Section 27: Security Protocols Flashcards

1
Q

S/MIME

A

Secures email by encrypting the contents (downside is it’ll encrypt the malware if it has it, too)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SSL and TLS

A

Cryptographic protocols that provide secure Internet communications for web browsing, instant messaging, email, VoIP, and many other services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Downgrade Attack

A

A protocol is tricked into using a lower quality version of itself instead of a higher quality version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SSH (Secure Shell)

A

A protocol that can create a secure channel between two computers or network devices to enable one device to control the other device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSH requires

A

a server (daemon) to be run on one device and a client on the other; operates over port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSH 2.0 uses

A

Diffie-Hellman key exchange and MACs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN

A

Secure connection between two or more computers or devices that are not on the same private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PPTP for VPN

A

A protocol that encapsulates PPP packets and ultimately sends data as encrypted traffic (port 1723)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

L2TP for VPN

A

Connection between two or more computers or device that are not on the same private network (not secure and doesn’t have any encryption - it’s usually paired with IPsec) (port 1701)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPSec for VPN

A

A TCP/IP protocol that authenticates and encrypts IP packets and effectively securing communications between computers and devices using this protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IKE

A

Internet Key Exchange - used by IPSec; has three modes - main, aggressive, quick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SA (Security Association)

A

Establishment of secure connections and share security information using certificates or cryptographic keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication Header

A

Protocol used in IPSec that provides integrity and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly