Security Protocols Flashcards
(IPsec) IPsec is a set of protocols for security at the _______ layer of the OSI model.
network
(IPsec) It encrypts the data when communication is happening between ___ _________.
two, computers
(IPsec) But, in order to use IPsec, both sender and receiver must share a ______ ___. This key is what locks and unlocks the ____ that is being communicated as it travels across a _______. This ensures that the data cannot be read or tampered with.
public, key, data, network
(IPsec) IPsec also verifies the ____ to make sure the data is ________ exactly as when it was sent.
data, received
(IPsec) IPsec also has two modes: _________ and ______. In transport mode, only the message portion of the data packet is _________. But in tunnel mode, the entire ____ ______ is encrypted.
transport, tunnel, encrypted, data, packet
(L2TP) Layer 2 Tunneling Protocol is a combination of Cisco’s _____ __ Forwarding and _____-__-_____ _________ Protocol.
Layer, 2, Point-to-point, tunneling
(L2TP) This protocol authenticates in two ways using digital ____________.
certificates
(L2TP) It authenticates both the ________ and the ____. It does this to ensure that the data is not tampered with during the ______________ process, which is known as a ___-__-___-______ attack.
computer, user, authentication , man-in-the-middle
(SSL) SSL or ______ ______ _____ is the protocol that is used to ensure ________ on the internet.
Secure, Socket, Layer, Security
(SSL) SSL uses public key encryption to ______ ____, and it’s commonly associated with ____.
secure, data, HTTP
(SSL) for example, if you were to go to an e-commerce website, you will notice that an “s” has been added to ____, which indicates that you are now using ___ in your web browser.
HTTP, SSL
(SSL) SSL provides protection in three ways: it _____________ the ______, the ______, and it ________ the data.
authenticates, server, client, encrypts
(TLS) Transport Layer Security is the latest industry standard ___ ________. It’s the successor to SSL, and it’s based on the ____ specifications.
SSL, protocol, same
(TLS) Like SSL, it also authenticates a ______, ______, and ________ the data.
server, client, encrypts
(TLS) TLS is made up of two layers. The first layer is the TLS record protocol, which provides __________ ________ by making sure the connection is _______ and reliable
connection, security, private