Chapter 5 - Network Security Flashcards
another name for “key”
5-177
encryption decoder
2 things found in WPA but not in WEP
5-178
TKIP - scrambles key with hashing for data encryption
EAP - used with certificates for authentication
2 ways WPA2 improves on WPA
5-178
AES for encryption
CCMP - 802.11i, this is the encryption that replaced TKIP
what standard does WPA enterprise use?
5-178
IEEE 802.1X
6 attributes used by ACL for filtering
5-180
source and destination IP addresses
source and destination MAC addresses
protocol
port number
2 locations where IP filtering should be employed
5-181
router
firewall
tell me the ranges for port
well known?
registered?
dynamic/private?
5-181
0-1023
1024-49151
49152-65535
3 protocols used in VPN
5-182
SSL
L2TP
PPTP
3 security services of IPSec
5-183
data verification
protection from data tampering
privacy of transactions
what protocol provides for secure creation and management of keys?
5-184
ISAKMP
tell me about TLS and TLS 1.2
5-184
TLS - kills eavesdropping, tampering, message forgery
TLS 1.2 - longer key and more sophisticated algorithms than what’s in TLS
what does RAS and RRAS both do?
what protocols do they use?
5-185
remote access connectivity to a LAN environment
PPTP, L2TP
main function of PPPoE?
5-186
encapsulate PPP frames inside ethernet frames
the 3 authentication options of PPP
5-186
PAP
CHAP
EAP
where does SSH operate at? (layer?)
5-187
7 and 5
application and session