Chapter 12 Flashcards

(59 cards)

1
Q

an encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links
Data Link layer

A

PPP
Point-to-Point Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this authentication protocol transmits usernames and passwords in cleartext

A

PAP - Password Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this authentication protocol uses a challenge-response and periodically reauthenticates the remote system

A

CHAP - Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an authentication framework that allows customized authentication solutions that can support smartcards, tokens, or biometrics

A

EAP - Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a legacy Cisco proprietary alternative to TKIP for WPA

A

LEAP - Lightweight Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this authentication protocol encapsulates EAP in a TLS tunnel and supports mutual authentication

A

PEAP - Protected Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a means of authenticating mobile devices using SIM cards

A

EAP-SIM
Subscriber Identity Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An obsolete Cisco protocol that was designed to replace LEAP

A

EAP-FAST
Flexible Authentication via Secure Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this deprecated authentication protocol hases passwords using MD5

A

EAP-MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this authentication protocol uses OTP tokens in MFA for both one-way and mutual authentication

A

EAP-POTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this authentication protocol is an IETF standard that is an implementation of the TLS protocol for use in protecting authentication traffic

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this authentication protocol creates a VPN-like tunnel between endpoints prior to authentication

A

EAP-TTLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

formal name for IEEE 802.1X standard

A

Port-Based Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what attacks are 802.1X vulnerable to?

A

MITM and hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the oversight and management of the efficiency and performance of network communications

A

QoS - Quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

5 telephony protocols

A

POTS - plain old telephone service
PSTN - public switched telephone network
PBX - private branch exchange
mobile/cell services
VOIP - voice over IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PBX and PSTN vulnerabilities

A

interception, eavesdropping, tapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

7 VOIP vulnerabilities

A

MiTM
hijacking
pharming
DoS
vishing
phreaking
fraud and abuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

telephone switching or exchange system deployed in private orgs to enable multistation use of a small number of PSTN lines

A

PBS - Private Branch Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

this security feature adds authentication requirements to all external connections to a PBX

A

Direct inward system access (DISA)

sus -.-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

this type of remote access gives users the ability to remotely connect to and manipulate or interact with a single service

A

service specific remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

this type of remote access grants a remote user the ability to fully control another system that is physically distant from them

A

remote control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

this type of remote access is just another name for when a remote client establishes a direct connection to a LAN such as with wireless or VPN

A

remote note operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

this type of remote access can be used to refer to remote control, remote access, or remote desktop services

A

screen scraper/scraping
virtual applications
virtual desktops

25
this type of remote access can be used to refer to an automated tool that interacts with a human interface
screen scraper
26
4 topics to address in a remote access security management strategy
remote connectivity technology transmission protection authentication protection remote user assistance
27
the use of various multimedia-supporting communication solutions to enhance distance collaboration
multimedia collaboration
28
load-balancing scheme where each packet or connection is assigned a destination randomly
random choice
29
load-balancing scheme where each packet or connection is assigned the next destination in order
round robin
30
load-balancing scheme where the device with the lowest current load receives the next connection
load monitoring
31
load-balancing scheme where each packet or connection is assigned a destination based on a subjective preference or known capacity difference
preferencing/weighted
32
load-balancing scheme where each connection is assigned a destination based on the destination's relative distance from the load balancer
locality based/geographic
33
load-balancing scheme where each connection is assigned a destination based on previous connections from the same client
Locality based (affinity)
34
a form of load balancing that uses all available pathways or systems during normal operations. Optimizes availability during normal conditions.
active-active system
35
a form of load balancing that keeps some pathways or systems in an unused state during normal operations that are only used for failover. This optimizes availability.
active-passive system
36
What is an SMTP server called when it does not require senders to authenticate before accepting messages?
an open relay or a relay agent
37
what is an SMTP server called when it does require authentication?
closed relays or authenticated relays
38
an email security standard that offers authentication and confidentiality to email through public key encryption, digital envelopes, and digital signatures.
S/MIME
39
a peer-to-peer public-private key email system that uses a variety of encryption algorithms to encrypt files and email messages.
PGP
40
a means to asset that valid email is sent by an organization through verification of domain name identity
DKIM - DomainKeys Identified Mail
41
checking with the domain administrators to ensure that the sender is authorized to send messages through their system
SPF - Sender Policy Framework
42
a DNS-based email authentication system
DMARC- Domain Message Authentication Reporting and Conformance
43
attempts to set up an encrypted connection with the target email server; it is an SMTP command
STARTTLS, explicit TLS, opportunistic TLS for SMTP
44
TLS-encrypted SMTP which assumes the target server supports TLS. If not, the connection is terminated because plaintext is not accepted. Be better losers.
Implicit SMTPS
45
a form of DoS attack when someone responds with a Reply All to a message that has a significant number of recipients
mail storm
46
an obsolete encapsulation protocol operating at the Data Link layer on TCP port 1723
PPTP Point-to-Point Tunneling Protocol
47
a Cisco tunneling protocol that operates at layer 2 and uses UDP port 1701
L2TP Layer 2 Tunneling Protocol
48
a Cisco tunneling protocol that provides encapsulation without encryption
GRE Generic Routing Encapsulation
49
a protocol that operates on TCP 22 that can be used as a transport mode VPN
SSH
50
an open source VPN option based on TLS
OpenVPN
51
a collection of protocols used for establishing VPN links between hosts or networks
IPsec Internet Protocol Security
52
4 primary switch functions
learning, forwarding, dropping, flooding
53
a table held in switch memory that contains a mapping between MAC addresses and port numbers
CAM table
54
a switch feature that restricts the number of MAC addresses that will be accepted into the CAM table from each port
MAC limiting
55
the characteristic of a security control that ensures it is unseen by users
transparency
56
a form of auditing focused on communications, containing details about the source, destination, timestamp, packets, etc of communications on a network
transmission logging
57
security controls to prevent eavesdropping
physical access security encryption onetime authentication application allow listing
58
security control to prevent modification attacks
integrity checking
59
a dedicated physical pathway is created between the two communicating parties
circuit switching