Secure Protocols Explanations

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

Domain Name System Security Extensions (DNSSEC)

focuses on ensuring that DNS information is not modified or malicious. ____ uses digital signatures, allowing systems that query a ____-equipped server to validate that the server’s signature matches the DNS record. _____ can also be used to build a chain of trust for IPSec keys, SSH fingerprints, and similar records

2
New cards

Simple Network Management Protocol, version (SNMPv3)

improves on previous versions of SNMP by providing authentication of message sources, message integrity validation, and confidentiality via encryption. It supports multiple security levels, but only the authPriv level uses encryption. Simply using ___ does not automatically make SNMP information secure

3
New cards

Secure Shell (SSH)

is a protocol used for remote console access to devices and is a secure alternative to telnet. ___ is also often used as a tunneling protocol or to support other uses like SFTP

4
New cards

Hypertext Transfer Protocol over SSL/TLS (HTTPS)

the underlying HTTP protocol relies on TLS to provide security in ____ implementations

5
New cards

Secure Real-Time Protocol (SRTP)

is a secure version of the Real-Time Protocol (RTP), a protocol designed to provide audio and video streams via networks. ____ uses encryption and authentication to attempt to reduce the likelihood of successful attacks, including replay and denial-of-service attempts

6
New cards

Secure Lightweight Directory Access Protocol (LDAPS)

is a TLS-protected version of LDAP that offers confidentiality and integrity protections

7
New cards

Secure/Multipurpose Internet Mail Extensions (S/MIME)

provides the ability to encrypt and sign MIME data, the format used for email attachments. Thus, the content and attachments for an email can be protected, while providing authentication, integrity, nonrepudiation, and confidentiality for messages sent using ___