Ch12 - Ch14 Flashcards

(62 cards)

1
Q

standards‐based mechanism for providing encryption for point‐to‐point TCP/IP traffic; operates at the Network layer (layer 3)

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

needed to allow an outside entity to initiate communications with an internal system behind a NAT proxy

A

static mode NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the least important aspect of security systems for Internet‐delivered email.

A

Availability, but yet in general availability is important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

use of email as an attack mechanism by flooding a system with messages causing a denial of service

A

Mail-Bombing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it difficult to stop spam

A

because source of messages are usually spoofed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

encryption tool used to protect sessionless datagram protocols; was designed to integrate with IPSec. replaced by IKE

A

Simple Key Management for Intenet Protocol (SKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

provides authentication, integrity, and confdentiality using an encapsulation protocol.

A

Software IP Encryption (SWIPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

authentication service and is simply a means to prevent unauthorized execution of code on remote systems.

A

Secure Remote Procedure Call (S-RPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

encryption protocol developed by Netscape to protect the communications between a web server and a web browser; used to secure web, email, FTP, or even Telnet traffc. deployed using a 40-bit key or a 128-bit key

A

Secure Sockets Layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

security protocol for the transmission of transactions over the Internet; based on RSA encryption and DES; not been widely accepted by the Internet in general; instead, SSL/TLS encrypted sessions are the preferred mechanism for secure e-commerce.

A

Secure Electronic Transaction (SET)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What tool is used to crack LEAP protocol

A

asLEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

used to manipulate line voltages to steal long-distance services. They are often just custom-built circuit boards with a battery and wire clips

A

Black Boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

used to simulate tones of coins being deposited into a pay phone. They are usually just small tape recorders

A

Red Boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

used to simulate 2600 Hz tones to interact directly with telephone network trunk systems (that is, backbones). This could be a whistle, a tape recorder, or a digital tone generator

A

Blue Boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

used to control the phone system. can use a dual-tone multifrequency (DTMF) generator (that is, a keypad). It can be a custom-built device or one of
the pieces of equipment that most telephone repair personnel use.

A

White Boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SMTP server that does not authenticate senders before accepting and relaying mail.

A

open relay agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what standard is used standard for email addressing and message handling.

A

X.400

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

email security standard that offers authentication and confidentiality to email through public key encryption and digital signatures.

A

Secure Multipurpose Internet Mail Extensions (S/MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

can provide authentication, confidentiality, integrity, and nonrepudiation for email messages; employs MD2, MD5 algorithms; RSA public key; and DES to provide authentication and encryption services.

A

MIME Object Security Services (MOSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

email encryption mechanism that provides authentication, integrity, confdentiality, and nonrepudiation. uses RSA, DES, and X.509.

A

Privacy Enhanced Mail (PEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

assert that valid mail is sent by an organization through verifcation of domain name identity

A

DomainKeys Identified Mail (DKIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

another name for dial-up connectivity

A

Remote Node Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what security border devices support NAT

A

firewalls, routers, proxies & gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Most WAN technologies require a “WAN switch”

A

channel service unit/data service unit CSU/DSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
some WAN technologies require additional specialized protocols to support specialized systems or devices. what are they
SDLC, HDLC, HSSI
26
offered no authentication, supported only half-duplex communications, had no error detection capabilities, and required manual link establishment and teardown
Serial Line Internet Protocol (SLIP)
27
encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links.
Point to Point protocol (PPP)
28
PPP was originally designed to support CHAP and PAP for authentication. However, recent versions of PPP also support 3 newer protocols...
MS-CHAP, EAP & SPAP
29
What security issues are related to VoIP
caller ID spoofing, vishing, SPIT, call manager software/firmware attacks, phone hardware attacks, DoS, MitM,
30
Are plain old telephone service (POTS) and public switched telephone network (PSTN) the same
yes
31
is NAT directly compatible with IPSec
No because it modifies packet headers
32
What version of NAT proxies are designed to support IPSec over NAT.
NAT-Traversal (RFC 3947) was designed to support IPSec VPNs through the use of UDP encapsulation of IKE
33
``` active entities (such as users) that access passive objects (such as files) ```
subjects
34
Does accountability include authorization
No
35
Does accountability require proper identification and authentication
Yes
36
to stop unwanted or unauthorized activity from occurring
Preventative
37
to discover unwanted or unauthorized activity
Detective
38
restore systems to normal after an unwanted or unauthorized activity has occurred
Corrective
39
attempt to discourage violation of security policies, by encouraging people to decide not to take an unwanted action
Deterent
40
attempt to repair or restore resources, functions, and capabilities after a security policy violation
Recovery
41
attempt to direct, confine, or control the action of | subjects to force or encourage compliance with security policy
Directive
42
provide options or alternatives to existing controls to aid in enforcement and support of a security policy
Compensation
43
generates and displays one‐time passwords, which work with an authentication server
synchronous token
44
uses a challenge‐response process to generate the one‐time password
asynchronous token
45
XML‐based framework used to exchange user information for single sign‐on (SSO) between organizations within a federated identity management system
Security Assertion Markup Language (SAML)
46
supports SSO in a single organization, not a federation.
Kerberos
47
combination of effective identification, authentication, and auditing provides for
accountability
48
most common SSO method used within organizations, and it uses symmetric cryptography and tickets to prove identification and provide authentication.
Kerberos
49
Other SSO methods include
scripted access, SESAME and KryptoKnight. OAuth and OpenID are two newer SSO technologies
50
uses UDP and encrypts passwords only to provide AAA services
RADIUS
51
uses TCP and encrypts entire session to provide AAA services
TACACS+
52
becoming more popular with smart phones, but is not compatible with RADIUS
Diameter
53
principle ensures that access to an object is denied unless access has been explicitly granted to a subjec
Implicit Deny not explicit
54
table that includes subjects, objects, and assigned privileges
Access Control Matrix
55
another way to identify privileges assigned to subjects. focused on subjects (such as users, groups, or roles)
Capability Table
56
list all the users and/or groups that are authorized | access to the file and the specific access granted to each; focused on objects
Access Control List
57
restricted interfaces to restrict what users can do or see based on their privileges
Constrained Interface
58
restrict access to data based on the content within an object
Content-Dependent Control
59
require specific activity before granting users access such as going thru the purchasing process on a website
Context-Dependent Control
60
access control model is prohibitive and it uses an implicit‐deny philosophy (not an explicit‐deny philosophy). It is not permissive and it uses labels rather than rules.
Mandatory Access control model
61
should threat modeling or asset value be done first?
Asset value, so that the focus on threats are set to high value items
62
what is an effective tool to prevent the success of social-engineering
user education