IS3220 CHAPTER 12 Flashcards
This provides integrity protection for packet headers and data, as well as user authentication. It can optionally provide replay protection and access protection.. It cannot encrypt any portion of a packet. Because authentication capabilities were added to ESP in the seconder version of IPSec, this has become less significant. But, it still has value because it can authenticate portions of packets that ESP cannot. This is called ___?
AUTHENTICATION HEADER (AH)
This is the second core IPSec security protocol in NISTs Guide to IPsec VPNs notes. Initially, this provided only encryption for packet payload data. Integrity protection was provided by the AH protocol if needed. The next version became more flexible. It can perform authentication to provide integrity protection, although not for the outermost IP header. This is called
ENCAPSULATING SECURITY PAYLOAD (ESP)
This is the standards body for internet-related engineering specifications.. It uses RFCs as a mechanism to define internet-related standards and is called ___?
INTERNET ENGINEERING TASK FORCE (IETF)
This negotiates, creates, and manages security associations. Security association (SA) is a generic term for a set of values that define the IPSec features and protections applied to a connection. You can also create SAs manually, using values agreed on in advance by both parties, but because these SAs cannot be updated, this method does not scale for real-life large-scale VPNs. In IPSec, this provides a secure mechanism for establishing IPSec-protected connections and is this is called ___?
INTERNET KEY EXCHANGE (IKE)
353
LAYER 2 FORWARDING (L2F)
This is an older protocol largely replaced by IPSec and SSL/TLS-based VPNs in production environments. This was used extensively in the early VPN solutions, but lost its popularity as other protocols proved to be more usable as industry standards developed. This is called ___?
LAYER 2 TUNNELING PROTOCOL (L2TP)
This was a protocol defined to provide a standard transport mechanism. This was used largely in conjunction with modem connections and has been phased out as high-speed internet connections have replaced modem connections. This is called ___?
POINT-TO-POINT PROTOCOL (PPP)
This protocol supports Microsoft’s remote access servers and has known issues. It uses Microsoft Point-to-point Encryption and is still used for some remote access solutions, IPSec and SSL-based solutions are replacing it. This is called ___?
POINT-TO-POINT TUNNELING PROTOCOL (PPTP)
A document that defines or describes computer and networking technologies. These exist for hardware, operating systems, protocols, security services and more. This is called ___?
REQUEST FOR COMMENT (RFC)
A network protocol that allows data exchange using a secure channel between two networked devices. It is used primarily on GNU/Linux and UNIX based systems to access shell accounts. This was a replacement for Telnet and other insecure remote shoes, which send information, notably passwords, in plaintext, rendering them susceptible to packet analysis. This is called ___?
SECURE SHELL (SSH)
- What are the two modes supported by IPSec?
(Multiple answers are correct) - Transition
- Tunnel
- Encrypted
- Transport
- Internally connected
Tunnel
Transport
- All the following are considered IPSec service EXCEPT:
(Multiple answers may be correct) - Access control
- Encryption
- NAT interoperability
- Replay rejection
- Support for AES encryption
NAT interoperability
Support for AES encryption
- The strongest encryption protocol currently supported by IPSec is ___?
3DES
- The two different protocols commonly used for remote access VPN are ___ and ___.
SSL and IPSec
- Select two advantages of using an IPSec-based VPN solution instead of an SSL-based solution.
(Multiple answers are correct) - Provides direct connection to the network
- Since IPSec works at Layer 3, it can support virtually all network applications
- Requires configuration of each application being accessed via the VPN
- Client-less solution
Provides direct connection to the network
Since IPSec works at Layer 3, it can support virtually all network applications