Term
| ___ ___ and ___ ___ Protocol is a framework defining procedures for authentication, creation and management of security associations (SAs), key generation techniques, and threat mitigation. |
|
Definition
| Internet Security and Key Management Protocol (ISAKMP) |
|
|
Term
| ISAKMP is a framework, not a ___ or application. |
|
Definition
|
|
Term
| __-__-__ __ protocol creates a secure tunnel between two points on a network, over which other connectivity protocols such as PPP can be used. |
|
Definition
| Point-to-Point Tunneling Protocol (PPTP) |
|
|
Term
| Point-to-Point Tunneling Protocol (PPTP) is the basis for creating a ___ ___ network. |
|
Definition
| virtual private network (VPN) |
|
|
Term
| With PPTP, a TCP connection known as a PPTP ___ connection creates and maintains the communication tunnel. |
|
Definition
|
|
Term
| The PPTP control connection exists between the IP addresses of the PPTP ___ and ___. |
|
Definition
|
|
Term
| The PPTP control connection uses a ___ port on the server and a ___ port on the client. |
|
Definition
|
|
Term
| The PPTP control connection passes the PPTP ___ and ___ messages between the remote system and the server. |
|
Definition
|
|
Term
| PPTP can both ___ and ___ communications. |
|
Definition
|
|
Term
| PPTP does not use a ___ ___ but does use a user ID and password. |
|
Definition
|
|
Term
| PPTP uses the same authentication methods as ___, including MS-CHAP, CHAP, PAP, and EAP. |
|
Definition
|
|
Term
| ___ ___ ___ protocol is a combination of PPTP and Cisco L2F technology |
|
Definition
| Layer 2 Tunneling Protocol (L2TP) |
|
|
Term
| L2TP uses ___ to deliver data. |
|
Definition
|
|
Term
| L2TP authenticates the ___ and then the ___. |
|
Definition
|
|
Term
| By authenticating the computer, ___ Protocol prevents data from being intercepted, changed, and returned to the user in a man-in-the-middle attack. |
|
Definition
| Layer 2 Tunneling Protocol (L2TP) |
|
|
Term
| Unlike IPSec, which operates at the network layer of the OSI model, L2TP operates at the ___ layer, making it protocol-independent. |
|
Definition
|
|
Term
| An L2TP connection can support protocols other than ___, such as AppleTalk and Novell’s legacy IPX. |
|
Definition
|
|
Term
PPTP vs. L2TP
___ has been around longer, so it offers more interoperability |
|
Definition
|
|
Term
PPTP vs. L2TP
___ offers greater security |
|
Definition
|
|
Term
PPTP vs. L2TP
___ is an industry standard. |
|
Definition
|
|
Term
PPTP vs. L2TP
___ supports common public key infrastructure technology. |
|
Definition
|
|
Term
PPTP vs. L2TP
___ is easier to configure because it doesn't use digital certificates. |
|
Definition
|
|
Term
PPTP vs. L2TP
___ provides support for header compression. |
|
Definition
|
|
Term
PPTP vs. L2TP
___ has less overhead |
|
Definition
|
|
Term
| The ___ ___ protocol is designed to provide secure communications between systems. |
|
Definition
|
|
Term
| IPSec can both ___ and ___ network transmissions. |
|
Definition
|
|
Term
| ___ is composed of two separate protocols: Authentication Header (AH) and Encapsulating Security Payload (ESP). |
|
Definition
|
|
Term
| In IPSec, ___ ___ provides authentication and ___ ___ ___ provides encryption. |
|
Definition
Authentication Header (AH) Encapsulating Security Payload (ESP) |
|
|
Term
| IPSec operates at the ___ layer of the OSI model and provides security for protocols that operate at the higher layers. |
|
Definition
|
|
Term
| IPSec can be used only on ___ networks. If a different network protocol is used, you need a different security protocol such as L2TP. |
|
Definition
|
|
Term
| The scope of a VPN tunnel can vary, with the two most common variations being ___-to-site and ___-to-site. |
|
Definition
|
|
Term
| In a site-to-site VPN, entire ____s are connected. |
|
Definition
|
|
Term
| In a site-to-site VPN, clients do not need to have VPN ___ software. |
|
Definition
|
|
Term
| In a ___-___-___ VPN, individual clients (such as telecommuters or travelers) connect to the network remotely. |
|
Definition
|
|
Term
| In a client-to-site implementation, each client must have ___ client software installed. |
|
Definition
|
|
Term
| ___ ___ describes the mechanisms used to filter network traffic to determine who is allowed to access the network and its resources. |
|
Definition
|
|
Term
| Firewalls, proxy servers, routers, and individual computers all maintain some degree of ___ control. |
|
Definition
|
|
Term
| ___ access control is the most secure form of access control. |
|
Definition
| Mandatory access control (MAC) |
|
|
Term
| In systems configured to use ___ access control, administrators dictate who can access and modify data, systems, and resources. |
|
Definition
|
|
Term
___ access control systems are commonly used in military installations, financial institutions, and medical institutions. |
|
Definition
|
|
Term
| Mandatory Access Control secures information and resources by assigning ___ labels to objects and users. |
|
Definition
|
|
Term
| ___ access control is controlled by an object’s owner rather than an administrator. |
|
Definition
| discretionary access control (DAC) |
|
|
Term
| ___ access control is configured using permissions and an access control list. |
|
Definition
|
|
Term
| ___-___ access control allows or denies access to objects according to established rules. Routers and firewalls are good examples. |
|
Definition
|
|
Term
| In practical application, rule-based access control is a variation on ___ access control. |
|
Definition
|
|
Term
| In ___-___ access control, access decisions are determined by the roles individual users have within the organization. |
|
Definition
| role-based access control (RoBAC) |
|
|
Term
| ___-based access control requires the administrator to have a thorough understanding of how an organization operates, the number of users, and each user’s exact function. |
|
Definition
|
|
Term
| Granting roles no more than the privilege level required to do the job is known as the ___ ___ concept. |
|
Definition
|
|
Term
| All the major operating systems include built-in support for ___ access. |
|
Definition
|
|
Term
| ___ ____ ____ is a remote-access solution included with Windows Server products. |
|
Definition
| Remote Access Service (RAS) |
|
|
Term
| Any system that supports the appropriate dial-up protocols, such as PPP, can connect to a___ ___ server. |
|
Definition
| Remote Access Server (RAS) |
|
|
Term
| ___ supports remote connectivity from all the major client operating systems available today, including all newer Windows OSs |
|
Definition
|
|
Term
| The standard remote-access protocol in use today, ___-___-___ Protocol is actually a family of protocols that work together to provide connection services. |
|
Definition
| Point-to-Point Protocol (PPP) |
|
|
Term
| ___-___-___ protocol provides security unavailable in SLIP, including authentication and encryption. |
|
Definition
| Point-to-Point Protocol (PPP) |
|
|
Term
| PPP lets administrators choose which ___ protocol to use over a remote link. |
|
Definition
|
|
Term
| PPP accommodates a number of ___ protocols, and it’s possible on many systems to configure more than one |
|
Definition
|
|
Term
| PPP ___ protocols include CHAP, MS-CHAP, MS-CHAP v2, EAP, and PAP. |
|
Definition
|
|
Term
| An upgrade to ___ from Serial Line Internet Protocol (SLIP) can solve connectivity problems on a network. |
|
Definition
|
|
Term
| __-__-__ __ __ __ is a protocol used to connect multiple users on an Ethernet LAN to a remote site through a common device. |
|
Definition
| Point-to-Point Protocol over Ethernet (PPPoE) |
|
|
Term
| PPPoE is a combination of ___ and the Ethernet protocol |
|
Definition
|
|
Term
| Using ___ allows all users on a network to share the same DSL, cable modem, or wireless connection to the Internet. |
|
Definition
|
|
Term
| PPPoE enables ISPs or administrators to bill or track access on a per-___ basis rather than a per-___ basis. |
|
Definition
|
|
Term
| PPPoE connections require the same ___ information as standard dialup phone accounts. |
|
Definition
|
|
Term
| The PPPoE communication process has two stages: ___ and the ___ ___. |
|
Definition
|
|
Term
The PPPoE ___ stage uses four steps to establish the connection:
initiation offer request session confirmation |
|
Definition
|
|
Term
| ___ access control restricts access to the network based on identity or posture. |
|
Definition
| Network Access Control (NAC) |
|
|
Term
| A ___ assessment is an evaluation of a system’s security based on settings and applications discovered on the system. |
|
Definition
|
|
Term
| ___ ___ Protocol lets a Windows client system connect to a server and operate on the server as if it were a local client. |
|
Definition
| Remote Desktop Protocol (RDP) |
|
|
Term
| With ___ client computing, client systems use the resources of the server instead of their local processing power. |
|
Definition
|
|
Term
| Remote Desktop Protocol (RDP) does not actually send ___ over the connection — only screenshots and client keystrokes. |
|
Definition
|
|
Term
| Originally created for UNIX systems, ___ ___ is a tunneling protocol that uses encryption to establish a secure connection between two systems for Telnet, FTP,and other communications oriented applications. |
|
Definition
|
|
Term
| Although it is available in Windows and other operating systems, ___ ___ is the preferred method of security for Telnet and other cleartext-oriented programs in the UNIX environment. |
|
Definition
|
|
Term
| SSH uses port __ and the ___ _Protocol. |
|
Definition
22 Transport Control Protocol (TCP) |
|
|
Term
| ___ ___ ___ and,Citrix ___ ____ ____ are examples of thin client computing. |
|
Definition
Remote Desktop Protocol (RDP) Independent Computing Architecture (ICA) |
|
|
Term
| When configuring security for wireless networks, filtering by ___ address is a common practice. |
|
Definition
|
|
Term
| In MAC filtering security, MAC addresses can be added to an “allow” or “deny” __ __ __. |
|
Definition
| Access Control List (ACL) |
|
|
Term
| ___ filtering can be used with an ACL. |
|
Definition
|
|