Flashcards in Chapter 5 - Network Security Deck (25)
another name for "key"
2 things found in WPA but not in WEP
TKIP - scrambles key with hashing for data encryption
EAP - used with certificates for authentication
2 ways WPA2 improves on WPA
AES for encryption
CCMP - 802.11i, this is the encryption that replaced TKIP
what standard does WPA enterprise use?
6 attributes used by ACL for filtering
source and destination IP addresses
source and destination MAC addresses
2 locations where IP filtering should be employed
tell me the ranges for port
3 protocols used in VPN
3 security services of IPSec
protection from data tampering
privacy of transactions
what protocol provides for secure creation and management of keys?
tell me about TLS and TLS 1.2
TLS - kills eavesdropping, tampering, message forgery
TLS 1.2 - longer key and more sophisticated algorithms than what's in TLS
what does RAS and RRAS both do?
what protocols do they use?
remote access connectivity to a LAN environment
main function of PPPoE?
encapsulate PPP frames inside ethernet frames
the 3 authentication options of PPP
where does SSH operate at? (layer?)
7 and 5
application and session
what is PKI?
how does it work?
public key infrastructure
public key - identifies user, encrypts data
private key - only held by the user, stored by the OS, decrypts the data
what is Kerberos?
default authentication protocol for Active Directory AND for Novell NDS systems
ticket granting ticket
key distribution center
authentication, authorization, accounting
remote authentication dial-in user service
terminal access controller access control system +
the client = ?
WAP = ?
CHAP = ?
challenge handshake authentication protocol
give an example of two factor authentication
smartcard plus PIN
give an example of multifactor authentication
smartcard plus PIN plus biometrics
how to defend against WPA cracking?
use WPA2 with AES
denial of service
distributed denial of service
what type of attack is phishing?
how is a worm different from a virus?
5 - 198,199
doesn't need to attach itself to an application
the best firewall settings use what?