Chapter 10: Securing TCP/IP Flashcards

1
Q

Define: Integrity

A

The process that guarantees that the data received is the same as originally sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define: Nonrepudiation

A

Means that a person cannot deny he or she took a specific action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define: Authentication

A

Means to verify that whoever is trying to access the data is the person you want accessing that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define: Authorization

A

Defines what an authenticated person can do with the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any encryption that uses the same key for both encryption and decryption is called:

A

symmetric-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any encryption that uses different keys for encryption and decryption is called:

A

asymmetric-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symmetric-key algorithms are either ____ ciphers or ____ ciphers.

A

block
stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do block ciphers encrypt data?

A

In single chunks of a certain length at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do stream ciphers encrypt data?

A

They take a single bit at a time and encrypt on-the-fly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is one serious weakness that symmetric-key encryption has?

A

Anyone who intercepts the key can encrypt or decrypt data with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does asymmetric-key encryption solve the weakness of symmetric-key encryption?

A

The public key of the receiver is used to encrypt the symmetric-key before it is sent, and the receiver uses their private key to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public-key cryptography, the primary asymmetric implementation, generates a key pair. What are these keys called?

A

private key
public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three asymmetric algorithms used today?

A

RSA (Rivest, Shamir, Adleman)
DSA (Digital Signature Algorithm)
ECDSA (Elliptic Curve DSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a one-way function that you run on a string of binary digits of any length that results in a value of some fixed length (often called a checksum or message digest)?

A

A cryptographic hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Can you recreate the original data from its hash if you know the hashing algorithm used?

A

No, a hash is irreversible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do operating systems and applications store passwords?

A

They only store the hashes of passwords and not the passwords themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the primary family of cryptographic functions and which two are currently recommended?

A

SHA (Secure Hash Algorithm)
SHA-2 (six variants)
SHA-3 (six variants)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In network security, nonrepudiation is typically enabled by a combination of encryption and hashing called a:

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does a sender of a message create a digital signature?

A

The sender hashes all or part of a message and then encrypts the hash with their private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The system for creating and distributing digital certificates issued by trusted third party certificate authorities (CA) such as DigiCert, GoDaddy, or Sectigo is called:

A

PKI (Public-Key Infrastructure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What three things are included in a PKI certificate?

A
  1. Public Key
  2. Info about the certificate
  3. The digital signature of a trusted third party
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In a PKI encryption method, which key encrypts the data?

A

The public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In order to have a PKI you must have a/an ____.

A

root authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What two jobs does a NAC (Network Access Control) application do?

A
  1. It usually prevents computers lacking anti-malware and patches from accessing the network.
  2. It creates policies that define what individual systems can do on the network.
25
What is an ACL (Access Control List)?
A list of permissions that specifies what an authenticated user may perform on a shared resource.
26
Which type of access control assigns a security level label on every resource?
MAC (Mandatory Access Control)
27
Which type of access control is based on the idea that a resource has an owner who may at their discretion assign access to that resource?
DAC (Discretionary Access Control)
28
Which type of access control defines a user's access to a resource based on the roles the user plays in the network environment?
RBAC (Role-Based Access Control)
29
____ enables two devices to connect, authenticate with a username and password, and negotiate the network protocol the two devices will use.
PPP or Point-to-Point Protocol
30
Originally used by PPP for authentication, ____ transmits the username and password over the connection in plaintext to authenticate a user.
PAP or Password Authentication Protocol
31
PPP switched from PAP to ____ for a secure authentication routine using hashes.
CHAP or Challenge Handshake Authentication Protocol
32
Microsoft invented a more detailed and secure version of CHAP for authentication called:
MS-CHAPv2
33
What does AAA stand for in network security?
Authentication Authorization Accounting
34
____ servers provides AAA for remote users accessing a network using point-to-point connections.
RADIUS or Remote Authentication Dial-In User Service
35
RADIUS consists of these three devices:
1. The RADIUS server 2. NASs (Network Access Servers) 3. Systems that connect to the network
36
RADIUS Port #s
UDP port 1812 (authentication) UDP port 1645 (authentication) UDP port 1813 (accounting) UDP port 1646 (accounting)
37
The ____ protocol supports AAA in a network with many routers and switches that need administration. It is similar to RADIUS in function.
TACACS+ or Terminal Access Controller Access Control System Plus
38
TACACS+ Port #
TCP port 49
39
The authentication protocol ____ is used for TCP/IP networks with many clients all connected to a single authenticating server. Microsoft Windows domains rely on it for authentication.
Kerberos
40
Kerberos Port #
UDP or TCP port 88
41
The ability to log in only one time and use the same token to access any resource you're allowed to access on an entire network is called:
SSO (Single Sign-On)
42
What is a SSH tunnel?
An encrypted link between SSH processes on two separate computers.
43
What does the authentication and encryption protocol suite IPsec (Internet Protocol Security) do and at what OSI layer does it work?
It creates secure tunnels between two computers and works at the Network layer.
44
What does IPsec Transport mode do?
It encrypts the payload of the IP packet.
45
What does IPsec Tunnel mode do?
It encrypts the entire IP packet and encapsulates it inside another IP packet at an endpoint.
46
Who generates CRLs (Certificate Revocation Lists) that a web browser can check certificates against?
Root authorities
47
What does SMTPS (Simple Mail Transport Protocol Secure) do?
It wraps SMTP communication with TLS (Transport Layer Security).
48
SMTPS (SMTP TLS) Port #
TCP port 587
49
What does the POP3S (Post Office Protocol 3 over SSL) extension do?
It adds a TLS (Transport Layer Security) wrap to POP3 e-mail retrieval.
50
POP3S Port #
port 995
51
What does the IMAPS (Internet Message Access Protocol over SSL) extension do?
It adds a TLS (Transport Layer Security) wrap for encryption.
52
IMAPS Port #
port 993
53
What protocol offers secure file transfers, resumption of interrupted file transfers, deletion of files on the server, and more?
SFTP or SSH File Transfer Protocol
54
SFTP Port #
TCP port 22
55
What protocol queries the state of network devices and reports whatever device-specific information the devices provide?
SNMP or Simple Network Management Protocol SNMPv3 is the standard version used today.
56
SNMP Port #s
UDP ports 161 and 162
57
What protocol do programs use to query and change a database used by the network (ie. Active Directory)? Domain controllers will use it automatically in the background to keep your databases in good order.
LDAP or Lightweight Directory Access Protocol
58
LDAP Port #s
TCP port 389 UDP port 389