chapter 13 Flashcards Preview

Network+ > chapter 13 > Flashcards

Flashcards in chapter 13 Deck (33):
1

what is access control list (ACL)?


432

An access control list (ACL) is a table that tells a computer, routers and more operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list.

2

the Allowing or blocking network packets into or out of a device or the network based on their application (port number).
433

port filtering

3

encapsulating one protocol within another to ensure a transmission is secure is called what?
it is a special connection made over a network between two computers or network devices.
434

tunneling

4

what are the tunneling protocol that we need to know about?

-virtual private network (VPN)
- Secure Socket Layer, SSL
- Layer 2 Tunneling Protocol (L2TP)
-The Point-to-Point Tunneling Protocol (PPTP)
- Generic Routing Encapsulation (GRE)
-IP sec
-ISAKMP

5

virtual private network (VPN)

a method employing encryption to provide secure access to a remote computer over the Internet.

6

4 categories of VPN, what are they


436

host to host VPNs ( remote access VPNs )
host to host VPNs
Sit to sit VPNs
Extranet VPNs ( B2B)

7

Secure Socket Layer, SSL
436

SSL is a protocol based on RSA, it is used to enable secure the session layer connection over the internet between a web browser and a web server

8

the SSL was merged with other Transport layer security protocol to form a new protocol named what?
436

Transport layer Security TLS

9

what is the latest version of TLS?
436

TLS 2.0

10

Layer 2 Tunneling Protocol (L2TP):
437

Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.

11


The Point-to-Point Tunneling Protocol (PPTP)



437

The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.

12

What is Generic Routing Encapsulation (GRE)?


438

Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network.

13

IP sec

439

IP Security, IP sec is a set of protocols developed by the Internet Engineering Task Force to support the secure exchange of packets at the IP layer.

14

in which layer of the OSI model does IPSec work?

439

it work at the net work layer( layer 3), it secures all applications of that layer and the layers above it.

15

IPSec can work with IPv4 and IPV6. T/F
439

True

16

their are 2 protocol working in IPSec, what are they/

439

The authentication header ( AH )
encapsulation security payload ( ESP)

17

AH protocol within IPSec is compatible with network running NAT ( network address Translation). T/F
439

False

18

AH provides Authentication services only. T/F
439

true

19

ESP provides authentication and encryption abilities. T/F

439

true

20

IPSec works in 2 mode what are they?

439

transport mode
tunneling mode

21

transport mode

it create secure tunnel between 2 devices end to end.
, that mean the packet is protected.

22

tunneling mode

it is created between 2 endpoints like; 2 routers or 2 gateway servers, all the traffic going through the tunnel is protected.

23

what is encryption?







440

The process of making data unreadable by other humans or computers for the purpose of preventing others from gaining access to its contents. Encrypted data is generated using an encryption program such as PGP, encryption machine, or a simple encryption key and appears as garbage until it is decrypted. To read or use the data, it must be decrypted, and only those who have the correct password or decryption key can make the data readable again.

24

what is an Encryption Key?

441

An Encryption Key is a random string of characters that is used with the encrypted algorithm to encrypt or decrypt data.

25

the encryption Key is unique to each transaction. T/F
441

True

26

Encryption Key come in 2 flavors what bare they?
441

public and private.

27

3 encryption standard, what are they?

442

DES
3DES
AES

28

Symmetric encryption key is ____


442

- Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way.
- both the sender and the receiver have the same key and use it to encrypt and decrypt all messages.

29

what can we say about DES, data encryption standard?


442

-uses lookup and functions
-uses 56 bit key
-works much faster then other complex systems.
-it is not exactly secure.

30

what is Triple DES?



442

Triple DES (3DES) is the common name for the Triple Data Encryption Algorithm (TDEA or Triple DEA) symmetric-key block cipher, which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.

31

how many bits are in the 3DES?

442

56x3 = 168

32

of the 168 bit key of the 3DES how many are effective?
442

80 bits.

33

The Advanced Encryption Standard (AES):


442

The Advanced Encryption Standard (AES), also known as Rijndael (its original name), is a specification for the encryption of electronic data.
AES key lengths is 128,192 or 256 bits.