Sybex Chp 12-14 Flashcards
True or False
In PPTP, the initial tunnel negotiation is not encrypted
True
Therefore, the IP address of the sender and receiver (and even usernames and hashed passwords) could be intercepted by an attacker.
True or False
PPTP does not support TACAS+ or RADIUS
True - PPTP does not support TACAS+ or RADIUS
True or False
L2F does not offer encryption
True - L2F does not offer encryption
True or False
L2F does not support TACAS+ or RADIUS
False - L2F does support TACAS+ or RADIUS
IPSec Authentication Header (AH) provides limited authentication
False
IPSec Authentication Header (AH) supports:
- –Authentication
- –Integrity
- –Non-repudiation
IPSec Encapsulating Security Payload (ESP) provides encryption to protect the confidentiality of transmitted data (and limited authentication)
True
ESP has two modes:
—Transport Mode - IP header is not encrypted (data is encrypted)
—Tunnel Mode - IP Header and data is encrypted ad a new header is generated to govern transmission through the tunnel
Main difference between Smart-card and Memory-card?
Smart card has a processor that can be used for authentication, encrypt data, or digitally sign email.
Memory card just holds authentication data about a user
Explain BYOD Device Fingerprinting
Users register their device and associate it with their account. The enrollment captures system characteristics (CPU, Memory, Applications, model, serial, etc.)
What is Identity as a Service (IDaaS)?
3rd Party service that provides cloud identity and access management
How does a right and a permission differ?
A permission has to do with an object (read/write/edit/execute,etc.)
A right has to do with an ability to do something (change time, restore a file)
__________ are subject focused and identify the objects that subjects can access.
ACL
Capability list
Capability list are subject focused and identify the objects that subjects can access.
Capability tables are focused on subjects (such as users, groups, roles)
__________ are object focused and identify access granted to subjects for any specific object.
ACL
Capability list
ACL are object focused and identify access granted to subjects for any specific object.
DAC Access Models are implemented using ACLs on objects
Which hash is not collision free?
MD5
SHA-3
MD-5 (128-bits) - considered broken
SHA-3 (512-bits) - considered safe against birthday attacks
This attack focuses on finding collisions in hashes
Birthday Attack
Find enough samples and you will find a collision
What is an Advanced Persistent Threat?
An APT is usually a government-funded group of very smart people with very expensive toys with the purpose of doing bad things with computers.