Secure Protocols & Encryption Flashcards

1
Q

Valid Modes of Operation used by IPsec

A

Transport & Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does FCS stand for ?

A

Frame Check Sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocols are used to make sure data has not been altered during transmission?

A

Cyclic Redundancy Check - (CRC)

Frame Check Sequence - (FCS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does CRC stand for ?

A

Cyclic Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does SSL stand for ?

A

Secure Sockets Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Secure Sockets Layer/Transport Layer Security do ?
How does it show this ?

A

Creates an encrypted connection between a client and a server and establish trust.
It shows this through a green padlock or a branded URL bar on a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the SSL key pair ?

What is the name of the process in which SSL uses these to establish a connection ?

A

A public and Private key that work together to establish an encrypted connection.
An SSL Handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does CSR stand for ?

What does it do ?

A

Certificate Signing Request

Creates a Public and Private key on your server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What types of things would SSL/TLS be used for ?

A
Web browser and web server
Mail Server and Mail Client 
Banking
Typing in sensitive information like credit card numbers, Social Security numbers 
Login Credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do protocols do ?

A

Describe how Algorithms should be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do SSL/TLS Secure websites begin with ?

A

HTTPS:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSL Handshake

A

BROSWER CONNECTS to a web server (website) secured with SSL (https). Browser requests that the server identify itself.

SERVER SENDS a copy of its SSL Certificate, including the server’s public key.

BROWSER CHECKS the certificate root against a list of trusted CAs and that the certificate is unexpired, unrevoked, and that its common name is valid for the website that it is connecting to. If the browser trusts the certificate, it creates, encrypts, and sends back a symmetric session key using the server’s public key.

SERVER DECYRPTS the symmetric session key using its private key and sends back an acknowledgement encrypted with the session key to start the encrypted session.
Server and Browser now encrypt all transmitted data with the session key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is SSL or TLS newer ?

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does TLS Stand for ?

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSL/TLS recommended port number

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does HTTP stand for ?

A

Hyper Text Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does SSH stand for ?

A

Secure Shell

18
Q

What is Secure Shell used for ?

A

Secure Remote Login and File Transfer using encryption.

19
Q

What is the benefit of SSH over Telnet ?

How is Telnet seen in Wireshark ?

A

It is encrypted.

Telnet can be seen as plain text by anyone sniffing packets.

20
Q

Where does SSL/TLS reside on the TCP/IP Model ?

A

The Transport Layer

21
Q

OSI Layer 2 methods of ensuring that data being transmitted across a LAN is free from errors.

A

Cyclic Redundancy Check - (CRC)

Frame Check Sequence - (FCS)

22
Q

What describes how Algorithms should be used ?

A

Protocols

23
Q

What does PPP stand for ?

A

Point to Point Protocol

24
Q

On what layer do we find PPP

A

Data Link Layer

25
Q

Where is Point to Point Protocol widely used ?

A

Broadband communications.

Over two routers

26
Q

What does ICMP stand for ?

A

Internet Control Message Protocol

27
Q

What are Checksums for ?

A

To ensure the integrity of data portions for data transmission or storage.
Error checking

28
Q

On what layer is a Frame Check Sequence used ?

A

The Data Link Layer

29
Q

Where is IPsec commonly used ?

A

In VPN’s

30
Q

What does IPsec provide ?

A

Secure encrypted communication between two computers over an Internet Protocol network

31
Q

What Layer does IPsec work at ?

A

Network Layer

32
Q

Which IPsec mode only encrypts the payload

A

Transport

33
Q

Which IPsec mode encrypts and authenticates the entire IP packet

A

Tunnel

34
Q

What IPsec mode is commonly used to secure VPN’s

A

Tunnel mode

35
Q

What is the payload ?

A

The data that is being transmitted. The message

36
Q

What does the header on a packet do ?

A

Makes sure that the packet arrives at the correct destination

37
Q

What does ESP stand for ?

A

Encapsulating Security Payload

38
Q

What does ECP stand for ?

A

Encryption Control Protocol

39
Q

What is the Encryption Control Protocol responsible for ?

A

Configuring and enabling data encryption algorithms on both ends of the point-to-point link.

40
Q

This protocol is a secure means of logging in to a system using a visual desktop interface (as opposed to the text-based limitations of the SSH protocol).

A

Remote Desktop Protocol