Practice Questions Flashcards

1
Q

How does IPSec differ from SSH, SSL, and TLS?

A

It is the only protocol that does NOT operate in the upper layers of the OSI model (TSPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What three protocols make up IPsec and perform its functions.

A

Security Association (SA), Authentication Header (AH), Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Security Association (SA) ?

A

Establishes secure connections, using either certificates or cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication Header (AH)

A

The authentication information is a keyed hash based on the bytes in the packet. It can be used with (ESP).
IT can also protect against replay attacks by employing sliding window protocols, which puts limits on the total amount of packets that can be transmitting in a period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encapsulating Security Payload (ESP)

A

The final product is encapsulated and encrypted; providing CIA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a PKI in its broadest sense?

A

Public Key Infrastructure is a complete environment for the public key, including hardware, software, and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a certificate do?

A

Certificates bind a users identity with a public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are certificates validated?

A

Computer initiates a certificate signing request (CSR) with proof of the users identity. If the website is invalid or the certificate is suspicious, it may be placed on a (CRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What two items are included in a digital certificate?

A

User’s public key, certificate authority’s digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rick has a local computer that uses software to generate and store key pairs. What type of PKI implementation is this?

A

Centralized?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is usually used with L2TP?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What ensures that a CRL is authentic and has not been modified?

A

The CRL is digitally signed by the CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What encryption concept is PKI based on?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are in charge of PKI certificates. What should you implement so that stolen certificates cannot be used?

A

CRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What network protocol sends data between two computers while using a secure channel, and has since replaced telnet.

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What protocol uses port 443?

A

HTTPS

17
Q

What protocol creates an unencrypted tunnel by itself, and is usually combined with IPSec?

A

L2TP

18
Q

Which layer of the OSI model does IPSec operate at?

A

Layer 3 (Network)

19
Q

Which layer of the OSI model is where SSL provides encryption?

A

Session layer

20
Q

What should you do to make sure that a compromised PKI key cannot be used again?

A

Revoke the key

21
Q

What does IPSec do and which layer does it operate at?

A

IPSec authenticates and encrypts IP Packets, and works at the network layer of the OSI model.

22
Q

What is IPSec’s AH based on?

A

All of the bytes in a packet

23
Q

What should you publish a compromised certificate to?

A

CRL

24
Q

What uses an asymmetric key to establish a session then a symmetric key for communications.

A

SSL

25
Q

What is a Key Escrow?

A

A secure copy of a users encryption key in case it gets lost