Securing TCP/IP Flashcards

1
Q

regarding security what is : CIA

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

these uses keys to encrypt cleartext into cyphertext

A

Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An algorithm that uses the same key to encrpyt and decrypt is

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is any unencrypted data:

A

cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this type of encryption uses a public and a private key:

A

asymmetric encyption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For 2 people to communicate, they must exchange:

A

Public keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ________ creates a fixed-size hash value

A

hash algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You see a lot of Hash algorithms when:

A

downloading stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of Hashes:

A

MD and SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These are used for verifying data, not for encryption:

A

Hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hash values are always fixed:

A

in size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication is first and uses

A

Identification or what or which user are you like your, user name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

After you are identified as a valid user you then need to be

A

Authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 3 parts to any form of authentication

A

identify yours self
a password
authorization - defines what exactly you can do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication Attributes

A

Something you do
Something you exhibit
Someone you know
Somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____________ is actually proving that or your identity

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Radius network basically has a supplicant, or EU, Client ( mediator ), Server ( handles the authentication), possible Database ( has all the user id’s and passwords) and they use Ports:

A

UDP ports 1812-1813
UDP ports 1645-1646

17
Q

___________ provides AAA or ( authentication, authorization, and accounting. It is used a lot in wireless networks.

A

Radius

18
Q

This is a version of Radius that’s a proprietary system because of Cisco to handle a large network of routers and switches. This is rarely used in wireless networks.

A

TACACS+

19
Q

TACACS+ uses what port?

A

TCP port 49

20
Q

This authenication protocol is mainly designed for LAN’s. It is a Microsoft proprietary technology that is used in Windows Server. Designed for wired networks.

A

Kerberos

21
Q

Kerberos using Key Distribution Server (KDS)

A

Authenticating Server
Ticket Granting Service

22
Q

In Kerberos this is sent back to a client to authenticate but doesn’t authorize. The client then stamps the ticket and send it back. Finally the KDC send a time-stamped Token back granting authorization which is normally 8 hours.

A

Ticket Granting Token (TGT)

23
Q

Windows networks, especially running Kerberos requires that the ________ be set the same on all machines.

A

time

24
Q

To help with the broad range of authentication protocols in the world, this protocol enables flexible authentication as it acts like a big envelope that can manage or decide on what authentication needs to happen and primarily used on wireless networks:

A

Extensible Authentication Protocol ( EAP )

25
Q

This EAP uses or has a common key for everyone to login

A

EAP pre-shared key (EAP PSK)

26
Q

This EAP uses a standard uses just a standard username and Password for authentication

A

Protected Extensible Authentication Protocol (PEAP)

27
Q

This EAP that’s not used that often which uses a “Hash” is called:

A

EAP MD5

28
Q

these EAP’s use certificates

A

EAP TLS
EAP TTLS

29
Q

A “Single Sign-On” is used on a Windows LAN via:

A

Windows Active Directory or (AD)

30
Q

Trust domains on a Windows network are also called:

A

Federated systems

31
Q

This version of a single sign-on starts with a “IdP” or identity provider which will allow via a token to access web providers or other devices via a VPN.

A

Security Assertion Markup Language ( SAML )

32
Q

___________ provides a variety of service provider samples for SAML

A

SSOcircle

33
Q

Public and Privat keys can actually do the same think but we don’t

A
34
Q

Encrypted Hash is a

A

Digital Signature

35
Q

Public Key, My Digital Signature, third part guarantee saying that your signature is good, and their Digital Signature.

A

Digital Certificate

36
Q

3 ways to create a trust relationship:

A

Create your own Digital Certificate Or unsigned Certificate
Web of trust: where a lot of people trust each other, lot of work
Public Key Infrastructure (PKI) :hierarchy structure with root servers, starts with a Certificate of Authority, is the way we do the internet.

37
Q

There are 2 ways to verify that a certificate is valid:

A

OCSP
CRL

38
Q

Take your time and Read the Certificate error message

A
39
Q

A self-signed certificate can throw a_____ _______if it wasn’t issued by a Certificate Authority

A

443 error

40
Q

An ______ _________n be viewed then fixed either by getting a new certificate from it’s issuer or accepting the certificate in it’s current state.

A

expired certificate

41
Q

The setting to ________ ___________ to confirm the current validity of certificates is a good security setting

A

query OCSP