Given a scenario, implement secure protocols Flashcards

1
Q

Protocols

A

Domain Name System Security Extension (DNSSEC)

SSH

Secure/Multipurpose Internet Mail Extensions (S/MIME)

Secure Real-time Protocol (SRTP)

Lightweight Directory Access Protocol Over SSL (LDAPS)

File Transfer Protocol, Secure (FTPS)

SSH File Transfer Protocol (SFTP)

Simple Network Management Protocol, version 3 (SNMPv3)

Hypertext transfer protocol over SSL/TLS (HTTPS)

IPSec

Secure Post Office Protocol (POP)/Internet Message

Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Domain Name System Security Extension (DNSSEC)

A

A security protocol that provides authentication of DNS data and upholds DNS data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSH

A

A remote administration and file-copy program that supports VPNs by using port forwarding, and that runs on TCP port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure/Multipurpose Internet Mail Extensions (S/MIME)

A

An email encryption standard that adds digital signatures and public key cryptography to traditional MIME communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Real-time Protocol (SRTP)

A

Version of RTP secured using TLS.

Opens a data stream for video and voice applications over UDP. The data is packetized and tagged with control information (sequence numbering and time-stamping).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lightweight Directory Access Protocol Over SSL (LDAPS)

A

A network protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information.

A network protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

File Transfer Protocol, Secure (FTPS)

A

A protocol used to transfer files between network hosts. Variants include S(ecure)FTP, FTP with SSL (FTPS and FTPES) and T(rivial)FTP. FTP utilizes ports 20 and 21.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSH File Transfer Protocol (SFTP)

A

A secure version of the File Transfer Protocol that uses a Secure Shell (SSH) tunnel as an encryption method to transfer, access, and manage files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Simple Network Management Protocol, version 3 (SNMPv3)

A

SNMP v3 supports encryption and strong user-based authentication. Instead of community names, the agent is configured with a list of usernames and access permissions. When authentication is required, the SNMP message is signed with a hash of the user’s passphrase. The agent can verify the signature and authenticate the user using its own record of the passphrase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hypertext transfer protocol over SSL/TLS (HTTPS)

A

The protocol used to provide web content to browsers. HTTP uses port 80. HTTPS(ecure) provides for encrypted transfers, using SSL/TLS and port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPSec

A
Authentication Header (AH)/Encapsulated Security Payloads (ESP)
Tunnel/transport

A set of open, non-proprietary standards that are used to secure data through authentication and encryption as the data travels across the network or the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication Header (AH)/Encapsulated Security Payloads (ESP)

A

An IPSec protocol that provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tunnel/transport

A

Transport mode—this mode is used to secure communications between hosts on a private network (an end-to-end implementation).When ESP is applied in transport mode, the IP header for each packet is not encrypted, just the payload data. If AH is used in transport mode, it can provide integrity for the IP header.

Tunnel mode—this mode is used for communications between VPN gateways across an unsecure network (creating a VPN). This is also referred to as a router implementation.With ESP, the whole IP packet (header and payload) is encrypted and encapsulated as a datagram with a new IP header. AH has no real use case in tunnel mode, as confidentiality will usually be required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure Post Office Protocol (POP)/Internet Message Access Protocol (IMAP)

A

TCP port 110 protocol that enables a client to access email messages stored in a mailbox on a remote server. The server usually deletes messages once the client has downloaded them.

TCP/IP application protocol providing a means for a client to access and manage email messages stored in a mailbox on a remote server. IMAP4 utilizes TCP port number 143.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use cases

A
Voice and video
Time synchronization
Email and web
File transfer
Directory services
Remote access
Domain name resolution
Routing and switching
Network address allocation
Subscription services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Voice and video

A

Answer these like essay questions

17
Q

Time synchronization

A
18
Q

Email and web

A
19
Q

File transfer

A
20
Q

Directory services

A
21
Q

Remote access

A
22
Q

Domain name resolution

A
23
Q

Routing and switching

A
24
Q

Network address allocation

A
25
Q

Subscription services

A