occurs when an attacker alters the domain-name-to-IP-address mappings in a DNS system
to redirect traffic to a rogue system or to simply perform a denial-of-service against a system.

A

DNS poisoning

57
Q

Understand the difference between packet switching and circuit switching.

A

In circuit switching, a dedicated physical pathway is created between the two communicating parties.
Packet switching occurs when the message or communication is broken up into small segments
and sent across the intermediary networks to the destination. Within packet-switching
systems are two types of communication paths, or virtual circuits: permanent virtual
circuits (PVCs) and switched virtual circuits (SVCs)

58
Q

Understand the difference between permanent virtual

circuits (PVCs) and switched virtual circuits (SVCs)

A

A PVC is a predefined virtual circuit that is always available. The virtual circuit may be closed down when not in use, but it can be instantly reopened
whenever needed. An SVC is more like a dial-up connection because a virtual circuit has to
be created using the best paths currently available before it can be used and then disassembled
after the transmission is complete. In

59
Q

Understand the differences between PPP and SLIP.

A

The Point-to-Point Protocol (PPP) is
an encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links.

SLIP offered no authentication, supported only half-duplex communications, had no errordetection capabilities, and required manual link establishment and teardown.

60
Q

Protocols that provide security services for application-specific communication channels are called ___ _____ ______ .

A

secure communication protocols

61
Q

Five Secure Communications Protocols are

A
Simple Key Management for Internet Protocol (SKIP)
Software IP Encryption (swIPe)
Secure Remote Procedure Call (S-RPC)
Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
Secure Electronic Transaction (SET)
62
Q

an email encryption mechanism that provides authentication, integrity, confidentiality, and nonrepudiation that uses RSA, DES, and X.509.

A

Privacy Enhanced Mail (PEM)

63
Q

Which version of TACAS keeps the authentication, authorization, and accounting processes separate.

TACACS
TACACS+
XTACACS

A

XTACACS

64
Q

Which version of TACAS adds two-factor
authentication.

TACACS
TACACS+
XTACACS

A

TACACS+

65
Q

a specific internal client’s IP address is assigned
a permanent mapping to a specific external public IP address.

Static NAT
Dynamic NAT

A

Static NAT

66
Q

Used to grant multiple internal clients access to a
few leased public IP addresses.

Static NAT
Dynamic NAT

A

Dynamic NAT

67
Q

NAT is not directly compatible with IPSec because it modifies packet headers, true or False.

A

True