Filters
Question type

Study Flashcards

An end user whose system is equipped with IP security protocols can make a local call to an ISP and gain secure access to a company network.

A) True
B) False

Correct Answer

verifed

verified

the __________ exchange requires that each side send a pseudorandom number in the initial message, which the other side acknowledges.

Correct Answer

verifed

verified

IPsec is executed on a packet-by-packet basis.

A) True
B) False

Correct Answer

verifed

verified

the term _________ refers to a sequence of SAs through which traffic must be processed to provide a desired set of IPsec services.

Correct Answer

verifed

verified

security a...

View Answer

Generic in that it does not dictate specific formats, the _________ is a key exchange protocol based on the Diffie-Hellman algorithm with added security.

Correct Answer

verifed

verified

Oakley Key...

View Answer

transport adjacency refers to applying more than one security protocol to the same IP packet without invoking tunneling.

A) True
B) False

Correct Answer

verifed

verified

Confidentiality is a service provided by an encryption format known as __________ .

Correct Answer

verifed

verified

encapsulat...

View Answer

_________ consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication.the current specification is RFC 4303.


A) SPI
B) ESP
C) ISA
D) IPsec

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

By implementing security at the IP level, an organization can ensure secure networking not only for applications that have security mechanisms but also for the many security-ignorant applications.

A) True
B) False

Correct Answer

verifed

verified

IKE key determination employs __________ to ensure against replay attacks.


A) cookies
B) groups
C) flags
D) nonces

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Authentication applied to all of the packet except for the IP header is _________ .


A) tunnel mode
B) transport mode
C) association mode
D) security mode

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

the __________ facility is concerned with the secure exchange of keys.

Correct Answer

verifed

verified

IPsec encompasses three functional areas: authentication, key management, and __________ .

Correct Answer

verifed

verified

__________ can be used to secure communication with other organizations, ensuring authentication and confidentiality and providing a key exchange mechanism.

Correct Answer

verifed

verified

A _________ is a one way relationship between a sender and a receiver that affords security services to the traffic carried on it.


A) SAD
B) SPD
C) SA
D) SPI

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

A __________ attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination.

Correct Answer

verifed

verified

the means by which IP traffic is related to specific SAs is the _________ .


A) TRS
B) SPD
C) SAD
D) SPI

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

A security association is uniquely identified by three parameters: Security Protocol Identifier, IP Destination Address, and ________ .

Correct Answer

verifed

verified

Security P...

View Answer

the default automated key management protocol for IPsec is referred to as ISAKMP/Oakley.

A) True
B) False

Correct Answer

verifed

verified

Both tunnel and transport modes can be accommodated by the encapsulating security payload encryption format.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 44

Related Exams

Show Answer