Remote Access Methods Flashcards

1
Q

Encapsulating a payload protocol within a delivery protocol to ensure secure transmission is known as what?

A

Tunnelling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the 4 types of VPNs

A

1) Client-to-site (Remote-Access)
2) Host-to-Host VPN
3) Site-to-Site VPN
4) Extranet VPN (allows organizations suppliers/partners to connect to the network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the main benefit of using a site-to-site VPN for connecting remote offices than other WAN technologies?

A

It’s cheap!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the 5 tunnelling protocols covered in CompTIA

A

1) DTLS
2) L2TP
3) GRE
4) IPsec
5) PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When might you use DatagramTLS?

A

DTLS is a protocol based on TLS that is capable of securing the datagram (connectionless) transport so you might use it for securing delay-sensitive traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which tunnelling protocol would you choose if you had to connect networks that used non-TCP/IP traffic?

A

L2TP (PPTP using GRE can do this but considered obsolete)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who created L2TP?

A

IETF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which data-link layer tunnelling protocol allows access to a VPN using ports TCP 1723 and IP 47?

A

PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which technique encapsulates Point-to-Point Protocol (PPP) frames in Internet Protocol (IP) packets using the Generic Routing Encapsulation (GRE) protocol.

A

PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List 4 characteristics of GRE

A

1) Uses protocol-type field to transport any Layer 3 protocol
2) It is STATELESS and has NO FLOW CONTROL
3) It has NO ENCRYPTION
4) Create addition OVERHEAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which tunneling protocol was designed by the IETF, works at the Network layer of the OSI model and supports both IPv4 and IPv6?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two major protocols work inside IPSec?

A

1) AH - Authentication Header (responsible for providing integrity and authentication using Integrity Value Check i.e. IVC)
2) ESP - Encapsulating Security Payload (responsible for encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do you need to be aware of when tunnelling to NAT networks using IPSec?

A

The Authentication Header protocol isn’t compatible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between IPSec transport and tunnelling modes?

A

1) Transport mode creates a secure tunnel between two devices (e.g. host to host/host to server)
2) Tunnelling mode creates a secure tunnel between two end points like routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the key advantage of ISAKMP? Which tunnelling protocol is it integrated into?

A

It allows for separating out of the method for safely transferring key and authentication independent of the key generation technique.
IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which layer 2 protocol is commonly used for remote access and provides authentication, encryption and compression services to clients logging in remotely?
Is it routable?

A

Point-to-Point Protocol

It is not routable. It can be made routable using PPTP

17
Q

List what happens in the Discovery phase in PPPoE

A

1) MAC addresses of end-points are exchanged
2) Session ID is created to facilitate further data transmission
3) Point-to-point connection is created

18
Q

Which remote desktop sharing system similar to RDP uses the remote frame buffer protocol?

A

VNC (Virtual Network Computing)

19
Q

if you wanted to create a private network on an intranet what could you use?

A

an SSL VPN

20
Q

What is the major difference between the RDP and VNC?

A

VNC sends raw pixel data while RDP uses graphic primitives (not as high quality basically)

21
Q

SSL is based on what public key encryption algorithm?

22
Q

Which remote access method uses a Terminal Services Client to connect and provides 128-bit encryption using the RC4 algorithm?

A

Remote Desktop Protocol

23
Q
List the layers at which the following protocls work at:
GRE
IPSec
L2TP
PPTP
A

GRE - Layer 3
IPSec - Layer 3
L2TP - Layer 2
PPTP - Layer 2

24
Q

Which web browser security method was deprecated in 2015 in favour of TLS?

25
What protocol number is 51 for?
The IPSec Authentication Header
26
What is the protocol number of the Encapsulating Security Payload (ESP) and the Authentication Header? (AH)
``` ESP = 50 AH = 51 ```
27
What uses Internet Key Exchange, what port does it use and what does it do?
IPsec uses IKE over port 500 to authenticate clients in the IPSec conversation before data is transmitted.