Securing TCP/IP Flashcards

1
Q

What is cleartext

A

Unencrypted, readable data. Includes binary that a computer can read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the encryption process work?

A

Binary > Cipher > Key > Algorithm
The key is different each time, and effects the Algorithm’s output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An 8-bit key will produce an 8-bit length encryption key. How does this effect files that are bigger than 8 bits?

A

The encryption is simply repeated upon each group of 8 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is symmetric encryption?

A

When the key pairs can both encrypt and decrypt the data sent between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is block-cipher encryption?

A

It encrypts in specific lengths ( in bits)
If for example it encrypts 128-bits it will encrypt the first 128 bits using one encryption key, and then a different key for all subsequent 128-bit groups in the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a stream cipher?

A

Using a different key for each bit in the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a hash

A

Converting data into a fixed length data string. This is used to verify integrity of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SHA? and its number range

A

Secure hashing algorithm. The numbers in the names of each SHA is the bit length of the hash it creates.
224-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some real world applications of SHA-256?

A

SSH, Bitcoin, IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the process for digital signatures

A

Message > hash > encrypt with private key > Send to client >Client decrypts > Compares hash received to one stored in browser > Verified certificate.
This message will include the third party verification also.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s included in the hashed and encrypted message sent to a client during the certificate validation process?

A

Public key, certificate information, third-party signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where are the list of certificate authorities held (client-side)

A

In your browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an example of a location, action and temporal attribute?

A

Location, Mobile screen pattern lock, access only during a specific time of day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When would you use a self-signed certificate?

A

Internal use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is network access control?

A

Forcing policies and rulesets upon the machines within a business. Not being allowed to enter the network unless you’re fully up to date and in compliance with the business’ security criteria is an example of network access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ACL and three of its sub-models?

A

Access control list is a method of security used to define permissions among users when accessing resources.

Mandatory AC - Every resource is labled with a level of security clearance
Discretionary AC - The owner of the file, at their own discretion, decides who can access the file.
Role-based AC - Based on user groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is PPP and 3 of its traits

A

Point to point protocol. Used to connect an initiator to a PC with authentication. This uses usernames and passwords, which the initiator will send over to the authenticating PC. This only allows ONE connection to ONE PC.

-Username and pass
-Plaintext
-No hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is PAP? and what is it used in?

A

Password authentication protocol is the username and password process used in point to point protocol (PPP)
It was succeeded by MS CHAP, (MS challenge handshake protocol) that, while still doing plaintext, hashes its passwords for mild security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What form of PPP is still used in dial-up today?

A

MS-CHAPv2
-Username and pass
-Hashing
-No encryption (though the radius server will do this instead)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of a NAS?

A

NAS are the gateways people must go through to reach the inside of an enterprise network. You connect to this over PPP. When you try to connect to a business network, you will send your authentication to the Network Access Server, which will then forward the information on to the RADIUS server, and send the result back to you once it has it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is PKI?

A

Public Key infrastructure is the method by which certificate authorities use intermediate and root certificate servers to provide authentication to servers.
Root CA servers will not directly provide certificates, as they contain sensitive information regarding how the certificate is made. Instead, an intermediate CA server will speak with the Root CA to get a stamp of approval, and then pass it to an issuing CA server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is NAC?

A

Network access control controls the access of devices on your network. It ensures that systems trying to gain access meet compliance requirements and are generally fit to be on the network without causing any issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is PPP and its 3 variants

A

Point to point protocol is a method by which two computers communicate directly, using a password and username to authenticate before talking to one another.
Password Authentication protocol - Username and pass. Sent in clear text.
Challenge handshake protocol - Hashes username and password instead of clear text.
MS CHAP v2 - Same as CHAP, really.

24
Q

What is the order through which a dial up client would reach a radius server for authentication?

A

Creds > Network access server > Network access server forwards info to Radius > Radius verifies and returns result to NAS > NAS provides access

25
Q

Most MS servers come with Internet Access Service. What is Internet Access Service used for?

A

It enables the usage of RADIUS.

26
Q

What is the purpose of a network access server?

A

PPP implies a direct connection to the recipient. When you use PPP, it is presumed that the system you connect to holds all of the data needed to authenticate. In the case of large networks, this is not true. As a result, a Network Access Server relays information to the Radius server without exposing the server itself to the public, allowing for PPP to be verified through a long network while also meeting the requirements of a direct connection.

27
Q

What’s the difference between RADIUS, TACACS and Kerberos

A

TACACS+ provide significantly more granularity of authorization control and is used in many deployments today.
Kerberos is purely an authentication protocol. Second Kerberos tells the network services who you are. - Authenticates Users
On the other hand, RADIUS is an A-A-A protocol. RADIUS asked to allow a particular device or user to access the network. - Authenticates computers

28
Q

What does TACACS stand for?

A

Terminal access control access system plus

29
Q

Between Radius, TACACS and Kerberos, which are PPP?

A

TACACS, RADIUS

30
Q

What is a domain controller?

A

The server that holds the AD information

31
Q

How does the kerberos Access Token setup work?

A

Client creds > Authentication server > AS provides Ticket Granting Ticket > Client sends Ticket granting ticket to ticket granting system > Ticket granting system provides client with an access token

32
Q

What is an access token?

A

An access token is referenced when you access resources. Your access token decides what permissions you have on a network and must be refreshed every 8 hours.

33
Q

What happens if the kerberos KDC goes down?

A

The Kerberos Key Distribution Center (KDC) service supplies both session tickets and session keys in an Active Directory domain. If this goes down, no one can access anything.

34
Q

What terminal access method can be used to tunnel for many times of programs?

A

SSH

35
Q

True or false: For SSH, you can have a pre-made public and private key you use to connect to a session instead of login details

A

True

36
Q

What is tunnelling?

A

Simply an encrypted conversation between two endpoints.

37
Q

What are SSL/TLS and IPSec’s purpose?

A

They act as the wrapping paper (encryption) and authentication (certificates) for packets sent over certian protocols such as HTTPS, Secure Mail Transfer Protocol, POP3S, IMAPS, etc.

38
Q

What are the two modes Ipsec has?

A

Transport mode: Only the payload of the packet is encrypted, meaning that IP headers and information are open to attack.
Tunnel mode: Everything is encrypted.

39
Q

What are IPsec’s two inner protocols?

A

Authentication Header AH: Data integrity/Authentication, but no encryption.
Encapsulation Security Protocol: Encryption, authentication, Encryption. This is the choice of many and outperforms AH.

40
Q

What are the ports for IMAPS and POP3S

A

993, 995

41
Q

What is SCP (Secure copy protocol?)

A

A lame version of FTP with no directories to navigate through.

42
Q

What level does IPsec work on?

A

Level 3, Network layer.

43
Q

What is the purpose of SNMP

A

Simple network management protocol is used to monitor network devices remotely. Things such as CPU usage, network utilisation, detailed firewalls etc can be accessed through it.

44
Q

Which network protocol requires the use of agents (Applications)) to use?

A

Simple Network Management Protocol

45
Q

What is the current best standard for SNMP?

A

SNMPv3 provides encryption security

46
Q

What is LDAP?

A

Lightweight directory access protocol is mostly used by domain controllers automatically, and will rarely be used manually. This protocol is used to query and change databases that hold information such as printer locations, DHCP clients and more. Active directory would be an example of one of these databases.

47
Q

Any encryption that uses the same key for encryption and decryption is called?
A. Encoded key
B. Symmetric key
C. Single key
D. Synthetic key

A

B. Symmetric key

48
Q

A(n) _______________ cipher encrypts the plaintext one bit at a time.
A. block
B. forwarding
C. stream
D. asymmetric

A

C. stream

49
Q

In a PKI encryption method, which key encrypts the data?
A. Public
B. Private
C. Both
D. Depends on who sends the data

A

A. Public

50
Q

The process of verifying with a high degree of confidence that the sender is who the receiver thinks he or she should be is called _______________.
A. PKI
B. authentication
C. locking
D. nonrepudiation

A

D. nonrepudiation

51
Q

A hash function is by definition a _______________.
A. complex function
B. PKI function
C. one-way function
D. systematic function

A

C. one-way function

52
Q

Which of the following is a hash function?
A. SHA-256
B. RC4
C. AES
D. BMX

A

A. SHA-256

53
Q

In order to have a PKI you must have a(n) _______________.
A. Web server
B. Web of trust
C. root authority
D. unsigned certificate

A

C. root authority

54
Q

Which type of access control requires a label to define its sensitivity?
A. MAC
B. DAC
C. RBAC
D. VAC

A

A. MAC Mandatory access control

55
Q

Which authentication standard is highly time sensitive?
A. PAP
B. RADIUS
C. 802.1X
D. Kerberos

A

D. Kerberos