Chapter_7 part 1 Flashcards

1
Q

what is a GRE?

A

GRE= Generic Routing Encapsulation:

cisco tunneling protocol, encapsulates a wide variety of network protocols into an ip tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the point of GRE?

A

GRE= Generic Routing Encapsulation : creates a virtual point to point link to cisco routers at remote points over ip networks. encapsulates network layer protocol packets inside IP tunnels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ASA?

A

ASA= Adaptive Security Appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is an ASA used for?

A

ASA= Adaptive Security Appliance:

is a firewall that combines firewall, VPN concentration and intrusion prevention into one software image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how does a site to site connection work? what is it?

A

a VPN connection between 2 or more sites over the internet. each site has a vpn terminating device (VPN gateway) on the edge of the network. the internal hosts do not know about the vpn connection and use regular TCP/IP communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are: Remote Access VPN’s?

A

a VPN used by a telecommuter to connect to a corp. network. the user needs vpn software and the corp. network needs a VPN gateway at its edge of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GRE header contains?

A

24 bytes additional- used for tunneling overhead, stateless= no flow control mechanisms, has flag field for optional header fields , protocol type indicator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the GRE steps to configure a tunnel?

A

1- admin needs ip’s of endpoints
2- create a tunnel interface using correct command
3- specify the tunnel source ip address
4- specify the tunnel destination (physical ip address of destination router)
5- configure ip address for the tunnel interface (this is the network for the tunnel with subnet mask.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does IPsec provide? what 3 standards/services?

A

Data confidentiality, integrity and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what layer of the tcp/ip model does IPsec work on?

A

layer 3 (packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IKE?

A

IKE: internet Key exchange- used by ipsec to authenticate users/ devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PSK?

A

PSK: Preshared Key- used by internet key exchange authentication for ipsec for the authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIA?

A

CIA: Confidentiality, Integrity and Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

anti-replay protection?

A

ipsec: detects and rejects replayed (duplicated packets) to protect against spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EFT

A

EFT: electronic Funds Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is AES used for?

A

AES: is encryption that is 256 bits long used in ipsec.

17
Q

what are the 2 types of encryption standards used in ipsec today?

A

AES (256 bits) and RSA: 2048 bits.

18
Q

Symmetric Encryption?

A

each user of encryption (sender and receiver) knows the key before-hand. pre-shared key.

19
Q

encryption types that use symetric keys? (3 types)

A

DES, 3DES and AES

20
Q

What is Asymmetric Encryption?

A

diff. keys for encryption and decryption. private key to decrypt and public to encrypt. (RSA)

21
Q

what type of encryption uses Asynmetric Encryption?

A

RSA

22
Q

DH?

A

DH= Diffie Hellman- method used to securely exchange keys for data encryption

23
Q

what is DH used for?

A

DH: diffie Hellman- specifies public key excahnge method so that when private/ public keys are shared over a public line, only the intended recipients can see/ read the data.

24
Q

HMAC?

A

hash based message authentication code

25
Q

types of HMAC algorithms are (2)?

A

HMAC: Hash Based message authentication- MD% and SHA

26
Q

what is a HASH and why use it?

A

a Hash is a number that is a result of a mathematical equation of he original message.
*the sender makes a hash of the message and sends with the message, the receiver combines the hash and the message… makes a new hash and compares the 2 hashes. if same then message is legit.

27
Q

name 2 common HMAC algorithms:

A

MD5: 128 bit shared secret key and message combined into 128 bit hash then combined with msg and sent.
**SHA: 160 bit key and msg combined to make 160 bit hashed . hash is added to msg and forwarded to recipient.

28
Q

how does HMAC work?

A

HMAC: Hash-based Message Authenticate Code:
a secret key is combined with a msg and hashed. the resulting hash is added to orig. msg. and sent to receiver, receiver does same and compares the 2 hash values.

29
Q

PSK?

A

PSK= Pre Shared Key:

30
Q

RSA?

A

RSA: Digital certificated are exchanged between devices. certificates are made by- a hash is derived, and encrypted with public key- sent then receiver decrypts hash with private key and compares hash to checksum.

31
Q

CA?

A

Certificate authority: