telecom Flashcards
Why are switched infrastructures safer environments than routed networks?
A. It is more difficult to sniff traffic since the computers have virtual private connections.
B. They are just as unsafe as nonswitched environments.
C. The data link encryption does not permit wiretapping.
D. Switches are more intelligent than bridges and implement security mechanisms.
A. It is more difficult to sniff traffic since the computers have virtual private connections.
___ attacks allow attackers to gain access to traffic in various VLAN segments, like having the system act as though it is a switch. Attackers can also insert tagging values to manipulate the control of traffic at this data link layer.
VLAN hopping
)___ header protocol provides data integrity, data origin authentication, and protection from replay attacks.
Authentication
___ security payloads protocol provides confidentiality, data origin authentication, and data integrity.
Encapsulating
FACT: Internet Security Association and Key Management Protocol provides a framework for security association creation and key exchange.
yes
Internet Key Exchange provides authenticated keying material for use with the Internet Security Association and Key Management Protocol.
fact
The ______________ is an IETF-defined signaling protocol, widely used for controlling multimedia communication sessions such as voice and video calls over IP.
A. Session Initiation Protocol
B. Real-time Transport Protocol
C. SS7
D. VoIP
A
An effective method to shield networks from unauthenticated DHCP clients is through the use of___________on network switches.
A. DHCP shielding
B. DHCP protection
C. DHCP snooping
D. DHCP caching
C
Which of the following is not one of the stages of the DHCP lease process?
i. Discover
ii. Offer
iii. Request
iv. Acknowledgment
A. All of them
B. None of them
C. i, ii
D. ii, iii
B
Which best describes the IP protocol?
A. A connectionless protocol that deals with dialog establishment, maintenance, and destruction
B. A connectionless protocol that deals with the addressing and routing of packets
C. A connection-oriented protocol that deals with the addressing and routing of packets
D. A connection-oriented protocol that deals with sequencing, error detection, and flow control
B
What takes place at the session layer?
A. Dialog control
B. Routing
C. Packet sequencing
D. Addressing
A
Its used by PPP to validate the id of remote clients. Better security than PAP (password authentication protocol).
CHAP (challenge-handshake authentication protocol).
wirelss LAN auth by CISCO. Features include a dynamic WEP keys and mutal auth bt client and RADIUS server.
LEAP (lightweight extensible authentaction protocol)
is an authentication protocol that uses a pswd. Used by PPP and most all network OS remote servers.
PAP
Define Cryptanalysis
Cryptanalysis is the science of studying and breaking the secrecy of encryption processes, compromising authentication schemes, and reverse-engineering algorithms and keys.
True or False: Cryptosystem is made of at least: sw, protocols, algo, keys.
TRUE
Principle : Plaintxt -> Encrypt -> ciphertxt -> decrypt -> plaintext
fact