Exam 20: Ip Security
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
At any point in an IKE exchange the sender may include a _________ payload to request the certificate of the other communicating entity.
Free
(Essay)
4.9/5
(31)
Correct Answer:
Certificate Request
The principal feature of IPsec is that it can encrypt and/or authenticate all traffic at the IP level.
Free
(True/False)
4.8/5
(28)
Correct Answer:
True
_________ mode is used when one or both ends of an SA are a security gateway, such as a firewall or router that implements IPsec.
Free
(Essay)
4.9/5
(30)
Correct Answer:
Tunnel
The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .
(Multiple Choice)
4.7/5
(35)
Additional padding may be added to provide partial traffic flow confidentiality by concealing the actual length of the payload.
(True/False)
4.8/5
(45)
The term _________ refers to a sequence of SAs through which traffic must be processed to provide a desired set of IPsec services.
(Essay)
4.8/5
(40)
The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.
(Multiple Choice)
4.8/5
(28)
A security association is uniquely identified by three parameters: Security Protocol Identifier,IP Destination Address,and ________ .
(Essay)
4.9/5
(39)
An end user whose system is equipped with IP security protocols can make a local call to an ISP and gain secure access to a company network.
(True/False)
4.8/5
(33)
The __________ facility is concerned with the secure exchange of keys.
(Essay)
4.9/5
(37)
Authentication must be applied to the entire original IP packet.
(True/False)
4.9/5
(26)
Generic in that it does not dictate specific formats,the _________ is a key exchange protocol based on the Diffie-Hellman algorithm with added security.
(Essay)
4.7/5
(37)
An individual SA can implement both the AH and the ESP protocol.
(True/False)
4.8/5
(32)
Any traffic from the local host to a remote host for purposes of an IKE exchange bypasses the IPsec processing.
(True/False)
4.8/5
(31)
The Security Parameters Index identifies a security association.
(True/False)
4.9/5
(34)
_________ consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication.The current specification is RFC 4303.
(Multiple Choice)
4.8/5
(26)
The __________ mechanism assures that a received packet was in fact transmitted by the party identified as the source in the packet header and assures that the packet has not been altered in transit.
(Multiple Choice)
4.9/5
(35)
A _________ is a one way relationship between a sender and a receiver that affords security services to the traffic carried on it.
(Multiple Choice)
4.7/5
(41)
Showing 1 - 20 of 44
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)