Lab 13
IPsec is implemented through two separate protocols. What are these protocols called?
AH and ESP Authentication Header and Encapsulation Security Payload
Which Security protocols use RSA encryptions to secure communications over an untrusted network? Pick 2. A. Internet Security Association and Key Management Protocol B. Transport Layer Security C. Point-to-Point Tunneling Protocol D. Secure Sockets layer
B. Transport Layer D. Secure Sockets Layer
SSH transfers data in clear text. True/False?
False. SSH uses public-key cryptography
Which of the following can route Layer 3 protocols across an IP network? -SSL -GRE -PPTP -IPsec
GRE
What protocol can encapsulate other LAN protocols and carry data securely over an IP network?
PPTP (Point-to-point Tunneling Protocol)
Which two protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet?
PPTP and L2TP (Point-to-Point Tunneling Protocol) and (Layer Two Tunneling Protocol)
To access the desktop of a remote computer or server, use a remote desktop protocol. What is Microsoft's protocol?
RDP (Remote Desktop Protocol)
Telnet is insecure because it transfers data in clear text and is easily intercepted. What is an acceptable alternative to Telnet?
SSH. (Secure Shell)
Which protocol does HTTPS use to offer greater security in Web transactions? A. IPsec B. SSL C. Kerberos D. Username and Password authentication
SSL - Secure Socket Layer HTTPS uses SSL to offer greater security during Web transactions.
A VPN is used primarily for what purpose?
Support secured communications over an untrusted network.
NAT prevents the use of IPsec in most cases. T/F?
T. IPsec can't typically be used when static IP addresses are not used by both communication partners. NAT proxy performs network address translation on all communications.
Which two protocols are often added to other protocols to provide secure transmissions of data? TLS SMTP HTTPS SSL SNMP
TLS SSL
IPsec provides authentication and encryption services for IP based network traffic. T/F?
True
SSH allows for secure interactive control of remote systems. T/F?
True
SSL uses public-key cryptography. True/False?
True
Statement about SSL VPN. True or false? -Encrypts the entire communication session -Uses port 443 -Encapsulates packets by adding a GRE header.
True True False
Telnet transfers data in clear text. True/False?
True. It's not very secure.
Console port cannot be sniffed. True/False?
True. It's the most secure way to manage a routers configuration.
What is a hash?
a function that takes a variable length string (message) and compresses and transforms it into a fixed length variable. Ensures the data integrity of files and messages in transit. Sender and receiver use same hashing algorithm on the original data. If hashes match, data is unmodified. Hashes do not ensure confidentiality.