Secure Protocols Flashcards

1
Q

_____ is when a port scanner uses a tool such as Nmap that can reveal the presence of a router and which dynamic routing and management protocols it is running.

A

Fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The _____ provides an automatic method for network address allocation. As well, an IP address and subnet mask can include optional parameters

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The _____ is a system for resolving host names and domain labels to IP addresses. It uses a distributed database system that contains information on domains and hosts within those domains.

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ help to mitigate against spoofing and poisoning attacks by providing a validation process for DNS responses.

A

DNS Security Extensions (DNSSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ is another redirection attack, but instead of trying to subvert the name service used by the client, it aims to corrupt the records held by the DNS server itself.

A

DNS server cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ is a set of open, non-proprietary standards that you can use to secure data as it travels across the network or the Internet.

A

Internet Protocol Security (IPSec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The _____ protocol performs a cryptographic hash on the packet plus a shared secret key (known only to the communicating hosts) and adds this Hashed Message Authentication Code (HMAC) in its header as an Integrity Check Value (ICV).

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ is when the whole IP packet (header and payload) is encrypted and a new IP header added.

A

Tunnel mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ is a set of open, non-proprietary standards that you can use to secure data as it travels across the network or the Internet.

A

Internet Protocol Security (IPSec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The _____ protocol provides confidentiality and/or authentication and integrity. It encrypts the data payload.

A

Encapsulation Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ secures communications between hosts on a private network (an end-to-end implementation)

A

Transport mode

AH and ESP running transport mode provides confidentiality, integrity, and authentication for internal secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ is a widely accepted method for sending digitally signed and encrypted messages. It allows the sender to encrypt the emails and digitally sign them.

A

Secure/Multipurpose Internet Mail Extensions (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The _____ is one of the most widely used session control protocols.

A

Session Initiation Protocol (SIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The _____ is a mailbox protocol designed to allow mail to be stored on a server and downloaded to the recipient’s email client at his or her convenience.

A

Post Office Protocol v3 (POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ uses port 636 to set up a secure channel to a directory service using a digital certificate.

A

Lightweight Directory Access Protocol Secure (LDAPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ provides confidentiality and/or authentication and integrity. ESP is used with Internet Protocol Security (IPSec) over layer 3 of the Open Systems Interconnection (OSI) model.

A

Encapsulation Security Payload (ESP)

17
Q

_____ use messaging applications that combine multiple communications channels and technologies into a single platform. These communications channels can include voice, messaging, interactive whiteboards, data sharing, email, and social media

A

Unified Communications (UC)

18
Q

_____ is deprecated and should only be deployed when subject to risk assessments.

A

SSL 2.0

19
Q

_____ adds support for the strong Secure Hash Algorithm (SHA)-256 cipher.

A

Transport Layer Security (TLS) 1.2

20
Q

_____ is designed for dial-up access. The client contacts the server to download its messages, then disconnects. IMAP supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously. Messages are stored and organized on the server.

A

Secure Internet Message Access Protocol v4 (IMAP4)

21
Q

_____ specifies how mail is delivered from one system to another.

A

Simple Mail Transfer Protocol (SMTP)

22
Q

_____ implicitly negotiates a Secure Sockets Layer/Transport Layer Security (SSL/TLS) tunnel before the exchange of any File Transfer Protocol (FTP) commands. This mode uses the secure port 990 for the control connection.

A

File Transfer Protocol over SSL (FTPS)

23
Q

_____ uses the AUTH TLS command to upgrade an unsecure connection established over port 21 to a secure one. This negotiates a SSL/TLS tunnel explicitly and is preferred over FTPS.

A

Explicit FTP over SSL (FTPES)

24
Q

_____ encrypts the authentication and data transfer between the client and server and a secure link is created between the client and server using SSH.

A

Secure Shell FTP (SFTP)

25
Q

_____ is a connectionless protocol that provides file transfer services but does not provide guaranteed delivery.

A

Trivial File Transfer Protocol (TFTP)

26
Q

Top level Network Time Protocol (NTP) servers _____ obtain the Coordinated Universal Time (UTC) from a highly accurate clock source, such as an atomic clock.

A

stratum 1

27
Q

A _____ server would obtain the time from a stratum 1 server, but not in reverse.

A

stratum 2

28
Q

A _____ server would obtain the time from a stratum 2

A

stratum 3

29
Q

_____ supports encryption and strong user-based authentication. Instead of community names, the agent is configured with a list of usernames and access permissions.

A

Simple Network Management Protocol (SNMP) v3

30
Q

_____ is the database that the SNMP agent uses. The agent is a process that runs on a switch, router, server, or SNMP compatible network device.

A

Management Information Base (MIB)

31
Q

_____ uses community names that are sent in plaintext and should not be transmitted over the network if there is any risk they could be intercepted.

A

Simple Network Management Protocol SNMPv1

32
Q

_____ is the default Windows secure authentication and authorization protocol for directory services. It is a single sign-on service based on a time-sensitive ticket-granting system.

A

Kerberos

33
Q

_____ encrypts actual real-time data, like voice and video. It provides confidentiality for the actual call data.

A

Secure real-time transport protocol (SRTP)