3.1 Implement Secure Protocols Flashcards

1
Q

Protocol used for secure real-time transport of voice and video communications.

A

SRTP (secure real-time protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Secure protocol used for time syncronization.

A

NTPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Public key encryption and digital signing of mail content. Requires a PKI or similar key organization.

A

S/MIME (secure/multipurpose internet mail extensions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protocol is used to encrypt email that is browser based?

A

SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 protocols used for secure web traffic?

A

SSL/TLS

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security protocol for OSI layer 3, encrypting every network packet.

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two core IPSec protocols?

A

AH (Authentication header)

ESP (encapsulation security payload)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

File transfer protocol that utilizes SSL for secure transmission.

A

FTPS (File transfer protocol secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

File transfer protocol that uses SSH and supports directory listings, remote file removal, and provides file system functionality.

A

SFTP (SSH file transfer protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protocol utilized to secure and encrypt directory information using SSL

A

LDAPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure authentication method using many different authentication methods (kerberos, client certificate, etc.)

A

SASL (Simple authentication and security layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encrypted terminal communication for remote console access. Replaces the unsecure Telnet.

A

SSH (secure shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Protocol used for securing domain name resolutions. Utilizes public key cryptography.

A

DNSSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Routing and switching protocol that is used for the secure management of networks. Allows CIA verification.

A

SNMPv3 (Simple network management protocol version 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or false: The secure form of DHCP is DHCPSec.

A

False: there is no secure form of DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What form of check can be performed to ensure an application meets the required baselines for security?

A

Integrity Check

17
Q
A