Securing TCP/IP Flashcards

(42 cards)

1
Q

regarding security what is : CIA

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

these uses keys to encrypt cleartext into cyphertext

A

Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An algorithm that uses the same key to encrpyt and decrypt is

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is any unencrypted data:

A

cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this type of encryption uses a public and a private key:

A

asymmetric encyption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For 2 people to communicate, they must exchange:

A

Public keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ________ creates a fixed-size hash value

A

hash algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You see a lot of Hash algorithms when:

A

downloading stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of Hashes:

A

MD and SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These are used for verifying data, not for encryption:

A

Hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hash values are always fixed:

A

in size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication is first and uses

A

Identification or what or which user are you like your, user name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

After you are identified as a valid user you then need to be

A

Authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 3 parts to any form of authentication

A

identify yours self
a password
authorization - defines what exactly you can do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication Attributes

A

Something you do
Something you exhibit
Someone you know
Somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____________ is actually proving that or your identity

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Radius network basically has a supplicant, or EU, Client ( mediator ), Server ( handles the authentication), possible Database ( has all the user id’s and passwords) and they use Ports:

A

UDP ports 1812-1813
UDP ports 1645-1646

17
Q

___________ provides AAA or ( authentication, authorization, and accounting. It is used a lot in wireless networks.

18
Q

This is a version of Radius that’s a proprietary system because of Cisco to handle a large network of routers and switches. This is rarely used in wireless networks.

19
Q

TACACS+ uses what port?

20
Q

This authenication protocol is mainly designed for LAN’s. It is a Microsoft proprietary technology that is used in Windows Server. Designed for wired networks.

21
Q

Kerberos using Key Distribution Server (KDS)

A

Authenticating Server
Ticket Granting Service

22
Q

In Kerberos this is sent back to a client to authenticate but doesn’t authorize. The client then stamps the ticket and send it back. Finally the KDC send a time-stamped Token back granting authorization which is normally 8 hours.

A

Ticket Granting Token (TGT)

23
Q

Windows networks, especially running Kerberos requires that the ________ be set the same on all machines.

24
To help with the broad range of authentication protocols in the world, this protocol enables flexible authentication as it acts like a big envelope that can manage or decide on what authentication needs to happen and primarily used on wireless networks:
Extensible Authentication Protocol ( EAP )
25
This EAP uses or has a common key for everyone to login
EAP pre-shared key (EAP PSK)
26
This EAP uses a standard uses just a standard username and Password for authentication
Protected Extensible Authentication Protocol (PEAP)
27
This EAP that's not used that often which uses a "Hash" is called:
EAP MD5
28
these EAP's use certificates
EAP TLS EAP TTLS
29
A "Single Sign-On" is used on a Windows LAN via:
Windows Active Directory or (AD)
30
Trust domains on a Windows network are also called:
Federated systems
31
This version of a single sign-on starts with a "IdP" or identity provider which will allow via a token to access web providers or other devices via a VPN.
Security Assertion Markup Language ( SAML )
32
___________ provides a variety of service provider samples for SAML
SSOcircle
33
Public and Privat keys can actually do the same think but we don't
34
Encrypted Hash is a
Digital Signature
35
Public Key, My Digital Signature, third part guarantee saying that your signature is good, and their Digital Signature.
Digital Certificate
36
3 ways to create a trust relationship:
Create your own Digital Certificate Or unsigned Certificate Web of trust: where a lot of people trust each other, lot of work Public Key Infrastructure (PKI) :hierarchy structure with root servers, starts with a Certificate of Authority, is the way we do the internet.
37
There are 2 ways to verify that a certificate is valid:
OCSP CRL
38
Take your time and Read the Certificate error message
39
A self-signed certificate can throw a_____ _______if it wasn't issued by a Certificate Authority
443 error
40
An ______ _________n be viewed then fixed either by getting a new certificate from it's issuer or accepting the certificate in it's current state.
expired certificate
41
The setting to ________ ___________ to confirm the current validity of certificates is a good security setting
query OCSP