Random Topics to memorize PT 3 Flashcards

1
Q

This allows you to verify the responses that you get from a DNS server. You can make sure that it is exactly the information that you requested. It is done through Public Key Cryptography. The information on a DNS server is signed by a trusted third party.

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

With this application all the communication between you and whatever device you’re connected to is encrypted.

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It’s a way that you can digitally sign and encrypt information right in your email client. It is required to be PKI enabled.

A

S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used to make secure phone calls for Voice over IP. It uses AES to encrypt phone calls as they go through the network. It also provides HMAC-SHA1 as hashing to provide integrity and replay protection.

A

Secure Real-Time Protocol (SRTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Works together with SSL to make directories more secure. This is a non-standard implementation of SSL.

A

LDAPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uses SSL to transfer files securely.

A

FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Uses SSH to transfer files. It allows for file system functionality so you can restart a file transfer if it has been interrupted.

A

SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It provides Confidentiality by encrypting communication between you and the device you are managing. It adds integrity and it has authentication to verify the source of the information. You can alternatively access certain devices via HTTPS to get the same effect.

A

SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Both include SSL encryption to help protect data that is being emailed.

A

Secure POP/IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is used to set the time on all the devices across the network.

A

NTP (Network Time Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is where someone can spoof a MAC address and make multiple requests for an IP address and once the DHCP server runs out of IPs to give out then it causes a Denial Of Service. You can configure a switch with MAC filtering to avoid this.

A

DHCP Starvation Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Based off of the X.500 standard. This hierarchical structure can contain the country name, organizational units, or you can customize it to be as extensive or as basic as you need.

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It is used for SSO. It is also protected against replay attacks and Man in the Middle attacks. Uses a ticketing processes to authenticate you.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It uses a three-way handshake method. The client sends a request, the server then sends a challenge method. The client responds with a password hash. The server then checks the hash against the records and determines if it is correct.

A

CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Communicates in the clear. It’s a super simple authentication method that is not secure for today’s use. You would just provide your username and password to a server, and the server would check to see if it matched with their records and if it did, you’re in.

A

PAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Uses PPTP. Both are not secure for authentication because they both use the DES encryption method. They should not be used.

A

MS-CHAP and MS-CHAPv2

17
Q

You can use this authenticate to a third party to provide access to local resources (SSO). This is not used with mobile networks.

A

SAML

18
Q

Is a protocol that provides resource authentication. Open ID usually handles the SSO authentication and OAUTH determines what services the user should have access to. This was created by Google. It is often used with Google, Twitter, Facebook, and other organizations.

A

OAUTH

19
Q

This is an open source application that uses SAML to provide federated SSO.

A

Shibboleth

20
Q

For server based authentication The server does not keep track of any session information, instead is uses a stateless form of authentication. After a user is authenticated the server the server provides them with a token

A

Secure Token

21
Q

This system uses an MD4 hash challenge for password authentication. There is an HMAC-MD5 hash of the username and server name, and then there’s a variable length challenge that uses a time stamp, some random data, and the name of the Windows domain. Kerberos replaced this.

A

NTLM (NT LAN Manager)