Study sets, textbooks, questions
Upgrade to remove ads
Network+ chapter 11
Get Quizlet's official Network+ - 1 term, 1 practice question, 1 full practice test
Terms in this set (19)
Point-to-point Protocol. Sends IP datagram packets over serial point-to-point links. Can be used for synchronous and asynchronous connections. Used to configure and test remote network clients, as well as connecting to networks and the Internet. Provides encryption for passwords.
Point-to-point protocol over Ethernet. Provides PPP to DSL or cable modem connections using Ethernet. Contains discovery process to determine client's MAC address
Extension of PPP for additional authentication methods (tokens, smart cards, certificates)
Strengthens EAP by creating an encrypted channel between client and server. Can be used with MS-CHAPv2
Password Authentication Protocol. Sends client IDs and passwords as cleartext.
Challenge Handshake Authentication Protocol. Encrypted authentication method so that passwords are not used and sent over the network in cleartext. Uses MD5 hashing and a challenge-response mechanism. (MS-CHAP is for Microsoft)
Remote Authentication Dial-in User Service.
Enables one server to provide standardized, centralized authentication of remote users. You can have one RADIUS server and other remote access servers as RADIUS clients, who sent requests to the server. Supported by VPN, authenticating Ethernet switches and WAPs.
Terminal Access Controller Access Control System/ Plus provides centralized authentication and authorization services for remote users.
TACACS+ supports multifactor authentication and is considered more secure/scalable than RADIUS. Accepts login requests and authetnicates access credentials of user. Includes process-wide encryption for authentication, and uses TCP.
virtual Private network - a private network configured by tunneling through a public network. Secure connections between endpoints (routers, clients or servers) by using tunneling to encapsulate and encrypt data.
Secure Socket Layer VPN - a VPN format used with a web browser. No external client needed. Good for schools, libraries, or anything else that might need quick access
Point-to-point Tunneling Protocol - A Microsoft VPN Layer 2 protocol. Increases security of PPP by tunneling data and encryption for PPP packets using the same authentication types. Can encapsulate any type of network and transports it over IP networks
Layer two tunneling protocol - Combination of PPTP and L2F that enables tunneling of PPP sessions across many network protocols (IP, frame relay,. ATM). Designed to provide tunneling and security interopability for client-to-gate and gateway-to-gateway connections. No encryption provided, appears as IP packets. IPSec Transport Mode is used for authentication, integrity and confidentiality
Secure Socket Tunneling Protocol - Uses HTTP over SSL protocol and encapsulates IP Packet with PPP header, then SSTP header. Encrypted by the SSL session. IP header containing the destination address is added to packet
Provides a 128-bit key as well as standard 56- or 40-bit key encryption. Requires MS-CHAP, MS-CHAPv2, or EAP remote authentication.
A device that incorporates advanced encryption and authentication methods. used specifically for secure remote-access or site-to-site VPNs. Provides high performance, high availability, and impressive scalability. Deployed when there is a need for a single device to handle a large number of VPN tunnels
Remote Desktop Protocol
RDP includes data encryption, remote audio and printing, access to local files, and redirection of the host computer's disk drives and peripheral ports. Server listens on port 3389
Virtual Network Computing
VNC - Platform-independent desktop sharing system. Uses Remote framebuffer (RFB) protocol, which allows client and server to determine the best version of RFB they can support. Not secure, but does offer varying levels of password and content encryption
Independent Computing Architecture - Citrix remote terminal protocol for Citrix WinFrame and Citrix Presentation Server software. Add-on to Microsoft Terminal Services. Enhances and expands core thin-client functionality and provides client support for additional protocols and services
X Window System
Protocol that uses a client-server relationship to provide graphical user interface and input device management functionality to applications. Based on X11 protocol.
Sets found in the same folder
Network+ 1.1 Compare the layers of the OSI and TCP…
CompTIA Network+ N10-005 All in One
CompTIA Network+ All-in-One Exam Guide, Fifth Edit…
Sets with similar terms
Ch 3 Objectives: Understanding Basic Network Secur…
Remote Access (Chapter 7)
Network+ [Chapter 13]
Chapter 9 terms
Other sets by this creator
802.11 WLAN standards
Twisted Pair Cable
Common Networking Protocols and their ports
Other Quizlet sets
The Crucible Act I Review
Middle East Test Definitions (People/Parties)
Honors Chemistry Atom Test
10) Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
What are the two primary features that give proxy servers an advantage over NAT?
Match the EtherChannel protocol on the left with its characteristics on the right. Each protocol may be used once, more than once, or not at all.
Once a hacker has physical access, which of these becomes a possibility: