Midterm Exam part-3 Flashcards

1
Q

how does the Certificate authority work?

A

independent and trusted through reputation org. that have info on true parties of public keys. can be verified with digital signature, check to see if still valid and check revocation list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is non-repudiation?

A

means that the sender can not claim they did not send a message. this is b/c digital signatures can only be validated by parties that know the private and public keys and these are the sender and receivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the basic operation of quantum key encryption?

A

one time kys
keys as long as message
keys show signs of tamper if eavesdroppers see them.
thousands of years to crack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

name some VPN types:

A

Virtual Private Networks: cryptography is used for all communications over an un-trusted network (such as the web to a company).
types:
host to host-pc to a server
*Remote access VPN : pc to private LAN through a VPN gateway on edge of the LAN
*site-to-site VPN: 2 LAN’s using VPN gateways communicate over a VPN on the web to reach one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is TLS and how does it relate to VPN’s?

A

TLS= Transport Layer Security is the same thing as SSL Secure Socket Layer

  • this is the cryptography used to encrypt the vpn connections.
  • used in host to host vpn and remote access VPN’s.
  • only requires web browser with ssl support and no software for computer side. server must have software or the vpn gateway must support ssl.
  • *TLS only provides security to TLS/SSL aware applications like HTTP or some web-servers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the diff. between IPSEC Transport and Tunnel mode?

A

IPSEC Transport is used to connect 2 hosts over VPN and use encryption that the border routers/firewalls can’t read. *costly
-IPSEC Tunnel Mode: only the connection between sites starting & ending at the VPN gateways is encrypted, once inside site it is unincripted. (cheaper) no need to set-up each device in network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is access control?

A

policy-driven control of access to systems, data and dialogues. **limit attackers and employees access to internal resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the saying “death of the Perimeter”?

A

network admins say this b/c the idea of creating a 100% secure network is impossible. esp. with BYOD of today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is flooding?

A

the attacker sends more requests than the victim can handle. this is used in a denial of service attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is spoofing?

A

when an attacker hides their ip address by changing it so that it is not their real ip address.
*they can’t get replies from the victim though.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are backscatter options?

A

this is when an attacker does a denial of service attack to a network while using a spoofed (made up) ip address. the victim sends back replies to the made up/ spoofed ip address and inadvertently these replies go to a real computer causing them an issue. (called backscatter).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the diff/ types of attack packets that a sender/attacker can send in a Dos attack?

A

SYN Flood: transmission control protocol - connection request.
*Ping Flood: ICMP/Echo request
HTTP flood: webserver/web application flood.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what does a SYN flood do?

A

Dos attack: the SYN- synchronous TCP(transmission control protocol) packets sent requesting connections until the ram is used up and crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does the Ping flood do?

A

Dos attack: pings (ICMP) internet control message protocol packets (/echo requests) are sent to use up the bandwidth and cpu cycles of the victim causing it to shutdown.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does the HTTP flood do?

A

Dos attack: webserver is targeted with web page requests/ HTTP application requests and this uses up all the Ram and CPU causing it to crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are bots?

A

Intermediaries: hosts infected with malware are remotely controlled and used in a denial of service attack called a distributed Dos attack.

17
Q

how does ARP poisoning work/.?

A

an attacker creates a series of ARP replies with its own Mac address claiming it is the gateways address (uses real gateways ip and the attackers mac) and forwards it to all hosts on the LAN except the real gateway. then all computers route traffic intended for the real gateway to the attackers computer since their ARP tables are now incorrect and switches only look at mac addresses so they can’t catch this mistake.

18
Q

what is Radius?

A

a type of server/ client protocol that provides authentication and authorization to certain servers, files and the authorized supplicant (user) ability to alter, read or copy files.

19
Q

what is EAP and its role in authentication protocol 802.1x?

A

EAP- Extensible Authentication Protocol: each time a host connects to a switch then the switch sends an EAP start msg. to the radius server. the server sends a MS-CHAP request to the host and if the host replies correctly then the host is allowed on the network. EAP governs this process.

20
Q

what does Extensible mean?

A

EAP- (Extensible Authentication Protocol)
easy to add new authentication method and structure of EAP does not change.
**no new upgrades needed the Radius server and Supplicant both automatically utilize the new protocols.

21
Q

diff. between wep and WPA?

A

WEP uses 24 bit key length IV’s that are easy to crack while WPA uses 48 bit key length IV’s and is not vulnerable to hacking. WPA will not defend against man in the middle attacks.