Exam 9: Ip Security
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
_________ defines a number of techniques for key management.
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
C
The Security Parameters Index identifies a security association.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
A value chosen by the responder to identify a unique IKE SA is a _________ .
Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
B
The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.
(Multiple Choice)
4.8/5
(35)
_________ consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication.The current specification is RFC 4303.
(Multiple Choice)
4.9/5
(26)
IPsec encompasses three functional areas: authentication, key management, and __________ .
(Short Answer)
4.8/5
(45)
The __________ facility is concerned with the secure exchange of keys.
(Short Answer)
4.9/5
(35)
The means by which IP traffic is related to specific SAs is the _________ .
(Multiple Choice)
4.9/5
(33)
A __________ attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination.
(Short Answer)
4.8/5
(28)
_________ identifies the type of data contained in the payload data field by identifying the first header in that payload.
(Multiple Choice)
4.8/5
(34)
_________ can be used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service, and traffic flow confidentiality.
(Short Answer)
4.9/5
(34)
IPsec policy is determined primarily by the interaction of two databases: The security policy database and the __________ .
(Short Answer)
4.8/5
(36)
IKE key determination employs __________ to ensure against replay attacks.
(Multiple Choice)
4.8/5
(26)
__________ provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet.
(Multiple Choice)
4.8/5
(44)
The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .
(Multiple Choice)
4.8/5
(29)
A security association is uniquely identified by three parameters: Security Protocol Identifier, IP Destination Address, and ________ .
(Short Answer)
4.8/5
(40)
The __________ payload contains either error or status information associated with this SA or this SA negotiation.
(Multiple Choice)
4.9/5
(40)
The default automated key management protocol for IPsec is referred to as ISAKMP/Oakley.
(True/False)
4.8/5
(31)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)