Shared Flashcard Set

Details

10a. Network Access Security
CompTIA Network+ Network Access Security
77
Computer Networking
Professional
04/04/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
___ ___ and ___ ___ Protocol is a framework defining procedures for authentication, creation and management of security associations (SAs), key generation techniques, and threat mitigation.
Definition
Internet Security and Key Management Protocol (ISAKMP)
Term
ISAKMP is a framework, not a ___ or application.
Definition
protocol
Term
__-__-__ __ protocol creates a secure tunnel between two points on a network, over which other connectivity protocols such as PPP can be used.
Definition
Point-to-Point Tunneling Protocol (PPTP)
Term
Point-to-Point Tunneling Protocol (PPTP) is the basis for creating a ___ ___ network.
Definition
virtual private network (VPN)
Term
With PPTP, a TCP connection known as a PPTP ___ connection creates and maintains the communication tunnel.
Definition
control
Term
The PPTP control connection exists between the IP addresses of the PPTP ___ and ___.
Definition
client
server
Term
The PPTP control connection uses a ___ port on the server and a ___ port on the client.
Definition
TCP
dynamic
Term
The PPTP control connection passes the PPTP ___ and ___ messages between the remote system and the server.
Definition
control
management
Term
PPTP can both ___ and ___ communications.
Definition
authenticate
encrypt
Term
PPTP does not use a ___ ___ but does use a user ID and password.
Definition
public key
Term
PPTP uses the same authentication methods as ___, including MS-CHAP, CHAP, PAP, and EAP.
Definition
PPP
Term
___ ___ ___ protocol is a combination of PPTP and Cisco L2F technology
Definition
Layer 2 Tunneling Protocol (L2TP)
Term
L2TP uses ___ to deliver data.
Definition
tunneling
Term
L2TP authenticates the ___ and then the ___.
Definition
computer
user
Term
By authenticating the computer, ___ Protocol prevents data from being intercepted, changed, and returned to the user in a man-in-the-middle attack.
Definition
Layer 2 Tunneling Protocol (L2TP)
Term
Unlike IPSec, which operates at the network layer of the OSI model, L2TP operates at the ___ layer, making it protocol-independent.
Definition
data link
Term
An L2TP connection can support protocols other than ___, such as AppleTalk and Novell’s legacy IPX.
Definition
TCP/IP
Term
PPTP vs. L2TP

___ has been around longer, so it offers more interoperability
Definition
PPTP
Term
PPTP vs. L2TP

___ offers greater security
Definition
L2TP
Term

PPTP vs. L2TP

 

___ is an industry standard.

Definition
PPTP
Term
PPTP vs. L2TP

___ supports common public key infrastructure technology.
Definition
L2TP
Term
PPTP vs. L2TP

___ is easier to configure because it doesn't use digital certificates.
Definition
PPTP
Term
PPTP vs. L2TP

___ provides support for header compression.
Definition
L2TP
Term
PPTP vs. L2TP

___ has less overhead
Definition
PPTP
Term
The ___ ___ protocol is designed to provide secure communications between systems.
Definition
IP Security (IPSec)
Term
IPSec can both ___ and ___ network transmissions.
Definition
authenticate
encrypt
Term
___ is composed of two separate protocols: Authentication Header (AH) and Encapsulating Security Payload (ESP).
Definition
IPSec
Term
In IPSec, ___ ___ provides authentication and ___ ___ ___ provides encryption.
Definition
Authentication Header (AH)
Encapsulating Security Payload (ESP)
Term
IPSec operates at the ___ layer of the OSI model and provides security for protocols that operate at the higher layers.
Definition
network
Term
IPSec can be used only on ___ networks. If a different network protocol is used, you need a different security protocol such as L2TP.
Definition
TCP/IP
Term
The scope of a VPN tunnel can vary, with the two most common variations being ___-to-site and ___-to-site.
Definition
site
client
Term
In a site-to-site VPN, entire ____s are connected.
Definition
networks
Term
In a site-to-site VPN, clients do not need to have VPN ___ software.
Definition
client
Term
In a ___-___-___ VPN, individual clients (such as telecommuters or travelers) connect to the network remotely.
Definition
client-to-site
Term
In a client-to-site implementation, each client must have ___ client software installed.
Definition
VPN
Term
___ ___ describes the mechanisms used to filter network traffic to determine who is allowed to access the network and its resources.
Definition
Access control
Term
Firewalls, proxy servers, routers, and individual computers all maintain some degree of ___ control.
Definition
access
Term
___ access control is the most secure form of access control.
Definition
Mandatory access control (MAC)
Term
In systems configured to use ___ access control, administrators dictate who can access and modify data, systems, and resources.
Definition
mandatory
Term
___ access control systems are
commonly used in military installations, financial institutions, and medical institutions.
Definition
mandatory
Term
Mandatory Access Control secures information and resources by assigning ___ labels to objects and users.
Definition
sensitivity
Term
___ access control is controlled by an object’s owner rather than an administrator.
Definition
discretionary access control (DAC)
Term
___ access control is configured using permissions and an access control list.
Definition
discretionary
Term
___-___ access control allows or denies access to objects according to established rules. Routers and firewalls are good examples.
Definition
Rule-based
Term
In practical application, rule-based access control is a variation on ___ access control.
Definition
mandatory
Term
In ___-___ access control, access decisions are determined by the roles individual users have within the organization.
Definition
role-based access control (RoBAC)
Term
___-based access control requires the administrator to have a thorough understanding of how an organization operates, the number of users, and each user’s exact function.
Definition
Role
Term
Granting roles no more than the privilege level required to do the job is known as the ___ ___ concept.
Definition
least privilege
Term
All the major operating systems include built-in support for ___ access.
Definition
remote
Term
___ ____ ____ is a remote-access solution included with Windows Server products.
Definition
Remote Access Service (RAS)
Term
Any system that supports the appropriate dial-up protocols, such as PPP, can connect to a___  ___ server.
Definition
Remote Access Server (RAS)
Term
___ supports remote connectivity from all the major client operating systems available today, including all newer Windows OSs
Definition
RAS
Term
The standard remote-access protocol in use today, ___-___-___ Protocol is actually a family of protocols that work together to provide connection services.
Definition
Point-to-Point Protocol (PPP)
Term
___-___-___ protocol provides security unavailable in SLIP, including authentication and encryption.
Definition
Point-to-Point Protocol (PPP)
Term
PPP lets administrators choose which ___ protocol to use over a remote link.
Definition
LAN
Term
PPP accommodates a number of ___ protocols, and it’s possible on many systems to configure more than one
Definition
authentication
Term
PPP ___ protocols include CHAP, MS-CHAP, MS-CHAP v2, EAP, and PAP.
Definition
authentication
Term
An upgrade to ___ from Serial Line Internet Protocol (SLIP) can solve connectivity problems on a network.
Definition
PPP
Term
__-__-__ __ __ __ is a protocol used to connect multiple users on an Ethernet LAN to a remote site through a common device.
Definition
Point-to-Point Protocol over Ethernet (PPPoE)
Term
PPPoE is a combination of ___ and the Ethernet protocol
Definition
PPP
Term
Using ___ allows all users on a network to share the same DSL, cable modem, or wireless connection to the Internet.
Definition
PPPoE
Term
PPPoE enables ISPs or administrators to bill or track access on a per-___ basis rather than a per-___ basis.
Definition
user
site
Term
PPPoE connections require the same ___ information as standard dialup phone accounts.
Definition
authentication
Term
The PPPoE communication process has two stages: ___ and the ___ ___.
Definition
discovery
PPP session
Term
The PPPoE ___ stage uses four steps to establish the connection:

initiation
offer
request
session confirmation
Definition
discovery
Term
___ access control restricts access to the network based on identity or posture.
Definition
Network Access Control (NAC)
Term
A ___ assessment is an evaluation of a system’s security based on settings and applications discovered on the system.
Definition
posture
Term
___ ___ Protocol lets a Windows client system connect to a server and operate on the server as if it were a local client.
Definition
Remote Desktop Protocol (RDP)
Term
With ___ client computing, client systems use the resources of the server instead of their local processing power.
Definition
thin
Term
Remote Desktop Protocol (RDP) does not actually send ___ over the connection — only screenshots and client keystrokes.
Definition
data
Term
Originally created for UNIX systems, ___ ___ is a tunneling protocol that uses encryption to establish a secure connection between two systems for Telnet, FTP,and other communications oriented applications.
Definition
Secure Shell (SSH)
Term
Although it is available in Windows and other operating systems, ___ ___ is the preferred method of security for Telnet and other cleartext-oriented programs in the UNIX environment.
Definition
Secure Shell (SSH)
Term
SSH uses port __ and the ___ _Protocol.
Definition
22
Transport Control Protocol (TCP)
Term
___ ___ ___ and,Citrix ___ ____ ____ are examples of thin client computing.
Definition
Remote Desktop Protocol (RDP)
Independent Computing Architecture (ICA)
Term
When configuring security for wireless networks, filtering by ___ address is a common practice.
Definition
MAC
Term
In MAC filtering security, MAC addresses can be added to an “allow” or “deny” __ __ __.
Definition
Access Control List (ACL)
Term
___ filtering can be used with an ACL.
Definition
TCP/IP
Supporting users have an ad free experience!