7-1 Flashcards

1
Q

a field that immediately follows the IP header in an IP datagram and provides authentication and integrity checking for the datagram

A

AH ( Authetication Header )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

an agency authorized to issue digital certificates

A

certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Challenge Handshake Authentication Protocol a commonly used authentication protocol

A

CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

synonym for cryptographic algorithm

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

encrypted text

A

cipher textg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

tunneling that is mandatory, not optional. this is in reference to VPN technologies. some protocols allow the user to choose whether to use tunneling

A

compulsory tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a program that runs in the background. often used to perform various system services

A

daemon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

wrapped up

A

encapsulated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

encapsulated security protocol, one of the two primary protocols(ESP AH) used in ipsec

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the process of verifying a connection request. it involves several packets goingfrom client to severe and back

A

handshacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ensuring that data has not been modified or altered and that the data received is identical to the data that was sent.

A

integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a method for setting up security associations in IPSec

A

IKE ( internet key exchange )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 2 Tunneling protocol, a VPN protocol

A

L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an encryption technology designed by Microsot for use with virtual private netowrks

A

Microsoft Point to Point Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a micirsoft extension to CHAP

A

MS-CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the most basic for of authetication in which a users name and password are transmitted over a network and compared to a table pf name-password

A

PAP (Password Autheticaton Protocol)