Chapter 10 - Securing TCP/IP Flashcards

1
Q

Any encryption that uses the same key for encryption and decryption is called a ______.

A

Symetric key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RC4 is a _____ cipher.

A

Stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a PKI method, which key encrypt the data?

A

The public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of verifying with a high degree of certitude that the sender is who the receiver thinks he or she would be.

A

Nonrepudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A hash function is by definition a _______.

A

one-way function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In order to have a PKI you must have a ______.

A

Root authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of access contol requires a label to define its sensitivity? MAC, DAC or RBAC.

A

MAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If you saw traffic runinng on UDP port 1812 and 1813, what AAAA standard would you know was running?

A

RADIUS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which authentication standard is highly time sensitive?

A

Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 5 area of security?

A

Encryption, integrity, nonrepudiation, authentication, authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name some symetric block cypher.

A

AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES, Blowfish, IDEA (Internation Data Encryption Algorithm).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name a stream cipher.

A

RC4 (Rivest Cipher 4).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name some hash funtions.

A

MDA5 (Message Digest Algorythm), SHA-1 (Secure Hash Algorythm), SHA-2, SHA-3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a digital signature?

A

A hash of the public key encrypted by the private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a PKI?

A

A PKI is a Public Key Infrastructure. When you try to connect to a service, it sends you a digital certificate (that contains the digital signature of the CA and the public key of the server). You verify this certificate with the root and process with the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the for type of autorisation mechanism?

A

ACL (Access Control List).
MAC (Mandatory Access Control).
DAC( Disretionnary Access Control).
RBAC (Role Base Access Control).

17
Q

What is PAP?

A

Password Authentication Protocol. Transmit the password and username over the connection in plain text.

18
Q

What is CHAP?

A

Challenge Handshake Authentication Protocol. It uses a shared secret (usually the password) and hash it prior to sending it over the network. Both devices must know the shared secret prior in order for CHAP to work. MS-CHAP is the updated version of CHAP.

19
Q

What is AAA?

A

Authentication, Autirixation and Accounting.

20
Q

What is RADIUS?

A

Remote Authentication Dial-In User Service. It’s a AAA standard. A RADIUS server supports multiple NAS that can each support multiple connections.

21
Q

What is TACACS+?

A

Terminal Access Controller Access Control System Plus. It’s a AAA standard. It’s used by Cisco router and Switches for remote connection.

22
Q

What is Kerberos?

A

Kerberos is a AAA standard that is not linked to PPP. It requires a KDC (Key Distribution Center) that does 2 jobs : AS (Authentication Server) and TGS (Ticket Granting Server). When a user first connect, it send a hash of it’s username and passwork to the AS. If it matches, the AS sends the client a TGT (Ticket Granting Ticket) and a Time Stamp. The TGT is sent to the TGS that gives access to the ressources via a token. The token has a limited life span.

23
Q

What is a KDC?

A

Key Distribution Center.

24
Q

What is a AS?

A

Authorisation Server.

25
Q

What is a TGS?

A

Ticket granting server.

26
Q

What is SSH?

A

Secure Shell. It is a way to securely connect to a computer. Can also be used to create VPN and tunnels. It uses RSA to exchange PKI. It create a session ID to encrypt the communication using AES.

27
Q

What is SSL?

A

Secure Socket Layer. An application level encyption scheme that works with older applications. TLS (Transport Layer Security) is the upgrade of SSL.

28
Q

What is IPsec?

A

The only Internet layer encryption protocol. Widspread with IPv6, it can also be used with IPv4 for transport and tunnel mode.

29
Q

What is SNMP?

A

Secure Network Management Protocol. Collect data from MIP (Management Information base) enabled devices.

30
Q

What is HTTPS?

A

Hyper Textr Transfer Protocol Serure.

31
Q

What is LDAP?

A

Lightweight Directory Access Protocol. Used to exchange and update database. Heavely used by AD.