VPN Protocols Flashcards

1
Q

What can we use to create a secure connection between two or more computers/devices, that are not on the same private network?

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 major VPN’s?

A

PPTP (Point to Point Tunneling Protocol)
LT2P (Layer 2 Tunneling Protocol)
IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocol encapsulates PPP packets and ultimately sends data as encrypted traffic?

What port does PPTP use?

A

PPTP (Point to Point Tunneling Protocol)

Port 1723

Note: PPP = Point to Point Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of authentication does PPTP use?

A

CHAP authentication.

Note: This makes PPTP vulnerable to attacks. If you use PPTP, you must use a stronger method of authentication or use another VPN type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What VPN protocol does not provide any level of security on its own?

What port does L2TP use?

A

LT2P (Layer 2 Tunneling Protocol)

Port 1701

Note: LT2P is generally paired with IPSec to provide security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What TCP/IP protocol do we use to authenticate and encrypt IP packets to secure communication between devices?

A

IPSec

Note: IPSec is used heavily for VPN’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What method does IPSec use to create a secure tunnel?

A

Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you call the establishment of secure connections and shared security information using certificates or cryptographic keys?

A

Security Association (SA)

Note: Need to remember for the exam.

Definition: The establishment of secure connections and shared security information using certificates or cryptographic keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What protocol in IPSec provides integrity and authentication?

A

Authentication Header

Note: The AH is hashed to provide integrity. It is often used with an Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What provides integrity, confidentiality, and authenticity of packets by encapsulating and encrypting them?

A

Encapsulating Security Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two modes of IPSec?

A

Transport Mode and Tunnel Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain Transport mode and when its used.

A

Transport mode is host-to-host and only encrypts the payload. This means the to and from address is visible to anyone. Because of this, it should only be used within a private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Tunnel mode and when it’s used.

A

Tunnel mode encrypts both the header and the payload.

Note: Imagine that you can not see the truck driver, or what is being delivered. Tunnel mode is commonly used between networks over the internet. Used a lot in VPN’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly