Secure Networks Flashcards
What protocol is session oriented and provides either 40bit or 128 bit encryption?
SSL
What are the characteristics of CHAP?
Challenge handshake authentication protocol… Used over PPP links and encrypts usernames and passwords.
What is PAP?
Password Authentication Protocol. Standard authentication protocol for PPP. Does transmit Usernames and passwords in clear.
What makes EAP Unique?
More of a framework for authentication than a protocol. Allows for 3rd party integration.
What is PPTP?
PPTP - Point To Point Tunneling Protocol. Derived from PPP and works at layer 2.
Describe the differences between L2F and L2TP
L2F - Layer 2 Forwarding vs L2TP - Layer 2 Tunneling Protocol. L2F does not encrypt.
Describe IPSec
Most commonly used VPN. It is both a protocol and a security mechanism for L2TP.
What are the 2 main components of IPsec?
Authentication Header (AH) - provides Authentication, integrity, and non repudiation. Encapsulating Security Payload (ESP) - Provides encryption. Operates at Layer 3.
In IPsec what is the difference between Transport Mode and Tunnel Mode?
In tunnel mode the entire packet is encrypted and in transport mode the header is not encrypted.
What is the address range for a private Class A network?
10.0.0.0 - 10.255.255.255
What is the address range for a private class B network?
172.16.0.0. - 172.31.255.255
What is the address range for a private class C network?
192.168.0.0 - 192.168.255.255
What is stateful NAT?
Basic NAT operation… Mapping of clients and internal addresses is maintained and managed during the session.
What is Static NAT?
Fixed address mapping. Used when and internal client needs to be accessed from the outside.
What is Dynamic NAT?
Allows multiple clients to share a few external IP addresses.
What is APIPA?
Automatic Private IP Addressing - Method of assigning IP address when DHCP fails. Primarily used in Windows
What is RFC 1918?
Standard for private IP addressing.
What is the difference between Circuit and Packet Switching?
Circuits depend on fixed connections for session communication and packets break payloads into smaller packets. oe Analog vs Digital.
What is a BRI?
Basic Rate Interface - 2 B Channel communication with a throughput of 64 Kbps per channel.
What is a PRI?
Primary Rate Interface - Allows multiple 64 Kbps B channels (2 - 23) and a single 64 Kbps D Channel.
What is the purpose of the D Channel?
Manages the link.
What is the CSU/ DSU and its purpose?
Border management in a WAN connection. CSU - Channel Service Unit
DSU - Data Service Unit
What is X.25?
Older packet switched technology used mainly in Europe.
What is Frame Relay?
Layer 2 packet switched. It supports multiple PVC (Permanent Virtual Circuit) over a single connection.
What is a PVC
Permanent virtual circuit. Like a dedicated leased line. Always on and ready to go.
What is an SVC
Switched Virtual Circuit. Operates more like a dial up connection. Some delay in opening the connection for use.
What is the Committed Information Rate?
CIR is the basic connection bandwidth before any bursting is taken into consideration.
What is ATM and when is it best used?
Asynchronous Transfer Mode - Packet Switching. Breaks packets into fixed 53 byte cells. Best used for high throughput environments.
What is transparency in design?
The ability to apply security that cannot be seen/ observed by users.
What are some checksum validation methods?
MD5 and SHA
What are some basic security mechanisms when deploying an SMTP server?
Change basic settings (ie passwords).
Apply patches.
DO NOT enable open relay. This makes you a target for spammers.
Which of the following VPN protocols do not offer native data encryption? A. L2F B. L2TP C. IPSec D. PPTP
L2F
L2TP
PPTP
At which OSI layer does the IPsec protocol function?
Network layer
When designing a security systems for internet delivered email, which of the following is least important? A. Non repudiation B. Availability C. Message Integrity D. Access Restriction
B. Availability
Which of the following is typically not a discussion topic with end users regarding email retention policies? A. Privacy B. Auditor Review C. Length of retention D. Backup method
D. - Backup method
Which of the following is a type of connection that can be described as a logical circuit that always exists and is waiting for data to be sent? A. ISDN B. PVC C. VPN D. SVC
B. PVC
What authentication protocol offers no encryption or protection for logon credentials? A. PAP B. CHAP C. SSL D. Radius
A. - PAP