Vulnerabilities and Security Risks Flashcards

1
Q

What is contained in a cipher suite

A

Key exchange, authentication, encryption, integrity algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption Algorithms that are antiquated

A

RC4, Triple-DES(Data Encryption Standard), ‘NULL’ (data is sent in clear text)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption algorithm to use

A

AES-128 or AES-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP

A

Transmission Control Protocol that establishes connection between end-points. Guarantees the delivery of packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IP

A

Internet Protocol that is connectionless and provides routing of packets in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

UDP

A

User Datagram Protocol - connectionless protocol that does not guarantee delivery of packets but it gives it its best shot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SYN

A

First part of a threeway handshake where a computer may reach out to a server to see if its available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SYN/ACK

A

Second part of a threeway handshake where the server responds to the requesting device saying its available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ACK

A

Final part of threeway handshake where the endpoint gives an acknowledgement (hence the ACK) to the server that it received back its message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly