Chapter 9 Flashcards
What is the mathematical value that is used to provide an integrity check for the packet in question? (204)
Checksum
If the data is corrupted while in transit, this checksum will? (204)
Alert the receiver of the problem and the packet will be dropped by the receiving computer.
What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer? (204)
IPSec
IPSec has two principle goals, what are they? (204)
- To protect the contents of IP packets
- To provide a defense against network attacks through packet filtering and the enforcement of trusted communication
What type of attack is where an attacker moniters and reads packets? (204)
Packet Sniffing
Packet Sniffing use what type of software to moniter packets? (204)
A Packet Sniffer (e.g. Wireshark)
What type of attack is when attackers modify packets and then forwards them to the destination? (205)
Data Modification
What type of attack is when an attacker pretends to be the destination or source IP? (205)
Identity Spoofing
What type of attack is where someone between the two communicating computers is actively monitoring, capturing, and controlling the data transparently? (205)
Man-in-the-Middle
What type of attacks prevents computers from performing normal operations? (205)
Denial of Service Attack (DOS)
_____ is an end-to-end security technology (205)
IPSec
What are the three ways to deploy IPSec? (205)
- Local Area Network (LAN)
- Wide area network (WAN)
- Remote access
Typically, both sides require a shared IPSec configuration, which is called a? (205)
IPSec Policy