Exam 20: Ip Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

At any point in an IKE exchange the sender may include a _________ payload to request the certificate of the other communicating entity.

Free
(Essay)
4.9/5
(31)
Correct Answer:
Verified

Certificate Request

The principal feature of IPsec is that it can encrypt and/or authenticate all traffic at the IP level.

Free
(True/False)
4.8/5
(28)
Correct Answer:
Verified

True

_________ mode is used when one or both ends of an SA are a security gateway, such as a firewall or router that implements IPsec.

Free
(Essay)
4.9/5
(30)
Correct Answer:
Verified

Tunnel

The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .

(Multiple Choice)
4.7/5
(35)

Additional padding may be added to provide partial traffic flow confidentiality by concealing the actual length of the payload.

(True/False)
4.8/5
(45)

The term _________ refers to a sequence of SAs through which traffic must be processed to provide a desired set of IPsec services.

(Essay)
4.8/5
(40)

The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.

(Multiple Choice)
4.8/5
(28)

IPsec is executed on a packet-by-packet basis.

(True/False)
4.9/5
(35)

A security association is uniquely identified by three parameters: Security Protocol Identifier,IP Destination Address,and ________ .

(Essay)
4.9/5
(39)

Transport mode provides protection to the entire IP packet.

(True/False)
4.7/5
(35)

An end user whose system is equipped with IP security protocols can make a local call to an ISP and gain secure access to a company network.

(True/False)
4.8/5
(33)

The __________ facility is concerned with the secure exchange of keys.

(Essay)
4.9/5
(37)

Authentication must be applied to the entire original IP packet.

(True/False)
4.9/5
(26)

Generic in that it does not dictate specific formats,the _________ is a key exchange protocol based on the Diffie-Hellman algorithm with added security.

(Essay)
4.7/5
(37)

An individual SA can implement both the AH and the ESP protocol.

(True/False)
4.8/5
(32)

Any traffic from the local host to a remote host for purposes of an IKE exchange bypasses the IPsec processing.

(True/False)
4.8/5
(31)

The Security Parameters Index identifies a security association.

(True/False)
4.9/5
(34)

_________ consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication.The current specification is RFC 4303.

(Multiple Choice)
4.8/5
(26)

The __________ mechanism assures that a received packet was in fact transmitted by the party identified as the source in the packet header and assures that the packet has not been altered in transit.

(Multiple Choice)
4.9/5
(35)

A _________ is a one way relationship between a sender and a receiver that affords security services to the traffic carried on it.

(Multiple Choice)
4.7/5
(41)
Showing 1 - 20 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)