Securing Network Security Flashcards

1
Q

What is a VPN?

A

Virtual Private Network

Extends a private network over a public one, enabling users to securely send and receive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Site-to-Site VPN?

A

Establishes secure tunnels over the public internet for interconnecting remote sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Client-to-Site VPN?

A

Connects individuals devices directly to the organizations headquarters, enabling remote users to access the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Full Tunnel VPN?

A

Maximizes security by encrypting all traffic to the headquarters while integrating clients with the network

Offers more security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Split Tunnel VPN?

A

Divides traffic and network requests and then routes them to the appropriate network

Offers better performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Clientless VPN?

A

used to secure remote access VPN tunnels using a web browser, and it doesn’t require any software or hardware clients to be configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is TLS?

A

Transport Layer Security

A protocol that provides cryptographic security for secure connections and is used for secure web browsing and data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is TCP?

A

Transmission Control Protocol

Used by TLS to establish secure connections between a client and server, but it may slow down the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is DTLS?

A

Datagram Transport Layer Security

A UDP-based version of TLS protocol that offers the same security level as TLS while maintaining faster operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is IPSec?

A

Internet Protocol Security

Protocol suite for secure communication through authentication and data encryption in IP networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 5 main steps to establishing a secure VPN tunnel?

A
  1. Request to start Internet Key Exchange (IKE)
  2. IKE Phase 1 - authenticate the parties
  3. IKE Phase 2 - negotiate the security association parameters and fully establish the secure tunnel.
  4. Data transfer - allow data transfer between the two parties to occur over the secure tunnel using the IPSec parameters and keys that we stored from the security associations that were negotiated back in step three.
  5. Tunnel Termination - happens when the security associations are going to be terminated through either a mutual agreement and deletion or due to the timing out of the tunnel because one party became non-responsive.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Transport Mode?

A

Employs the original IP header, ideal for client-to-site VPN’s and is advantageous when dealing with MTU constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MTU?

A

Maximum Transmission Unit

going to be set at 1,500 bytes in most of our networks and may cause fragmentation and VPN problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Tunneling Mode?

A

Employed for site-to-site VPNs and adds a extra header that can increase packet size and exceed the MTU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the AH?

A

Authentication Header

provide connectionless data integrity and data origin authentication for IP datagrams, and it provides protection against replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ESP?

A

Encapsulating Security Payload

Employed for proving authentication, integrity, replay protection, and data confidentiality by encrypting the packets payload