Chapter 13 - Supplement - Sheet1 Flashcards

1
Q

ACL

A

Access Control List. Reside on routers to determine which packets are allowed to route through based on requesting device’s source or destination IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VPN

A

Virtual Private Network. Makes a local host part of a remote network by using an ecrypted connection over a WLAN link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 catagories of VPNs

A

Remote-access VPNS, site-to-site VPNs, Extranet VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Remote Access VPNs

A

Allow remote users to scecurly access corporate network wherever and wheenever they need to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Site to Site VPNs

A

AKA intranet VPNs. Allow a company to connect its remote sites to the corporate backbone securely over a public medium like the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Extranet VPNs

A

Allow an org’s suppliers, partners, and customers to be connected to hte corporate network in a limited way for business-to-business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSL

A

Secure Sockets Layer. Protocol developed by netscape to encrypt data transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSL VPN

A

A method used to establish a secure VPN connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PPTP

A

Method for establishing VPNs. Point-topoint tunneling protocol. Developed by Microsoft, Lucent Technologies, 3COM. Not found much anymore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPSec

A

IP Security. Standard protocol for VPNs today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TWo protocols within IPSec

A

AH, ESP. Authentication header and Enxapsulating Security Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two modes of IPSec

A

Transport Mode, Tunneling Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISAKMP

A

Internet Security Association and Key Management Protocol. Framework for safely transferring key and authentication data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetrical Key Encryption

A

Sender and receiver have the same key and use it to encrypt and decrypt all meessages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DES

A

Data Encryption Standard. Uses symmetrical encryption keys. No longer secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3DES

A

Triple Data Encryption Standard. Improvement on DES. Max encryption of just 168 bits of security (or 112 bits security, relatively speaking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AES

A

Advanced Encryption Standard. Official encryption standard i nthe US since 2002. Key lengths at 128, 192, or 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Public Key Encryption

A

Uses the Diffie-Hellman algorithm, which uses a public key to encrypt data and a private key to decrypt it. Sender gets receipient’s public key and encrypts data using it. Receiver decrypts using its private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Two types of encryption

A

Public Key Encryption, Symmetrical Key Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Two examples of Public Key Encryption

A

RSA (Rivest, Shamir, and Aldeman) – The company formed by the MIT professors who created it. And PGP (Pretty Good Privacy)

21
Q

Six examples of methods to create remote-access connections

A

RAS, RDP, PPP, PPoE, ICA, SSH

22
Q

RAS

A

Remote Access Services. Refers to the combination of hardware and software required to make a remote-access connection. Used by Microsoft

23
Q

RDP

A

Remote Desktop Protocol. Used by Windows users, though other OSes can use it so long as they have an RDP client.

24
Q

PPP

A

Point-to-point Protocol. Layer 2 protocol that provides authentication, encryption, and compression services to clients logging in remotely. ISPs use this to authenticate clients accessing via modem

25
Q

PPPoE

A

Point-to-point protocol over ethernet. Extension of PPP. Encapsulates PPP frames within Ethernet frames.

26
Q

ICA

A

Independent Computing Architecture. Protocol used bb Citrix Systems to provided communication between servers and clients. Primarily used for Citrix’s WinFrame, which allows users to run Windows Applications on a WinFrame server from any OS.

27
Q

SSH

A

SecureShell. Secure alternative to Telnet.

28
Q

3 Ways a user can be identified via Single Sign On

A

Something they know (password), something they are (retinas, fingerprint, facial recognition), something they possess (Smart card)

29
Q

Common user authentication methods

A

PKI, Kerberos, AAA, NAC, CHAP, MS-CHAP, EAP

30
Q

PKI

A

Public Key Infrstructure. Method of user authentication. What we used on the web with a certificate authority (CA) and public / private keys to confirm someone’s identity

31
Q

Kerberos

A

Method of user authentication. Open source security system. Issues users tickets as they log in, which are used to access resources. Tickets expire but are renewed by the server. Dependent on all PCs in the system to have sync’d clocks.

32
Q

AAA

A

Authentication Authorization and Accounting. Conceptual models for managing network security through one cenral location. Also AAAA, which adds auditing

33
Q

Common implementations of AAA

A

RADIUS, TACACS+

34
Q

RADIUS and TACACS+

A

Implementations of AAA. Remote Authentication Dial In user Service. Terminal Access Controllers Access-Control System Plus. Authe nticatio nand accounting service used for verifying users over various types of network connections. ISPs use RADIUS server to store usernames and passwords of their clients. Handles authentication on behalf of wireless APs, RAS servers, or LAN switches.

35
Q

Differences between RADIUS and TACACS+

A

RADIUS combines user authentication and authorization into one profile. TACACS+ separates the two. TACACS+ utilizes TCP but RADIUS uses UDP (connectionless). TACACS is considered more stable and more secure.

36
Q

NAC

A

Network Access Control. Authentication method. Secures network hosts before they’re allowed to access the network.

37
Q

CHAP

A

Authentication Method. Challenge Handshake Authentication Protocol. Secure authentication protocol – Username and password never cross the wire. Both client/server are configurecd with a shared securet. Server challenges client with a random data to encrypt via one-way hash to prove it’s credentials.

38
Q

MS-CHAP

A

Microsoft Challenge handshake Authentication Protocol. Just like CHAP, but Microsoft encryptes the shared secret locally, while CHAP stores it locally in cleartext.

39
Q

EAP

A

Extensible Authentication Protocol. Authentication method. Extension of PPP. Provices additional authentication methods for remote-access clients, like smart cards, certificates, biometric schemes, voice recognition, etc.

40
Q

What two types of addresses can access control lists filter?

A

IP Addresses, MAC addresses

41
Q

Which encryption protocol works with both IPv4 and IPv6?

A

IPSec

42
Q

Which encryption protocol or standard allows you to create a private network on an
intranet?

A

SSL VPN

43
Q

Which user-authentication method uses a public key and private key pair?

A

PKI

44
Q

In an authentication system that uses private and public keys, who should have access
to the private key?

A

Only the owner of the key

45
Q

Which authentication method relies on tickets to grant access to resources?

A

Kerberos

46
Q

In computer security, what does AAA stand for?

A

Authentication, Authorization, and Accounting

47
Q

Which network access security method is commonly used in wireless networks?

A

802.1x

48
Q

Which user-authentication method is available only in an all-Windows environment?

A

MS-CHAP

49
Q

Which user-authentication method utilizes the TCP protocol?

A

TACACS+