Chapter 13: Securing the Network Flashcards

(84 cards)

1
Q

Link encryption

A

encrypts all the data along a specific communication path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

E2EE

A

End-to-end encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

End-to-end encryption

A

occurs at the session layer (or higher) and does not encrypt routing information, enabling attackers to learn more about a captured packet and where it is headed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transport Layer Security

A

E2EE protocol that provides confidentiality and data integrity for network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSL

A

Secure Sockets Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure Sockets Layer

A

predecessor of TLS and is deprecated and considered insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VPN

A

virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

virtual private network

A

secure, private connection through an untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PPTP

A

Point-to-Point Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Point-to-Point Tunneling Protocol

A

obsolete and insecure means of providing VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

L2TP

A

Layer 2 Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 2 Tunneling Protocol

A

tunnels PPP traffic over various network types (IP, ATM, X.25) but does not encrypt the user traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPSec

A

Internet Protocol Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Internet Protocol Security

A

suite of protocols which provides authentication, integrity, and confidentiality protections to data at the network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TLS can be used to provide … connectivity at layer … in the … model

A

TLS can be used to provide VPN connectivity at layer 5 in the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

web service

A

client/server system in which clients and servers communicate using HTTP over a network such as the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SOA

A

service-oriented architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

service-oriented architecture

A

a system as a set of interconnected but self-contained components which communicate with each other and with their clients through standardized protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

API

A

application programming interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

application programming interfaces

A

establish a language which enables a system component to make a request from another component and then interpret that second component’s response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HTTP

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hypertext Transfer Protocol

A

TCP/IP-based communications protocol used for transferring data between a server and a client in a connectionless and stateless manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HTTPS

A

HTTP Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
HTTP Secure
HTTP running over TLS
26
SOAP
Simple Object Access Protocol
27
Simple Object Access Protocol
messaging protocol which uses XML over HTTP to enable clients to invoke processes on a remote host in a platform-agnostic way
28
WS-Security or WSS
Web Services Security
29
Web Services Security
a set of protocol extensions which provides message confidentiality, integrity, and authentication
30
SOAP security
enabled by Web Services Security
31
REST
Representational State Transfer
32
Representational State Transfer
an architectural pattern used to develop web services without using SOAP
33
DGA
domain generation algorithm
34
domain generation algorithm
produces seemingly random domain names in a way which is predictable by anyone who knows the algorithm
35
DNS tunneling
practice of encoding messages in one or a series of DNS queries or responses for exfiltrating or infiltrating data into an environment
36
DNS reflection attacks
send a query to a server while spoofing the source address of the intended target
37
DNS amplification attack
small queries result in very much larger responses
38
DNSSEC
Domain Name System Security Extensions
39
Domain Name System Security Extensions
a set of IETF standards which ensure the integrity of DNS records but not their confidentiality or availability
40
DoH
DNS over HTTPS
41
DNS over HTTPS
protect the privacy and confidentiality of DNS queries by sending them over HTTPS/TCP/IP instead of unsecured UDP/IP
42
E-mail spoofing
technique used by malicious users to forge emails to appear from a legitimate source
43
SASL
Simple Authentication and Security Layer
44
Simple Authentication and Security Layer
protocol-independent framework for performing authentication typically used in POP3 email systems
45
SPF
Sender Policy Framework
46
Sender Policy Framework
email validation system; prevents email spam by detecting email spoofing by verifying sender's IP address
47
DKIM
DomainKeys Identified Mail
48
DomainKeys Identified Mail standard
allows email servers to digitally sign messages so that receiving server can ensure the message is from the domain it claims to be from
49
DMARC
Domain-based Message Authentication, Reporting and Conformance
50
DMARC systems
use both SPF and DKIM to protect email
51
S/MIME
Secure MIME
52
S/MIME standard
encrypts and digitally signs email; provides secure data transmissions
53
DNP3
Distributed Network Protocol 3
54
Distributed Network Protocol 3
multilayer communications protocol for SCADA systems, especially those in the power sector
55
CAN
Controller Area Network
56
Controller Area Network bus
multilayer protocol for microcontrollers and other embedded devices to communicate with each other on a shared bus
57
Converged protocols
started off independent and distinct from one another but converged to become one
58
FCoE
Fibre Channel over Ethernet
59
Fibre Channel over Ethernet
protocol encapsulation which allows Fibre Channel (FC) frames to ride over Ethernet networks
60
iSCSI
Internet Small Computer Systems Interface
61
Internet Small Computer Systems Interface protocol
encapsulates SCSI data in TCP segments so computer peripherals can be located at any physical distance from the computer they support
62
Network segmentation
the practice of dividing networks into smaller subnetworks
63
VLAN
virtual LAN
64
virtual LAN
set of devices which behave as though they are all directly connected to the same switch when they aren't
65
VxLAN
virtual eXtensible LAN
66
Virtual eXtensible LAN
network virtualization technology which encapsulates layer 2 frames onto UDP (layer 4) datagrams for distribution anywhere in the world
67
SDN
software-defined networking
68
software-defined networking
networking approach which relies on distributed software to separate the control and forwarding planes of a network
69
SD-WAN
Software-defined wide area networking
70
software-defined wide area networking
use of software (instead of hardware) to control the connectivity, management, and services between distant sites in a manner similar to SDN but applied to WANs
71
VLAN hopping attack opportunity
an attacker is able to insert tagging values into network- and switch-based protocols with the goals of manipulating traffic at the data link layer
72
VLAN hopping
attackers gain access to traffic in various VLAN segments; attacker can have a system act as a switch; the system understands the tagging values used in the network and trunking protocols and can insert itself between other VLAN devices and gain access to the traffic going back and forth; attackers can insert tagging values to manipulate the control of traffic at this data link layer
73
Authentication Header protocol
provides data integrity, data origin authentication, protection from replay attacks
74
Encapsulating Security Payload protocol
provides confidentiality, data origin authentication, data integrity
75
Internet Security Association and Key Management Protocol
framework for security association creation and key exchange
76
Internet Key Exchange
provides authenticated keying material for use with ISAKMP
77
Secure Multipurpose Internet Mail Extensions
standard for encryption to provide secure data transmissions using public key infrastructure (PKI)
78
WS-Security is for SOAP
for web services confidentiality with SOAP; not RESTful web service
79
RESTful requires .... and uses ... for confidentiality
RESTful uses HTTP and HTTP Secure (HTTPS) for confidentiality
80
What is a set of IETF standards for DNS records?
Domain Name System Security Extensions (DNSSEC) ensures integrity and authenticity of DNS records but not their confidentiality or availability
81
Best protection against email spoofing?
DMARC systems incorporate both SPF and DKIM to protect email
82
IMAP does or does not have email protections against spoofing
Internet Message Access Protocol (IMAP) does NOT have any built-in protections against email spoofing
83
Which is a multilayer protocol for use in SCADA systems?
DNP3 (Distributed Network Protocol 3 used in SCADA, specifically the power sector
84
Converged protocol FACTS
FCoE is a converged protocol, IP convergence addresses specific type of converged protocols, certain protocols are encapsulated within each other