Transport Flashcards

1
Q

DNS

A

looks up associated IP address for a particular domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process for accessing website

A

A computer asks its DNS server for the address associated with a website, the DNS server responds with an IP address, and your computer undoubtedly accepts it as legitimate response and connects to that website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNSSEC

A

can foil DNS cache poisoning attacks by signing replies by responding server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HTTP web based login process

A

Client requests nonce from server

server responds with nonce

Client uses server, client nonce, and password to generate hash

Client sends username, nonce and hash to server

Server retrieves server nonce and password from database

Server combines server nonce, client nonce, and password to generate a hash

server compares hash just generated with hash sent from client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HTTPS encrypts what

A

URL of requested web page

web page contents

contents of forms filled in

cookies established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

integrating HTTP and SSL leads to 2 majority security services

A

encryption and SSL handshaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HTTPS provides

A

confidentiality

server authentication

message integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TLS (Transport Layer Security)

A

enhances network communication with confidentiality, data integrity, server authentication, client authentication, and secure HTTP web transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Message Digest

A

cryptographic hash function containing string of digits created by a one-way hashing formula

protect integrity of data

detects changes and alterations to any part of message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TLS is designed to operate over TCP. Why?

A

doesn’t work with UDP. because it is not designed to handle the ;timing out’ and ‘retransmitting lost data’ which are handled by TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSL provides network connection through

A

Confidentiality

Authentication

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSL consists of

A

handshake protocol

cipher change protocol

alert protocol

Record protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSL Hanshake protocol process

A

Establish security capabilities

server authentication and key exchange

client authentication and key exchange

finishing and verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does cipher change protocol do in SSL

A

exchange of this message indicates all future data exchanges are encrypted and integrity is protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does Alert protocol do in SSL

A

Report errors

notify closure of TCP connection

notify of bad certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSH (Secure Shell Protocol)

A

method for secure remote login from one computer to another

17
Q

SSH process

A

connection established with public key sent to client

negotiate on symmetric encryption algorithm that will be used and generate the key

18
Q

What is ssh replacing

A

Telnet

19
Q

ssh port

A

22

20
Q

Types of Digital Certificate

A

Server

Personal

Organization

Developer

21
Q

Server certificate

A

allows visitors to exchange personal information

credit card info

22
Q

Personal certificates

A

allow one to authenticate a visitor’s identity and restrict access to specified content

23
Q

Organization Certificate

A

used by corporate entities to identify employees for corporate secure email and web based transaction

24
Q

Developer Certificates

A

Prove authorship and retain integrity of software

25
Q

advantages of digital certificate

A

decrease number of passwords a user has to remember to gain access to different network domains

creates electronic audit trail

26
Q

what does Man in the middle attack

A

Public Keys