Section 3.1 Secure Protocols Flashcards

1
Q

What is layer 7 of the OSI model?

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Layer 6 of the OSI model?

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Layer 5 of the OSI model?

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Layer 4 of the OSI model?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is layer 3 of the OSI model?

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is layer 2 of the OSI model?

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is layer 1 of the OSI model?

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What layer of the OSI model does the Hyper Text Transfer protocol correspond to?

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What layer of the OSI model does the Simple Mail Transfer Protocol correspond to?

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What layer of the OSI model does the Multipurpose Internet Mail Extension Protocol correspond to?

A

Presentation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What layer of the OSI model does the Network File System Protocol correspond to?

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What layer of the OSI model does the Transmission Control Protocol correspond to?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What layer of the OSI model does the User Datagram Protocol correspond to?

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What layer of the OSI protocol does the Internet Protocol versions 4 & 6 correspond to?

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What layer of the OSI model does the Point to Point Protocol (PPP) correspond to?

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What protocol manages:
1)how to divide network messages into smaller frames and packages and
2) send network messages from source to destination by using error checking and flow control?

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What protocol is responsible for reassembling divided packages and frames once they have reached their destination?

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What protocol is used for addressing and routing network packets from source to destination device between LAN’s?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What protocol translates internet domains into IP addresses?

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In a _______________ attack, the DNS server is overloaded with requests so the server can’t respond to legit DNS requests

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DNS uses port _______ on TCP and UDP

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

____________ allows a user to log in to a remote machine and execute commands

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does SSH work?

A

Provides a secure encrypted tunnel to access another system remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SSH uses port?

A

TCP port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
_____________ is a specification for transferring multimedia and attachments through email
Multipurpose Internet Mail Extensions (MIME)
26
___________ offers a standard way for all mail clients and mail transfer systems to handle certain types of attachments.
Multipurpose Internet Mail Extensions (MIME)
27
____________ is used for sending confidential email that needs to be secured.
Secure Multipurpose Internet Mail Extensions (S/MIME)
28
___________digitally signs and encrypts emails using certificates
S/MIME
29
_____________ requires the use of public key certificates for authentication and provides message confidentiality and integrity via the user’s encryption & hashing algorithms.
S/MIME
30
Which protocol is used for delivering voice and video services over IP networks?
Real-Time Transport Protocol (RTP)
31
Because RTP does not inherently integrate encryption, what was developed to provide AES encryption?
Secure Real-Time Transfer Protocol (SRTP)
32
Which protocols are most commonly used for voice and video?
Real-time Transfer Protocol Secure Real-Time Transfer Protocol
33
Which protocols are most commonly used for Time synchronization?
Network Time Server Internet based time source running NTP on UDP port 123
34
Which protocols are most commonly used for email services?
Secure POP and Secure IMAP
35
Which protocols are most commonly used for web communications?
HTTPS
36
Which protocols are most commonly used for File Transfer?
FTPS and SFTP
37
Which protocols are most commonly used for Directory Services?
LDAPS
38
Which protocols are most commonly used for Remote Access?
IPSec
39
Which protocols are most commonly used for Domain Name Resolution?
DNSSEC
40
Which protocols are most commonly used for Routing and Switching?
The two aspects of the TCP/IP protocol: TCP and IP
41
Which protocols are most commonly used for Network Address Allocation?
DHCP
42
__________ is a vendor-neutral software protocol used to lookup information or devices within a network.
Lightweight Directory Access Protocol (LDAP)
43
_________ is designed to maintain and access directory services within a network
LDAP
44
Most LDAP servers support the use of ______________ to communicate with clients
Encrypted secure channels
45
Which protocol uses SSL or TLS to allow secure file transferring using built-in encryption and authentication mechanisms?
File Transfer Protocol Secure (FTPS)
46
Which protocol uses TCP port 990?
File Transfer Protocol Secure (FTPS)
47
Which protocol uses SSH to create a FTP tunnel through an SSH connection?
SSH File Transfer Protocol (SFTP)
48
Which protocol allows you to use network monitoring programs to analyze diagnostic information on network devices?
Simple Network Management Protocol (SNMP)
49
What file contains the organized SNMP data?
Management Information Based (MIB) file
50
SNMP's security consists of a password system called?
Community Strings
51
_____________ are simple passphrases used by SNMP to access each device
Community Strings
52
SNMP passwords should be changed when?
immediately after set up
53
What are used to limit SNMP access to a specific IP address of a network monitoring system?
Access Control Lists (ACL)
54
Which protocol provides a secure way of transmitting HTTP data between a web browser and a web server?
Hypertext Transfer Protocol over SSL/TLS (HTTPS)
55
HTTPS provides secure web transmissions by using?
SSL/TLS and certificates to provide encrypted and protected communications.
56
HTTPS uses ________ as its default secure protocol?
TLS
57
What is a standards based suite of protocols that provide confidentiality, integrity, and authenticity to information transferred across IP networks?
IPSec
58
Which protocol is most often used to secure VPN communications over an open network?
IPSec
59
Which protocol's use is mandatory in IPv6?
IPSec
60
Which mode of IPSec uses the IP addresses in the outer header to determine the IPSec policy that will be applied to the packet?
Transport Mode
61
Which mode of IPSec is used only in host-to-host communications?
Transport Mode
62
Which mode of IPSec sends to IP headers and uses the inner IP packet to determine the IPSec policy that will be applied to the packet?
Tunnel Mode
63
Which mode of IPSec is used to host VPN gateway communications?
Tunnel Mode
64
What IPSec protocol provides a mechanism for authentication only?
Authentication Header
65
What IPSec protocol provides data confidentiality (encryption) and authentication (data integrity, data origin authentication, and replay protection)
Encapsulating Security Payload
66
What specify the cryptographic parameters that must be agreed upon before the data transfer between 2 devices?
Security Associations
67
What provides the framework for Authentication Headers and Encapsulating Security Payloads to work?
Security Associations
68
What is the framework that authenticates the communicating devices and exchanges the keys as part of a security association establishment
Internet Security Association and Key Management Protocol (ISAKMP)
69
What protocol does the actual key exchange during a security association establishment?
Internet Key Exchange (IKE)
70
What protocol is a method of securely sharing keys between 2 security devices?
Internet Key Exchange (IKE)
71
Which protocol provides a way for users to retrieve mail from their inboxes using a POP-enabled email client?
Post Office Protocol
72
Which protocol uses TCP port 110?
Post Office Protocol
73
Which protocol is basically a version of POP that gives users more control over downloaded messages and how they are stored online?
Internet Message Access Protocol (IMAP)
74
Which protocol uses TCP port 143?
Internet Message Access Protocol (IMAP)
75
Which protocol uses TCP port 995?
Secure POP
76
Which protocol uses TCP port 993?
Secure IMAP
77
Which protocol is used to navigate email to it's destination?
Simple Mail Transfer Protocol (SMTP)
78
Which protocol uses TCP port 25?
Simple Mail Transfer Protocol (SMTP)
79
Which protocol uses UDP port 123?
Network Time Protocol (NTP)
80
Which protocol allocates IP addresses and other network information on a network automatically?
Dynamic Host Configuration Protocol (DHCP)
81
Which protocol uses UDP ports 67 & 68?
Dynamic Host Configuration Protocol (DHCP)
82
What protocol is used to secure remote access (LInux and Network)?
Secure Shell on port 22
83
What protocol is used to secure copy to Linux/Unix?
Secure copy protocol port 22
84
What protocol is used to secure FTP downloads?
SSH File Transfer Protocol port 22
85
What protocol is used for secure authentication?
Kerberos on port 88
86
What protocol is used for remote monitoring and configuration of SNMP entities (such as network devices)?
Simple Network Management Protocol v3 on port 162
87
What protocol is used for secure directory services information?
Lightweight Directory Access Protocol over SSL (LDAPS) on port 636
88
What protocol is used for secure VPN sessions between 2 hosts?
IPSec on UDP port 500
89
What protocol is used for secure remote access?
Remote Desktop Protocol on port 3389
90
What protocol is used for signaling and controlling in Internet telephony for voice and video?
Session Initiated Protocol (SIP) on port 5060/5061
91
What protocol is used for encryption, message authentication, and integrity for audio and video over IP networks?
Secure Real Time Protocol (SRTP) on port 5061