Chapter 13 - Authentication and Access Control Flashcards
following tunneling protocols:
Virtual Private Network (VPN) Secure Sockets Layer (SSL) Secure Sockets Layer Virtual Private Network (SSL VPN) Datagram Transport Layer Security (DTLS) Layer 2 Tunneling Protocol (L2TP) Point-to-Point Tunneling Protocol (PPTP) Generic Routing Encapsulation (GRE) Internet Protocol Security (IPSec) ISAKMP
Client-to-Site (Remote-Access) VPNs Host-to-Host VPN
Site-to-Site VPNs
Datagram Transport Layer Security (DTLS) provides security for datagram-based applications by allowing them to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. It is based on the stream-oriented Transport Layer Security (TLS) protocol and is intended to provide similar security guarantees.
L2TP is actually a combination of Microsoft’s Point-to-Point Tunneling Protocol (PPTP) and Cisco’s Layer 2 Forwarding (L2F) technologies. A nice L2TP feature is that, because it works way down there at the Data Link layer (Layer 2) of the OSI model, it can support tons of protocols beyond just TCP/IP—a couple of biggies being Internetwork Packet Exchange (IPX) and AppleTalk.
PPTP acts by combining an unsecured Point-to-Point Protocol (PPP) session with a secured session using the Generic Routing Encapsulation (GRE) protocol .
Because PPTP uses two different protocols, it actually opens up two different network sessions: so be warned, PPTP can give you some grief when passing through a router. This is a big reason you won’t find it around much nowadays. Another
In fact, as you’d probably expect from a first-generation security protocol, it’s now really vulnerable to spoofing attacks, which is why it’s pretty much been replaced by L2TP and IPSec. (PPTP)
PPTP is a VPN protocol that runs over port 1723 and allows encryption to be done at the Application (data) level. It is important to remember for the CompTIA Network+ exam that PPTP is a protocol that allows secure access to a VPN.
Generic Routing Encapsulation (GRE) is a tunneling protocol that can encapsulate many protocols inside IP tunnels. Some examples would be routing protocols such as EIGRP and OSPF and the routed protocol IPv6. Figure 13.5 shows GRE.
IP Security (IPSec) was designed by the IETF for providing authentication and encryption over the Internet. It works at the Network layer of the OSI model (Layer 3) and secures all applications that operate in the layers above it.
The two major protocols you’ll find working in IPSec are Authentication Header (AH) and Encapsulating Security Payload (ESP) .
AH serves up authentication services only—no encryption—but ESP provides both authentication and encryption abilities.
The AH protocol within IPSec isn’t compatible with networks running Network Address Translation (NAT).
IPSec works in two modes: transport mode and tunneling mode. Transport mode creates a secure tunnel between two devices end to end.
Until 1998, only software with 40-bit strength or less could be exported, but today, the bar has been raised to 64-bit strength. And by the way, exporting any software with a key length greater than 64 bits is subject to review by the Export Administration Regulations (EAR) required by the U.S. Department of Commerce’s Bureau of Industry and Security.
Point-to-Point Protocol over Ethernet (PPPoE) is an extension of PPP. Its purpose is to encapsulate PPP frames within Ethernet frames.
Out of band management refers to any method of managing the server that does use the network. An example of this technology is Integrated Lights-Out, or iLO, a technology embedded into HP servers that allows for out of band management of the server.
servers). HP iLO functions out-of-the-box without additional software installation regardless of the servers’ state of operation giving you complete access to the server from any location via a web browser or the iLO Mobile App.
Sometimes people don’t use their real email addresses. If you really want to know where a user is located on the Internet, use third-party software to verify IP addresses and Internet domain names.
On Windows servers, it’s (surprise) Administrator, and in Unix it’s root.
An X.509 certificate contains the following fields: Version Serial Number Algorithm ID Issuer Validity Subject Subject Public Key Info
Public Key Algorithm Subject Public Key Issuer Unique Identifier (optional) Subject Unique Identifier (optional)
digital certificate classes: Class 1: For individuals and intended for email. These certificates get saved by web browsers. Class 2: For organizations that must provide proof of identity. Class 3: For servers and software signing in which independent verification and identity and authority checking is done by the issuing CA.
Nonpersistent or dissolvable NAC agents may help to make what possible?
A. BYOD initiative
B. Edge control
C. Unified voice services
D. Host-based IDS
- A. A nonpersistent agent is one that is used to assess the device only during the onetime check-in at login. It can be used to support the assessment of endpoints not owned by the organization and as such can help to make a Bring Your Own Device (BYOD) policy possible.
What is the main difference between a private network and a public network?
A. In a private network, everyone has access; in a public network, only authorized users have access. B. There is no difference; in both a private and public network, only authorized users have access.
C. In a private network, only authorized users have access; in a public network, everyone that is connected has access.
D. In a private network, everyone has access; in a public network, only the first 100 people have access.
- C. On a private network, only authorized users have access to the data, whereas in a public network, everyone connected has access to the data.
You have a remote user who can connect to the Internet but not to the office via their VPN client. After determining the problem, which should be your next step?
A. Have the client reboot their host.
B. Make sure the user has the correct VPN address and password.
C. Have the client reinstall their VPN software. D.Reboot the router at the corporate office.
- B. After determining that the user has Internet access, your next step would be to verify the VPN address and password.
Which IP address should you deny into your internetwork?
A. 126.10.10.0/8
B. 168.0.0.0/8
C. 128.0.0.0/8
D. 127.0.0.0/8
- D. To have good security on your network, deny any addresses from your internal networks, deny any local host addresses (127.0.0.0/8), deny any reserved private addresses, and deny any addresses in the IP multicast address range (224.0.0.0/4).