• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back

A service model in which applications are provided through an online user interface and are compatible with a multitude of devices and operating systems.​

​SaaS (Software as a Service)

​In the context of IPsec, a type of encryption that provides authentication of the IP packet's data payload through public key techniques. In addition, it also encrypts the entire IP packet for added security.

​ESP (Encapsulating Security Payload)

A service model in which hardware services are provided virtually, including network infrastructure devices such as virtual servers.​

​IaaS (Infrastructure as a Service)

A Layer 2 communications protocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL. It can support multiple Network layer protocols and can encrypt transmissions.​

PPP (Point to Point Protocol)​

A service model in which various platforms are provided virtually, enabling developers to build and test applications within virtual, online environments tailored to the specific needs of a project.​

PaaS (Platform as a Service)​

An encryption key generation and management scheme used by 802.11i.​

​TKIP (Temporal Key Integrity Protocol)

One of two services in the key management phase of creating a secure IPsec connection. It negotiates the exchange of keys, including authentication of the keys. It uses UDP and usually runs on port 500.​

​IKE (Internet Key Exchange)

An authentication protocol that operates over PPP and also encrypts usernames and passwords for transmission​

CHAP (Challenge Handshake Authentication Protocol)​

In the context of IPsec, a type of encryption that provides authentication of the IP packet's data payload through public key techniques.​

​AH (Authentication Header)

In Kerberos terminology, the server that issues keys to clients during initial client authentication.​

KDC (Key Distribution Center) KDC)

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?​

​Citrix Xen

​A SecurID key chain fob from RSA security generates a password that changes how often?

​every 60 seconds

At what layer of the OSI model does the IPSec encryption protocol operate?​

​Network layer

Digital certificates are issued by organizations known as what term?​

​certification authorities

​How often should administrators and network users be required to change their password?

60 days

​The combination of a public key and a private key are known by what term below?

​key pair

The key management phase of IPSec is reliant on which two services below?

​Internet Key Exchange (IKE), ​Internet Security Association and Key Management Protocol (ISAKMP)

The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?​

​160 bit

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?​

​FCS

​The SSH service listens on what TCP port?

​22

What authentication protocol sends authentication information in cleartext without encryption?​

​PAP

​What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

​SaaS

What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?​

​TKIP

​What option below is not an encryption algorithm method that is used by SSH?

​SHA-2

_______________ is a service that is shared between multiple organizations, but not available publicly.​

Community Cloud

A variant of TLS is __________, which provides authentication like SSL/TLS, but does not require a certificate for each user.​

Tunneled Transport Layer Security (TTLS)

​In Kerberos, a temporary set of credentials that a client uses to prove that its identity has been validated is known as a___________

ticket

The ___________cloud service model provides virtual environments online that can be tailored to the needs of developers.

Platform as a Service(PaaS)

When PPP is used over an Ethernet network, it is known as ____________

PPPoE

What protocol below is a Microsoft proprietary protocol first available in Windows Vista?​
​SSTP

​What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?

​EAP

​What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

​IPSec

What security principle provides proof of delivery and proof of the sender's identity?​

​non-repudiation

What two different types of encryption can be used by IPSec during data transfer?​

Authentication Header (AH), ​Encapsulating Security Payload (ESP)

What two key lengths are the most popular for the SHA-2 hashing algorithm?​

​256, ​512

What two options below are AAA services?​

​RADIUS, ​TACACS+

What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?

​SLIP, ​PPP

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?​

​VPN gateway

When using public and private keys to connect to an SSH server, where must your public key be placed?​

​In the authorized keys file on the host where the SSH server is.

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?​

IaaS​