Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
A service model in which applications are provided through an online user interface and are compatible with a multitude of devices and operating systems. |
SaaS (Software as a Service) |
|
In the context of IPsec, a type of encryption that provides authentication of the IP packet's data payload through public key techniques. In addition, it also encrypts the entire IP packet for added security. |
ESP (Encapsulating Security Payload) |
|
A service model in which hardware services are provided virtually, including network infrastructure devices such as virtual servers. |
IaaS (Infrastructure as a Service) |
|
A Layer 2 communications protocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL. It can support multiple Network layer protocols and can encrypt transmissions. |
PPP (Point to Point Protocol) |
|
A service model in which various platforms are provided virtually, enabling developers to build and test applications within virtual, online environments tailored to the specific needs of a project. |
PaaS (Platform as a Service) |
|
An encryption key generation and management scheme used by 802.11i. |
TKIP (Temporal Key Integrity Protocol) |
|
One of two services in the key management phase of creating a secure IPsec connection. It negotiates the exchange of keys, including authentication of the keys. It uses UDP and usually runs on port 500. |
IKE (Internet Key Exchange) |
|
An authentication protocol that operates over PPP and also encrypts usernames and passwords for transmission |
CHAP (Challenge Handshake Authentication Protocol) |
|
In the context of IPsec, a type of encryption that provides authentication of the IP packet's data payload through public key techniques. |
AH (Authentication Header) |
|
In Kerberos terminology, the server that issues keys to clients during initial client authentication. |
KDC (Key Distribution Center) KDC) |
|
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments? |
Citrix Xen |
|
A SecurID key chain fob from RSA security generates a password that changes how often? |
every 60 seconds |
|
At what layer of the OSI model does the IPSec encryption protocol operate? |
Network layer |
|
Digital certificates are issued by organizations known as what term? |
certification authorities |
|
How often should administrators and network users be required to change their password? |
60 days |
|
The combination of a public key and a private key are known by what term below? |
key pair |
|
The key management phase of IPSec is reliant on which two services below? |
Internet Key Exchange (IKE), Internet Security Association and Key Management Protocol (ISAKMP) |
|
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length? |
160 bit |
|
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field? |
FCS |
|
The SSH service listens on what TCP port? |
22 |
|
What authentication protocol sends authentication information in cleartext without encryption? |
PAP |
|
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices? |
SaaS |
|
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol? |
TKIP |
|
What option below is not an encryption algorithm method that is used by SSH? |
SHA-2 |
|
_______________ is a service that is shared between multiple organizations, but not available publicly. |
Community Cloud |
|
A variant of TLS is __________, which provides authentication like SSL/TLS, but does not require a certificate for each user. |
Tunneled Transport Layer Security (TTLS) |
|
In Kerberos, a temporary set of credentials that a client uses to prove that its identity has been validated is known as a___________ |
ticket |
|
The ___________cloud service model provides virtual environments online that can be tailored to the needs of developers. |
Platform as a Service(PaaS) |
|
When PPP is used over an Ethernet network, it is known as ____________ |
PPPoE |
|
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
|
SSTP
|
|
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers? |
EAP |
|
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission? |
IPSec |
|
What security principle provides proof of delivery and proof of the sender's identity? |
non-repudiation |
|
What two different types of encryption can be used by IPSec during data transfer? |
Authentication Header (AH), Encapsulating Security Payload (ESP) |
|
What two key lengths are the most popular for the SHA-2 hashing algorithm? |
256, 512 |
|
What two options below are AAA services? |
RADIUS, TACACS+ |
|
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem? |
SLIP, PPP |
|
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites? |
VPN gateway |
|
When using public and private keys to connect to an SSH server, where must your public key be placed? |
In the authorized keys file on the host where the SSH server is. |
|
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers? |
IaaS |