Transport Layer Security Flashcards

1
Q

Where does TLS sit between?

A

Transport and Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does TLS run in terms of its interaction with other layers?

A

It runs on top of TCP, securing HTTP traffic. A TCP connection must be established before a TLS handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a TLS handshake?

A

It is the setup of cryptographic parameters between client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the steps in a TLS handshake (up to verifying server certificate)

A

Client Hello with cipher suites and client random.
Server Hello with decision on cipher suites and client random.
Server certificate sent to client.
Verification of server certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What steps are involved in key generation/derivation?

A

Generate pre master secret.
With premaster secret, client random and server random generate master secret (48 bytes).
With master secret, client random and server random generate session keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are three typical firewall policies?

A

User control, service control and direction control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a user control policy control the access to and from the firewall? Which users are affected by user control policies by a firewall?

A

User control policies control access to data based on the role of a user in the network. It apples only to users inside the firewall perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a service control policy control the access to and from the firewall? What parameters do firewall apply the basis of their control policy on?

A

Controls access by the type of service provided by host. Applied on basis of network address, protocol of connection and port numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does direction control policy control the access to and from the firewall?

A

Determines the direction in which requests are allowed to flow through the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewalls have what 3 actions to control network traffic?

A

Accepted, denied and rejected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between a denied and a rejected action.

A

Rejected actions tell the source about the decision made by the firewall, denied packets do not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly