Day 7 Flashcards

1
Q

IPsec core protocols

A

Authentication Header (AH) and Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication Header (AH)

A

handles authentication services for IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encapsulating Security Payload (ESP)

A

encrypts a datagrams payload, ensuring the privacy of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IPsec security modes

A

IPsec provides protection through two security modes: transport and tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transport Mode

A

host to host or end to end security.
provides security between any two communicating devices or end-points
only the data is encapsulated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tunnel mode

A

protects communication between routers and not the end hosts

IPsec encapsulates the entire payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIA triad

A

confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

five pillars of information assurance

A

confidentiality, integrity, availability, nonrepudiation, authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hashing

A

a form of one way encryption where data of variable length is input to a hashing algorithm and a value of fixed length results are output.
hashing provides password authentication and file integrity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

password authentication

A

password is hashed using the same algorithm and compared to the stored hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

file verification

A

using a hashing algorithm allows a user to verify file integrity regardless of file size.
the hash is also known as a checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

encryption

A

a technique of providing confidentiality by converting plaintext, or ordinary data, into ciphertext.
can be done either symmetrically or asymmetrically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

symmetric encryption

A

uses a single key to encrypt and decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

asymmetric encryption

A

uses a different key for encryption than is used for decryption.
this key pair consists of both a private key and public key.
PKI uses asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

digital signatures

A

utilizes hashing functions to associate a sender with data and to be sure a sender is who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

certificates

A

electronic documents of credentials usually signed by a third party called a certification authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

authentication, authorization, and accounting (AAA)

A

a framework for data protection for databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

authentication

A

presenting credentials for access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

authorization

A

the determination of what tasks are and are not allowed on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

accounting

A

keeping a record of such things as login/logoff times, or what services have been accessed.
AAA is suported through two main protocols: RADIUS and TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Remote Authentication Dial-In User Service (RADIUS)

A

an AAA standard used in supporting thousands of access points managed by internet service providers and linking them to a single database.
requests are sent to a Network Access Server (NAS)
the three replies are “Access Accept”, “Access Reject”, or “Access Challenge”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Terminal Access Controller Access Control System Plus (TACACS+

A

an AAA protocol developed by Cisco to include access to routers and switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

virtual networking

A

aka logical networking, overcomes certain network functions previously hindered by physical or geographic limitations

24
Q

Virtual Local Area Network (VLAN)

A

seperating LAN’s with a switch. VLAN’s logically seperate a single device into different resource groups.

25
Q

trunking

A

connects VLans that physically reside on different switches

26
Q

Virtual Private Network (VPN)

A

extends a LAN over an intermediate and usually unsecure infrastructure such as the internet.

27
Q

VPN tunnel

A

a secure connection that allows remote connections from the internet into the private network

28
Q

tunneling

A

allows private communications over a public infrastructure while maintaining security

29
Q

cloud computing

A

an idea by which people and businesses can use needed resources, such as software or hardware, without actually having to purchase them.

30
Q

deployment models

A

a cloud computing environment can be deployed in different ways depending on customer need.

31
Q

private cloud

A

a deployment model where one specific company or organization uses the entire cloud infrastructure

32
Q

public cloud

A

designated for use by the general public and exist on the cloud provider’s property

33
Q

community cloud

A

space occupied by several different tenants that share a common concern

34
Q

hybrid cloud

A

consists of the combination of two or more cloud deployment models.
allows for cloud bursting: additional processing can be handled outside of the normal cloud infrastructure and into another

35
Q

software as a service (SaaS)

A

the customer use of applications running from a cloud provider.
the client has no control over the network, servers, or even the actual application.

36
Q

Platform as a Service (PaaS)

A

a client creates their own applications or software, but use programming languages and tools supported by the cloud provider,

37
Q

infrastructure as a service (IaaS)

A

aka hardware as a service (HaaS)
the provisioning of processing, storage and networks to a customer. the customer controls the software and even the OS’s running on the hardware.

38
Q

threat

A
a network threat is something that has the potential to damage the network, to include data, hosts, or users.  most common threats:
hardware failures
access
malware
social engineering
denial of service
39
Q

hardware failures

A

equipment can fail. to mitigate these failures, redundancy must be maintained

40
Q

access

A

access is devided up into two main types: physical and logical

41
Q

physical access

A

physical access should be protected through the use of locking cabinets, doors, and buildings. security guards, cameras and safes are also means of providing physical security.

42
Q

logical access

A

protects data through the means of logical controls. these controls can be provided by the use of passwords, permissions, access control lists (ACL’s), and traffic filtering with devices such as firewalls

43
Q

remote access

A

the non local access to network systems or resources from a seperate physical location.
remote access points should always be shut off when not needed.

44
Q

malicious software (malware)

A

program or code designed to perform an undesired function on a system

45
Q

virus

A

a virus replicates itself by making copies of itself
viruses do not replicate across networks.
activation is the action a virus takes once replicated

46
Q

worm

A

a worm is like a virus but can send copies of itself to other computers on a network

47
Q

macro

A

a macro is a form of malware which exploits a programs built in macro function, with malicious results. these viruses use weaknesses in the macro language to accomplish the tasks of replication and activation

48
Q

trojan

A

a piece of malware that looks legitimate to a user but performs malicious functions in the background.
trojans to not replicate like viruses or worms do

49
Q

rootkit

A

rootkits are trojans that use low level computing functions in order to hide themselves from these anti-malware tools. rootkits allow for continued privileged access to the system

50
Q

adware/spyware

A

adware is a program that use functions such as pop-up windows to flood a user with advertisements. spyware is software that sends information about your system over the internet

51
Q

dealing with malware

A

anti-malware programs
training
procedures

52
Q

social engineering

A

the process of tricking people to gain unauthorized access to information

53
Q

phishing

A

a phishing attack consists of both creating a site, which seems trusted, and then soliciting people to visit it. phishing attacks launched through email include a hyperlink that when clicked, takes a victim to the attacker’s site

54
Q

denial of service (DoS)

A

involves an adversary flooding a network with enough traffic to overwhelm it

55
Q

distributed denial of service (DDoS)

A

overwhelms a system like DoS but through multiple source computers.
an adversary first takes control of a computer called the command and control server.
each of the comptuers being controlled to participate in a DDoS attack is called a zombie.
a group of computers under the control of an operator is called a botnet.