Domain 3 Flashcards
Secure ________ are those that have built-in security mechanisms so that, by defaultSecurity can be enforced via the protocol
Protocols
________ provides integrity by validating DNS data
_______ uses TCP port 53
Domain Name System Security Extensions (DNSSEC)
An encrypted remote terminal connection program used for remote connections to a server
____ uses TCP port 22
Secure Shell (SSH)
____________ is designed to provide cryptographic protections to e-mails and is built into the majority of modern e-mail software to facilitate interoperability
Secure/Multipurpose Internet Mail Extensions (S/MIME)
_____ is a protocol to secure communications, typically over a telephony or communications-based network
Secure Real-time Transport Protocol (SRTP
What uses an SSL/TLS tunnel to connect these services
This communication occurs over port TCP 636
Lightweight Directory Access Protocol over SSL (LDAPS)
is the use of FTP over an SSH channel _____ uses TCP port 22
SSH File Transfer Protocol (SFTP)
A standard for managing devices on IP-based networks. All versions of SNMP require ports 161 and 162 to be open on a firewallThe only secure version of SNMP is _______
Simple Network Management Protocol, Version 3 (SNMPv3)
What is the use of SSL or TLS to encrypt a channel over which HTTP traffic HTTPS is used for secure web communications, Using port 443, it offers integrity and confidentiality
Hypertext Transfer Protocol over SSL/TLS (HTTPS)
________ is a set of protocols developed to securely exchange packets at the network layer (layer 3) of the OSI model ______ uses two protocols to provide traffic security:
•Authentication Header (AH)•Encapsulating Security Payload (ESP
IPSec
The AH protects the IP address, which enables data origin authenticationThe AH Provides Authentication & Integrity for each data packet, but it does not provide privacy because only the header is secured.
Authentication Header (AH)
This provides security services for the higher-level protocol portion of the packet only, not the IP header
Encapsulating Security Payload (ESP
This encrypts only the data portion of a packet
This enables an outsider to see source and destination IP addresses
Transport Mode
provides encryption of source and destination IP addresses as well as of the data itself. This provides the greatest security
Tunnel Mode
An Internet standard protocol used by e-mail clients to retrieve e-mail from a remote server
E-mail clients using this generally leave messages on the server until the user explicitly deletes them
IMAP uses port 143, but secure IMAP4 uses port 993
Internet Message Access Protocol
What internet standard protocol used by e-mail clients to retrieve e-mail from a remote server supports simple download-and-delete requirements for access to remote mailboxes, it uses port 110, but secure uses port 995
Post Office Protocol (POP)
Internet standard protocol for electronic mail (e-mail) transmission across IP-based networks ____ is used to transmit mail from server to server and POP3 and IMAP are used to access the mail on a personal device
Simple Mail Transfer Protocol (SMTP)
Beyond knowing the general meaning and functionality of the protocols, you need to know the scenarios in which you would deploy them.
Use cases
There are two forms of communication
Voice translates to phone calls while video translates to video calls or video conferencing. For this use case, this is appropriate. Additionally, there would likely be use of TLS for parts of the communication
Voice and video
For, the primary service is Network Time Protocol (NTP) NTP is a protocol to sync clocks between two devices over the network. It operates using UDP on port 123
Time synchronization
For email , the primary protocols are SMTP (port 25, for email relay), POP/IMAP (for email retrieval using legacy email clients), S/MIME (for encrypted email), HTTPS (for administration and web-based email), and SSL/TLS (for securing various communications
Email and web
you can opt to use FTP (quick, easy, lacking security), FTPS (like FTP but adds encryption), or SFTP (securely transfer files over SSH)Alternatively, you can use HTTPS for web-based file transfers
File Transfer
Delete
Delete
For ____ _____ to devices, HTTPS is the most common protocol
For ____ _____ to servers, SSH (mostly for Linux-based computers) and RDP (Remote Desktop Protocol, mostly for Windows-based computers) are commonly used
Remote Access
For DNS, DNSSEC is the most common security protocol
Although not widely implemented, it is the standard for securing DNS when you have requirements for DNS security
Domain Name Resolution
Open Shortest Path First (OSPF) is an interior gateway protocol that provides robustness
Border Gateway Protocol (BGP) is a complex routing protocol that provides the backbone functionality of the internet
For administration purposes, SSH and HTTPS are commonly used
Routing and switching
To efficiently and automatically distribute IP addresses to devices on a network, Dynamic Host Configuration Protocol (DHCP) is the most used
DHCP works via broadcast traffic initially
Network address resolution
Network News Transfer Protocol (NNTP) is a legacy protocol used to communicate with Usenet, which hosts forums and file transfer
With NNTP, you subscribe to desired groups, whether for discussion or file transfer
Subscription services
Endpoint security is a concept that each system is responsible for its own security
Appropriate level of security controls includes anti-malware software or local firewall
Each system should be capable of maintaining local security to an appropriate level
Endpoint protection
Most current antivirus software packages provide protection against a wide range of threats, including viruses, worms, Trojans, and other malware
Use of an up-to-date antivirus package is essential in the current threat environment
Antivirus
What is the name of a product designed to protect your machine from malicious software or malware.
Most of these solutions are combined with antivirus solutions into a single product.
Anti-malware
______ ______ are solutions are integrated solutions that combine individual endpoint security functions into a complete package
Having a packaged solution makes updating easier
Endpoint detection and Response (EDR)
____ ____ solutions serve to prevent sensitive data from leaving the network without notice
Data loss prevention (DLP)
_____ _____ ______ act by inspecting the actual traffic crossing the firewall—not just looking at the source and destination addresses and ports, but also at the actual content being sent
NGFW)Next-generation firewalls (NGFWs)
What act is to detect undesired elements in network traffic to and from the host
Host-based intrusion detection system
(HIDS)
is a HIDS with additional components to permit it to respond automatically to a threat condition
A host-based intrusion prevention system (HIPS)
protective mechanisms that monitor and control traffic passing in to and out of a single system
Host-based firewall or Personal firewalls
What is the characteristic of the intended hardware/firmware/software load for the system following the expected state
Having a means to ensure ? is a means of assuring that the hardware, firmware, and initial loading of software are free of any tampering
Boot integrity
_______ offers a solution to the problem of boot integrity, called _______ , which is a mode that, when enabled, only allows signed drivers and OS loaders to be invoked
Secure Boot enables the attestation that the drivers and OS loaders being used have not changed since they were approved for use
Boot security/Unified Extensible Firmware Interface (UEFI)UEFI
What is also a method of depending on the Root of Trust in starting a system, but rather than using signatures to verify subsequent components, a measured boot process hashes the subsequent processes and compares the hash values to known good values
Measured boot