Implementation Flashcards

1
Q

What is DNSSEC

A

In the context of the Security+ exam, DNSSEC stands for Domain Name System Security Extensions. DNSSEC is a suite of extensions to DNS (Domain Name System) designed to add an additional layer of security to the domain name lookup process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does DNSSEC insures Data Integrity?

A

DNSSEC uses cryptographic signatures to ensure the integrity of DNS data. Each DNS record is signed by the domain owner, and these signatures are verified by DNS resolvers to ensure that the data has not been tampered with during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does DNSSEC prevents DNS spoofing and DNS cache poisoning attacks.

A

By using Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain DNSSEC’s chain of trust.

A

The DNSSEC (Domain Name System Security Extensions) chain of trust is a verified electronic signature, or handshake, at each DNS lookup node. In other words, it is a chain of lookups validated by the domain name’s digital signature that secures the request through all lookup nodes.

It starts with the root DNS zone and extends to the authoritative DNS servers for a specific domain. This chain of trust ensures that each level of the DNS hierarchy can vouch for the authenticity of the data in the level below it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Howdoes DNSSEC uses PKI?

A

DNSSEC relies on PKI to manage the cryptographic keys used for signing and validating DNS data. Public and private key pairs are used to create digital signatures, and the public keys are distributed in DNS records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is S/MIME?

A

Secure Multipurpose Internet Mail Extensions is the internet standard for digitally signing mime based emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

key aspects of s/mime

A

Digital Signatures: S/MIME allows the sender to digitally sign an email using their private key. The recipient can verify the signature using the sender’s public key, ensuring the authenticity of the message and confirming that it hasn’t been altered in transit.

Encryption: S/MIME supports the encryption of email content using the recipient’s public key. This ensures that only the intended recipient, who possesses the corresponding private key, can decrypt and read the message.

Public Key Infrastructure (PKI): S/MIME relies on a PKI to manage public and private key pairs. Digital certificates, issued by trusted Certificate Authorities (CAs), are used to bind public keys to individuals or entities, establishing a trust relationship in the encryption and signing process.

Interoperability: S/MIME is widely supported by various email clients and servers, promoting interoperability for secure email communication across different platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Secure real-time transport protocol (SRTP)

A

SRTP is a security protocol used to provide confidentiality, integrity, and authenticity for real-time communication protocols, especially those used in voice-over-IP (VoIP) and video conferencing applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the key features of SRTP?

A

Encryption: SRTP provides encryption for the data exchanged during real-time communication, such as voice and video streams. This encryption helps to protect the confidentiality of the communication by preventing eavesdropping.

Message Integrity: SRTP employs cryptographic mechanisms to ensure the integrity of the transmitted data. This prevents tampering with the content of the communication during transit.

Authentication: SRTP supports mechanisms for authenticating the parties involved in the communication. This helps ensure that the received data is from a legitimate source and has not been altered by a malicious actor.

Replay Protection: SRTP includes safeguards against replay attacks, where an attacker may try to retransmit previously recorded packets to gain unauthorized access or disrupt the communication.

Key Management: SRTP relies on appropriate key management mechanisms to handle the exchange and storage of cryptographic keys. Proper key management is crucial for maintaining the security of the communication.

SRTP is commonly used to enhance the security of real-time communication applications, especially those relying on protocols such as the Real-time Transport Protocol (RTP) for streaming audio and video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is LDAP

A

LDAP stands for Lightweight Directory Access Protocol. LDAP is a standard application protocol used to access and manage directory information services. A directory service is a centralized repository for storing, organizing, and providing access to information about network resources, such as users, computers, and other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is LDAP often used for?

A

Directory Services: LDAP provides a framework for accessing and managing directory services. A directory service organizes information in a hierarchical structure, often referred to as a directory tree, and allows efficient querying and retrieval of information.

Authentication and Authorization: LDAP is commonly used for user authentication and authorization in network environments. It allows systems to verify user credentials and determine access rights based on information stored in the directory.

Address Book Services: LDAP is utilized in applications like email clients and other communication tools as a protocol for accessing address book information. This enables users to search and retrieve contact information.

Network Resource Information: LDAP is used to store and retrieve information about network resources, including users, groups, printers, and other devices. It provides a standard way to organize and access this information.

Security Services: LDAP supports encryption through protocols like LDAPS (LDAP Secure) to secure the communication between LDAP clients and servers. This is important for protecting sensitive information, especially during authentication processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LDAPS

A

LDAPS stands for LDAP Secure, which is an extension of the Lightweight Directory Access Protocol (LDAP) that provides a secure communication channel using the Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL). LDAPS is used to encrypt the communication between LDAP clients and LDAP servers, adding a layer of security to protect sensitive information, especially during authentication processes. Port: By default, LDAPS typically uses port 636 for communication. This is in contrast to the non-secure LDAP, which usually operates on port 389. Using a dedicated port helps differentiate between secure and non-secure LDAP connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is FTPS

A

FTPS stands for File Transfer Protocol Secure. FTPS is an extension of the traditional File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) cryptographic protocols to secure the data transmitted between the FTP client and the FTP server.

FTPS can encrypt both the control channel (used for sending commands) and the data channel (used for transferring actual files). This ensures the confidentiality and integrity of both the commands and the transferred data.

Compatibility: FTPS is backward-compatible with traditional FTP. This means that clients or servers that support FTPS can communicate with non-secure FTP implementations, but the level of security will be limited to the capabilities of the non-secure FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SNMPv3

A

SNMPv3 stands for Simple Network Management Protocol version 3. SNMP is a protocol widely used in network management systems to monitor and manage network devices, such as routers, switches, and servers. SNMPv3 is an improved and more secure version of the SNMP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Authentication header in IPSEC

A

Authentication Header (AH) is one of the two primary protocols used in IPsec (Internet Protocol Security) to provide security services for IP (Internet Protocol) network traffic. The other protocol is the Encapsulating Security Payload (ESP). Both AH and ESP can be used separately or in combination, depending on the specific security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the key points of authentication header

A

AH ensures the authenticity and integrity of IP packets by using cryptographic mechanisms. It achieves this by generating a hash (also known as a message digest or HMAC) based on the packet content, including the IP header, and appending this hash as part of the AH header.

No Encryption: Unlike ESP, AH does not provide encryption of the actual payload of the IP packet. It focuses solely on authentication and integrity. If confidentiality is required, ESP is often used in conjunction with AH.

Header Placement: AH is typically inserted after the IP header and before the transport-layer protocol header (e.g., TCP or UDP). This ensures that the AH header covers both the IP header and the transport-layer protocol header.

Anti-Replay Protection: AH includes a sequence number field to protect against replay attacks. The sequence number helps prevent an attacker from retransmitting authenticated packets to gain unauthorized access.

17
Q

What is ESP

A

ESP stands for Encapsulating Security Payload. ESP is one of the two primary protocols used in IPsec (Internet Protocol Security) to provide security services for IP (Internet Protocol) network traffic. The other protocol is the Authentication Header (AH). Both AH and ESP can be used separately or in combination, depending on the specific security requirements.

18
Q

What are the keypoints to ESP

A

Confidentiality: ESP provides confidentiality for the payload of IP packets through encryption. It encrypts the actual data (payload) of the IP packet to ensure that it cannot be easily intercepted and understood by unauthorized parties.

Integrity: Similar to AH, ESP also provides integrity services. It ensures the integrity of the encrypted payload by adding a cryptographic checksum or hash value. This helps detect any tampering or modification of the encrypted data during transit.

Encryption Algorithms: ESP supports various encryption algorithms, such as Advanced Encryption Standard (AES), Triple DES (3DES), and others. The choice of encryption algorithm depends on the security requirements and the level of protection needed.

Header Placement: In transport mode, ESP is typically inserted after the IP header and before the transport-layer protocol header (e.g., TCP or UDP). In tunnel mode, ESP encapsulates the entire original IP packet, adding a new IP header.

Anti-Replay Protection: ESP includes a sequence number field to protect against replay attacks. The sequence number helps prevent an attacker from retransmitting encrypted packets to gain unauthorized access.

19
Q

What is transport or tunnel modes?

A

ESP can operate in two modes: Transport mode and Tunnel mode. These modes add an extra layer of protection In Transport mode, only the payload of the IP packet is protected. In Tunnel mode, both the original IP header and the payload are protected, and a new IP header is added.

20
Q

What is POP?

A

“POP” typically refers to the Post Office Protocol. There are two main versions of POP, namely POP2 and POP3, but when people refer to POP without specifying a version, they are usually talking about POP3. Here are key points related to POP3:

21
Q

Post Office Protocol 3 (POP3)

A

Function: POP3 is an internet standard protocol used by email clients to retrieve emails from a mail server.
Port: POP3 commonly uses port 110 for unencrypted communication and port 995 for communication secured by SSL/TLS (known as POP3S).
Download and Delete: In its basic mode, POP3 downloads emails to the client’s device and typically removes them from the server. This is in contrast to IMAP (Internet Message Access Protocol), which is another email retrieval protocol that often leaves emails on the server.
2. Security Considerations:

Authentication: POP3 supports simple username and password-based authentication. However, this information is sent in clear text if not secured with SSL/TLS.
Encryption (POP3S): To enhance security, POP3S (POP3 over SSL/TLS) encrypts the communication between the email client and the server. This helps protect sensitive information, including login credentials, from eavesdropping.

22
Q

How is POP differs from IMAP?

A

Download vs. Synchronization: Unlike IMAP, which often synchronizes the email client with the server, POP3 is primarily a download-and-delete protocol. This means that emails are typically downloaded to the client, and the server’s copy is removed.
4. Use in Email Security Discussions:

Client Considerations: In the context of email security, understanding the use of POP3 is important when discussing how email clients retrieve and handle messages. Security professionals may consider the encryption methods used and the implications for protecting sensitive email content.
Note: While POP3 is widely used, it’s important to be aware of its limitations, especially in scenarios where users access their emails from multiple devices. IMAP is often preferred in such situations because it allows for synchronization between devices.

Understanding the basics of POP3 and its security considerations is relevant for the Security+ exam, especially in the context of securing email communication and understanding the protocols used for email retrieval.

23
Q

What is IMAP

A

IMAP stands for Internet Message Access Protocol. IMAP is an internet standard protocol used by email clients to retrieve and interact with email messages stored on a mail server. It is one of the main protocols used for email retrieval, and it provides features that differ from the more traditional Post Office Protocol (POP).

24
Q

What are the keypoints to IMAP

A

Internet Message Access Protocol (IMAP):

Function: IMAP allows email clients to access and manipulate messages stored on a mail server. Unlike POP, which typically downloads messages to the client and removes them from the server, IMAP allows users to view, organize, and synchronize messages across multiple devices while leaving the messages on the server.
Port Numbers:

Unencrypted Communication: IMAP commonly uses port 143 for unencrypted communication between the email client and the server.
Encrypted Communication (IMAPS): IMAPS (IMAP over SSL/TLS) uses port 993 for encrypted communication, adding a layer of security to protect sensitive information during transmission.
Features:

Mailbox Management: IMAP supports the management of multiple mailboxes on the server, allowing users to organize their emails into folders.
Message Flags: IMAP supports the use of flags to mark messages as read, unread, flagged, etc. These flags are stored on the server, allowing users to see the same status across different devices.
Message Synchronization: Changes made to messages or mailbox structures on one device are synchronized with the server and reflected on other devices.
Authentication:

IMAP supports various authentication mechanisms, including simple username and password authentication. To enhance security, IMAPS encrypts the communication between the email client and the server using SSL/TLS.
Use in Email Security Discussions:

In the context of email security discussions, understanding IMAP is important when considering how email clients interact with servers, how messages are managed, and how security measures such as encryption can be applied.

25
Q

What is implicit mode in FTPS?

A

Implicit FTPS is a method of FTPS that allows clients to connect to an implicit port (Port 990) which already has secure connections baked in without requesting for there to be one. Implicit FTPS makes use of a dedicated port in order to allow for port 21 to be left open.

26
Q

What is explicit mode in FTPS

A

Explicit FTPS is a mode of FTPS in which the client “explicitly” requests the server to create a secured session, using SSL/TLS, on port 21 prior to authentication. In essence, the client connects to the traditionally insecure port of 21 and then has to specifically request a secure connection be established.

27
Q

What is the difference between IMAP and POP?

A

POP3 downloads the email from the server to the local device and deletes the data from the server. IMAP stores the data in the remote server and syncs it across multiple devices.

28
Q

What is ESP?

A

Encapsulating Security Payload (ESP) is a protocol that encrypt and authenticate the packets of data between computers using a Virtual Private Network (VPN).