Remote Access Methods Flashcards

1
Q

Encapsulating a payload protocol within a delivery protocol to ensure secure transmission is known as what?

A

Tunnelling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the 4 types of VPNs

A

1) Client-to-site (Remote-Access)
2) Host-to-Host VPN
3) Site-to-Site VPN
4) Extranet VPN (allows organizations suppliers/partners to connect to the network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the main benefit of using a site-to-site VPN for connecting remote offices than other WAN technologies?

A

It’s cheap!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the 5 tunnelling protocols covered in CompTIA

A

1) DTLS
2) L2TP
3) GRE
4) IPsec
5) PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When might you use DatagramTLS?

A

DTLS is a protocol based on TLS that is capable of securing the datagram (connectionless) transport so you might use it for securing delay-sensitive traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which tunnelling protocol would you choose if you had to connect networks that used non-TCP/IP traffic?

A

L2TP (PPTP using GRE can do this but considered obsolete)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who created L2TP?

A

IETF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which data-link layer tunnelling protocol allows access to a VPN using ports TCP 1723 and IP 47?

A

PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which technique encapsulates Point-to-Point Protocol (PPP) frames in Internet Protocol (IP) packets using the Generic Routing Encapsulation (GRE) protocol.

A

PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List 4 characteristics of GRE

A

1) Uses protocol-type field to transport any Layer 3 protocol
2) It is STATELESS and has NO FLOW CONTROL
3) It has NO ENCRYPTION
4) Create addition OVERHEAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which tunneling protocol was designed by the IETF, works at the Network layer of the OSI model and supports both IPv4 and IPv6?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two major protocols work inside IPSec?

A

1) AH - Authentication Header (responsible for providing integrity and authentication using Integrity Value Check i.e. IVC)
2) ESP - Encapsulating Security Payload (responsible for encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do you need to be aware of when tunnelling to NAT networks using IPSec?

A

The Authentication Header protocol isn’t compatible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between IPSec transport and tunnelling modes?

A

1) Transport mode creates a secure tunnel between two devices (e.g. host to host/host to server)
2) Tunnelling mode creates a secure tunnel between two end points like routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the key advantage of ISAKMP? Which tunnelling protocol is it integrated into?

A

It allows for separating out of the method for safely transferring key and authentication independent of the key generation technique.
IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which layer 2 protocol is commonly used for remote access and provides authentication, encryption and compression services to clients logging in remotely?
Is it routable?

A

Point-to-Point Protocol

It is not routable. It can be made routable using PPTP

17
Q

List what happens in the Discovery phase in PPPoE

A

1) MAC addresses of end-points are exchanged
2) Session ID is created to facilitate further data transmission
3) Point-to-point connection is created

18
Q

Which remote desktop sharing system similar to RDP uses the remote frame buffer protocol?

A

VNC (Virtual Network Computing)

19
Q

if you wanted to create a private network on an intranet what could you use?

A

an SSL VPN

20
Q

What is the major difference between the RDP and VNC?

A

VNC sends raw pixel data while RDP uses graphic primitives (not as high quality basically)

21
Q

SSL is based on what public key encryption algorithm?

A

RSA

22
Q

Which remote access method uses a Terminal Services Client to connect and provides 128-bit encryption using the RC4 algorithm?

A

Remote Desktop Protocol

23
Q
List the layers at which the following protocls work at:
GRE
IPSec
L2TP
PPTP
A

GRE - Layer 3
IPSec - Layer 3
L2TP - Layer 2
PPTP - Layer 2

24
Q

Which web browser security method was deprecated in 2015 in favour of TLS?

A

SSL

25
Q

What protocol number is 51 for?

A

The IPSec Authentication Header

26
Q

What is the protocol number of the Encapsulating Security Payload (ESP) and the Authentication Header? (AH)

A
ESP = 50
AH = 51
27
Q

What uses Internet Key Exchange, what port does it use and what does it do?

A

IPsec uses IKE over port 500 to authenticate clients in the IPSec conversation before data is transmitted.