Section 3.1 Secure Protocols Flashcards
What is layer 7 of the OSI model?
Application Layer
What is Layer 6 of the OSI model?
Presentation Layer
What is Layer 5 of the OSI model?
Session Layer
What is Layer 4 of the OSI model?
Transport Layer
What is layer 3 of the OSI model?
Network Layer
What is layer 2 of the OSI model?
Data Link Layer
What is layer 1 of the OSI model?
Physical Layer
What layer of the OSI model does the Hyper Text Transfer protocol correspond to?
Application layer
What layer of the OSI model does the Simple Mail Transfer Protocol correspond to?
Application Layer
What layer of the OSI model does the Multipurpose Internet Mail Extension Protocol correspond to?
Presentation layer
What layer of the OSI model does the Network File System Protocol correspond to?
Session Layer
What layer of the OSI model does the Transmission Control Protocol correspond to?
Transport Layer
What layer of the OSI model does the User Datagram Protocol correspond to?
Transport layer
What layer of the OSI protocol does the Internet Protocol versions 4 & 6 correspond to?
Network layer
What layer of the OSI model does the Point to Point Protocol (PPP) correspond to?
Data Link Layer
What protocol manages:
1)how to divide network messages into smaller frames and packages and
2) send network messages from source to destination by using error checking and flow control?
Transmission Control Protocol (TCP)
What protocol is responsible for reassembling divided packages and frames once they have reached their destination?
Transmission Control Protocol (TCP)
What protocol is used for addressing and routing network packets from source to destination device between LAN’s?
Internet Protocol
What protocol translates internet domains into IP addresses?
Domain Name System (DNS)
In a _______________ attack, the DNS server is overloaded with requests so the server can’t respond to legit DNS requests
Denial of Service
DNS uses port _______ on TCP and UDP
53
____________ allows a user to log in to a remote machine and execute commands
Secure Shell (SSH)
How does SSH work?
Provides a secure encrypted tunnel to access another system remotely
SSH uses port?
TCP port 22
_____________ is a specification for transferring multimedia and attachments through email
Multipurpose Internet Mail Extensions (MIME)
___________ offers a standard way for all mail clients and mail transfer systems to handle certain types of attachments.
Multipurpose Internet Mail Extensions (MIME)
____________ is used for sending confidential email that needs to be secured.
Secure Multipurpose Internet Mail Extensions (S/MIME)
___________digitally signs and encrypts emails using certificates
S/MIME
_____________ requires the use of public key certificates for authentication and provides message confidentiality and integrity via the user’s encryption & hashing algorithms.
S/MIME
Which protocol is used for delivering voice and video services over IP networks?
Real-Time Transport Protocol (RTP)
Because RTP does not inherently integrate encryption, what was developed to provide AES encryption?
Secure Real-Time Transfer Protocol (SRTP)
Which protocols are most commonly used for voice and video?
Real-time Transfer Protocol
Secure Real-Time Transfer Protocol
Which protocols are most commonly used for Time synchronization?
Network Time Server
Internet based time source running NTP on UDP port 123
Which protocols are most commonly used for email services?
Secure POP and Secure IMAP
Which protocols are most commonly used for web communications?
HTTPS
Which protocols are most commonly used for File Transfer?
FTPS and SFTP
Which protocols are most commonly used for Directory Services?
LDAPS
Which protocols are most commonly used for Remote Access?
IPSec
Which protocols are most commonly used for Domain Name Resolution?
DNSSEC
Which protocols are most commonly used for Routing and Switching?
The two aspects of the TCP/IP protocol: TCP and IP
Which protocols are most commonly used for Network Address Allocation?
DHCP
__________ is a vendor-neutral software protocol used to lookup information or devices within a network.
Lightweight Directory Access Protocol (LDAP)
_________ is designed to maintain and access directory services within a network
LDAP
Most LDAP servers support the use of ______________ to communicate with clients
Encrypted secure channels
Which protocol uses SSL or TLS to allow secure file transferring using built-in encryption and authentication mechanisms?
File Transfer Protocol Secure (FTPS)
Which protocol uses TCP port 990?
File Transfer Protocol Secure (FTPS)
Which protocol uses SSH to create a FTP tunnel through an SSH connection?
SSH File Transfer Protocol (SFTP)
Which protocol allows you to use network monitoring programs to analyze diagnostic information on network devices?
Simple Network Management Protocol (SNMP)
What file contains the organized SNMP data?
Management Information Based (MIB) file
SNMP’s security consists of a password system called?
Community Strings
_____________ are simple passphrases used by SNMP to access each device
Community Strings
SNMP passwords should be changed when?
immediately after set up
What are used to limit SNMP access to a specific IP address of a network monitoring system?
Access Control Lists (ACL)
Which protocol provides a secure way of transmitting HTTP data between a web browser and a web server?
Hypertext Transfer Protocol over SSL/TLS (HTTPS)
HTTPS provides secure web transmissions by using?
SSL/TLS and certificates to provide encrypted and protected communications.
HTTPS uses ________ as its default secure protocol?
TLS
What is a standards based suite of protocols that provide confidentiality, integrity, and authenticity to information transferred across IP networks?
IPSec
Which protocol is most often used to secure VPN communications over an open network?
IPSec
Which protocol’s use is mandatory in IPv6?
IPSec
Which mode of IPSec uses the IP addresses in the outer header to determine the IPSec policy that will be applied to the packet?
Transport Mode
Which mode of IPSec is used only in host-to-host communications?
Transport Mode
Which mode of IPSec sends to IP headers and uses the inner IP packet to determine the IPSec policy that will be applied to the packet?
Tunnel Mode
Which mode of IPSec is used to host VPN gateway communications?
Tunnel Mode
What IPSec protocol provides a mechanism for authentication only?
Authentication Header
What IPSec protocol provides data confidentiality (encryption) and authentication (data integrity, data origin authentication, and replay protection)
Encapsulating Security Payload
What specify the cryptographic parameters that must be agreed upon before the data transfer between 2 devices?
Security Associations
What provides the framework for Authentication Headers and Encapsulating Security Payloads to work?
Security Associations
What is the framework that authenticates the communicating devices and exchanges the keys as part of a security association establishment
Internet Security Association and Key Management Protocol (ISAKMP)
What protocol does the actual key exchange during a security association establishment?
Internet Key Exchange (IKE)
What protocol is a method of securely sharing keys between 2 security devices?
Internet Key Exchange (IKE)
Which protocol provides a way for users to retrieve mail from their inboxes using a POP-enabled email client?
Post Office Protocol
Which protocol uses TCP port 110?
Post Office Protocol
Which protocol is basically a version of POP that gives users more control over downloaded messages and how they are stored online?
Internet Message Access Protocol (IMAP)
Which protocol uses TCP port 143?
Internet Message Access Protocol (IMAP)
Which protocol uses TCP port 995?
Secure POP
Which protocol uses TCP port 993?
Secure IMAP
Which protocol is used to navigate email to it’s destination?
Simple Mail Transfer Protocol (SMTP)
Which protocol uses TCP port 25?
Simple Mail Transfer Protocol (SMTP)
Which protocol uses UDP port 123?
Network Time Protocol (NTP)
Which protocol allocates IP addresses and other network information on a network automatically?
Dynamic Host Configuration Protocol (DHCP)
Which protocol uses UDP ports 67 & 68?
Dynamic Host Configuration Protocol (DHCP)
What protocol is used to secure remote access (LInux and Network)?
Secure Shell on port 22
What protocol is used to secure copy to Linux/Unix?
Secure copy protocol port 22
What protocol is used to secure FTP downloads?
SSH File Transfer Protocol port 22
What protocol is used for secure authentication?
Kerberos on port 88
What protocol is used for remote monitoring and configuration of SNMP entities (such as network devices)?
Simple Network Management Protocol v3 on port 162
What protocol is used for secure directory services information?
Lightweight Directory Access Protocol over SSL (LDAPS) on port 636
What protocol is used for secure VPN sessions between 2 hosts?
IPSec on UDP port 500
What protocol is used for secure remote access?
Remote Desktop Protocol on port 3389
What protocol is used for signaling and controlling in Internet telephony for voice and video?
Session Initiated Protocol (SIP) on port 5060/5061
What protocol is used for encryption, message authentication, and integrity for audio and video over IP networks?
Secure Real Time Protocol (SRTP) on port 5061