Sophos Fundamentals. Flashcards
(20 cards)
What are the objectives of the sophos fundamentals?
Cryptography, network protocols and communication, Microsoft Active Directory and Security threats
what is covered in the cryptography module
encryption overview, key length and complexity, symmetric cryptography and key transfer. Asymmetric cryptography, hash functions, digital signatures and digital certificates.
what is the earliest known encryption algorithm?
Ceasar cipher. Replaces letters in plain text ānā places up and down the alphabet.
Symmetric encryption uses how many keys?
One
Asymmetric encryption uses how many keys?
Two - Public and Private Key
What does a hash function do?
Calculates a fixed length string from the information in the file
Mbps
millions of bits per second
Gbps
billions of bits per second
Half Duplex
allows communication both directions but only one direction at a time.
Full Duplex
allows commmunication in both directions at the same time
Auto
allows devices to match their setting to the network
Describe Active Directory capabilities
- Centralised system administration
- Storage of network objects such as users, groups and computers
- Management of permissions on resources.
SSO
Single sign on
LDAP distinguished names. Lightweight Directory Access Protocol.
- DC Domain component
- OU Organizational unit
- CN Container eg Users & Computers
- CN Common name e.g. computer name or user login name
ldap examples
cn=workstation,OU=desktops,OU=sophos computers,DC=sophos,DC=virtual
LDAP and LDAPS
LDAP Uses TCP port 389, LDAPS (Secure) uses TCP port 636
Global catalogue uses 3268 for LDAP and 3269 for LDAPS
How are clients identified in LDAP
using a process known as bind, if no bind is used then client is treated as anonymous, Simple auth sends the name and pasword in clear-text. LDAPS should be used to encrypt bind operations.
What authentication protocol does Acticve Directory use?
the Kerberos Authentication Protocol. The user requestes an encrypted ticket from the Key Distribution Center, this ticket is present when access is requested to other resources, uses TCP and UDP port 88.
Authentication methods:
Something you know eg password or pin
Something you have e.g smart card
Something you are e.g. a fingerprint
mulifactor authentication
users two or more methods to authenticate.