Chapter 7 Study Guide Flashcards
Tunneling
1
Q
What was the weakness of SSL v2?
A
- The usage of “export grade cipersuites”
- Crackable 40-bit session keys
2
Q
HTTP port
A
80
3
Q
HTTPS port
A
443
4
Q
SMTP port
A
25
5
Q
SMTPS port
A
465
6
Q
how is a SSL/TLS tunnel created?
A
- With a symetric key method (RCA or AES)
- Signature created with a defined hashing method (SHA-1 or MD5)
7
Q
Client Hello
A
- Sent from client to the server and defines cipher suites that the client supports
8
Q
Server Hello
A
- Sends back the digital certificate from the server and the selected cipher suite from the list the client sent
9
Q
Client Key Exchange
A
- Sent from the client and contains the information required to generate the session key
10
Q
Tunneling mode
A
Allows information to be inspected by firewalls. The information will still be encrypted over the internet
11
Q
Transport mode
A
End-to-end encryption, cannot be inspected
12
Q
Two phases of IPSEC
A
- IKE (Internet Key Exchange)
- Defines the policies
13
Q
Default port for the IPsec key exchange
A
- UDP 500
14
Q
Which protocol indicates the virtual private network (VPN) is using Authentication Header (AH)?
A
- 51