Chapter 9 Flashcards

1
Q

What is the mathematical value that is used to provide an integrity check for the packet in question? (204)

A

Checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If the data is corrupted while in transit, this checksum will? (204)

A

Alert the receiver of the problem and the packet will be dropped by the receiving computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What suite of protocols was introduced to provide a series of cryptographic algorithms that can be used to provide security for all TCP/IP hosts at the Internet layer? (204)

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IPSec has two principle goals, what are they? (204)

A
  • To protect the contents of IP packets
  • To provide a defense against network attacks through packet filtering and the enforcement of trusted communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of attack is where an attacker moniters and reads packets? (204)

A

Packet Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet Sniffing use what type of software to moniter packets? (204)

A

A Packet Sniffer (e.g. Wireshark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attack is when attackers modify packets and then forwards them to the destination? (205)

A

Data Modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of attack is when an attacker pretends to be the destination or source IP? (205)

A

Identity Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of attack is where someone between the two communicating computers is actively monitoring, capturing, and controlling the data transparently? (205)

A

Man-in-the-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of attacks prevents computers from performing normal operations? (205)

A

Denial of Service Attack (DOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ is an end-to-end security technology (205)

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three ways to deploy IPSec? (205)

A
  • Local Area Network (LAN)
  • Wide area network (WAN)
  • Remote access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Typically, both sides require a shared IPSec configuration, which is called a? (205)

A

IPSec Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly