Network+ Chapter 13 Flashcards

1
Q

________typically reside on routers to determine which packets are allowed to route through them based on the requesting devices’s source or destination IP.

ch 13 pg 432

A

Access Control Lists (ACLs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 4 things should you do when configuring ACLs between the internet and your private network to mitigate security problems?

Ch 13 pg 433

A

Deny any address from your internal networks
Deny any local host address(127.0.0.0/8)
Deny any reserved private addresses
Deny addresses in the IP multicast address range (224.0.0.0/4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define tunneling?

Ch 13 pg 434

A

Encapsulating one protocol within another to ensure that a transmission is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Network+ exam will test your understanding of the following tunneling protocols?

Ch 13 pg 434

A
VPNs (Virtual Private Network)
SSL (Secure Socket Layer)
SSL VPN  (Secure Socket Layer Virtual Private Network)
Layer 2 Tunneling Protocol (L2TP)
Point to Point Tunneling Protocol(PPTP)
Generic Routing Encapsulation(GRE)
Internet Protocol Security (IPSec)
ISAKMP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____________ allow remote users like telecommuters to securely access the corporate network wherever and whenever they need to.

(p. 436)

A

Host-to-Site (Remote-Access) VPN’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is one of the most common reasons why users can connect to the internet and not their office?
(p. 436)

A

The users don’t have the correct VPN address and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________VPN allow an organization’s suppliers, partners, and customers to be connected to the corporate network in a limited way for business-to-business b2b communications.
(p. 436)

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who created L2TP?

p. 437

A

Internet Engineering Task Force (IETF).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which port does PPTP use and what is its function?

p. 438

A

PPTP is a VPN protocol that runs over port 1723 and allows encryption to be done at the Application (data) level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____________is a tunneling protocol that can encapsulate many protocols inside IP tunnels. Some examples would be routing protocols such as EIGRP and OSFP and the routed protocol IPv6.

(p. 438)

A

Generic Routing Encapsulation (GRE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two modes does IPSec work in?

(p. 439).

A

transport mode and tunneling mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____________defines procedures and packet formats to establish, negotiate, modify, and delete security associations

(p. 440)

A

Internet Security Association and Key Management Protocol (ISAKMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______________is a Layer 2 protocol that provides authentication, encryption, and compression services to clients logging in remotely.
(p. 446). Wiley

A

Point-to-Point Protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____________is an extension of PPP. Its purpose is to encapsulate PPP frames within Ethernet frames.
p. 446

A

Point-to-Point Protocol over Ethernet PPPoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What has been the preferred method of encryption in the US since 2002 and has key lengths of 128,192,256 bits.
pg 447

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______________is not a protocol but refers to the combination of hardware and software required to make a remote-access connection.

p. 445

A

Remote Access Services (RAS)

17
Q

_____________allows users to connect to a computer running Microsoft’s Remote Desktop Services, but a remote computer must have the right kind of client software installed for this to happen.

p. 446

A

Remote Desktop Protocol (RDP)

18
Q

What are 3 things you need to do when a user leaves the organization?

p. 448

A

Leave the account in place.
Delete the account.
Disable the account.

19
Q

What are some passwords formats that you should never use?

pg 451

A
The word password  Proper names
 Your pet's name
 Your spouse's name
 Your children's names
 Any word in the dictionary
20
Q

Define Multifactor authentication?

(p. 455)

A

Multifactor authentication is designed to add an additional level of security to the authentication process by verifying more than one characteristic of a user before allowing access

21
Q

What are 3 ways a user can be identified by using Multifactor authentication?

(p. 455)

A

By something they know (password)
By something they are (retinas, fingerprint, facial recognition)
By something they possess (smart card)

22
Q

______________is a system that links users to public keys and verifies a user’s identity by using a certificate authority (CA).

(p. 455)

A

Public Key Infrastructure (PKI)

23
Q

___________is a computer network authentication protocol which works on the basis of ‘tickets’ to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

p. 456

A

Kerberos,

24
Q

What are two major differences between TACACS + and RADIUS:

p. 458

A

RADIUS combines user authentication and authorization into one profile, but TACACS + separates the two.

TACACS + utilizes the connection-based TCP protocol, but RADIUS uses UDP instead.

25
Q

_______________is a protocol developed by Cisco and released as an open standard beginning in 1993.

pg 458

A

Terminal Access Controller Access-Control System Plus