Section 3.1 Secure Protocols Flashcards
What is layer 7 of the OSI model?
Application Layer
What is Layer 6 of the OSI model?
Presentation Layer
What is Layer 5 of the OSI model?
Session Layer
What is Layer 4 of the OSI model?
Transport Layer
What is layer 3 of the OSI model?
Network Layer
What is layer 2 of the OSI model?
Data Link Layer
What is layer 1 of the OSI model?
Physical Layer
What layer of the OSI model does the Hyper Text Transfer protocol correspond to?
Application layer
What layer of the OSI model does the Simple Mail Transfer Protocol correspond to?
Application Layer
What layer of the OSI model does the Multipurpose Internet Mail Extension Protocol correspond to?
Presentation layer
What layer of the OSI model does the Network File System Protocol correspond to?
Session Layer
What layer of the OSI model does the Transmission Control Protocol correspond to?
Transport Layer
What layer of the OSI model does the User Datagram Protocol correspond to?
Transport layer
What layer of the OSI protocol does the Internet Protocol versions 4 & 6 correspond to?
Network layer
What layer of the OSI model does the Point to Point Protocol (PPP) correspond to?
Data Link Layer
What protocol manages:
1)how to divide network messages into smaller frames and packages and
2) send network messages from source to destination by using error checking and flow control?
Transmission Control Protocol (TCP)
What protocol is responsible for reassembling divided packages and frames once they have reached their destination?
Transmission Control Protocol (TCP)
What protocol is used for addressing and routing network packets from source to destination device between LAN’s?
Internet Protocol
What protocol translates internet domains into IP addresses?
Domain Name System (DNS)
In a _______________ attack, the DNS server is overloaded with requests so the server can’t respond to legit DNS requests
Denial of Service
DNS uses port _______ on TCP and UDP
53
____________ allows a user to log in to a remote machine and execute commands
Secure Shell (SSH)
How does SSH work?
Provides a secure encrypted tunnel to access another system remotely
SSH uses port?
TCP port 22
_____________ is a specification for transferring multimedia and attachments through email
Multipurpose Internet Mail Extensions (MIME)
___________ offers a standard way for all mail clients and mail transfer systems to handle certain types of attachments.
Multipurpose Internet Mail Extensions (MIME)
____________ is used for sending confidential email that needs to be secured.
Secure Multipurpose Internet Mail Extensions (S/MIME)
___________digitally signs and encrypts emails using certificates
S/MIME
_____________ requires the use of public key certificates for authentication and provides message confidentiality and integrity via the user’s encryption & hashing algorithms.
S/MIME
Which protocol is used for delivering voice and video services over IP networks?
Real-Time Transport Protocol (RTP)
Because RTP does not inherently integrate encryption, what was developed to provide AES encryption?
Secure Real-Time Transfer Protocol (SRTP)
Which protocols are most commonly used for voice and video?
Real-time Transfer Protocol
Secure Real-Time Transfer Protocol
Which protocols are most commonly used for Time synchronization?
Network Time Server
Internet based time source running NTP on UDP port 123
Which protocols are most commonly used for email services?
Secure POP and Secure IMAP
Which protocols are most commonly used for web communications?
HTTPS
Which protocols are most commonly used for File Transfer?
FTPS and SFTP