Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
28 Cards in this Set
- Front
- Back
what is RAS
|
remote access service unsured outdated microsoft service
|
|
What is PPP
|
dial up service to TCP/IP the most common dial up networking protocol today
|
|
what is PPTP
|
Point to point tunneling
|
|
how does PPTP work
|
A tunneling protocal that encapsulates connection oriented PPP packets into connectionless IP packets prevents sniffing and other outside manipulation
|
|
where is PPTP used
|
sets up private virtual networks
|
|
What is L2TP
|
layer 2 Tunneling Protocol that uses IP SEC to encrypt data from client to server
|
|
where is SSL employed
|
over HTTP FTP and application layer protocols to provide security
|
|
where is HTTPS used HTTP over SSL
|
Credit card validation companies and banks (LOCK ICON)
|
|
which remote access protocal would allow you to connect remotley through VPN
|
PPTP
|
|
A user cannot access a website because a protocol is not enabled what is the protocol
|
HTTP over SSL
|
|
what is the most reliable and secure remote access
|
L2TP
|
|
what type of audit prevents privilege creep
|
Privilege audit
|
|
what kind of physical access device restricts access to a small number of individuals at a time
|
Mantrap
|
|
what is PKCS
|
PUblic Key Cryptography standards voluntary standards for public key cryptography
|
|
what protocal creates a secure environemnt in a wireless network
|
WEP
|
|
A internet server interfaces with TCP Ip at which layer
|
process layer
|
|
in the key recovery process which key must be recoverable
|
previous key
|
|
which component of IDS collects data
|
Sensor
|
|
which mechanism is used by PKI to allow immediate verification of certificates validity
|
OCSP
|
|
which mechanism can enable or disable access to a network resource based on an IP address
|
ACL
|
|
what can increase security to a internet web server
|
Changing port address to 1019
|
|
what type of program exist to proagate itself to other systems
|
a worm
|
|
what is a major security problem with FTP servers
|
user ID and passwords are unecrypted
|
|
what system would you install to provide notification of security problems in a network connected to the internet
|
IDS
|
|
what encryption process uses one message to hide another
|
STeganography
|
|
which algorithm is used to create a temporary secure session for exchange of key info
|
KEA
|
|
what security standard is for handheld devices using asymmetric encryption
|
ECC
|
|
which back up method provides the fastest backup times
|
incremental backup
|