CompTIA Security+: Enterprise Security Capabilities Flashcards
What port is Kerboros
88
network auth protocol that allows for communication over a non-secure network
What port is SNMP
161/162
What port is DHCP
67/68
What port is TACACS+
49
What port is FTPS
989/990 Uses TLSS for encryption; can also run on ports 20/21
What port is RADIUS
1812/1813
What port is Diameter
3868 ; upgrade to RADIUS
What is SRTP
5004
What does DNSSEC do?
Provides an extra layer of trust on top of DNS by providing authentication; does not provide confidentiality.
What helps to facilitate signature validation within DNSSEC?
RRSIG - contains a cryptographic signature
DNSKEY- contains a public signing key
DS- contains the hash of a DNSKey record
NSEC and NSEC3- for explicit denial of existence of a DNS record
CDNSKEY and CDS - for a child requesting updates to DS record(s) in the parent zone
What prevents Sender address forgery?
SPF
What does SPFv1 do
Protects the envelope sender address, which is used for messages delivery
spfv1 permits domain owners to designate their mail sending policy(e.g. which mail servers they use to send mail from their domain)
What is DKIM
DKIM is an email authentication method conducted between the outbound and inbound mail server or Message Transfer Agents.
With DKIM, the outbound mail server appends a digital signature to the mail then the inbound server verifies the signature by looking up the public key and then comparing it with the signature from the specified outgoing mail server.
What is DMARC?
DMARC is an email authentication, policy, and reporting protocol. It builds on the widely deployed and previously discussed SPF and DKIM protocols, offering linkage to the sender or “From:” domain name, published policies for recipient handling of authentication failures, reporting from receivers to senders, to enhance and monitor protection of the domain from fraudulent email.
What is FIM?
File Integrity Monitoring, or FIM, examines operating system files, configuration files, registries, application software, and Linux system files for changes and for indicators of compromise. Windows FIM provides alerts about suspicious activity such as file and registry key creation or deletion.