Chapter 12 Flashcards
(59 cards)
an encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links
Data Link layer
PPP
Point-to-Point Protocol
this authentication protocol transmits usernames and passwords in cleartext
PAP - Password Authentication Protocol
this authentication protocol uses a challenge-response and periodically reauthenticates the remote system
CHAP - Challenge Handshake Authentication Protocol
an authentication framework that allows customized authentication solutions that can support smartcards, tokens, or biometrics
EAP - Extensible Authentication Protocol
a legacy Cisco proprietary alternative to TKIP for WPA
LEAP - Lightweight Extensible Authentication Protocol
this authentication protocol encapsulates EAP in a TLS tunnel and supports mutual authentication
PEAP - Protected Extensible Authentication Protocol
a means of authenticating mobile devices using SIM cards
EAP-SIM
Subscriber Identity Module
An obsolete Cisco protocol that was designed to replace LEAP
EAP-FAST
Flexible Authentication via Secure Tunneling
this deprecated authentication protocol hases passwords using MD5
EAP-MD5
this authentication protocol uses OTP tokens in MFA for both one-way and mutual authentication
EAP-POTP
this authentication protocol is an IETF standard that is an implementation of the TLS protocol for use in protecting authentication traffic
EAP-TLS
this authentication protocol creates a VPN-like tunnel between endpoints prior to authentication
EAP-TTLS
formal name for IEEE 802.1X standard
Port-Based Network Access Control
what attacks are 802.1X vulnerable to?
MITM and hijacking
the oversight and management of the efficiency and performance of network communications
QoS - Quality of service
5 telephony protocols
POTS - plain old telephone service
PSTN - public switched telephone network
PBX - private branch exchange
mobile/cell services
VOIP - voice over IP
PBX and PSTN vulnerabilities
interception, eavesdropping, tapping
7 VOIP vulnerabilities
MiTM
hijacking
pharming
DoS
vishing
phreaking
fraud and abuse
telephone switching or exchange system deployed in private orgs to enable multistation use of a small number of PSTN lines
PBS - Private Branch Exchange
this security feature adds authentication requirements to all external connections to a PBX
Direct inward system access (DISA)
sus -.-
this type of remote access gives users the ability to remotely connect to and manipulate or interact with a single service
service specific remote access
this type of remote access grants a remote user the ability to fully control another system that is physically distant from them
remote control
this type of remote access is just another name for when a remote client establishes a direct connection to a LAN such as with wireless or VPN
remote note operation
this type of remote access can be used to refer to remote control, remote access, or remote desktop services
screen scraper/scraping
virtual applications
virtual desktops