Random Topics to memorize PT 3 Flashcards
This allows you to verify the responses that you get from a DNS server. You can make sure that it is exactly the information that you requested. It is done through Public Key Cryptography. The information on a DNS server is signed by a trusted third party.
DNSSEC
With this application all the communication between you and whatever device you’re connected to is encrypted.
SSH
It’s a way that you can digitally sign and encrypt information right in your email client. It is required to be PKI enabled.
S/MIME
Used to make secure phone calls for Voice over IP. It uses AES to encrypt phone calls as they go through the network. It also provides HMAC-SHA1 as hashing to provide integrity and replay protection.
Secure Real-Time Protocol (SRTP)
Works together with SSL to make directories more secure. This is a non-standard implementation of SSL.
LDAPS
Uses SSL to transfer files securely.
FTPS
Uses SSH to transfer files. It allows for file system functionality so you can restart a file transfer if it has been interrupted.
SFTP
It provides Confidentiality by encrypting communication between you and the device you are managing. It adds integrity and it has authentication to verify the source of the information. You can alternatively access certain devices via HTTPS to get the same effect.
SNMPv3
Both include SSL encryption to help protect data that is being emailed.
Secure POP/IMAP
Is used to set the time on all the devices across the network.
NTP (Network Time Protocol)
This is where someone can spoof a MAC address and make multiple requests for an IP address and once the DHCP server runs out of IPs to give out then it causes a Denial Of Service. You can configure a switch with MAC filtering to avoid this.
DHCP Starvation Attack
Based off of the X.500 standard. This hierarchical structure can contain the country name, organizational units, or you can customize it to be as extensive or as basic as you need.
LDAP
It is used for SSO. It is also protected against replay attacks and Man in the Middle attacks. Uses a ticketing processes to authenticate you.
Kerberos
It uses a three-way handshake method. The client sends a request, the server then sends a challenge method. The client responds with a password hash. The server then checks the hash against the records and determines if it is correct.
CHAP
Communicates in the clear. It’s a super simple authentication method that is not secure for today’s use. You would just provide your username and password to a server, and the server would check to see if it matched with their records and if it did, you’re in.
PAP