Securing TCP/IP Flashcards

1
Q

Process of guaranteeing that someone can’t deny that they sent a message; message can be traced back to the sender

A

nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption using the same key for the encryption and decryption

A

symmetric-key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption using different keys for the encryption and decryption

A

asymmetric-key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Grandaddy of all symmetric-key algorithms, it used a 64-bit block and 56-bit key for encryption; susceptible to brute force

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric algorithm in which data is encrypted in discrete chunks of a certain length

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric algorithm in which data is encrypted one bit at a time; quick and popular with older wireless network or cell phones

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Popular stream cipher that was fast, easy to use, and free; considered a legacy cipher due to found weaknesses

A

Rivest Cipher 4 (RC4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric algorithm that uses a 128-bit block size and a 128-, 192-, or 256-bit key for encryption; most popular symmetric algorithm

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Primary asymmetric implementation where one user keeps a private key to himself and send a public key to another; data is encrypted using the public key, the decrypted later using the private key; today, this is done by encrypting and decrypting a symmetric key

A

public-key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

system used by most asymmetric cryptographic implementations

A

RSA (Rivest, Shamir, and Adleman)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

First commonly used hash, which resulted in a 128-bit message digest

A

Message-Digest Algorithm version 5 (MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The primary family of cryptographic has functions used these days, which includes 3 different versions (version 1 no longer used, version 2 is most popular right now)

A

Secure Hash Algorithm (SHA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A special form of MD5 used by SMTP servers, it is used as a tool for server authentication

A

Challenge-Response Authentication Mechanism-Message Digest 5 (CRAM-MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organization/tree of certificate authorities; sometimes consists of root CA’s, intermediate CA’s, and issuing CA’s

A

public-key infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A newer series of protection applications that combine features previously done my multiple applications; these prevent computers lacking anti-malware and patches from accessing the network and create policies for what systems can do on a network

A

Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security model where each resource is assigned a label defining its security level, and any user without that level of security is not granted access; oldest and least used

A

mandatory access control (MAC)

17
Q

Security model where an “owner” of a resource assigns access to that resource - more flexible

A

discretionary access control (DAC)

18
Q

Security model where a user’s access to a resource is based on their roles in the network; this is typically linked to groups the user is linked to; most popular for file sharing

A

role-based access control (RBAC)

19
Q

Protocol enabling two point-to-point devices to connect, authenticate, and negotiate the network protocol to be used

A

point-to-point protocol (PPP)

20
Q

Included with PPP, this protocol provides a more secure authentication routine by hashing using a shared secret, like a passwords known by both sides

A

Challenge Handshake Authentication Protocol (CHAP)

21
Q

Form of AAA standard created to support ISPs with hundreds of modems; consists of three devices: a server with access to a database of usernames and passwords, some NAS’s that control the modems, and systems that connect to the network

A

Remote Authentication Dial-In User Service (RADIUS)

22
Q

Most popular choice of RADIUS server for Microsoft environments, included in most versions Windows Server OS’s

A

Internet Authentication Service (IAS)

23
Q

AAA standard/protocol developed by Cisco to provide support in a system with many routers and switches, uses TCP port 49; uses PAP, CHAP, and MD5 hashes as well as Kerberos

A

Terminal Access Controller Access Control System Plus (TACACS+)

24
Q

Authentication protocol used by all Windows networks using a domain controller; for networks with many clients connected to a single authenticating server - no point-to-point

A

Kerberos

25
Q

that which ID’s a user or group in a token, used for authorization

A

security identifier (SID)

26
Q

SNMP’s version of a server which stores network information - agents access this for the info

A

Management Information Base (MIB)

27
Q

Tool that programs use to query and change databases used by a network (AD, for example); computers use this to update the database on another computer; uses TCP and UDP ports 389 by default, though deprecated versions of this used TCP 636

A

Lightweight Directory Access Protocol (LDAP)

28
Q

One of the first protocols after the intro to SSH used to securely transfer data between two hosts; last directory listing; still exists with the <> command-line utility in UNIX systems

A

Secure Copy Protocol (SCP)