Secure Protocols Flashcards
_____ is when a port scanner uses a tool such as Nmap that can reveal the presence of a router and which dynamic routing and management protocols it is running.
Fingerprinting
The _____ provides an automatic method for network address allocation. As well, an IP address and subnet mask can include optional parameters
Dynamic Host Configuration Protocol (DHCP)
The _____ is a system for resolving host names and domain labels to IP addresses. It uses a distributed database system that contains information on domains and hosts within those domains.
Domain Name System (DNS)
_____ help to mitigate against spoofing and poisoning attacks by providing a validation process for DNS responses.
DNS Security Extensions (DNSSEC)
_____ is another redirection attack, but instead of trying to subvert the name service used by the client, it aims to corrupt the records held by the DNS server itself.
DNS server cache poisoning
_____ is a set of open, non-proprietary standards that you can use to secure data as it travels across the network or the Internet.
Internet Protocol Security (IPSec)
The _____ protocol performs a cryptographic hash on the packet plus a shared secret key (known only to the communicating hosts) and adds this Hashed Message Authentication Code (HMAC) in its header as an Integrity Check Value (ICV).
Authentication Header (AH)
_____ is when the whole IP packet (header and payload) is encrypted and a new IP header added.
Tunnel mode
_____ is a set of open, non-proprietary standards that you can use to secure data as it travels across the network or the Internet.
Internet Protocol Security (IPSec)
The _____ protocol provides confidentiality and/or authentication and integrity. It encrypts the data payload.
Encapsulation Security Payload (ESP)
_____ secures communications between hosts on a private network (an end-to-end implementation)
Transport mode
AH and ESP running transport mode provides confidentiality, integrity, and authentication for internal secure communication.
_____ is a widely accepted method for sending digitally signed and encrypted messages. It allows the sender to encrypt the emails and digitally sign them.
Secure/Multipurpose Internet Mail Extensions (S/MIME)
The _____ is one of the most widely used session control protocols.
Session Initiation Protocol (SIP)
The _____ is a mailbox protocol designed to allow mail to be stored on a server and downloaded to the recipient’s email client at his or her convenience.
Post Office Protocol v3 (POP3)
_____ uses port 636 to set up a secure channel to a directory service using a digital certificate.
Lightweight Directory Access Protocol Secure (LDAPS)
_____ provides confidentiality and/or authentication and integrity. ESP is used with Internet Protocol Security (IPSec) over layer 3 of the Open Systems Interconnection (OSI) model.
Encapsulation Security Payload (ESP)
_____ use messaging applications that combine multiple communications channels and technologies into a single platform. These communications channels can include voice, messaging, interactive whiteboards, data sharing, email, and social media
Unified Communications (UC)
_____ is deprecated and should only be deployed when subject to risk assessments.
SSL 2.0
_____ adds support for the strong Secure Hash Algorithm (SHA)-256 cipher.
Transport Layer Security (TLS) 1.2
_____ is designed for dial-up access. The client contacts the server to download its messages, then disconnects. IMAP supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously. Messages are stored and organized on the server.
Secure Internet Message Access Protocol v4 (IMAP4)
_____ specifies how mail is delivered from one system to another.
Simple Mail Transfer Protocol (SMTP)
_____ implicitly negotiates a Secure Sockets Layer/Transport Layer Security (SSL/TLS) tunnel before the exchange of any File Transfer Protocol (FTP) commands. This mode uses the secure port 990 for the control connection.
File Transfer Protocol over SSL (FTPS)
_____ uses the AUTH TLS command to upgrade an unsecure connection established over port 21 to a secure one. This negotiates a SSL/TLS tunnel explicitly and is preferred over FTPS.
Explicit FTP over SSL (FTPES)
_____ encrypts the authentication and data transfer between the client and server and a secure link is created between the client and server using SSH.
Secure Shell FTP (SFTP)
_____ is a connectionless protocol that provides file transfer services but does not provide guaranteed delivery.
Trivial File Transfer Protocol (TFTP)
Top level Network Time Protocol (NTP) servers _____ obtain the Coordinated Universal Time (UTC) from a highly accurate clock source, such as an atomic clock.
stratum 1
A _____ server would obtain the time from a stratum 1 server, but not in reverse.
stratum 2
A _____ server would obtain the time from a stratum 2
stratum 3
_____ supports encryption and strong user-based authentication. Instead of community names, the agent is configured with a list of usernames and access permissions.
Simple Network Management Protocol (SNMP) v3
_____ is the database that the SNMP agent uses. The agent is a process that runs on a switch, router, server, or SNMP compatible network device.
Management Information Base (MIB)
_____ uses community names that are sent in plaintext and should not be transmitted over the network if there is any risk they could be intercepted.
Simple Network Management Protocol SNMPv1
_____ is the default Windows secure authentication and authorization protocol for directory services. It is a single sign-on service based on a time-sensitive ticket-granting system.
Kerberos
_____ encrypts actual real-time data, like voice and video. It provides confidentiality for the actual call data.
Secure real-time transport protocol (SRTP)