Securing TCP/IP Flashcards

1
Q

Process of guaranteeing that someone can’t deny that they sent a message; message can be traced back to the sender

A

nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption using the same key for the encryption and decryption

A

symmetric-key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption using different keys for the encryption and decryption

A

asymmetric-key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Grandaddy of all symmetric-key algorithms, it used a 64-bit block and 56-bit key for encryption; susceptible to brute force

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric algorithm in which data is encrypted in discrete chunks of a certain length

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric algorithm in which data is encrypted one bit at a time; quick and popular with older wireless network or cell phones

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Popular stream cipher that was fast, easy to use, and free; considered a legacy cipher due to found weaknesses

A

Rivest Cipher 4 (RC4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric algorithm that uses a 128-bit block size and a 128-, 192-, or 256-bit key for encryption; most popular symmetric algorithm

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Primary asymmetric implementation where one user keeps a private key to himself and send a public key to another; data is encrypted using the public key, the decrypted later using the private key; today, this is done by encrypting and decrypting a symmetric key

A

public-key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

system used by most asymmetric cryptographic implementations

A

RSA (Rivest, Shamir, and Adleman)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

First commonly used hash, which resulted in a 128-bit message digest

A

Message-Digest Algorithm version 5 (MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The primary family of cryptographic has functions used these days, which includes 3 different versions (version 1 no longer used, version 2 is most popular right now)

A

Secure Hash Algorithm (SHA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A special form of MD5 used by SMTP servers, it is used as a tool for server authentication

A

Challenge-Response Authentication Mechanism-Message Digest 5 (CRAM-MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organization/tree of certificate authorities; sometimes consists of root CA’s, intermediate CA’s, and issuing CA’s

A

public-key infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A newer series of protection applications that combine features previously done my multiple applications; these prevent computers lacking anti-malware and patches from accessing the network and create policies for what systems can do on a network

A

Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security model where each resource is assigned a label defining its security level, and any user without that level of security is not granted access; oldest and least used

A

mandatory access control (MAC)

17
Q

Security model where an “owner” of a resource assigns access to that resource - more flexible

A

discretionary access control (DAC)

18
Q

Security model where a user’s access to a resource is based on their roles in the network; this is typically linked to groups the user is linked to; most popular for file sharing

A

role-based access control (RBAC)

19
Q

Protocol enabling two point-to-point devices to connect, authenticate, and negotiate the network protocol to be used

A

point-to-point protocol (PPP)

20
Q

Included with PPP, this protocol provides a more secure authentication routine by hashing using a shared secret, like a passwords known by both sides

A

Challenge Handshake Authentication Protocol (CHAP)

21
Q

Form of AAA standard created to support ISPs with hundreds of modems; consists of three devices: a server with access to a database of usernames and passwords, some NAS’s that control the modems, and systems that connect to the network

A

Remote Authentication Dial-In User Service (RADIUS)

22
Q

Most popular choice of RADIUS server for Microsoft environments, included in most versions Windows Server OS’s

A

Internet Authentication Service (IAS)

23
Q

AAA standard/protocol developed by Cisco to provide support in a system with many routers and switches, uses TCP port 49; uses PAP, CHAP, and MD5 hashes as well as Kerberos

A

Terminal Access Controller Access Control System Plus (TACACS+)

24
Q

Authentication protocol used by all Windows networks using a domain controller; for networks with many clients connected to a single authenticating server - no point-to-point

25
that which ID's a user or group in a token, used for authorization
security identifier (SID)
26
SNMP's version of a server which stores network information - agents access this for the info
Management Information Base (MIB)
27
Tool that programs use to query and change databases used by a network (AD, for example); computers use this to update the database on another computer; uses TCP and UDP ports 389 by default, though deprecated versions of this used TCP 636
Lightweight Directory Access Protocol (LDAP)
28
One of the first protocols after the intro to SSH used to securely transfer data between two hosts; last directory listing; still exists with the <> command-line utility in UNIX systems
Secure Copy Protocol (SCP)