Firewalls, Encryption, Hashing Algorithms

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What type of firewall topology consists of placing a screening router between a dual-homed host and the public network?

Screened-host

What type of firewall topology consist two screening routers, one placed between the dual-homed firewall and the internet and the other between the dual-homed firewall and the internal network?

Screened-subnet

Created by the National Security Agency, this commonly used version of the hashing algorithm generates a 160-bit hash value.

Secure Hash Algorithm 1 SHA-1

A block cipher supporting 128-bit, 192-bit, and 256-bit encryption that has replaced 3DES as the new standard.

Advanced Encryption Standard

What is a web application firewall's main focus?

Analyzing HTTP traffic

What type of firewall can filter traffic based on the payload data in the packet?

Application

A block cipher algorithm created to replace DES, offering variable encryption rates from 1 to 448-bit encryption.

Blowfish

A 56-bit block cipher selected by the Government as a standard in the 1970's.

Data Encryption Standard DES

Key exchange protocol.

Diffie Hellman

What type of firewall topology consists of a single computer with two physical network interfaces that act as a gateway between the two networks?

Dual-homed host

Newer asymmetric algorithm that is based on Diffie Hellman for key exchange and Digital Signature Algorithm for signing messages.

Elliptic Curve

Uses a secret key combined with the hashing algorithm to calculate the resulting hashing value.

Hash-based Message Authentication Code HMAC

This hashing algorithm used by older Microsoft operating systems to hash and store passwords is considered unsecure.

LANMAN

Created by Ron Rivest, this hashing algorithm is one of the most commonly used today and generates a 128-bit hash value.

Message Digest 5 MD5

Uses MD4 for hashing and storing passwords in the registry. Version 2 uses HMAC-MD5.

NT LAN Manager NTLM

What type of firewall is known as a stateless inspection firewall because it simply allows or denies traffic based on the header of the packet?

Packet-Filtering

What type of firewall uses rules to filter traffic based on source address, destination address, protocol, and source and destination and port address?

Packet-filtering

Uses 128-bit, 160-bit, 256-bit, and 320-bit hashing levels.

RACE Integrity Primitive Evaluation Message Digest RIPEMD

There are different versions of this cipher. One is a stream cipher that is used in SSL and WEP.

Rivest Cipher RC4/RC5

First asymmetric algorithm to implement signing and encryption.

Rivest Shamir Adleman RSA

Two newer versions of the SHA algorithm that are not considered to be susceptible to collision attacks.

SHA-256 SHA-512

What type of firewall can filter traffic based on source and destination IP address or port number, but can also look at the context of the conversation and determine if the packet is supposed to be received at that point?

Stateful Packet Inspection

A block cipher that runs information through three 56-bit keys to create 168-bit encryption.

Triple DES 3DES

Bruce Schneier's second encryption algorithm that offers 129-bit encryption

Twofish

What security device allows you to control which HTTP messages can reach a web server?

Web application firewall

A device or software that protects your network from malicious content on the Internet and can provide data loss prevention.

Web security gateway


Ensembles d'études connexes

BUSN 101 CH 7: Operations Management and Quality

View Set

A+ 901-1.15-(1)- Given a scenario, perform appropriate printer maintenance.

View Set

Questions de conversation: la politique, l'économie, et la société

View Set

Basic Nursing Care Provided by the Nurse Aide

View Set