Section 27 Security Protocols Flashcards

1
Q
  1. Emails
  2. Websites
  3. Remote Control
  4. Remote Access
A

Important Security Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A standard that provides cryptographic security for electronic messaging.

A

Secure/Multipurpose Internet Mail Extensions (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptographic protocols that provide secure internet communications for web browsing, instant messaging, emails, VoIP, and many other services.

A

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A protocol that can create a secure channel between two computers or network devices to enable one device to control the other device.

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A secure connection between two or more computers or device that are not on the same private network.

A

Virtual Private Networks (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A protocol that encapsulates PPP packets and ultimately sends data as encrypted traffic PPTP uses Port 1723.

A

Point to Point Tunneling Protocol (PPTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A TCP/IP protocol that authenticates and encrypts IP packets and effectively securing communications between computers and devices using this protocol.

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Method used by IPSec to create a secure tunnel by encrypting the connecting between authenticated peers.

A

Internet Key Exchange (IKE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Establishes secure connections and shared security information using certificates or cryptographic keys.

A

Security Association (SA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protocol used in IPSec that provides integrity and authentication.

A

Authentication Holder (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provides integrity, confidentiality, and authenticity of packets by encapsulating and encrypting them.

A

Encapsulating Security Protocol (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Host to host transport mode only uses encryption of the payload of an IP packet but not its header.

A

Transport Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly