Chapter 12 Flashcards

1
Q

an encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links
Data Link layer

A

PPP
Point-to-Point Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this authentication protocol transmits usernames and passwords in cleartext

A

PAP - Password Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this authentication protocol uses a challenge-response and periodically reauthenticates the remote system

A

CHAP - Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an authentication framework that allows customized authentication solutions that can support smartcards, tokens, or biometrics

A

EAP - Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a legacy Cisco proprietary alternative to TKIP for WPA

A

LEAP - Lightweight Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this authentication protocol encapsulates EAP in a TLS tunnel and supports mutual authentication

A

PEAP - Protected Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a means of authenticating mobile devices using SIM cards

A

EAP-SIM
Subscriber Identity Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An obsolete Cisco protocol that was designed to replace LEAP

A

EAP-FAST
Flexible Authentication via Secure Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this deprecated authentication protocol hases passwords using MD5

A

EAP-MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this authentication protocol uses OTP tokens in MFA for both one-way and mutual authentication

A

EAP-POTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this authentication protocol is an IETF standard that is an implementation of the TLS protocol for use in protecting authentication traffic

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this authentication protocol creates a VPN-like tunnel between endpoints prior to authentication

A

EAP-TTLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

formal name for IEEE 802.1X standard

A

Port-Based Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what attacks are 802.1X vulnerable to?

A

MITM and hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the oversight and management of the efficiency and performance of network communications

A

QoS - Quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

5 telephony protocols

A

POTS - plain old telephone service
PSTN - public switched telephone network
PBX - private branch exchange
mobile/cell services
VOIP - voice over IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PBX and PSTN vulnerabilities

A

interception, eavesdropping, tapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

7 VOIP vulnerabilities

A

MiTM
hijacking
pharming
DoS
vishing
phreaking
fraud and abuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

telephone switching or exchange system deployed in private orgs to enable multistation use of a small number of PSTN lines

A

PBS - Private Branch Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

this security feature adds authentication requirements to all external connections to a PBX

A

Direct inward system access (DISA)

sus -.-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

this type of remote access gives users the ability to remotely connect to and manipulate or interact with a single service

A

service specific remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

this type of remote access grants a remote user the ability to fully control another system that is physically distant from them

A

remote control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

this type of remote access is just another name for when a remote client establishes a direct connection to a LAN such as with wireless or VPN

A

remote note operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

this type of remote access can be used to refer to remote control, remote access, or remote desktop services

A

screen scraper/scraping
virtual applications
virtual desktops

25
Q

this type of remote access can be used to refer to an automated tool that interacts with a human interface

A

screen scraper

26
Q

4 topics to address in a remote access security management strategy

A

remote connectivity technology
transmission protection
authentication protection
remote user assistance

27
Q

the use of various multimedia-supporting communication solutions to enhance distance collaboration

A

multimedia collaboration

28
Q

load-balancing scheme where each packet or connection is assigned a destination randomly

A

random choice

29
Q

load-balancing scheme where each packet or connection is assigned the next destination in order

A

round robin

30
Q

load-balancing scheme where the device with the lowest current load receives the next connection

A

load monitoring

31
Q

load-balancing scheme where each packet or connection is assigned a destination based on a subjective preference or known capacity difference

A

preferencing/weighted

32
Q

load-balancing scheme where each connection is assigned a destination based on the destination’s relative distance from the load balancer

A

locality based/geographic

33
Q

load-balancing scheme where each connection is assigned a destination based on previous connections from the same client

A

Locality based (affinity)

34
Q

a form of load balancing that uses all available pathways or systems during normal operations. Optimizes availability during normal conditions.

A

active-active system

35
Q

a form of load balancing that keeps some pathways or systems in an unused state during normal operations that are only used for failover. This optimizes availability.

A

active-passive system

36
Q

What is an SMTP server called when it does not require senders to authenticate before accepting messages?

A

an open relay or a relay agent

37
Q

what is an SMTP server called when it does require authentication?

A

closed relays or authenticated relays

38
Q

an email security standard that offers authentication and confidentiality to email through public key encryption, digital envelopes, and digital signatures.

A

S/MIME

39
Q

a peer-to-peer public-private key email system that uses a variety of encryption algorithms to encrypt files and email messages.

A

PGP

40
Q

a means to asset that valid email is sent by an organization through verification of domain name identity

A

DKIM - DomainKeys Identified Mail

41
Q

checking with the domain administrators to ensure that the sender is authorized to send messages through their system

A

SPF - Sender Policy Framework

42
Q

a DNS-based email authentication system

A

DMARC- Domain Message Authentication Reporting and Conformance

43
Q

attempts to set up an encrypted connection with the target email server; it is an SMTP command

A

STARTTLS, explicit TLS, opportunistic TLS for SMTP

44
Q

TLS-encrypted SMTP which assumes the target server supports TLS. If not, the connection is terminated because plaintext is not accepted. Be better losers.

A

Implicit SMTPS

45
Q

a form of DoS attack when someone responds with a Reply All to a message that has a significant number of recipients

A

mail storm

46
Q

an obsolete encapsulation protocol operating at the Data Link layer on TCP port 1723

A

PPTP
Point-to-Point Tunneling Protocol

47
Q

a Cisco tunneling protocol that operates at layer 2 and uses UDP port 1701

A

L2TP
Layer 2 Tunneling Protocol

48
Q

a Cisco tunneling protocol that provides encapsulation without encryption

A

GRE
Generic Routing Encapsulation

49
Q

a protocol that operates on TCP 22 that can be used as a transport mode VPN

A

SSH

50
Q

an open source VPN option based on TLS

A

OpenVPN

51
Q

a collection of protocols used for establishing VPN links between hosts or networks

A

IPsec
Internet Protocol Security

52
Q

4 primary switch functions

A

learning, forwarding, dropping, flooding

53
Q

a table held in switch memory that contains a mapping between MAC addresses and port numbers

A

CAM table

54
Q

a switch feature that restricts the number of MAC addresses that will be accepted into the CAM table from each port

A

MAC limiting

55
Q

the characteristic of a security control that ensures it is unseen by users

A

transparency

56
Q

a form of auditing focused on communications, containing details about the source, destination, timestamp, packets, etc of communications on a network

A

transmission logging

57
Q

security controls to prevent eavesdropping

A

physical access security
encryption
onetime authentication
application allow listing

58
Q

security control to prevent modification attacks

A

integrity checking

59
Q

a dedicated physical pathway is created between the two communicating parties

A

circuit switching