3.0 Implementation Flashcards
(237 cards)
What is Remote Access ?
Remote access refers to the user’s device connecting over or through an intermediate network, usually a public Wide Area Network (WAN). It does not make a direct cabled or wireless connection to the network.
What is Internet Protocol Security (IPSec)
Internet Protocol Security (IPSec) is a set of open, non-proprietary standards that you can use to secure data as it travels across the network or the Internet.
What is does the Authentication Header (AH) protocol perform?
What else?
What is that called and where does add it? and where ? for what?
The Authentication Header (AH) protocol performs a cryptographic hash on the packet plus a shared secret key (known only to the communicating hosts) and adds this Hashed Message Authentication Code (HMAC) in its header as an Integrity Check Value (ICV)
What is Tunnel mode?
The tunnel mode is used by IPsec to provide encrypted communication by encrypting the entire network packet. This method is used mostly in unsecured networks.
What port does DNSSec use?
DNS traffic uses port 53. However, given that most DNSSEC packets can be larger than 512 bytes, which is the limit for UDP packets,
DNSSEC uses TCP port 53.
What is TCP and UDP port 88 are used for?
TCP and UDP port 88 are used by Microsoft’s Kerberos. It is an authentication service that is based on a time-sensitive, ticket-granting system beneficial for single sign-on requirements.
What is UDP port 389 is used for?
UDP port 389 is used by Lightweight Directory Access Protocol. It is a network protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information.
What is The transport mode?
Transport mode secures communications between hosts on a private network (an end-to-end implementation). AH and ESP running transport mode provides confidentiality, integrity, and authentication for internal secure communication.
The transport mode is used by IPsec to provide encrypted communication by only encrypting the payload. This method is used mostly in private networks.
What is a cipher?
A cipher is the process (or algorithm) used to encrypt and decrypt a message. A cipher mode refers to the cryptographic product processes multiple blocks. ECB or Electronic Code Book is the simplest mode of cipher operation.
What is a counter mode?
A counter mode is a type of cipher mode of operation.
What is Secure Shell (SSH)?
What are 2 main uses for SSH?
What port does it use?
Secure Shell (SSH) is the principal means of obtaining secure remote access to a UNIX or Linux server. The main uses of SSH are for remote administration and Secure File Transfer (SFTP).
Supports VPNs by using port forwarding and runs on TCP port 22
What is Telnet?
Telnet is terminal emulation software to support a remote connection to another computer. It does not support file transfer directly.
What is Remote Desktop Protocol (RDP)?
Remote Desktop Protocol (RDP) is Microsoft’s protocol for operating remote connections to a Windows machine.
What is a Virtual Private Network (VPN) is utilized for?
A Virtual Private Network (VPN) is utilized to connect to a network and the user needs to connect to a single host to complete the file transfer.
What is Secure/Multipurpose Internet Mail Extensions (S/MIME)?
Secure/Multipurpose Internet Mail Extensions (S/MIME) is a widely accepted method for sending digitally signed and encrypted messages. It allows the sender to encrypt the emails and digitally sign them
What is a characteristic of The Session Initiation Protocol (SIP) ?
The Session Initiation Protocol (SIP) is one of the most widely used session control protocols.
Security Actions to consider when deploying a new Web Server?
- The guest account must be secured so that it cannot be used to modify any data on the server.
- A secure means of uploading files and configuration changes needs to be used, such as Secure Shell (SSH).
- Web servers should be deployed using configuration templates where possible. This will assist the administrator with hardening the system.
- The location of the server should be carefully considered as a way to not expose the private network to attack from the public. This can be achieved by placing a firewall between the web server and the local network.
How can Transport Layer Security (TLS) be used to provide encrypted communication of services?
File transfer services can use the Transport Layer Security (TLS) protocol to encrypt communication such as File Transfer Protocol Secure (FTPS). A TLS tunnel is negotiated before the exchange of any FTP commands.
Directory services can encrypt traffic, for example, using the Lightweight Directory Authentication Protocol Secure (LDAPS). Credentials are encrypted when in transit to a directory service like Windows Active Directory.
Web services use TLS to encrypt traffic between users and a bank’s web site, for example. The latest TLS version 1.3 is approved as of 2018
What is Network Time Security (NTS)?
What does it secure?
How does it do it?
Network Time Security (NTS) is a long-developed solution to securing the Network Time Protocol (NTP). TLS can be used to provide an authenticated channel.
What is Secure real-time transport protocol (SRTP)?
Secure real-time transport protocol (SRTP) encrypts actual real-time data, like voice and video. It provides confidentiality for the actual call data.
What does the Session initiation protocol (SIP) do?
Session initiation protocol (SIP) provides session management features between SIP endpoints and/or gateways.
What is Quality of service (QoS)?
Quality of service (QoS) provides information about the connection to a QoS system, which in turn ensures that voice or video communications are free from problems, such as dropped packets, delay, or jitter.
What is The Encapsulation Security Payload (ESP) protocol?
The Encapsulation Security Payload (ESP) protocol provides confidentiality and/or authentication and integrity. It encrypts the data payload.
ESP is used with Internet Protocol Security (IPSec) over layer 3 of the Open Systems Interconnection (OSI) model.
What does Simple Network Management Protocol (SNMP) v3 supports?
Simple Network Management Protocol (SNMP) v3 supports encryption and strong user-based authentication. Instead of community names, the agent is configured with a list of usernames and access permissions.