Chapter 5 - Network Security Flashcards

1
Q

another name for “key”

5-177

A

encryption decoder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2 things found in WPA but not in WEP

5-178

A

TKIP - scrambles key with hashing for data encryption

EAP - used with certificates for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 ways WPA2 improves on WPA

5-178

A

AES for encryption

CCMP - 802.11i, this is the encryption that replaced TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what standard does WPA enterprise use?

5-178

A

IEEE 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

6 attributes used by ACL for filtering

5-180

A

source and destination IP addresses
source and destination MAC addresses
protocol
port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2 locations where IP filtering should be employed

5-181

A

router

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

tell me the ranges for port

well known?
registered?
dynamic/private?

5-181

A

0-1023
1024-49151
49152-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 protocols used in VPN

5-182

A

SSL
L2TP
PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 security services of IPSec

5-183

A

data verification
protection from data tampering
privacy of transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what protocol provides for secure creation and management of keys?

5-184

A

ISAKMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

tell me about TLS and TLS 1.2

5-184

A

TLS - kills eavesdropping, tampering, message forgery

TLS 1.2 - longer key and more sophisticated algorithms than what’s in TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what does RAS and RRAS both do?

what protocols do they use?

5-185

A

remote access connectivity to a LAN environment

PPTP, L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

main function of PPPoE?

5-186

A

encapsulate PPP frames inside ethernet frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the 3 authentication options of PPP

5-186

A

PAP
CHAP
EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

where does SSH operate at? (layer?)

5-187

A

7 and 5

application and session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is PKI?

how does it work?

5-188,189

A

public key infrastructure

public key - identifies user, encrypts data
private key - only held by the user, stored by the OS, decrypts the data

17
Q

what is Kerberos?

5-189

A

default authentication protocol for Active Directory AND for Novell NDS systems

18
Q
TGT?
KDC?
AAA?
RADIUS?
TACACS+?

5-189,190

A

ticket granting ticket
key distribution center
authentication, authorization, accounting
remote authentication dial-in user service
terminal access controller access control system +

19
Q

in 802.1x,
the client = ?
WAP = ?
________________________________________________

CHAP = ?

5-191

A

supplicant
authenticator
_________________________________________

challenge handshake authentication protocol

20
Q

give an example of two factor authentication

5-192

A

smartcard plus PIN

21
Q

give an example of multifactor authentication

5-193

A

smartcard plus PIN plus biometrics

22
Q

how to defend against WPA cracking?

DoS?
DDoS?

5-196

A

use WPA2 with AES

denial of service

distributed denial of service

23
Q

what type of attack is phishing?

how is a worm different from a virus?

5 - 198,199

A

social engineering

doesn’t need to attach itself to an application

24
Q

the best firewall settings use what?

5-203

A

implicit deny

25
Q

what should you place in the DMZ?

5-204

A

your servers that are used by hosts in both the internal network and the external network