Network Security Flashcards

1
Q

DES

A

Data Encryption Standard

SYMMETRIC

● Developed in the mid-1970s

● 56-bit key

● Used by SNMPv3

● Considered weak today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3DES

A

3DES (Triple DES)

SYMMETRIC

● Uses three 56-bit keys (168-bit total)

● Encrypt, decrypt, encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

AES (Advanced Encryption Standard)

SYMMETRIC

● Preferred symmetric encryption standard

● Used by WPA2

● Available in 128-bit, 192-bit, and 256-bit keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RSA

A

ASYMMETRIC

Used with PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MD5

A

▪ Message digest 5 (MD5)

● 128-bit hash digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SHA-1

A

Secure Hash Algorithm 1 (SHA-1) ● 160-bit hash digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SHA-2

A

Secure Hash Algorithm 256 (SHA-256) ● 256-bit hash digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CRAMMD5

A

Challenge-Response Authentication Mechanism Message Digest 5 (CRAMMD5)

● Common variant often used in e-mail systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RADIUS

A

Open Standard, UDP based authentication protocol

UDP port 1812/1813

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TACACS+

A

Cisco proprietary, TCP-based Authentication protocol

TCP port 49

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Kerberos

A

Authentication in Windows

Ticket based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

System Lifecycle

A

● Conceptual Design

● Preliminary Design

● Detailed Design

● Production and Installation

● Operations and Support

● Phase Out

● Disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NGFW

A

NextGen Firewalls (NGFW)
▪ Third generation firewalls that conduct deep packet inspection and packet filtering
▪ Operates at higher levels of the OSI model than traditional stateful firewalls
▪ Web Application Firewalls are a good example of these, as they inspect HTTP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ACL

A

Access Control List (ACL)
▪ Set of rules typically applied to router interfaces that permit or deny certain traffic
▪ ACL filtering criteria includes:

● Source IP, Port, or MAC

● Destination IP, Port, or MAC

17
Q

UTM

A

Unified Threat Management (UTM) Devices
▪ Device that combines firewall, router, intrusion detection/prevention system, antimalware, and other security features into a single device
▪ Agent is run on an internal client and can be queried by the UTM before allowing connection to the network
▪ UTM can be purchased as a physical device to install in your network, or you can look to a cloud solution