Chapter 6 & 7: Secure Network Configuration and Authentication Flashcards

1
Q

Which protocols use PKI (4)

A

SSH
TLS
S/MIME
HTTP-Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which protocol is used by many directory service systems from multiple vendors and manages distributed information services across a network. In this context, a “directory” is a database that stores information about network users, systems, services, and so on.

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Active Directory on Windows based on (2)

A

LDAP and Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a session-layer API for network applications that is use for file and printer sharing as well as computer identification on local network segments

A

Netbios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What protocol is used to remotely manage and monitor devices like routers and switches?

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an open set of standards based on the Remote Frame Buffer Protocol. Uses TCP port 4900+N where N is the display number.

A

VNC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a simplified version of FTP designed for very lightweight applications, such as devices booting from the network. Uses UDP port 69.

A

Trivial File Transfer Protocol (TFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an improved version of WPA-Personal used by WPA3 which is still based on a shared password distributed to each authorized user, but the password is not used in key generation or exposed to the network in hashed form.

A

Simultaneous Authentication of Equals (SAE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which VPN technology encapsulates almost any L3 protocol in a virtual point-to-point link and is used for tunneling.

A

Generic Routing Encapsulation (GRE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which VPN technology encapsulates PPP packets over GRE to provide VPN tunneling features, but relies on vendor implementation to provide encryption and authentication. Uses TCP port 1723 and GRE port 47

A

Point-to-point Tunneling Protocol (PPTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which VPN technology is an IETF standard based on elements of PPTP and Cisco’s similar protocol. Uses RADIUS or TACACS+ authentication and IPSec encryption. Requires UDP port 500 and 1701.

A

L2TP/IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which VPN technology It

provides similar functionality to L2TP/IPsec while offering higher performance and better firewall traversal.

A

IKEv2/IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which encryption technology is often associated with VPNs, but can provide end-to-end level 3 security on any IP network. It is comprised on three protocols to provide authentication and integrity. They’re all based on the idea of security associations (SAs)

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which IPSec component negotiates and authenticates SAs between two hosts and exchanges encryption keys to set up a secure channel.

A

Internet Key Exchange (IKE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which IPSec component provides data integrity and source authentication through cryptographic hashes of the packet contents and source identity.

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which IPSec component encrypts the packet payload along with integrity and authentication information

A

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

During IKE negotiations, host, or pee, identities are established through what? (2)

A

preshared keys or X.509 certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IPSec operates in what two modes?

A

Tunnel mode and Transport mode

19
Q

What is the purpose of a site survey

A

To determine existing wifi coverage areas and identify problems

20
Q

What are onboarding and offboarding procedures applied to?

A

devices added or removed from the network

21
Q

What is the term where one party has explicit trust relationship with two other parties, that can form an implied trust relationship between those two

A

Transitive trust

22
Q

What is the system that allows a authentication system to be shared across multiple systems or networks even if they’re not directly associated with each other. This makes SSO easier to implement.

A

Federated Identity Management

23
Q

What is the term for where users can authorize one service to access resources belonging to another service within the same federation

A

Access delegation

24
Q

Which PPP authentication protocol is the oldest and most widely supported standards. It uses a two-way handshake where the client presents user/pass and the server accept/rejects. This is only a one-way authentication and the exchange happens in plaintext.

A

Password Authentication Protocol (PAP)

25
Q

Which PPP authentication protocol uses a three-way handshake, with security provided by a shared secret. It also allows for periodic challenges during the session to prevent session hijacking.

A

Challenge-handshake Authentication Protocol (CHAP)

26
Q

Which PPP authentication extension can also be used for wireless authentication. This isn’t an authentication method in itself, but rather a message format and set of standard functions that can be used to support a wide variety of specific authentication methods. WPA-Enterprise networks combine 802.1X standard with some version of this for authentication.

A

Extensible Authentication Protocol (EAP)

27
Q

Which EAP extension uses client and server X.509 certs in the auth process, allowing high security.

A

EAP-TLS

28
Q

Which EAP extension only requires server certificates and the client authenticates securely with a password.

A

EAP-TTLS

29
Q

Which EAP extension is used by GSM cellular networks?

A

EAP-SIM

30
Q

Which EAP extension is a proprietary Cisco version based off MS-CHAP

A

Lightweight EAP (LEAP)

31
Q

Which EAP extension is a proprietary Cisco upgrade to LEAP

A

EAP Flexible Authentication via Secure Tunneling (EAP-FAST)

32
Q

This is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.
It provides a transport layer security structure where it is needed within EAP. It uses a public-key encryption certificate for this purpose. Server-side public-key certificates authenticate servers. It also supports authentication with usernames/passwords.

A

PEAP

33
Q

Which technology provides full AAA support to PPP and wireless. It communicates with a network access server (NAS) to provide AAA of the client, and then the NAS manages authorizing that user to network resources. Operates on UDP port 182.

A

Remote Authentication Dial-In User Service (RADIUS)

34
Q

Which technology has features similar to RADIUS with the following exceptions

  • Uses TCP port 49
  • Encrypts entire access request packets
  • Combines authentication and authorization into a single step
  • Supports more non-IP protocols
A

Terminal Access Controller Access Control System (TACACS+)

35
Q

Which EAP extension prevents users from attaching unauthorized devices on the network. It is the underlying technology of WPA-Enterprise and WPA2-Enterprise. The protocol encapsulates EAP messages into EAP over LAN (EAPOL) frames and then relies on some back-end AAA server. Works with RADIUS, Diameter and TACACS+

A

802.1X

36
Q

Which system provides mutual authentication and encryption between clients and servers on a non-secure network. Nodes negotiate with each other on the words of this system operating as a trusted third-party.

A

Kerberos

37
Q

In Kerberos, each realm is controlled by what?

A

a Key Distribution Center (KDC)

38
Q

In Kerberos, what is the component of KDC that authenticates users and gives them a ticket granting ticket (TGT)

A

The Authentication Server (AS)

39
Q

In Kerberos, what is the component of KDC that validates TGT holders and issues them temporary credential tickets and session keys?

A

The ticket-granting service (TGS)

40
Q

What technology is an open XML-based standard that’s used to exchange authentication and authorization information. It is used in many SSO environments.

A

Security Association Markup Language (SAML)

41
Q

What framework provides access delegation, allowing you to give authorization for something to use some, but not all, of you accounts?

A

OAuth

42
Q

What is a layer on top of OAuth framework that handles the SSO authentication between systems?

A

OpenID

43
Q

In Kerberos, messages are timestamped to prevent replay attacks. Therefore, what is required for authentication using Kerberos?

A

synchronized time

44
Q

WPA2 largest change is mandatory support for what encryption mode

A

128-bit AES-CCMP, the AES cipher using the Counter Mode/CBC-MAC mode of operation.