Section 3.1 Secure Protocols Flashcards

1
Q

What is layer 7 of the OSI model?

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Layer 6 of the OSI model?

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Layer 5 of the OSI model?

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Layer 4 of the OSI model?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is layer 3 of the OSI model?

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is layer 2 of the OSI model?

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is layer 1 of the OSI model?

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What layer of the OSI model does the Hyper Text Transfer protocol correspond to?

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What layer of the OSI model does the Simple Mail Transfer Protocol correspond to?

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What layer of the OSI model does the Multipurpose Internet Mail Extension Protocol correspond to?

A

Presentation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What layer of the OSI model does the Network File System Protocol correspond to?

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What layer of the OSI model does the Transmission Control Protocol correspond to?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What layer of the OSI model does the User Datagram Protocol correspond to?

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What layer of the OSI protocol does the Internet Protocol versions 4 & 6 correspond to?

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What layer of the OSI model does the Point to Point Protocol (PPP) correspond to?

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What protocol manages:
1)how to divide network messages into smaller frames and packages and
2) send network messages from source to destination by using error checking and flow control?

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What protocol is responsible for reassembling divided packages and frames once they have reached their destination?

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What protocol is used for addressing and routing network packets from source to destination device between LAN’s?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What protocol translates internet domains into IP addresses?

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In a _______________ attack, the DNS server is overloaded with requests so the server can’t respond to legit DNS requests

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DNS uses port _______ on TCP and UDP

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

____________ allows a user to log in to a remote machine and execute commands

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does SSH work?

A

Provides a secure encrypted tunnel to access another system remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SSH uses port?

A

TCP port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

_____________ is a specification for transferring multimedia and attachments through email

A

Multipurpose Internet Mail Extensions (MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

___________ offers a standard way for all mail clients and mail transfer systems to handle certain types of attachments.

A

Multipurpose Internet Mail Extensions (MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

____________ is used for sending confidential email that needs to be secured.

A

Secure Multipurpose Internet Mail Extensions (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

___________digitally signs and encrypts emails using certificates

A

S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

_____________ requires the use of public key certificates for authentication and provides message confidentiality and integrity via the user’s encryption & hashing algorithms.

A

S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which protocol is used for delivering voice and video services over IP networks?

A

Real-Time Transport Protocol (RTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Because RTP does not inherently integrate encryption, what was developed to provide AES encryption?

A

Secure Real-Time Transfer Protocol (SRTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which protocols are most commonly used for voice and video?

A

Real-time Transfer Protocol
Secure Real-Time Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which protocols are most commonly used for Time synchronization?

A

Network Time Server
Internet based time source running NTP on UDP port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which protocols are most commonly used for email services?

A

Secure POP and Secure IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which protocols are most commonly used for web communications?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which protocols are most commonly used for File Transfer?

A

FTPS and SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which protocols are most commonly used for Directory Services?

A

LDAPS

38
Q

Which protocols are most commonly used for Remote Access?

A

IPSec

39
Q

Which protocols are most commonly used for Domain Name Resolution?

A

DNSSEC

40
Q

Which protocols are most commonly used for Routing and Switching?

A

The two aspects of the TCP/IP protocol: TCP and IP

41
Q

Which protocols are most commonly used for Network Address Allocation?

A

DHCP

42
Q

__________ is a vendor-neutral software protocol used to lookup information or devices within a network.

A

Lightweight Directory Access Protocol (LDAP)

43
Q

_________ is designed to maintain and access directory services within a network

A

LDAP

44
Q

Most LDAP servers support the use of ______________ to communicate with clients

A

Encrypted secure channels

45
Q

Which protocol uses SSL or TLS to allow secure file transferring using built-in encryption and authentication mechanisms?

A

File Transfer Protocol Secure (FTPS)

46
Q

Which protocol uses TCP port 990?

A

File Transfer Protocol Secure (FTPS)

47
Q

Which protocol uses SSH to create a FTP tunnel through an SSH connection?

A

SSH File Transfer Protocol (SFTP)

48
Q

Which protocol allows you to use network monitoring programs to analyze diagnostic information on network devices?

A

Simple Network Management Protocol (SNMP)

49
Q

What file contains the organized SNMP data?

A

Management Information Based (MIB) file

50
Q

SNMP’s security consists of a password system called?

A

Community Strings

51
Q

_____________ are simple passphrases used by SNMP to access each device

A

Community Strings

52
Q

SNMP passwords should be changed when?

A

immediately after set up

53
Q

What are used to limit SNMP access to a specific IP address of a network monitoring system?

A

Access Control Lists (ACL)

54
Q

Which protocol provides a secure way of transmitting HTTP data between a web browser and a web server?

A

Hypertext Transfer Protocol over SSL/TLS (HTTPS)

55
Q

HTTPS provides secure web transmissions by using?

A

SSL/TLS and certificates to provide encrypted and protected communications.

56
Q

HTTPS uses ________ as its default secure protocol?

A

TLS

57
Q

What is a standards based suite of protocols that provide confidentiality, integrity, and authenticity to information transferred across IP networks?

A

IPSec

58
Q

Which protocol is most often used to secure VPN communications over an open network?

A

IPSec

59
Q

Which protocol’s use is mandatory in IPv6?

A

IPSec

60
Q

Which mode of IPSec uses the IP addresses in the outer header to determine the IPSec policy that will be applied to the packet?

A

Transport Mode

61
Q

Which mode of IPSec is used only in host-to-host communications?

A

Transport Mode

62
Q

Which mode of IPSec sends to IP headers and uses the inner IP packet to determine the IPSec policy that will be applied to the packet?

A

Tunnel Mode

63
Q

Which mode of IPSec is used to host VPN gateway communications?

A

Tunnel Mode

64
Q

What IPSec protocol provides a mechanism for authentication only?

A

Authentication Header

65
Q

What IPSec protocol provides data confidentiality (encryption) and authentication (data integrity, data origin authentication, and replay protection)

A

Encapsulating Security Payload

66
Q

What specify the cryptographic parameters that must be agreed upon before the data transfer between 2 devices?

A

Security Associations

67
Q

What provides the framework for Authentication Headers and Encapsulating Security Payloads to work?

A

Security Associations

68
Q

What is the framework that authenticates the communicating devices and exchanges the keys as part of a security association establishment

A

Internet Security Association and Key Management Protocol (ISAKMP)

69
Q

What protocol does the actual key exchange during a security association establishment?

A

Internet Key Exchange (IKE)

70
Q

What protocol is a method of securely sharing keys between 2 security devices?

A

Internet Key Exchange (IKE)

71
Q

Which protocol provides a way for users to retrieve mail from their inboxes using a POP-enabled email client?

A

Post Office Protocol

72
Q

Which protocol uses TCP port 110?

A

Post Office Protocol

73
Q

Which protocol is basically a version of POP that gives users more control over downloaded messages and how they are stored online?

A

Internet Message Access Protocol (IMAP)

74
Q

Which protocol uses TCP port 143?

A

Internet Message Access Protocol (IMAP)

75
Q

Which protocol uses TCP port 995?

A

Secure POP

76
Q

Which protocol uses TCP port 993?

A

Secure IMAP

77
Q

Which protocol is used to navigate email to it’s destination?

A

Simple Mail Transfer Protocol (SMTP)

78
Q

Which protocol uses TCP port 25?

A

Simple Mail Transfer Protocol (SMTP)

79
Q

Which protocol uses UDP port 123?

A

Network Time Protocol (NTP)

80
Q

Which protocol allocates IP addresses and other network information on a network automatically?

A

Dynamic Host Configuration Protocol (DHCP)

81
Q

Which protocol uses UDP ports 67 & 68?

A

Dynamic Host Configuration Protocol (DHCP)

82
Q

What protocol is used to secure remote access (LInux and Network)?

A

Secure Shell on port 22

83
Q

What protocol is used to secure copy to Linux/Unix?

A

Secure copy protocol port 22

84
Q

What protocol is used to secure FTP downloads?

A

SSH File Transfer Protocol port 22

85
Q

What protocol is used for secure authentication?

A

Kerberos on port 88

86
Q

What protocol is used for remote monitoring and configuration of SNMP entities (such as network devices)?

A

Simple Network Management Protocol v3 on port 162

87
Q

What protocol is used for secure directory services information?

A

Lightweight Directory Access Protocol over SSL (LDAPS) on port 636

88
Q

What protocol is used for secure VPN sessions between 2 hosts?

A

IPSec on UDP port 500

89
Q

What protocol is used for secure remote access?

A

Remote Desktop Protocol on port 3389

90
Q

What protocol is used for signaling and controlling in Internet telephony for voice and video?

A

Session Initiated Protocol (SIP) on port 5060/5061

91
Q

What protocol is used for encryption, message authentication, and integrity for audio and video over IP networks?

A

Secure Real Time Protocol (SRTP) on port 5061