Chapter 5 - Network Security Flashcards
another name for “key”
5-177
encryption decoder
2 things found in WPA but not in WEP
5-178
TKIP - scrambles key with hashing for data encryption
EAP - used with certificates for authentication
2 ways WPA2 improves on WPA
5-178
AES for encryption
CCMP - 802.11i, this is the encryption that replaced TKIP
what standard does WPA enterprise use?
5-178
IEEE 802.1X
6 attributes used by ACL for filtering
5-180
source and destination IP addresses
source and destination MAC addresses
protocol
port number
2 locations where IP filtering should be employed
5-181
router
firewall
tell me the ranges for port
well known?
registered?
dynamic/private?
5-181
0-1023
1024-49151
49152-65535
3 protocols used in VPN
5-182
SSL
L2TP
PPTP
3 security services of IPSec
5-183
data verification
protection from data tampering
privacy of transactions
what protocol provides for secure creation and management of keys?
5-184
ISAKMP
tell me about TLS and TLS 1.2
5-184
TLS - kills eavesdropping, tampering, message forgery
TLS 1.2 - longer key and more sophisticated algorithms than what’s in TLS
what does RAS and RRAS both do?
what protocols do they use?
5-185
remote access connectivity to a LAN environment
PPTP, L2TP
main function of PPPoE?
5-186
encapsulate PPP frames inside ethernet frames
the 3 authentication options of PPP
5-186
PAP
CHAP
EAP
where does SSH operate at? (layer?)
5-187
7 and 5
application and session
what is PKI?
how does it work?
5-188,189
public key infrastructure
public key - identifies user, encrypts data
private key - only held by the user, stored by the OS, decrypts the data
what is Kerberos?
5-189
default authentication protocol for Active Directory AND for Novell NDS systems
TGT? KDC? AAA? RADIUS? TACACS+?
5-189,190
ticket granting ticket
key distribution center
authentication, authorization, accounting
remote authentication dial-in user service
terminal access controller access control system +
in 802.1x,
the client = ?
WAP = ?
________________________________________________
CHAP = ?
5-191
supplicant
authenticator
_________________________________________
challenge handshake authentication protocol
give an example of two factor authentication
5-192
smartcard plus PIN
give an example of multifactor authentication
5-193
smartcard plus PIN plus biometrics
how to defend against WPA cracking?
DoS?
DDoS?
5-196
use WPA2 with AES
denial of service
distributed denial of service
what type of attack is phishing?
how is a worm different from a virus?
5 - 198,199
social engineering
doesn’t need to attach itself to an application
the best firewall settings use what?
5-203
implicit deny
what should you place in the DMZ?
5-204
your servers that are used by hosts in both the internal network and the external network