transport encryption cont, cryptographic attacks, and TCP/IP, Ports

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Domain Keys Identified Mail (DKIM)

provides email authentication by allowing mail servers to digitally sign legitimate outbound email messages

2
New cards

Tor protocol

facilitates anonymous internet. The onion router (Tor) is a software package that uses encryption and relays nodes to facilitate anonymous internet access

  • anonymity achieved with Perfect Forward Secrecy- hides nodes’ identity from each other

3
New cards

blockchain

distributed, immutable ledger

4
New cards

When you communicate over the Tor network, which of the following entities do you communicate with directly?

entry node

5
New cards

Renee is configuring her organization's email servers and would like to communicate security policies to other email servers about how they should handle email from her domain. Which protocol would best meet her needs?

DMARC

6
New cards

secure copy protocol (SCP)

port 22

Cindy would like to transfer files between two systems over a network. Which one of the following protocols performs this action over a secure, encrypted connection?

7
New cards

What IPsec protocol provides confidentiality protection for the content of packets?

encapsulating security payload ESP

8
New cards

keyspace

the set of all possible encryption keys usable with an algorithm

9
New cards

frequency analysis attack

detects patterns in ciphertext

10
New cards

known plaintext attack

attacker has access to an unencrypted message

11
New cards

chosen plaintext attack

attacker can create an encrypted message of their choice

12
New cards

birthday attack

attacker finds two inputs with the same hash values

13
New cards

Transmission Control Protocol/Internet Protocol (TCP/IP)

TCP- connection oriented protocol, and guarantees delivery through acknowledgement. Widely used for critical applications

IP- routes information across networks, provides an addresing scheme, and delivers packets from source to destination, serves as a network control protocol

14
New cards

TCP Flags (three way handshake)

  • SYN- opens a connection

  • FIN- closes a connection

  • ACK- acknowledges a SYN or FIN

15
New cards

User Datagram Protocol (UDP)

  • lightweight, connectionless protocol

  • doesn’t send acknowledgments or guarantee delivery

  • often used for voice and video applications

16
New cards

Open Systems Interconnect (OSI) Model

  1. physical layer- wires, radios, and optics

  2. data link layer- data transfers between two nodes

  3. Network layer- internet protocol (IP)

  4. Transport layer- TCP and UDP

  5. session layer- exchanges between systems

  6. presentation layer- data translation and encryption

  7. application layer- user programs

17
New cards

IP address

uniquely identifies systems. Uses dotted quad notation (4 numbers separated by periods

first part is network address, second part is host address

18
New cards

IPv6

  • replaces IPv4 due to address exhaustion

  • uses 128 bits (compared to 32 for IPv4)

  • consists of eight groups of four hexadecimal numbers

19
New cards

Static IPs

manually assigned to systems by an administrator. They must be unique and within appropriate range for the network

20
New cards

DHCP

allows automatic assignment of IP addresses from an admin-configured pool

21
New cards

Domain Name Service (DNS)

  • functions over UDP port 53

  • translates IP addresses into domain names

22
New cards

dig command

is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the queried name server(s).

23
New cards

DNSSEC

adds digital signature to DNS

24
New cards

port ranges

  • 0-1023- well known ports

  • 1024-49,151- registered ports

  • 49,152- 65,535- dynamic ports

25
New cards

port 21

File Transfer Protocol (FTP)

26
New cards

Port 22

Secure Shell (SSH)

27
New cards

Port 3389

remote desktop protocol (RDP)

28
New cards

Port 137, 138, and 139

NetBIOS

29
New cards

Port 53

DNS

30
New cards

Port 25

Simple Mail Transfer Protocol (SMTP)

31
New cards

Port 110

Post office Protocol (POP)

32
New cards

Port 143

Internet Message Access Protocol (IMAP)

33
New cards

Port 80 (insecure), 443 (secure)

HTTP/HTTPS