Filters
Question type

Study Flashcards

The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .


A) IAB
B) SPI
C) ESP
D) SPD

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

An end user whose system is equipped with IP security protocols can make a local call to an ISP and gain secure access to a company network.

A) True
B) False

Correct Answer

verifed

verified

The __________ mechanism assures that a received packet was in fact transmitted by the party identified as the source in the packet header and assures that the packet has not been altered in transit.


A) confidentiality
B) authentication
C) security
D) key management

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

At any point in an IKE exchange the sender may include a _________ payload to request the certificate of the other communicating entity.

Correct Answer

verifed

verified

Certificate Request

A security association is uniquely identified by three parameters: Security Protocol Identifier,IP Destination Address,and ________ .

Correct Answer

verifed

verified

Security P...

View Answer

Generic in that it does not dictate specific formats,the _________ is a key exchange protocol based on the Diffie-Hellman algorithm with added security.

Correct Answer

verifed

verified

Oakley Key...

View Answer

_________ consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication.The current specification is RFC 4303.


A) SPI
B) ESP
C) ISA
D) IPsec

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Any traffic from the local host to a remote host for purposes of an IKE exchange bypasses the IPsec processing.

A) True
B) False

Correct Answer

verifed

verified

Authentication must be applied to the entire original IP packet.

A) True
B) False

Correct Answer

verifed

verified

Transport mode provides protection to the entire IP packet.

A) True
B) False

Correct Answer

verifed

verified

The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.


A) security
B) key management
C) authentication
D) confidentiality

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The __________ facility is concerned with the secure exchange of keys.

Correct Answer

verifed

verified

The term _________ refers to a sequence of SAs through which traffic must be processed to provide a desired set of IPsec services.

Correct Answer

verifed

verified

security a...

View Answer

Additional padding may be added to provide partial traffic flow confidentiality by concealing the actual length of the payload.

A) True
B) False

Correct Answer

verifed

verified

An individual SA can implement both the AH and the ESP protocol.

A) True
B) False

Correct Answer

verifed

verified

_________ mode is used when one or both ends of an SA are a security gateway, such as a firewall or router that implements IPsec.

Correct Answer

verifed

verified

Tunnel

The principal feature of IPsec is that it can encrypt and/or authenticate all traffic at the IP level.

A) True
B) False

Correct Answer

verifed

verified

True

The Security Parameters Index identifies a security association.

A) True
B) False

Correct Answer

verifed

verified

IPsec is executed on a packet-by-packet basis.

A) True
B) False

Correct Answer

verifed

verified

A _________ is a one way relationship between a sender and a receiver that affords security services to the traffic carried on it.


A) SAD
B) SPD
C) SA
D) SPI

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 44

Related Exams

Show Answer