Chapter 12 Flashcards
This is an encryption tool
used to protect sessionless datagram protocols.
Transport Layer Security (TLS)
Simple Key Management for Internet Protocol (SKIP)
Secure Sockets Layer (SSL)
Secure Remote Procedure Call (S-RPC)
Simple Key Management for Internet Protocol (SKIP)
This is an authentication service and is
simply a means to prevent unauthorized execution of code on remote systems.
Transport Layer Security (TLS)
Simple Key Management for Internet Protocol (SKIP)
Secure Sockets Layer (SSL)
Secure Remote Procedure Call (S-RPC)
Secure Remote Procedure Call (S-RPC)
is an encryption protocol developed by Netscape to
protect the communications between a web server and a web browser.
Transport Layer Security (TLS)
Simple Key Management for Internet Protocol (SKIP)
Secure Sockets Layer (SSL)
Secure Remote Procedure Call (S-RPC)
Secure Sockets Layer (SSL)
______ functions in the same general manner as SSL, but it uses stronger authentication and encryption protocols.
Transport Layer Security (TLS)
Simple Key Management for Internet Protocol (SKIP)
Secure Sockets Layer (SSL)
Secure Remote Procedure Call (S-RPC)
Transport Layer Security (TLS)
_______ encrypts usernames and passwords.
It performs authentication using a challenge-response dialogue that cannot be replayed.
Lightweight Extensible Authentication Protocol (LEAP).
Protected Extensible Authentication Protocol (PEAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)
Challenge Handshake Authentication Protocol (CHAP)
________ a standardized authentication protocol for PPPand transmits usernames and passwords in the clear. It offers no form of encryption;
Lightweight Extensible Authentication Protocol (LEAP).
Protected Extensible Authentication Protocol (PEAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)
Password Authentication Protocol (PAP)
This is a framework for authentication
instead of an actual protocol.
Lightweight Extensible Authentication Protocol (LEAP).
Protected Extensible Authentication Protocol (PEAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)
Extensible Authentication Protocol (EAP)
_____ encapsulates EAP in a TLS tunnel and is used for securing communications over 802.11 wireless connections.
Lightweight Extensible Authentication Protocol (LEAP).
Protected Extensible Authentication Protocol (PEAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)
Protected Extensible Authentication Protocol (PEAP)
______ was Cisco’s initial response to insecure WEP.
Lightweight Extensible Authentication Protocol (LEAP).
Protected Extensible Authentication Protocol (PEAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)
Lightweight Extensible Authentication Protocol (LEAP).
______ abuse phone systems in much the same way that attackers abuse computer networks.
phreakers
______ is designed to help manage external access and external control of a PBX by assigning access codes to users.
Direct Inward System Access (DISA)
____________ are used to manipulate line voltages to steal long-distance services. They
are often just custom-built circuit boards with a battery and wire clips.
Black boxes
___________ are used to simulate tones of coins being deposited into a pay phone. They
are usually just small tape recorders.
Red boxes
____________ are used to simulate 2600 Hz tones to interact directly with telephone network trunk systems (that is, backbones). This could be a whistle, a tape recorder, or a digital tone generator.
Blue boxes
____________ are used to control the phone system. A white box is a dual-tone
multifrequency (DTMF) generator (that is, a keypad). It can be a custom-built device
or one of the pieces of equipment that most telephone repair personnel use.
White boxes
___________ is an email security standard that offers authentication and confidentiality to email through public key encryption and digital signatures.
Authentication is provided through X.509 digital certificates. Privacy is provided through
the use of Public Key Cryptography Standard (PKCS) encryption.
Secure Multipurpose Internet Mail Extensions (S/MIME)
MIME Object Security Services (MOSS)
DomainKeys Identified Mail (DKIM)
Pretty Good Privacy (PGP)
Secure Multipurpose Internet Mail Extensions (S/MIME)
__________ can provide
authentication, confidentiality, integrity, and nonrepudiation for email messages and
employs Message Digest 2 (MD2) and MD5 algorithms; Rivest, Shamir, and Adelman
(RSA) public key; and Data Encryption Standard (DES) to provide authentication and
encryption services.
MIME Object Security Services (MOSS)
________ is a means to assert that valid mail is
sent by an organization through verification of domain name identity.
DomainKeys Identified Mail (DKIM)
___________ is a public-private key system
that uses a variety of encryption algorithms to encrypt files and email messages.
Pretty Good Privacy (PGP)
The two primary examples of dialup
protocols _________.
Point-to-Point Protocol (PPP), Serial Line Internet Protocol (SLIP)
_______ is a replacement for SLIP and can support any LAN protocol, not just TCP/IP.
Point-to-Point Protocol (PPP)
____________ is a full-duplex protocol used for transmitting TCP/IP packets over various non-LAN connections, such as modems, ISDN, VPNs, Frame
Relay, and so on.
Point-to-Point Protocol (PPP)
___________ is an older technology developed to
support TCP/IP communications over asynchronous serial connections, such as serial
cables or modem dial-up.
Serial Line Internet Protocol (SLIP)
Centralized remote authentication services are ______ & ________
RADIUS and TACACS+
______ used to centralize
the authentication of remote dial-up connections.
Remote Authentication Dial-In User Service (RADIUS)
______ keeps the authentication, authorization, and
accounting processes separate.
XTACACS