Section 6: Understanding Secure and Insecure Protocols Flashcards

1
Q

What is the authentication protocol that uses tickets and prevents replay attacks?

A

Kerberos authentication, during which a TGT session is established where a user obtains an encrypted service ticket. Kerberos uses USN and timestamps to prevent replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe how IPSec tunnel mode works.

A

Used with L2TP/IPSec VPN session where both the Authenticated Header (AH) and Encapsulating Security Payload (ESP) are encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe how IPSec transport mode works.

A

Server-to-server on a LAN where only the Encapsulating Security Payload (ESP) is encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If an IT administrator uses Telnet to run remote commands on a router, which secure protocol can it be replaced with?

A

SSH is a secure protocol replacement for Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of a router?

A

Connects external networks and routes IP packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a switch?

A

Internal device connecting computers being used in the same location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of service is Spotify?

A

Subscription service where user pays a monthly fee. It is a pay-per-use model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain how port security works.

A

A port on a switch is disabled to prevent someone form using a particular wall jack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe how a managed switch with 802.1x works.

A

802.1x authenticates users and devices connecting to a switch.

Normally, the user or device has a certificate to authenticate them without the need to disable ports on the switch. An unauthorized user is prevented from using the port as they have no certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three portions of a distinguished name and the order that they come in?

A
  1. CN
  2. OU
  3. DC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which protocol can you use to prevent DNS poisoning?

A

DNSSEC, which produces RRSIG records and prevents DNS poisoning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two reasons why a computer might not receive an IP address from a DHCP server?

A
  1. Resource exhaustion
  2. Network connectivity issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of server would both a SIEM server and a Microsoft domain controller benefit from having installed on their network?

A

NTP server, to keep the clock times on the hosts up to date since they use Kerberos authentication. Otherwise, the SIEM server cannot put events into chronological order, meaning Kerberos clients cannot login.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If two companies rented offices on the same floor of a building, what could the building administrator implement to isolate them from each other?

A

VLANs in order to provide departmental isolation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of STP?

A

Spanning Tree Protocol (STP) prevents switches from looping, which slows the switch down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If a network administrator wanted to collect the statuses and reports of network devices, what secure protocol could they use?

A

SMTP v3.

17
Q

If a network administrator wants to set up a VPN, what is the most secure protocol that they can use?

A

AES is the strongest protocol for an L2TP/IPSec VPN, as it can use 256 bits.

18
Q

Which secure protocol can be used to prevent a pass-the-hash attack?

A

Kerberos, because it uses the Active Directory which stores the passwords in an encrypted database.

Pass-the-hash attacks are hash collision attacks against NTLM authentication.

19
Q

Which protocol protects data in transit?

A

Transport Layer Security (TLS) or Secure Sockets Layer (SSL).

20
Q

Which protocol can be used to digitally sign an email between two people?

A

Secure/Multipurpose Internet Mail Extensions (S/MIME).

21
Q

Which protocol can be used to secure video conferencing?

A

Secure Real-Time Transport Protocol (SRTP).

22
Q

Which protocol allows a user to put a Skype session on hold, speak to another person, and then come back to the first caller?

A

Session Initiation Protocol (SIP).

23
Q

A system administrator is managing a directory service using a protocol that uses TCP port 389. What protocol are they using and which protocol can be used to carry out the same task securely?

A

LDAP uses TCP port 389 and is used to manage directory services. It can be replaced by LDAPS TCP port 636, which is more secure.

24
Q

Say I use nbtstat -n command and the output shows me the following: IAN <00> IAN <20> What naming convention is used and what format is being show?

A

The format is NETBIOS, where the name is up to 15-characters long with a service identifier.

The host is called IAN.
<00> indicates the workstation service.
<20> indicates the server service.

25
Q

What protocol can be used to transfer large files remotely?

A

FTPS, over port 989/990.