Section 6: Understanding Secure and Insecure Protocols Flashcards
What is the authentication protocol that uses tickets and prevents replay attacks?
Kerberos authentication, during which a TGT session is established where a user obtains an encrypted service ticket. Kerberos uses USN and timestamps to prevent replay attacks.
Describe how IPSec tunnel mode works.
Used with L2TP/IPSec VPN session where both the Authenticated Header (AH) and Encapsulating Security Payload (ESP) are encrypted.
Describe how IPSec transport mode works.
Server-to-server on a LAN where only the Encapsulating Security Payload (ESP) is encrypted.
If an IT administrator uses Telnet to run remote commands on a router, which secure protocol can it be replaced with?
SSH is a secure protocol replacement for Telnet.
What is the purpose of a router?
Connects external networks and routes IP packets.
What is the purpose of a switch?
Internal device connecting computers being used in the same location.
What type of service is Spotify?
Subscription service where user pays a monthly fee. It is a pay-per-use model.
Explain how port security works.
A port on a switch is disabled to prevent someone form using a particular wall jack.
Describe how a managed switch with 802.1x works.
802.1x authenticates users and devices connecting to a switch.
Normally, the user or device has a certificate to authenticate them without the need to disable ports on the switch. An unauthorized user is prevented from using the port as they have no certificate.
What are the three portions of a distinguished name and the order that they come in?
- CN
- OU
- DC
Which protocol can you use to prevent DNS poisoning?
DNSSEC, which produces RRSIG records and prevents DNS poisoning.
What are the two reasons why a computer might not receive an IP address from a DHCP server?
- Resource exhaustion
- Network connectivity issues
What type of server would both a SIEM server and a Microsoft domain controller benefit from having installed on their network?
NTP server, to keep the clock times on the hosts up to date since they use Kerberos authentication. Otherwise, the SIEM server cannot put events into chronological order, meaning Kerberos clients cannot login.
If two companies rented offices on the same floor of a building, what could the building administrator implement to isolate them from each other?
VLANs in order to provide departmental isolation.
What is the purpose of STP?
Spanning Tree Protocol (STP) prevents switches from looping, which slows the switch down.