Chapter 12 - Network Security Flashcards

1
Q

Advanced Encryption Standard (AES)

A

Released in 2001, AES is typically considered the preferred symmetric encryption algorithm. AES is available in 128-bit key, 192-bit key, and 256-bit key versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric encryption

A

With asymmetric encryption, the sender and receiver of a packet use different keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication Header (AH)

A

An IPsec protocol that provides authentication and integrity services. However, it does not provide encryption services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Buffer overflow

A

This attack occurs when an attacker leverages a vulnerability in an application, causing data to be written to a memory area (that is, a buffer) that’s being used by a different application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Challenge-Response Authentication Mechanism Message Digest 5 (CRAM-MD5)

A

A common variant of HMAC frequently used in e-mail systems. Like CHAP, CRAM-MD5 only performs one-way authentication (the server authenticates the client).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial of service (DoS)

A

A DoS attack floods a system with an excessive amount of traffic or requests, which consumes the system’s processing resources and prevents the system from responding to many legitimate requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Distributed denial of service (DDoS)

A

These attacks can increase the amount of traffic flooded to a target system. Specifically, an attacker compromises multiple systems, and those compromised systems, called zombies, can be instructed by the attacker to simultaneously launch a DDoS attack against a target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encapsulating Security Payload (ESP)

A

An IPsec protocol that provides authentication, integrity, and encryption services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FTP bounce

A

Use FTP PORT command to open a connection on FTP server to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Generic Routing Encapsulation (GRE)

A

A tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocol packet types inside IP tunnels. This creates a virtual point-to-point link to various brands of routers at remote points over an Internet Protocol (IP) internetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GNU privacy guard (GPG)

A

A free variant of pretty good privacy (PGP), which is an asymmetric encryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Key Exchange (IKE)

A

A protocol used to set up an IPsec session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet Security Association and Key Management Protocol (ISAKMP)

A

Negotiates parameters for an IPsec session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP Security (IPsec)

A

A type of VPN that provides confidentiality, integrity, and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Kerberos

A

A client-server authentication protocol that supports mutual authentication between a client and a server. Kerberos uses the concept of a trusted third party (a key distribution center) that hands out tickets to be used instead of a username and password combination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pretty good privacy (PGP)

A

PGP is a widely deployed asymmetric encryption algorithm and is often used to encrypt e-mail traffic.

17
Q

Public key infrastructure (PKI)

A

A PKI system uses digital certificates and a certificate authority to allow secure communication across a public network.

18
Q

Remote Authentication Dial-In User Service (RADIUS)

A

A UDP-based protocol used to communicate with a AAA server. Unlike TACACS+, RADIUS does not encrypt an entire authentication packet, but only the password. However, RADIUS offers more robust accounting features than TACACS+. Also, RADIUS is a standards-based protocol, whereas TACACS+ is a Cisco proprietary protocol.

19
Q

RSA

A

A popular and widely deployed asymmetric encryption algorithm.

20
Q

Single sign-on (SSO)

A

Allows a user to authenticate once to gain access to multiple systems, without requiring the user to independently authenticate with each system.

21
Q

Stateful firewall

A

Inspects traffic leaving the inside network as it goes out to the Internet. Then, when returning traffic from the same session (as identified by source and destination IP addresses and port numbers) attempts to enter the inside network, the stateful firewall permits that traffic. The process of inspecting traffic to identify unique sessions is called stateful inspection.

22
Q

Symmetric encryption

A

With symmetric encryption, both the sender and the receiver of a packet use the same key (a shared key) for encryption and decryption.

23
Q

Unified threat management (UTM)

A

A firewall or gateway that attempts to bundle multiple security functions into a single physical or logical device.

24
Q

Virtual private network (VPN)

A

Some VPNs can support secure communication between two sites over an untrusted network (for example, the Internet).