Chapter 13: Securing the Network Flashcards

1
Q

Link encryption

A

encrypts all the data along a specific communication path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

E2EE

A

End-to-end encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

End-to-end encryption

A

occurs at the session layer (or higher) and does not encrypt routing information, enabling attackers to learn more about a captured packet and where it is headed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transport Layer Security

A

E2EE protocol that provides confidentiality and data integrity for network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSL

A

Secure Sockets Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure Sockets Layer

A

predecessor of TLS and is deprecated and considered insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VPN

A

virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

virtual private network

A

secure, private connection through an untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PPTP

A

Point-to-Point Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Point-to-Point Tunneling Protocol

A

obsolete and insecure means of providing VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

L2TP

A

Layer 2 Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 2 Tunneling Protocol

A

tunnels PPP traffic over various network types (IP, ATM, X.25) but does not encrypt the user traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPSec

A

Internet Protocol Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Internet Protocol Security

A

suite of protocols which provides authentication, integrity, and confidentiality protections to data at the network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TLS can be used to provide … connectivity at layer … in the … model

A

TLS can be used to provide VPN connectivity at layer 5 in the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

web service

A

client/server system in which clients and servers communicate using HTTP over a network such as the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SOA

A

service-oriented architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

service-oriented architecture

A

a system as a set of interconnected but self-contained components which communicate with each other and with their clients through standardized protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

API

A

application programming interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

application programming interfaces

A

establish a language which enables a system component to make a request from another component and then interpret that second component’s response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HTTP

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hypertext Transfer Protocol

A

TCP/IP-based communications protocol used for transferring data between a server and a client in a connectionless and stateless manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HTTPS

A

HTTP Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

HTTP Secure

A

HTTP running over TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SOAP

A

Simple Object Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Simple Object Access Protocol

A

messaging protocol which uses XML over HTTP to enable clients to invoke processes on a remote host in a platform-agnostic way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

WS-Security or WSS

A

Web Services Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Web Services Security

A

a set of protocol extensions which provides message confidentiality, integrity, and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

SOAP security

A

enabled by Web Services Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

REST

A

Representational State Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Representational State Transfer

A

an architectural pattern used to develop web services without using SOAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

DGA

A

domain generation algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

domain generation algorithm

A

produces seemingly random domain names in a way which is predictable by anyone who knows the algorithm

35
Q

DNS tunneling

A

practice of encoding messages in one or a series of DNS queries or responses for exfiltrating or infiltrating data into an environment

36
Q

DNS reflection attacks

A

send a query to a server while spoofing the source address of the intended target

37
Q

DNS amplification attack

A

small queries result in very much larger responses

38
Q

DNSSEC

A

Domain Name System Security Extensions

39
Q

Domain Name System Security Extensions

A

a set of IETF standards which ensure the integrity of DNS records but not their confidentiality or availability

40
Q

DoH

A

DNS over HTTPS

41
Q

DNS over HTTPS

A

protect the privacy and confidentiality of DNS queries by sending them over HTTPS/TCP/IP instead of unsecured UDP/IP

42
Q

E-mail spoofing

A

technique used by malicious users to forge emails to appear from a legitimate source

43
Q

SASL

A

Simple Authentication and Security Layer

44
Q

Simple Authentication and Security Layer

A

protocol-independent framework for performing authentication typically used in POP3 email systems

45
Q

SPF

A

Sender Policy Framework

46
Q

Sender Policy Framework

A

email validation system; prevents email spam by detecting email spoofing by verifying sender’s IP address

47
Q

DKIM

A

DomainKeys Identified Mail

48
Q

DomainKeys Identified Mail standard

A

allows email servers to digitally sign messages so that receiving server can ensure the message is from the domain it claims to be from

49
Q

DMARC

A

Domain-based Message Authentication, Reporting and Conformance

50
Q

DMARC systems

A

use both SPF and DKIM to protect email

51
Q

S/MIME

A

Secure MIME

52
Q

S/MIME standard

A

encrypts and digitally signs email; provides secure data transmissions

53
Q

DNP3

A

Distributed Network Protocol 3

54
Q

Distributed Network Protocol 3

A

multilayer communications protocol for SCADA systems, especially those in the power sector

55
Q

CAN

A

Controller Area Network

56
Q

Controller Area Network bus

A

multilayer protocol for microcontrollers and other embedded devices to communicate with each other on a shared bus

57
Q

Converged protocols

A

started off independent and distinct from one another but converged to become one

58
Q

FCoE

A

Fibre Channel over Ethernet

59
Q

Fibre Channel over Ethernet

A

protocol encapsulation which allows Fibre Channel (FC) frames to ride over Ethernet networks

60
Q

iSCSI

A

Internet Small Computer Systems Interface

61
Q

Internet Small Computer Systems Interface protocol

A

encapsulates SCSI data in TCP segments so computer peripherals can be located at any physical distance from the computer they support

62
Q

Network segmentation

A

the practice of dividing networks into smaller subnetworks

63
Q

VLAN

A

virtual LAN

64
Q

virtual LAN

A

set of devices which behave as though they are all directly connected to the same switch when they aren’t

65
Q

VxLAN

A

virtual eXtensible LAN

66
Q

Virtual eXtensible LAN

A

network virtualization technology which encapsulates layer 2 frames onto UDP (layer 4) datagrams for distribution anywhere in the world

67
Q

SDN

A

software-defined networking

68
Q

software-defined networking

A

networking approach which relies on distributed software to separate the control and forwarding planes of a network

69
Q

SD-WAN

A

Software-defined wide area networking

70
Q

software-defined wide area networking

A

use of software (instead of hardware) to control the connectivity, management, and services between distant sites in a manner similar to SDN but applied to WANs

71
Q

VLAN hopping attack opportunity

A

an attacker is able to insert tagging values into network- and switch-based protocols with the goals of manipulating traffic at the data link layer

72
Q

VLAN hopping

A

attackers gain access to traffic in various VLAN segments; attacker can have a system act as a switch; the system understands the tagging values used in the network and trunking protocols and can insert itself between other VLAN devices and gain access to the traffic going back and forth; attackers can insert tagging values to manipulate the control of traffic at this data link layer

73
Q

Authentication Header protocol

A

provides data integrity, data origin authentication, protection from replay attacks

74
Q

Encapsulating Security Payload protocol

A

provides confidentiality, data origin authentication, data integrity

75
Q

Internet Security Association and Key Management Protocol

A

framework for security association creation and key exchange

76
Q

Internet Key Exchange

A

provides authenticated keying material for use with ISAKMP

77
Q

Secure Multipurpose Internet Mail Extensions

A

standard for encryption to provide secure data transmissions using public key infrastructure (PKI)

78
Q

WS-Security is for SOAP

A

for web services confidentiality with SOAP; not RESTful web service

79
Q

RESTful requires …. and uses … for confidentiality

A

RESTful uses HTTP and HTTP Secure (HTTPS) for confidentiality

80
Q

What is a set of IETF standards for DNS records?

A

Domain Name System Security Extensions (DNSSEC) ensures integrity and authenticity of DNS records but not their confidentiality or availability

81
Q

Best protection against email spoofing?

A

DMARC systems incorporate both SPF and DKIM to protect email

82
Q

IMAP does or does not have email protections against spoofing

A

Internet Message Access Protocol (IMAP) does NOT have any built-in protections against email spoofing

83
Q

Which is a multilayer protocol for use in SCADA systems?

A

DNP3 (Distributed Network Protocol 3 used in SCADA, specifically the power sector

84
Q

Converged protocol FACTS

A

FCoE is a converged protocol, IP convergence addresses specific type of converged protocols, certain protocols are encapsulated within each other