Filters
Question type

Study Flashcards

The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.


A) security
B) key management
C) authentication
D) confidentiality

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

IPsec is executed on a packet-by-packet basis.

A) True
B) False

Correct Answer

verifed

verified

A __________ attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination.

Correct Answer

verifed

verified

__________ provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet.


A) IKE
B) ISA
C) IAB
D) IPsec

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

The Security Parameters Index identifies a security association.

A) True
B) False

Correct Answer

verifed

verified

True

The __________ facility is concerned with the secure exchange of keys.

Correct Answer

verifed

verified

The means by which IP traffic is related to specific SAs is the _________ .


A) TRS
B) SPD
C) SAD
D) SPI

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

The Payload Data Field is designed to deter replay attacks.

A) True
B) False

Correct Answer

verifed

verified

_________ consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication.The current specification is RFC 4303.


A) SPI
B) ESP
C) ISA
D) IPsec

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

_________ identifies the type of data contained in the payload data field by identifying the first header in that payload.


A) Security Parameters Index
B) Next Header
C) Sequence Header
D) Payload Data

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

IKE key determination employs __________ to ensure against replay attacks.


A) cookies
B) groups
C) flags
D) nonces

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

IPsec policy is determined primarily by the interaction of two databases: The security policy database and the __________ .

Correct Answer

verifed

verified

security a...

View Answer

The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .


A) IAB
B) SPI
C) ESP
D) SPD

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

IPsec encompasses three functional areas: authentication, key management, and __________ .

Correct Answer

verifed

verified

The __________ payload contains either error or status information associated with this SA or this SA negotiation.


A) Encrypted
B) Notify
C) Configuration
D) Nonce

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

_________ defines a number of techniques for key management.


A) KEP
B) KMP
C) SKE
D) IKE

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

C

The default automated key management protocol for IPsec is referred to as ISAKMP/Oakley.

A) True
B) False

Correct Answer

verifed

verified

A value chosen by the responder to identify a unique IKE SA is a _________ .


A) Initiator SPI
B) Responder Cookie
C) Flag
D) Message ID

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

B

_________ can be used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service, and traffic flow confidentiality.

Correct Answer

verifed

verified

Encapsulat...

View Answer

A security association is uniquely identified by three parameters: Security Protocol Identifier, IP Destination Address, and ________ .

Correct Answer

verifed

verified

Security P...

View Answer

Showing 1 - 20 of 45

Related Exams

Show Answer