Security Protocols Flashcards

1
Q

(IPsec) IPsec is a set of protocols for security at the _______ layer of the OSI model.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(IPsec) It encrypts the data when communication is happening between ___ _________.

A

two, computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(IPsec) But, in order to use IPsec, both sender and receiver must share a ______ ___. This key is what locks and unlocks the ____ that is being communicated as it travels across a _______. This ensures that the data cannot be read or tampered with.

A

public, key, data, network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(IPsec) IPsec also verifies the ____ to make sure the data is ________ exactly as when it was sent.

A

data, received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(IPsec) IPsec also has two modes: _________ and ______. In transport mode, only the message portion of the data packet is _________. But in tunnel mode, the entire ____ ______ is encrypted.

A

transport, tunnel, encrypted, data, packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(L2TP) Layer 2 Tunneling Protocol is a combination of Cisco’s _____ __ Forwarding and _____-__-_____ _________ Protocol.

A

Layer, 2, Point-to-point, tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(L2TP) This protocol authenticates in two ways using digital ____________.

A

certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(L2TP) It authenticates both the ________ and the ____. It does this to ensure that the data is not tampered with during the ______________ process, which is known as a ___-__-___-______ attack.

A

computer, user, authentication , man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(SSL) SSL or ______ ______ _____ is the protocol that is used to ensure ________ on the internet.

A

Secure, Socket, Layer, Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(SSL) SSL uses public key encryption to ______ ____, and it’s commonly associated with ____.

A

secure, data, HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(SSL) for example, if you were to go to an e-commerce website, you will notice that an “s” has been added to ____, which indicates that you are now using ___ in your web browser.

A

HTTP, SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(SSL) SSL provides protection in three ways: it _____________ the ______, the ______, and it ________ the data.

A

authenticates, server, client, encrypts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(TLS) Transport Layer Security is the latest industry standard ___ ________. It’s the successor to SSL, and it’s based on the ____ specifications.

A

SSL, protocol, same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(TLS) Like SSL, it also authenticates a ______, ______, and ________ the data.

A

server, client, encrypts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(TLS) TLS is made up of two layers. The first layer is the TLS record protocol, which provides __________ ________ by making sure the connection is _______ and reliable

A

connection, security, private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(TLS) The second layer is the TLS handshake protocol, which allows the server and client to __________ each other and negotiate an __________ algorithm and _____________ keys before data is sent out.

A

authenticate, encryption, cryptographic

17
Q

(TLS) The goal for TLS is to make SSL _____ and more ______.

A

safer, secure

18
Q

(802.1x) 802.1X, and this standard is used for both _____ and ________ networks.

A

wired, wireless

19
Q

(802.1x) It controls network access by _____. So, if authentication passes, the port is ______, and if the authentication fails, the port is ______.

A

ports, opened, closed