telecom Flashcards

1
Q

Why are switched infrastructures safer environments than routed networks?
A. It is more difficult to sniff traffic since the computers have virtual private connections.
B. They are just as unsafe as nonswitched environments.
C. The data link encryption does not permit wiretapping.
D. Switches are more intelligent than bridges and implement security mechanisms.

A

A. It is more difficult to sniff traffic since the computers have virtual private connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ attacks allow attackers to gain access to traffic in various VLAN segments, like having the system act as though it is a switch. Attackers can also insert tagging values to manipulate the control of traffic at this data link layer.

A

VLAN hopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

)___ header protocol provides data integrity, data origin authentication, and protection from replay attacks.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ security payloads protocol provides confidentiality, data origin authentication, and data integrity.

A

Encapsulating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FACT: Internet Security Association and Key Management Protocol provides a framework for security association creation and key exchange.

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Key Exchange provides authenticated keying material for use with the Internet Security Association and Key Management Protocol.

A

fact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ______________ is an IETF-defined signaling protocol, widely used for controlling multimedia communication sessions such as voice and video calls over IP.
A. Session Initiation Protocol
B. Real-time Transport Protocol
C. SS7
D. VoIP

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An effective method to shield networks from unauthenticated DHCP clients is through the use of___________on network switches.
A. DHCP shielding
B. DHCP protection
C. DHCP snooping
D. DHCP caching

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is not one of the stages of the DHCP lease process?
i. Discover
ii. Offer
iii. Request
iv. Acknowledgment
A. All of them
B. None of them
C. i, ii
D. ii, iii

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which best describes the IP protocol?
A. A connectionless protocol that deals with dialog establishment, maintenance, and destruction
B. A connectionless protocol that deals with the addressing and routing of packets
C. A connection-oriented protocol that deals with the addressing and routing of packets
D. A connection-oriented protocol that deals with sequencing, error detection, and flow control

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What takes place at the session layer?
A. Dialog control
B. Routing
C. Packet sequencing
D. Addressing

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Its used by PPP to validate the id of remote clients. Better security than PAP (password authentication protocol).

A

CHAP (challenge-handshake authentication protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

wirelss LAN auth by CISCO. Features include a dynamic WEP keys and mutal auth bt client and RADIUS server.

A

LEAP (lightweight extensible authentaction protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is an authentication protocol that uses a pswd. Used by PPP and most all network OS remote servers.

A

PAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Cryptanalysis

A

Cryptanalysis is the science of studying and breaking the secrecy of encryption processes, compromising authentication schemes, and reverse-engineering algorithms and keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: Cryptosystem is made of at least: sw, protocols, algo, keys.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Principle : Plaintxt -> Encrypt -> ciphertxt -> decrypt -> plaintext

A

fact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In encryption, the key (cryptovariable) is a value that comprises a large sequence of random bits. Is it just any random number of bits crammed together? Not really. An algorithm contains a keyspace, which is a range of values that can be used to construct a key. When the algorithm needs to generate a new key, it uses random values from this keyspace.

A

fact

19
Q

One time pad encryption is unbreakable IFF:

A

The one-time pad encryption scheme is deemed unbreakable only if the following things are true:

1) used only one time.
2) The pad must be as long as the message
3) The pad must be securely distributed and protected at its destination.
4) The pad must be made up of truly random values.

20
Q

is a method of hiding data in another media type so the very existence of the data is concealed

A

Steganography

21
Q

Cipher Terms:

Substitution

Transposition

Runnng Key cipher

concealment cipher

A

Substitution (shift of alpha)

Transposition (values scrambled or broken up)

Running key cipher Substitution cipher that creates keystream values, commonly from agreed-upon text passages, to be used for encryption purposes. “ Like use of a book.”

Concealment cipher Encryption method that hides a secret message within an open messag. (ex: every 3rd word in a sentence). AKA: null cipher

22
Q

Symetric Algos

A

use symm keys aka “secret keys”.

Strengths: Faster than asym sys. Harder to break if key size is lg.

Weakness: Req secure delivery of keys, each pair of users need uniq key, doesn’t provide authenticity or nonrepudiation.

23
Q

Name a few examples of Sysmetric Algothrims

A

Examples: of symmetric systems
• Data Encryption Standard (DES) (uses DEA algo)
• 3DES (Triple DES)
• Blowfish
• Twofish
• International Data Encryption Algorithm (IDEA)
• RC4, RC5, and RC6
• Advanced Encryption Standard (AES) (uses Rijndael algo)
• Secure and Fast Encryption Routine (SAFER)
• Serpent

24
Q

Asymetric Algo

A

Asymmetric Algos – use “public (known to all) and private (known only to owner) keys”
Strengths
• Better key distribution than symmetric systems.
• Better scalability than symmetric systems
• Can provide authentication and nonrepudiation
Weaknesses
• Works much more slowly than symmetric systems
• Mathematically intensive tasks

25
Q

Examples of Asymetric Algo

A

o Rivest-Shamir-Adleman (RSA)
o Elliptic curve cryptosystem (ECC)
o Diffie-Hellman
o El Gamal
o Digital Signature Algorithm (DSA)
o Merkle-Hellman Knapsack

26
Q

A strong cipher contains the right level of two main attributes: confusion and diffusion. ___ is commonly carried out through substitution, while ____ is carried out by using transposition.

A

Confusion , Diffutions

27
Q

Data Encryption Algo

A

Algorithm chosen to fulfill the Data Encryption Standard. Block symmetric cipher that uses a 56-bit true key size, 64-bit block size, and 16 rounds of computation.

28
Q

AES

A

U.S. encryption standard that replaced DES. Block symmetric cipher that uses 128-bit block sizes and various key lengths (128, 192, 256).

29
Q

Rijndael

A

Block symmetric cipher that was chosen to fulfill the Advanced Encryption Standard. It uses a 128-bit block size and various key lengths (128, 192, 256).

30
Q

3DES

A

Symmetric cipher that applies DES three times to each block of data during the encryption process.

31
Q

IDEA (int’l data encrypt algo)

A

Block symmetric cipher that uses a 128-bit key and 64-bit block size.

32
Q

Blowfish

A

Block symmetric cipher that uses 64-bit block sizes and variable-length keys

33
Q

RC4

A

Stream symmetric cipher that was created by Ron Rivest of RSA. Used in SSL and WEP

34
Q

RCS

A

Block symmetric cipher that uses variable block sizes (32, 64, 128) and variable-length key sizes (0–2040).

35
Q

Smurf uses ICMP while Fraggel is similar using UDP

A

True

36
Q

5 levels of CMMI

A
  1. Initial Dev
  2. Repeatable
  3. Defined Formal proc
  4. Managed
  5. Optimizing
37
Q

SW dev models (4 of them)

A
  • Joint Analysis Development (JAD)
  • Rapid Application Development (RAD)
  • Reuse Model
  • Cleanroom
38
Q

First asymmetric algorithm created and is used to exchange symmetric key values. Based upon logarithms in finite fields.

A

Diffle-hellman algo

39
Q

RSA Algo

A

De facto asymmetric algorithm used for encryption, digital signatures, and key exchange. Based upon the difficulty of factoring large numbers into their original prime numbers.

40
Q

El Gamal algo

A

• Asymmetric algorithm based upon the Diffie-Hellman algorithm used for digital signatures, encryption, and key exchange.

41
Q

Cryptographic process that takes an arbitrary amount of data and generates a fixed-length value. Used for integrity protection.

A

One way hash

42
Q

Message authentication code (MAC) Keyed cryptographic hash function used for data integrity and data origin authentication.

A

True

43
Q

Terms:

CBC-MAC Cipher block chaining message authentication code uses encryption for data integrity and data origin authentication.

CMAC Cipher message authentication code that is based upon and provides more security compared to CBC-MAC.

CMM Block cipher mode that combines the CTR encryption mode and CBC-MAC. One encryption key is used for both authentication and encryption purposes.

A

44
Q
A