Exam 9: Ip Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________ defines a number of techniques for key management.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

The Security Parameters Index identifies a security association.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

A value chosen by the responder to identify a unique IKE SA is a _________ .

Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
Verified

B

The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.

(Multiple Choice)
4.8/5
(35)

_________ consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication.The current specification is RFC 4303.

(Multiple Choice)
4.9/5
(26)

IPsec encompasses three functional areas: authentication, key management, and __________ .

(Short Answer)
4.8/5
(45)

The __________ facility is concerned with the secure exchange of keys.

(Short Answer)
4.9/5
(35)

The means by which IP traffic is related to specific SAs is the _________ .

(Multiple Choice)
4.9/5
(33)

A __________ attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination.

(Short Answer)
4.8/5
(28)

_________ identifies the type of data contained in the payload data field by identifying the first header in that payload.

(Multiple Choice)
4.8/5
(34)

IPsec is executed on a packet-by-packet basis.

(True/False)
4.8/5
(33)

_________ can be used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service, and traffic flow confidentiality.

(Short Answer)
4.9/5
(34)

The Payload Data Field is designed to deter replay attacks.

(True/False)
4.9/5
(31)

IPsec policy is determined primarily by the interaction of two databases: The security policy database and the __________ .

(Short Answer)
4.8/5
(36)

IKE key determination employs __________ to ensure against replay attacks.

(Multiple Choice)
4.8/5
(26)

__________ provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet.

(Multiple Choice)
4.8/5
(44)

The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .

(Multiple Choice)
4.8/5
(29)

A security association is uniquely identified by three parameters: Security Protocol Identifier, IP Destination Address, and ________ .

(Short Answer)
4.8/5
(40)

The __________ payload contains either error or status information associated with this SA or this SA negotiation.

(Multiple Choice)
4.9/5
(40)

The default automated key management protocol for IPsec is referred to as ISAKMP/Oakley.

(True/False)
4.8/5
(31)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)