Secure Protocols Flashcards
_____ is when a port scanner uses a tool such as Nmap that can reveal the presence of a router and which dynamic routing and management protocols it is running.
Fingerprinting
The _____ provides an automatic method for network address allocation. As well, an IP address and subnet mask can include optional parameters
Dynamic Host Configuration Protocol (DHCP)
The _____ is a system for resolving host names and domain labels to IP addresses. It uses a distributed database system that contains information on domains and hosts within those domains.
Domain Name System (DNS)
_____ help to mitigate against spoofing and poisoning attacks by providing a validation process for DNS responses.
DNS Security Extensions (DNSSEC)
_____ is another redirection attack, but instead of trying to subvert the name service used by the client, it aims to corrupt the records held by the DNS server itself.
DNS server cache poisoning
_____ is a set of open, non-proprietary standards that you can use to secure data as it travels across the network or the Internet.
Internet Protocol Security (IPSec)
The _____ protocol performs a cryptographic hash on the packet plus a shared secret key (known only to the communicating hosts) and adds this Hashed Message Authentication Code (HMAC) in its header as an Integrity Check Value (ICV).
Authentication Header (AH)
_____ is when the whole IP packet (header and payload) is encrypted and a new IP header added.
Tunnel mode
_____ is a set of open, non-proprietary standards that you can use to secure data as it travels across the network or the Internet.
Internet Protocol Security (IPSec)
The _____ protocol provides confidentiality and/or authentication and integrity. It encrypts the data payload.
Encapsulation Security Payload (ESP)
_____ secures communications between hosts on a private network (an end-to-end implementation)
Transport mode
AH and ESP running transport mode provides confidentiality, integrity, and authentication for internal secure communication.
_____ is a widely accepted method for sending digitally signed and encrypted messages. It allows the sender to encrypt the emails and digitally sign them.
Secure/Multipurpose Internet Mail Extensions (S/MIME)
The _____ is one of the most widely used session control protocols.
Session Initiation Protocol (SIP)
The _____ is a mailbox protocol designed to allow mail to be stored on a server and downloaded to the recipient’s email client at his or her convenience.
Post Office Protocol v3 (POP3)
_____ uses port 636 to set up a secure channel to a directory service using a digital certificate.
Lightweight Directory Access Protocol Secure (LDAPS)