Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
48 Cards in this Set
- Front
- Back
CHAP, MS-CHAP, and PAP are all what type of protocols? |
Authentication Protocols for Remote Connectivity. |
|
What does EAP mean and where is the only substantial use? |
Extensible Authentication Protocol / Wireless Networks |
|
What sets EAP apart from other Authentication Protocols? |
It supports special authentication devices like smart cards. |
|
What does CHAP mean |
Challenge Handshake Authentication Protocol |
|
What does MS-CHAP mean |
Microsoft Challenge Handshake Authentication Protocol |
|
What does PAP mean |
Password Authentication Protocol |
|
What does MIMO mean and what standard uses it? |
Multiple In Multiple Out used by 802.11n |
|
What does MU-MIMO mean and what standard uses it? |
Multiuser Multiple In Multiple Out used by 802.11ac |
|
What is the maximum distance for 1000Base-LX running multimode fiber and single mode fiber? |
550 meters or 5000 meters 5km on SMF |
|
What is the maximum distance for 1000Base-SX |
220 to 500 meters Length is left up to manufacturers |
|
What is the maximum distance for 1000Base-CX |
25 meters |
|
What is the best way to prevent a zero-day attack? |
Implement effective security policies. By definition there's no patch out for the zero-day exploit. |
|
What is IPsec and what layer does it work at? |
Internet Protocol Security is an authentication and encryption protocol suite that works at the Internet/Netowrk layer. Will become dominant with IPv6 as it rolls out. |
|
What are the main protocols with in IPsec? |
Authentication Header (AH) Encapsulating Security Payload (ESP) Internet Security Association and Key Management Protocol (ISAKMP) Internet Key Exchange (IKE & IKEv2) and Kerberized Internet Negotiation of Keys (KINK) |
|
What is SSL and what is the downside? |
Secure Sockets Layer. SSL is limited to HTML, FTP, SMTP and a few older TCP applications. |
|
What is TLS and what is it most heavily used in? |
Transport Layer Security Has no restrictions like SSL but most heavily used in securing Web pages. |
|
What is a Cipher and what does it do? |
Ciphers make figuring out what data means difficult for other people. |
|
How does a Algorithm correspond with a cipher? |
The algorithm is the mathematical formula that underlies the cipher. |
|
What does SHA mean |
Secure Hash Algorithm |
|
What does MD5 mean |
Message Digest Algorithm v5 |
|
What are the 3 ways to send a ethernet packet? |
Broadcast = everyone on the LAN hears. Unicast = message sent directly to another computer. Multicast = One computer sends a packet to a group of interested computers. |
|
What does OSPF mean and what is it? |
Open Shortest Path First It's a link state dynamic routing protocol. |
|
What does IS-IS mean and what is it? |
Intermediate System to Intermediate System IS-IS is a link state dynamic routing protocol. |
|
What does DES mean and what is it? |
Data Encryption Standard It's a symmetric-key algorithm. |
|
What does AES mean and what is it? |
Advanced Encryption Standard AES is a block encryption algorithm. (When in doubt always pick AES on the exam.) |
|
What does RSA do? |
It provides a safe way to deliver a public-key by enabling secure digital signatures. |
|
What is the most popular form of e-mail encryption? |
Public-key cryptography. |
|
What is a hash and what does it do? |
Cryptographic hash functions allows one to easily verify that some input data maps to a given hash value. Thus assuring integrity of transmitted data. |
|
What is SHA? |
It's the primary family of cryptographic hash functions. |
|
What is CRAM-MD5 and what can it be used for? |
Challenge-Responce Authentication Mechanism-Message Digest 5 (Sometimes used as a tool for server authentication) |
|
What is a digital signature? |
It's a hash of the message encrypted by the private key. |
|
What is a CA? |
Certificate authority |
|
What does PKI mean and what does a PKI do? |
Public-Key Infrastructure Provides a Root certificate and intermediate CA along with the issuing CA to create a tree. |
|
What does AAA mean and what was the idea behind it? |
Authentication, Authorization, & Accounting AAA is designed for port authentication for allowing remote users authentication to a particular point of entry. |
|
What does RADIUS stand for? |
Remote Authentication Dial-In User Service |
|
What does IAS stand for and what is IAS? |
Internet Authentication Service This is Microsofts RADIUS server. |
|
What does TACACS+ stand for? |
Terminal Access Controller Access Control System Plus (Created by Cisco) |
|
What is TACACS+ used for and what other AAA standard is it like? |
TACACS+ is used for achieving AAA when managing many routers and switches. TACACS+ is very similar to RADIUS. |
|
What 2 authentication protocols can TACACS+ use that RADIUS can't? |
MD5 hashes and Kerberos |
|
What is Kerberos? |
Kerberos is an authentication protocol for TCP/IP that has no connection to PPP. |
|
What does 802.1X define? |
802.1X is a full AAA process for any device that wants access to the network. |
|
What 2 security aspects do both SSL/TLS combine? |
SSL and TLS combine encryption and authentication. |
|
What is Bluejacking? |
When a Bluetooth node sends unsolicited messages to nearby BTE devices. |
|
What is Bluesnarfing |
Bluesnarfing is unauthorized access to data on a BTE device. |
|
What does a Smurf attack do? |
Continuously bombards a remote computer with broadcast pings that contain a bogus return address. |
|
TFTP doesn't need security because it doesn't provide authentication? True or False |
True |
|
What does 802.1q define? |
It's the networking standard for VLAN. |
|
What does VTP mean and what does it do? |
VLAN Trunking Protocol It's a Cisco proprietary protocol to automate the updating of multiple VLAN switches. |