Practice Questions Flashcards
How does IPSec differ from SSH, SSL, and TLS?
It is the only protocol that does NOT operate in the upper layers of the OSI model (TSPA)
What three protocols make up IPsec and perform its functions.
Security Association (SA), Authentication Header (AH), Encapsulating Security Payload (ESP)
What is Security Association (SA) ?
Establishes secure connections, using either certificates or cryptographic keys.
Authentication Header (AH)
The authentication information is a keyed hash based on the bytes in the packet. It can be used with (ESP).
IT can also protect against replay attacks by employing sliding window protocols, which puts limits on the total amount of packets that can be transmitting in a period of time.
Encapsulating Security Payload (ESP)
The final product is encapsulated and encrypted; providing CIA.
What is a PKI in its broadest sense?
Public Key Infrastructure is a complete environment for the public key, including hardware, software, and procedures
What does a certificate do?
Certificates bind a users identity with a public key.
How are certificates validated?
Computer initiates a certificate signing request (CSR) with proof of the users identity. If the website is invalid or the certificate is suspicious, it may be placed on a (CRL)
What two items are included in a digital certificate?
User’s public key, certificate authority’s digital signature
Rick has a local computer that uses software to generate and store key pairs. What type of PKI implementation is this?
Centralized?
Which of the following is usually used with L2TP?
IPSec
What ensures that a CRL is authentic and has not been modified?
The CRL is digitally signed by the CA
What encryption concept is PKI based on?
Asymmetric
You are in charge of PKI certificates. What should you implement so that stolen certificates cannot be used?
CRL
What network protocol sends data between two computers while using a secure channel, and has since replaced telnet.
SSH