CS Midterm Flashcards

1
Q

AAA

A

Authentication, authorization and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control

A

Mechanisms or methods used to determine what access permissions subjects have for objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accounting

A

Collection of billing and other detail records kept for network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication

A

The process by which a subject’s identity is verified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication Header (AH)

A

A portion of the IPsec security protocol that provides authentication services and replay-detection ability. Can be used with Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authorization

A

granting of specific permissions based on privileges held by the account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Content Protection

A

Protection of the data portion of a datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Context Protection

A

Protection of the header of a datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Discretionary Access Control (DAC)

A

An access control mechanism in which the owner of an object (such as a file) can decide which other subjects may have access to the object and what type of access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encapsulating Security Payload (ESP)

A

A portion of the IPsec implementation that provides for data confidentiality with optional authentication and replay detection services. ESP completely encapsulates user data in the datagram and can be used by itself or in conjunction with Authentication Headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identification

A

Process of ascribing a computer ID to a specific user, computer network device or computer process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Key Exchange (IKE)

A

The protocol formerly known as ISAKMP/Oakley. A hybrid protocol that uses part Oakley and part SEMI inside the Internet Security Association framework. IKE is used to establish a shared security policy and authenticated keys for services that require keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet Protocol Security (IPsec)

A

A protocol used to secure IP packets during transmission across a network. Offers authentication, integrity and confidentiality services. Uses AH and ESP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet Security Association & Key Management Protocol (ISAKMP)

A

A protocol framework that defines the mechanics of implementing a key exchange protocol and negotiation of a security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Kerberos

A

A network authentication protocol designed by MIT for use in client/server environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key Distribution Center (KDC)

A

A portion of the Kerberos authentication system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Layer 2 Tunneling Protocol (L2TP)

A

A Cisco switching protocol that operates at the data link layer.

18
Q

Mandatory Access Control (MAC)

A

An access control mechanism in which the security mechanism controls access to all objects and individual subjects cannot change that access.

19
Q

Point to Point Protocol

A

The Internet standard for transmission of IP packets over a serial line, as in a dial-up connection to an ISP.

20
Q

Remote Access Server (RAS)

A

A combination of hardware and software used to enable remote access to a network.

21
Q

Role-based Access Control

A

An access control mechanism in which, a set of roles that the user may perform depends on access.

22
Q

Rule-Based Access Control

A

Access Control mechanism based on rules

23
Q

Security Association (SA)

A

An instance of security policy and keying material applied to a specific data flow.

24
Q

Virtual Private Network (VPN)

A

An encrypted network connection across another network offering a private communication channel.

25
Q

Ping sweep

A

sends a ping (an Internet Control Message Protocol ICMP) echo request to the target machine.

26
Q

smurf attack

A

attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all systems on that network.

27
Q

TCP/IP Hijaking

A

taking control of an already existing session between a client and server.

28
Q

Malware

A

refers to software designed for nefarious

purposes.

29
Q

certificate

A

A cryptographically signed object that contains an identity and a public key associated with this identity.

30
Q

certificate authority

A

An entity responsible for issuing and revoking certificates.

31
Q

Certificate Revocation List

A

A digitally signed object that lists all of the current but revoked certificates issued by a given certification authority.

32
Q

Internet Security Association and Key Management Protocol

A

A protocol framework that defines the mechanics of implements a key exchange protocol and negotiation of a security policy.

33
Q

Point-to-Point Tunneling Protocol

A

allows the encapsulation of one packet inside another to hid the original packet

34
Q

Pretty Good Privacy

A

A popular encryption program that has the ability to encrypt and digitally sign email and files

35
Q

Public Key Infrastructure

A

Infrastructure for binding a public key to a known user through a trusted intermediary, typically a CA

36
Q

secure multipurpose internet mail extension

A

An encrypted implementation of the MIME protocol specification

37
Q

Secure Socket Layer (SSL)

A

An encryption layer between the session and transport layer

38
Q

Transport Layer Security

A

a newer form of SSL

39
Q

Wired Equivalent Privacy

A

Encryption scheme used to attempt to provide confidentiality and data integrity on 802.11 networks

40
Q

Wireless Application Protocol

A

A protocol for transmitting data to small handheld devices such as cell phones

41
Q

Wireless Transport Layer Security

A

The encryption protocol used on WAP networks

42
Q

X.509

A

The standard format for digital certificates