• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/48

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

48 Cards in this Set

  • Front
  • Back

CHAP, MS-CHAP, and PAP are all what type of protocols?

Authentication Protocols for Remote Connectivity.

What does EAP mean and where is the only substantial use?

Extensible Authentication Protocol / Wireless Networks

What sets EAP apart from other Authentication Protocols?

It supports special authentication devices like smart cards.

What does CHAP mean

Challenge Handshake Authentication Protocol

What does MS-CHAP mean

Microsoft Challenge Handshake Authentication Protocol

What does PAP mean

Password Authentication Protocol

What does MIMO mean and what standard uses it?

Multiple In Multiple Out used by 802.11n

What does MU-MIMO mean and what standard uses it?

Multiuser Multiple In Multiple Out used by 802.11ac

What is the maximum distance for 1000Base-LX running multimode fiber and single mode fiber?

550 meters or 5000 meters 5km on SMF

What is the maximum distance for 1000Base-SX

220 to 500 meters


Length is left up to manufacturers

What is the maximum distance for 1000Base-CX

25 meters

What is the best way to prevent a zero-day attack?

Implement effective security policies. By definition there's no patch out for the zero-day exploit.

What is IPsec and what layer does it work at?

Internet Protocol Security is an authentication and encryption protocol suite that works at the Internet/Netowrk layer. Will become dominant with IPv6 as it rolls out.

What are the main protocols with in IPsec?

Authentication Header (AH)


Encapsulating Security Payload (ESP)


Internet Security Association and Key Management Protocol (ISAKMP)


Internet Key Exchange (IKE & IKEv2) and Kerberized Internet Negotiation of Keys (KINK)

What is SSL and what is the downside?

Secure Sockets Layer.


SSL is limited to HTML, FTP, SMTP and a few older TCP applications.

What is TLS and what is it most heavily used in?

Transport Layer Security


Has no restrictions like SSL but most heavily used in securing Web pages.

What is a Cipher and what does it do?

Ciphers make figuring out what data means difficult for other people.

How does a Algorithm correspond with a cipher?

The algorithm is the mathematical formula that underlies the cipher.

What does SHA mean

Secure Hash Algorithm

What does MD5 mean

Message Digest Algorithm v5

What are the 3 ways to send a ethernet packet?

Broadcast = everyone on the LAN hears.


Unicast = message sent directly to another computer.


Multicast = One computer sends a packet to a group of interested computers.

What does OSPF mean and what is it?

Open Shortest Path First


It's a link state dynamic routing protocol.

What does IS-IS mean and what is it?

Intermediate System to Intermediate System


IS-IS is a link state dynamic routing protocol.

What does DES mean and what is it?

Data Encryption Standard


It's a symmetric-key algorithm.

What does AES mean and what is it?

Advanced Encryption Standard


AES is a block encryption algorithm.


(When in doubt always pick AES on the exam.)

What does RSA do?

It provides a safe way to deliver a public-key by enabling secure digital signatures.

What is the most popular form of e-mail encryption?

Public-key cryptography.

What is a hash and what does it do?

Cryptographic hash functions allows one to easily verify that some input data maps to a given hash value.


Thus assuring integrity of transmitted data.

What is SHA?

It's the primary family of cryptographic hash functions.

What is CRAM-MD5 and what can it be used for?

Challenge-Responce Authentication Mechanism-Message Digest 5


(Sometimes used as a tool for server authentication)

What is a digital signature?

It's a hash of the message encrypted by the private key.

What is a CA?

Certificate authority



What does PKI mean and what does a PKI do?

Public-Key Infrastructure


Provides a Root certificate and intermediate CA along with the issuing CA to create a tree.

What does AAA mean and what was the idea behind it?

Authentication, Authorization, & Accounting


AAA is designed for port authentication for allowing remote users authentication to a particular point of entry.

What does RADIUS stand for?

Remote Authentication Dial-In User Service

What does IAS stand for and what is IAS?

Internet Authentication Service


This is Microsofts RADIUS server.

What does TACACS+ stand for?

Terminal Access Controller Access Control System Plus


(Created by Cisco)

What is TACACS+ used for and what other AAA standard is it like?

TACACS+ is used for achieving AAA when managing many routers and switches.


TACACS+ is very similar to RADIUS.

What 2 authentication protocols can TACACS+ use that RADIUS can't?

MD5 hashes and Kerberos

What is Kerberos?

Kerberos is an authentication protocol for TCP/IP that has no connection to PPP.

What does 802.1X define?

802.1X is a full AAA process for any device that wants access to the network.

What 2 security aspects do both SSL/TLS combine?

SSL and TLS combine encryption and authentication.

What is Bluejacking?

When a Bluetooth node sends unsolicited messages to nearby BTE devices.

What is Bluesnarfing

Bluesnarfing is unauthorized access to data on a BTE device.

What does a Smurf attack do?

Continuously bombards a remote computer with broadcast pings that contain a bogus return address.

TFTP doesn't need security because it doesn't provide authentication?


True or False

True

What does 802.1q define?

It's the networking standard for VLAN.

What does VTP mean and what does it do?

VLAN Trunking Protocol


It's a Cisco proprietary protocol to automate the updating of multiple VLAN switches.