chapter 13 Flashcards
what is access control list (ACL)?
432
An access control list (ACL) is a table that tells a computer, routers and more operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list.
the Allowing or blocking network packets into or out of a device or the network based on their application (port number).
433
port filtering
encapsulating one protocol within another to ensure a transmission is secure is called what?
it is a special connection made over a network between two computers or network devices.
434
tunneling
what are the tunneling protocol that we need to know about?
- virtual private network (VPN)
- Secure Socket Layer, SSL
- Layer 2 Tunneling Protocol (L2TP)
- The Point-to-Point Tunneling Protocol (PPTP)
- Generic Routing Encapsulation (GRE)
- IP sec
- ISAKMP
virtual private network (VPN)
a method employing encryption to provide secure access to a remote computer over the Internet.
4 categories of VPN, what are they
436
host to host VPNs ( remote access VPNs )
host to host VPNs
Sit to sit VPNs
Extranet VPNs ( B2B)
Secure Socket Layer, SSL
436
SSL is a protocol based on RSA, it is used to enable secure the session layer connection over the internet between a web browser and a web server
the SSL was merged with other Transport layer security protocol to form a new protocol named what?
436
Transport layer Security TLS
what is the latest version of TLS?
436
TLS 2.0
Layer 2 Tunneling Protocol (L2TP):
437
Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.
The Point-to-Point Tunneling Protocol (PPTP)
437
The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.
What is Generic Routing Encapsulation (GRE)?
438
Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network.
IP sec
439
IP Security, IP sec is a set of protocols developed by the Internet Engineering Task Force to support the secure exchange of packets at the IP layer.
in which layer of the OSI model does IPSec work?
439
it work at the net work layer( layer 3), it secures all applications of that layer and the layers above it.
IPSec can work with IPv4 and IPV6. T/F
439
True