IS3230 CHAPTER 12 Flashcards
As part of AAA, this provides the ability of a system to collect statistic on networks or users for auditing and billing purposes. This enables the tracking of systems usage, start and stop times of resources, and number of packets, as well as other metrics that identify what was used and for how long is called ___.
ACCOUNTING
An IPSec authentication protocol that is used to prove the identity of the sender and ensure the data has not been tampered with is called ___.
AUTHENTICATION HEADER (AH)
Network service that provide security through a framework of access controls and policies, enforcement of policies, and information needed for billing purposes is called ___.
AUTHENTICATION, AUTHORIZATION, AND ACCOUNTING (AAA)
____provides authentication over a PPP link.
CHALLENGE HANDSHAKE AUTHENTICATION PROTOCOL (CHAP)
Authentication and encryption protocol for IPSec that encrypts Internet Protocol (IP) packets and ensures their integrity is called ___.
ENCAPSULATED SECURITY PAYLOAD (ESP)
A framework enabling multiple authentication mechanisms over various connections is called ___.
EXTENSIBLE AUTHENTICATION PROTOCOL (EAP)
A tunneling protocol that encapsulates packets inside Internet Protocol (IP) tunnels is called ___.
GENERIC ROUTING ENCAPSULATION (GRE)
Provides identification to communication partners via a secure connection is called ___.
INTERNET KEY EXCHANGE (IKE)
A protocol that secures IP communications by authentication and encrypting each IP packet is called ___.
INTERNET PROTOCOL SECURITY (IPSec)
A protocol that provides the framework for the negotiation of algorithms, protocols, modes and keys for IKE is called ___.
INTERNET SECURITY ASSOCIATION AND KEY MANAGEMENT PROTOCOL (ISAKMP)
This sets up a point-to-point connection between two computer systems that can be transmitted over multiple types of networks is called ___.
LAYER 2 TUNNELING PROTOCOL (L2TP)
An algorithm that applies a hash function to a message, creating a 128-bit message digest. This algorithm is used to ensure the data has not been changed in any manner is called ___.
MESSAGE DIGEST 5 (MD5)
Proveds a service to dial-in users. This server allows a computer system to connect to the network through either a phone line or the Internet is called ___.
NETWORK ACCESS SERVER (NAS)
A protocol that allows computer systems to exchange key agreement over an insecure network is called ___.
OAKLEY
A data-link protocol that provides authentication over PPP is called ___.
PASSWORD AUTHENTICATION PROTOCOL (PAP)