IS3230 CHAPTER 12 Flashcards

1
Q

As part of AAA, this provides the ability of a system to collect statistic on networks or users for auditing and billing purposes. This enables the tracking of systems usage, start and stop times of resources, and number of packets, as well as other metrics that identify what was used and for how long is called ___.

A

ACCOUNTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An IPSec authentication protocol that is used to prove the identity of the sender and ensure the data has not been tampered with is called ___.

A

AUTHENTICATION HEADER (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network service that provide security through a framework of access controls and policies, enforcement of policies, and information needed for billing purposes is called ___.

A

AUTHENTICATION, AUTHORIZATION, AND ACCOUNTING (AAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____provides authentication over a PPP link.

A

CHALLENGE HANDSHAKE AUTHENTICATION PROTOCOL (CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication and encryption protocol for IPSec that encrypts Internet Protocol (IP) packets and ensures their integrity is called ___.

A

ENCAPSULATED SECURITY PAYLOAD (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A framework enabling multiple authentication mechanisms over various connections is called ___.

A

EXTENSIBLE AUTHENTICATION PROTOCOL (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A tunneling protocol that encapsulates packets inside Internet Protocol (IP) tunnels is called ___.

A

GENERIC ROUTING ENCAPSULATION (GRE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides identification to communication partners via a secure connection is called ___.

A

INTERNET KEY EXCHANGE (IKE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A protocol that secures IP communications by authentication and encrypting each IP packet is called ___.

A

INTERNET PROTOCOL SECURITY (IPSec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A protocol that provides the framework for the negotiation of algorithms, protocols, modes and keys for IKE is called ___.

A

INTERNET SECURITY ASSOCIATION AND KEY MANAGEMENT PROTOCOL (ISAKMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This sets up a point-to-point connection between two computer systems that can be transmitted over multiple types of networks is called ___.

A

LAYER 2 TUNNELING PROTOCOL (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An algorithm that applies a hash function to a message, creating a 128-bit message digest. This algorithm is used to ensure the data has not been changed in any manner is called ___.

A

MESSAGE DIGEST 5 (MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proveds a service to dial-in users. This server allows a computer system to connect to the network through either a phone line or the Internet is called ___.

A

NETWORK ACCESS SERVER (NAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A protocol that allows computer systems to exchange key agreement over an insecure network is called ___.

A

OAKLEY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A data-link protocol that provides authentication over PPP is called ___.

A

PASSWORD AUTHENTICATION PROTOCOL (PAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A protocol for communication between two computers. Typically, the connection from the client to the server isomer a telephone line and is called ___.

A

POINT-TO-POINT PROTOCOL (PPP)

17
Q

A protocol that seats up a point-to-point connection between two computer systems over an Internet Protocol (IP) network is called ___.

A

POINT-TO-POINT TUNNELING PROTOCOL (PPTP)

18
Q

A server that provides an authentication service for users that are dialing into a network or accessing it from the Internet is called ___.

A

REMOTE ACCESS SERVER (RAS)

19
Q

A client/server protocol that provides authentication, authorization, and accounting for a remote dial-in system is called ___.

A

REMOTE AUTHENTICATION DIAL IN USER SERVICE (RADIUS)

20
Q

Records the configuration the computer systems need to support an IPSec connection is called ___.

A

SECURITY ASSOCIATION (SA)

21
Q

A remote access client/server protocol that provides authentication and authorization capabilities to users that are accessing the network remotely and is not a secure protocol is called ___.

A

TERMINAL ACCESS CONTROLLER ACCESS CONTROL SYSTEM (TACACS)

22
Q

A remote access client/server protocol. It is a Cisco proprietary protocol and provides authentication, authorization, and accounting is called ___.

A

TERMINAL ACCESS CONTROLLER ACCESS CONTROL SYSTEM PLUS (TACACS+)

23
Q

The sending of messages to a single network destination. The opposite of this is broadcast, where data is sent to all network destinations is called ___.

A

UNICAST

24
Q
  1. RADIUS uses TCP.

TRUE OR FALSE

A

FALSE

25
Q
  1. AAA stands for ___.
A

Authentication
Authorization
Accounting

26
Q
  1. Which of the following bed describes the act of verifying that users are who they say they are?
  2. Identification
  3. Authentication
  4. Authorization
  5. Auditing
A

Authentication

27
Q
  1. Which of the following are authentication protocols used with PPP (Select three)
  2. CHES
  3. CHAP
  4. EAP
  5. MAP
  6. PAP
A

CHAP
EAP
PAP

28
Q
  1. TACACS+ encrypts the entrée data packet.

TRUE OR FALSE

A

TRUE

29
Q
  1. What portion of TACACS+ provides AAA capabilities?
  2. NAS
  3. Client
  4. TACACS+ daemon
  5. XTACACS
A

TACACS+ daemon

30
Q
  1. What are examples of Web authentication? (Select three)
  2. Knowledge-based authentication
  3. Identification
  4. Certificates
  5. User ID/password
  6. Remote access server
A

Knowledge-based authentication
Certificates
User ID/password

31
Q
  1. MD5 is a cryptographic ___ function.
A

Hash

32
Q
  1. Cisco developed the TACACS_ and XTACACS.

TRUE OR FALSE

A

TRUE

33
Q
  1. Which of the following is used to validate the communication between a RADIUS server and a RADIUS client?
  2. NAM
  3. TACACS daemon
  4. RAS
  5. Shared secret
A

Shared secret

34
Q
  1. PAP is a ___ handshake.
A

Two-way

35
Q
  1. CHAP is a ___ handshake.
A

Three-way

36
Q
  1. What is a program that runs in the background?
  2. RAS
  3. Encryption
  4. Daemon
  5. PAP
A

Daemon

37
Q
  1. What is the de facto standard for IPSec key exchange?
  2. OAKLEY
  3. IKE
  4. ISAKMP
  5. RADIUS
A

IKE