Securing TCP/IP Flashcards

1
Q

Block Cipher

A

An encryption algorithim in which data is encrypted in “chunks” of a certain length at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DES

A

Data Encryption Standard: A symmetcic-key algorithm developed by the U.S. government in the 1970’s and formerly in use in a variety of TCP/IP applications. DES used a 64-bit block and a 56-bit key. Over time, the 56-bit key made DES susceptible to brute-force attacks.

DES

3DES

IDEA

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stream Cipher

A

Takes a single bit at a time and encrypts is on-the-fly.

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

American Encryption Standard: block cipher that uses a 128-bit block size and 128-, 192-, or 256-bit key size.

Exam Tip: When in doubt on a question about symmetric algorithms, always pick AES. You’ll be right most of the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hash

A

A cryptographic hash function is a mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length (often called a checksum or a message digest). No matter how long or how short the input, the hash’s message digest will always be the same length (usually around 100 to 500 bits long, depending on the type of hash your use).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CRAM-MD5

A

Challenge-Response Authentication Mechanism-Message Digest 5

is a tool for server authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PKI

A

Public Key Infrastructure - The system for creating and distributing digital certificates using sites like Comodo, Symantec, or GoDaddy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multifactor Authentication

A

Using two or more distinctly differednt methods for authentication. Generally, these methods fall into one of six categories, the first five of which you need to remember for the exam.

  • something you know (username, passphrase, or PIN)
  • something you have (key fob or RFID badge)
  • something you are (biometrics)
  • somewhere you are (requires you to be in a particular location to authenticate)
  • something you do (writing your signature)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ACL

A

Access Control List: A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.

There are three types on ACL’s:

  • mandatory
  • discretionary
  • role based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MAC

A

Mandatory Access Control: A security model in which every resource is assigned a label that defines its security level. If the user lack that security level, they do not get access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DAC

A

Discretionary Access Control: authorization method based on the idea that there is an owner of a resource who may at his or her discretion assign access to that resource. DAC is considered much moure flexible that mandatory access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RBAC

A

Role Based Access Control: The most popular authentication model used in file sharing, defines a user’s access to a resource based on the roles the user plays in the network encironment, This leads to the idea of creation of groups. A group in most networks is nothing more than a name that has clearly defined accesses to different resources. User accournts are placed into various groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PPP

A

Point to Point Protocol: enables two point-to-point devices to connect, authenticate with a user name and password, and negotiate the network protocol the two devices will use.

PPP has two methods of authentication PAP and CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PAP

A

Passwork Authentication Protocol: simply transmits the user name and password orver the connection in plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CHAP

A

Challenge Handshake Authentication Protocol: It has the serving system challenge the remote client, which must provide an encrypted ( hashed ) password.

latest version is MS-CHAPv2: provides the most security over PAP or CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AAA

A

Authentication , Authorization, and Accounting: A security philosophy wherein a computer trying to connect to a network must first present some form of credential in order to be authenticated and then must have limitable permissions within the network. The authenticating server should also record session information about the client.

RADIUS and TACACS+

17
Q

RADIUS

A

Remote Authentication Dial-In User Service: RADIUS consists of three devices: the RADIUS server that has access to a database of user names and passwords, a number of network access servers (NAS’s) that control the modems, and a group of systems that dial into the network.

18
Q

TACACS+

A

Terminal Access Controller Access Control System Plus: A protocol developed by Cisco to support AAA in a network with many routers and switches. It is similar to RADIUS in function, but separates AAA into different parts.

TACACS+ uses PAP, CHAP, MD5, and can use Kerberos

19
Q

IPsec

A

A network layer encryption protocol. works in two different modes: Transport mode and Tunnel mode.

In transport mode , only the actual payload of the IP packet is encrypted: the destination and source IP addresses and otheIP header information are still readable.

In Tunnel mode, the entire IP packet is encrypted and then placed into an IPsec endpoint where it is encapsulated inside another IP packet.

20
Q

SCP

A

Secure Copy Protocol: one of the first protocols used to transfer data securely between two hosts and thus might have replaced FTP.

21
Q

SFTP

A

SSH FTP (SFTP) was designed as a secure replacement for FTP. Not to be confused with FTPS, which is FTP using SSL/TLS.

22
Q

LDAP

A

Lightweight Directory Access Protocol: is the tool that programs use to query and change a database used by the network.