Chapter 7 Remote access Flashcards

(67 cards)

1
Q

Wireless network encryption standard.

A

802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

vendor-independent standard for connecting two nodes according to the port

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

login, access privileges, track account usage

A

AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

secure encryption, better than TKIP

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPsec; provides IP packet authentication through public keys

A

AH (authentication header)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kerberos; a process to initially authenticate a client

A

AS (authentication service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

one key to encrypt, another to decrypt

A

asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

rules to authenticate clients

A

authentication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kerberos: user’s time stamp is encrypted with a session key

A

authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

organization that maintains and issues certificates, part of public-key infrastructure

A

CA (certificate authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

random string of text to another computer to initiate authentication

A

challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PPP authentication process

A

CHAP (challenge handshake authentication protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3-tenet security standard for protecting data

A

CIA triad (confidentiality, integrity, availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

input of 2 different data sets resulting in the same hash value

A

collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

services shared by many organizations, but are not public

A

community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a digital document that contains verifiable information about the user and their public key

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

WinServer 2008 service; automatically authenticates remote users to a Domain and to corporate networks

A

DirectAccess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

forging name server records

A

DNS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the authenticator initiates the authentication process

A

EAP (extensible authentication protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

nature of storage and services to be easily scalable on demand

A

elastic (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

security concerns while data is in transit

A

endpoint security vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

two nodes connect without help from intermediate devices directing hops for transmissions

A

end-to-end connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IPsec; a packet’s data authentication through a public key

A

ESP payload (encapsulating security payload)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cisco: transmits PPP data frames through VPN-tunnel packets to look like IP packets in Layer 3

A

GRE (generic routing encapsulation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
data transformed through a particular algorithm - impossible to reverse
hashed data
26
virtually hosted desktops on a different physical computer.
HVD (hosted virtual desktop)
27
different data services within a cloud
hybrid cloud
28
IPsec; negotiates the exchange and authentication of keys
IKE (internet key exchange)
29
works with IPsec to form a secure connection
ISAKMP (Internet security association and key management protocol)
30
Kerberos; the server issues keys to clients during initial client authentication
KDC (key distribution center)
31
a cross-platform private key encryption service; uses key encryption to verify client identity and securely exchange information
Kerberos
32
combination of public and private keys used to encrypt and decipher data using public key encryption
key pair
33
a VPN protocol that encapsulates PPP data for use on VPNs
Layer 2 Tunneling protocol
34
a 128-bit hash protocol
MD5
35
authentication protocol over PPP that encryps usenames and passwords
MS-CHAP (Microsoft challenge handshake authentication protocol)
36
requires two or more pieces of info for authentication
MFA (multifactor authentication)
37
multiple customers share one storage location
multi-tenant
38
both computers verify each other's credentials
mutual authentication
39
open source SSH: protocols for security and encryption
open SSH
40
open source VPN
open VPN
41
legacy authentication protocol; very fallible against brute force attacks
PAP (password authentication protocol)
42
using certificates to assign users to public keys
PKI (public key infrastructure)
43
a client's identity is verified before the port for transmission is opened
port authentication
44
redirecting traffic to a different port
port forwarding
45
an upgrade to SLIP; a client connects to a server via a serial connection (dial-up/DSL); considered weak for authentication
PPP (point-to-point protocol)
46
services on a private server within an organization
private cloud
47
encryption using a key that only the sender and recipient know
private key encryption
48
a tunneling protocol that encapsulates PPP data frames so they travel masked as an IP transmission
PTP (point-to-point)
49
services provided over public transmission lines
public cloud
50
encryption using a public key associated with the user and the client-specific key
public key encryption
51
a source for public keys
public key server
52
protocol for providing centralized AAA services
RADIUS service
53
an access server wherein remote users log in, access data, and are granted provileges
RAS (remote access server)
54
Microsoft's RAS and VPN
RRAS (routing and remote access service)
55
IPsec: a secured channel
secure channel
56
Kerberos: random two copies of a new key
session key
57
hash algorithm resistant to collisions
SHA (secure hash algorithm)
58
one-time sign in to access multiple resources
SSO (single sign on)
59
tunnels connect multiple sites on a WAN
site-to-site VPN
60
predecessor to PPP; allows clients to connect to a server via serial connections
SLIP (serial line internet protocol)
61
software is provided by subscription
subscription model
62
the same encryption key is used at both ends
symmetric encryption
63
Kerberos: you don't need a new ticket to access other resources
TGS (ticket granting service)
64
predecessor to AES, 802.11i
TKIP (temporal key integrity protocol)
65
a virtual connection between a client and a remote network
VPN
66
a gateway on the edge of a LAN that establishes secure connections (routers / RASs)
VPN gateway
67
A Citrix virtualization software package
Xen