Security Filtering and Encryption Standards Flashcards

1
Q

Which 4 ACL conditions are recommended to configure inbound from the internet to your private network?

A

1) Deny any addresses from your internal networks
2) Deny local host addresses (127.0.0.0/8)
3) Deny reserved private addresses
4) Deny multicast addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If you’re not running TCP/IP what security filtering could you apply if you don’t have an IP address?

A

MAC Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Successful firewall management involves what?

A

Being aware of and ONLY allowing the ports to keep things running safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are hashing functions used for?

A

To ensure that the data is not changed or altered (integrity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exporting software allowing an encryption key length of more that 48-bits is subject to review by the Export Administration Regulations. TRUE or FALSE?

A

FALSE. It’s greater than 64-bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetrical encryption and what is its downside?

A

Symmetrical encryption is when both the send and receiver have the same key. The downside is its harder to maintain the security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which encryption standard was made in 1977 and used a 56-bit key?

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which encryption standard allows for 168-bit key length but really only provides 112bits due to man in the middle attacks?

A

3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the official encryption standard in the US since 2002 and what is its maximum key length?

A

Advanced Encryption Standard. 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What encryption uses a public key to encrypt data sent from a source host but uses a private key to decrypt it? What algorithm does it use?

A

Public Key Encryption. Diffie-Hellman algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Apart from Diffie-Hellman, name the other common encryption method for KEY EXCHANGE

A

Rivest,Shamir and Adleman (RSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the 4 steps of PGP encryption

A

1) Encrypt document with session key
2) Session key encrypted with public key of recipient
3) session key decrypted with recipient private key
4) document decrypted with session key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Out of Band management?

A

Is any method of accessing a server that doesn’t use the production network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which protocl designed by Citrix Systems to provide communication between servers and clients of different operating systems?

A

Independent Computing Architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an encryption key?

A

A random string of characters that is used in conjunction with the encryption algorithm to encrypt and decrypt the data sent/received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly