Chapter 7 Remote access Flashcards

1
Q

Wireless network encryption standard.

A

802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

vendor-independent standard for connecting two nodes according to the port

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

login, access privileges, track account usage

A

AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

secure encryption, better than TKIP

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPsec; provides IP packet authentication through public keys

A

AH (authentication header)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kerberos; a process to initially authenticate a client

A

AS (authentication service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

one key to encrypt, another to decrypt

A

asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

rules to authenticate clients

A

authentication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kerberos: user’s time stamp is encrypted with a session key

A

authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

organization that maintains and issues certificates, part of public-key infrastructure

A

CA (certificate authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

random string of text to another computer to initiate authentication

A

challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PPP authentication process

A

CHAP (challenge handshake authentication protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3-tenet security standard for protecting data

A

CIA triad (confidentiality, integrity, availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

input of 2 different data sets resulting in the same hash value

A

collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

services shared by many organizations, but are not public

A

community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a digital document that contains verifiable information about the user and their public key

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

WinServer 2008 service; automatically authenticates remote users to a Domain and to corporate networks

A

DirectAccess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

forging name server records

A

DNS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the authenticator initiates the authentication process

A

EAP (extensible authentication protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

nature of storage and services to be easily scalable on demand

A

elastic (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

security concerns while data is in transit

A

endpoint security vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

two nodes connect without help from intermediate devices directing hops for transmissions

A

end-to-end connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IPsec; a packet’s data authentication through a public key

A

ESP payload (encapsulating security payload)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cisco: transmits PPP data frames through VPN-tunnel packets to look like IP packets in Layer 3

A

GRE (generic routing encapsulation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

data transformed through a particular algorithm - impossible to reverse

A

hashed data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

virtually hosted desktops on a different physical computer.

A

HVD (hosted virtual desktop)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

different data services within a cloud

A

hybrid cloud

28
Q

IPsec; negotiates the exchange and authentication of keys

A

IKE (internet key exchange)

29
Q

works with IPsec to form a secure connection

A

ISAKMP (Internet security association and key management protocol)

30
Q

Kerberos; the server issues keys to clients during initial client authentication

A

KDC (key distribution center)

31
Q

a cross-platform private key encryption service; uses key encryption to verify client identity and securely exchange information

A

Kerberos

32
Q

combination of public and private keys used to encrypt and decipher data using public key encryption

A

key pair

33
Q

a VPN protocol that encapsulates PPP data for use on VPNs

A

Layer 2 Tunneling protocol

34
Q

a 128-bit hash protocol

A

MD5

35
Q

authentication protocol over PPP that encryps usenames and passwords

A

MS-CHAP (Microsoft challenge handshake authentication protocol)

36
Q

requires two or more pieces of info for authentication

A

MFA (multifactor authentication)

37
Q

multiple customers share one storage location

A

multi-tenant

38
Q

both computers verify each other’s credentials

A

mutual authentication

39
Q

open source SSH: protocols for security and encryption

A

open SSH

40
Q

open source VPN

A

open VPN

41
Q

legacy authentication protocol; very fallible against brute force attacks

A

PAP (password authentication protocol)

42
Q

using certificates to assign users to public keys

A

PKI (public key infrastructure)

43
Q

a client’s identity is verified before the port for transmission is opened

A

port authentication

44
Q

redirecting traffic to a different port

A

port forwarding

45
Q

an upgrade to SLIP; a client connects to a server via a serial connection (dial-up/DSL); considered weak for authentication

A

PPP (point-to-point protocol)

46
Q

services on a private server within an organization

A

private cloud

47
Q

encryption using a key that only the sender and recipient know

A

private key encryption

48
Q

a tunneling protocol that encapsulates PPP data frames so they travel masked as an IP transmission

A

PTP (point-to-point)

49
Q

services provided over public transmission lines

A

public cloud

50
Q

encryption using a public key associated with the user and the client-specific key

A

public key encryption

51
Q

a source for public keys

A

public key server

52
Q

protocol for providing centralized AAA services

A

RADIUS service

53
Q

an access server wherein remote users log in, access data, and are granted provileges

A

RAS (remote access server)

54
Q

Microsoft’s RAS and VPN

A

RRAS (routing and remote access service)

55
Q

IPsec: a secured channel

A

secure channel

56
Q

Kerberos: random two copies of a new key

A

session key

57
Q

hash algorithm resistant to collisions

A

SHA (secure hash algorithm)

58
Q

one-time sign in to access multiple resources

A

SSO (single sign on)

59
Q

tunnels connect multiple sites on a WAN

A

site-to-site VPN

60
Q

predecessor to PPP; allows clients to connect to a server via serial connections

A

SLIP (serial line internet protocol)

61
Q

software is provided by subscription

A

subscription model

62
Q

the same encryption key is used at both ends

A

symmetric encryption

63
Q

Kerberos: you don’t need a new ticket to access other resources

A

TGS (ticket granting service)

64
Q

predecessor to AES, 802.11i

A

TKIP (temporal key integrity protocol)

65
Q

a virtual connection between a client and a remote network

A

VPN

66
Q

a gateway on the edge of a LAN that establishes secure connections (routers / RASs)

A

VPN gateway

67
Q

A Citrix virtualization software package

A

Xen