IS3220 CHAPTER 12 Flashcards

1
Q

This provides integrity protection for packet headers and data, as well as user authentication. It can optionally provide replay protection and access protection.. It cannot encrypt any portion of a packet. Because authentication capabilities were added to ESP in the seconder version of IPSec, this has become less significant. But, it still has value because it can authenticate portions of packets that ESP cannot. This is called ___?

A

AUTHENTICATION HEADER (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is the second core IPSec security protocol in NISTs Guide to IPsec VPNs notes. Initially, this provided only encryption for packet payload data. Integrity protection was provided by the AH protocol if needed. The next version became more flexible. It can perform authentication to provide integrity protection, although not for the outermost IP header. This is called

A

ENCAPSULATING SECURITY PAYLOAD (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is the standards body for internet-related engineering specifications.. It uses RFCs as a mechanism to define internet-related standards and is called ___?

A

INTERNET ENGINEERING TASK FORCE (IETF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This negotiates, creates, and manages security associations. Security association (SA) is a generic term for a set of values that define the IPSec features and protections applied to a connection. You can also create SAs manually, using values agreed on in advance by both parties, but because these SAs cannot be updated, this method does not scale for real-life large-scale VPNs. In IPSec, this provides a secure mechanism for establishing IPSec-protected connections and is this is called ___?

A

INTERNET KEY EXCHANGE (IKE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

353

A

LAYER 2 FORWARDING (L2F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is an older protocol largely replaced by IPSec and SSL/TLS-based VPNs in production environments. This was used extensively in the early VPN solutions, but lost its popularity as other protocols proved to be more usable as industry standards developed. This is called ___?

A

LAYER 2 TUNNELING PROTOCOL (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This was a protocol defined to provide a standard transport mechanism. This was used largely in conjunction with modem connections and has been phased out as high-speed internet connections have replaced modem connections. This is called ___?

A

POINT-TO-POINT PROTOCOL (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This protocol supports Microsoft’s remote access servers and has known issues. It uses Microsoft Point-to-point Encryption and is still used for some remote access solutions, IPSec and SSL-based solutions are replacing it. This is called ___?

A

POINT-TO-POINT TUNNELING PROTOCOL (PPTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A document that defines or describes computer and networking technologies. These exist for hardware, operating systems, protocols, security services and more. This is called ___?

A

REQUEST FOR COMMENT (RFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network protocol that allows data exchange using a secure channel between two networked devices. It is used primarily on GNU/Linux and UNIX based systems to access shell accounts. This was a replacement for Telnet and other insecure remote shoes, which send information, notably passwords, in plaintext, rendering them susceptible to packet analysis. This is called ___?

A

SECURE SHELL (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What are the two modes supported by IPSec?
    (Multiple answers are correct)
  2. Transition
  3. Tunnel
  4. Encrypted
  5. Transport
  6. Internally connected
A

Tunnel

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. All the following are considered IPSec service EXCEPT:
    (Multiple answers may be correct)
  2. Access control
  3. Encryption
  4. NAT interoperability
  5. Replay rejection
  6. Support for AES encryption
A

NAT interoperability

Support for AES encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. The strongest encryption protocol currently supported by IPSec is ___?
A

3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. The two different protocols commonly used for remote access VPN are ___ and ___.
A

SSL and IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Select two advantages of using an IPSec-based VPN solution instead of an SSL-based solution.
    (Multiple answers are correct)
  2. Provides direct connection to the network
  3. Since IPSec works at Layer 3, it can support virtually all network applications
  4. Requires configuration of each application being accessed via the VPN
  5. Client-less solution
A

Provides direct connection to the network

Since IPSec works at Layer 3, it can support virtually all network applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A solution that permitted industry to extend the life of IPv4 addresses is ___.
A

network address translation (NAT)

17
Q
7. Which of the following are benefits of using an SSL VPN?  
(Multiple answers may be correct)
1. More costly
2. Less flexible
3. Support for NAT
4. Fewer firewall rules
5. Used for secure logins
A

Support for NAT

Fewer firewall rules

18
Q
  1. SSL VPNs are considered ____ because access is granted through SSL, which is supported by Web browsers on virtually all platforms.
A

platform independent

19
Q
9. Which of the following are areas that can impact the stability of your VPN?
(Multiple answers may be correct)
1. Number of users
2. VPN Configuration
3. Code Revision Level
4. Operating System
5. Encryption Level
A

VPN Configuration

Code Revision Level

Operating System

20
Q
  1. Which of the following are types of Network Address Translation? (Multiple answers may be correct)
  2. On Demand
  3. Dynamic
  4. Secure
  5. Static
  6. Encrypted
A

Dynamic

Static

21
Q
  1. The mechanism used by the IETF to document internet standards is the ___.
A

request for comment (RFC)

22
Q
  1. Separating the physical devices from the logical devices is known as ___.
A

.virtualization

23
Q
13. Which of the following are uses for the SSH protocol?
(Multiple answers may be correct)
1. Secure Remote Login
2. Secure File Transfers
3. Secure access to a Web site
4. Encrypting data on backup tapes
5. Creating a VPN connection
A

Secure Remote Login

Secure File Transfers

Creating a VPN connection

24
Q
  1. The L2TP protocol was created by the combination of these two protocols: ___ and ___.
A

L2F and PPTP

25
Q
  1. When you need to securely connect to a router for remote login, ___ would be the recommended protocol.
A

SSH

26
Q
  1. Which of the following are protocols that can be used for a VPN connection? (Multiple answers may be correct)
  2. IPSec
  3. 3DES
  4. SSH
  5. IETF
  6. SSL
A

IPSec

SSH

SSL

27
Q
  1. When working with IPSec in an environment using network address translation, which protocols and ports need to be open for IPSec to communicate?
    (Multiple answers may be correct)
  2. (IKE) __ User Datagram Protocol (UDP) port 500
  3. Internet Key Exchange – UDP port 500
  4. Encapsulating Security Payload – IP port 50
  5. Secure Sockets Layer __ TCP port 443
  6. Authentication Header – IP protocol number 51
A

Internet Key Exchange – UDP port 500

Encapsulating Security Payload – IP port 50

Authentication Header – IP protocol number 51

28
Q
  1. When designing a VPN solutions, which of the following areas could impact VPN performance? (Multiple answers may be correct)
  2. Available bandwidth
  3. Client configuration
  4. Client patch level
  5. Traffic
  6. Topology
A

Available bandwidth

Client configuration

Traffic

Topology

29
Q
  1. Which of the following are benefits of IPv6?
    (Multiple answers may be correct)
  2. IPSec is defined as a native protocol
  3. Support for SSL included in the standard
  4. Ability to address a limit of 4.3 billion hosts
  5. Plug and Play configuration with or without DHCP
  6. Define how to respond to incidents
A

IPSec is defined as a native protocol

Plug and Play configuration with or without DHCP

30
Q
  1. The ability to traverse a firewall using Network Address Translation on port 443 is a component of which VPN protocol ___?
A

Secure Socket Layer