SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One of the most popular tunneling protocols is
3DES
Difffie-Hellman
SHA
GRE
2. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
Difffie-Hellman
ESP
'MD5 - SHA-1 - or RSA'
IPSEC (aggressive mode)
3. Data integrity is the process of making sure data is not tampered with while it
IKE
AH/ESP
IPSEC BENEFIT
Hashing
4. It also provides protection for ISAKMP peer identities with encryption.
Difffie-Hellman
RSA/DSA
DSA
IPSEC (main mode)
5. 'produces a 160-bit hash output - which makes it more difficult to decipher.'
IPSEC (main mode)
'IPSEC (phase1 -step3)'
SHA
Tunneling
6. Uses protocol number 50.
IPSEC (main mode)
ESP
Difffie-Hellman
IPSEC BENEFIT
7. ID exchange and authentication of D-H key by using the reply to the received nonce or string of bits
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. 'The messages are authenticated - and the mechanisms that provide such integrity checks based on a secret key are usually called'
DSA
message authentication codes (MAC).
MD5
RSA
9. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
MD5
RSA
AH/ESP
DSA
10. Used for integrity checks on peer and data sent by peer and for authentication checks.
'DES - 3DES - or AES.'
SHA
AH
'MD5 - SHA-1 - or RSA'
11. IPSEC tunnels data through IP using one of two protocols?
Origin Auth (DH auth)
3DES
DSA
AH/ESP
12. Where the original Layer 3 header and payload inside an IPsec packet is encapsulated. Tunnel mode does add overhead to each packet and uses some additional CPU resources.
AES
AH
Tunnel Mode (ipsec)
IKE
13. Verify whether the data has been altered.
ESP
IPSEC (main mode)
'IPSEC (phase1 -step1)'
Hashing
14. IPSec SAs are negotiated and protected by the existing IPsec SA.
DES
IPSEC (main mode)
DSA
IPSEC (phase2)
15. Hybrid protocol that defines the mechanism to derive authenticated keying material and negotiation of security associations (SA).
IKE
MD5
hash-based message authentication codes (HMAC).
3DES
16. Used in IPsec for two discreet purposes:
DSA
3DES
DSA
RSA
17. 'When using the hash-based key function -'
DSA
DES
HMAC-MD5/HMAC-SHA
AH
18. 'key lengths are 128 - 192 - or 256 bits to encrypt blocks of equal length.'
RSA
AES
ISAKMP
IPSEC (aggressive mode)
19. Invented by Ron Rivest of RSA Security (RFC 1321).
IKE
MD5
Hashing
IPSEC (phase2)
20. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
ISAKMP
Difffie-Hellman
ESP
RSA
21. Main mode establishes ISAKMP security association in six messages and performs authenticated D-H exchange.
IPSEC BENEFIT
ISAKMP
IPSEC (main mode)
3DES
22. This mode does not support identity protection or protection against clogging attacks and spoofing.
Difffie-Hellman
IKE
RSA
IPSEC (aggressive mode)
23. More CPU intensive
3DES
ESP
Difffie-Hellman
SHA
24. The DES algorithm that performs 3 times sequentially.
MD5
3DES
Tunneling
'MD5 - SHA-1 - or RSA'
25. The sending device encrypts for a final time with another 56-bit key.
MD5
IPSEC BENEFIT
Difffie-Hellman
3DES
26. 'key exchange is vulnerable to a man-in-the-middle attack. You can rectify this problem by allowing the two parties to authenticate themselves to each other with a shared secret key - digital signatures - or public-key certificates.'
Difffie-Hellman
3DES
Transport Mode (Ipsec)
HMAC
27. 'often called public-key algorithms - do not rely on a randomly generated shared encryption key; instead - they create two static keys. These static keys are completely different - but mathematically bound to each other; what one key encrypts - the o
DES
Difffie-Hellman
Asymetric Encryption Protocols
3DES
28. 'Digital signatures. Peer X encrypts a hash value with his private key and then sends the data to Peer Y. Peer Y obtains Peer X
ISAKMP
RSA
Difffie-Hellman
Antireplay
29. Is a two-phase protocol: The first phase establishes a secure authenticated channel and the second phase is where SAs are negotiated on behalf of the IPsec services.
AES
AH
IKE
MD5
30. The receiving device decrypts the data with the third key.
Hashing
IPSEC (phase2)
3DES
Difffie-Hellman
31. You use this encryption method by keeping one key private and giving the other key to anyone in the public Internet. It does not matter who has your public key; it is useless without the private key.
Asymetric Encryption Protocols
AH/ESP
ESP
DES
32. 'group 1 identifies a 768-bit key - group 1 is faster to execute - but it is less secure -'
IPSEC BENEFIT
Difffie-Hellman
HMAC-MD5/HMAC-SHA
SHA
33. Turns clear-text data into cipher text with an encryption algorithm. The receiving station decrypts the data from cipher text into clear text. The encryption key is a shared secret key that encrypts and decrypts messages.
IKE
DES
RSA
IPSEC (aggressive mode)
34. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
AH/ESP
3DES
RSA
IPSEC (aggressive mode)
35. 'including Internet Security Association and Key Management Protocol (ISAKMP) - Secure Key Exchange Mechanism for the Internet (SKEME) - and Oakley.'
IKE
Difffie-Hellman
Difffie-Hellman
RSA
36. Drawback of this is that the hash is passed unencrypted and is susceptible to PSK crack attacks.
3DES
IPSEC (aggressive mode)
hash algorithms
ISAKMP
37. 'defines the mode of communication - creation - and management of security associations.'
AH/ESP
IKE
ISAKMP
3DES
38. Provides authentication and encryption of the payload.
ESP
IPSEC (main mode)
Hashing
GRE
39. Uses IKE for key exchange.
ISAKMP
'IPSEC (phase1 -step3)'
AH/ESP
AH
40. Key exchange for IPSEC
AES
AH
IKE
SHA
41. 'Finally - the receiving devices decrypt the data with the first key.'
IPSEC (main mode)
3DES
RSA
RSA
42. 'A 56-bit encryption algorithm - meaning the number of possible keys
DES
IKE
ISAKMP
'IPSEC (phase1 -step2)'
43. Common key size is 1024 bits.
Difffie-Hellman
ISAKMP
HMAC
RSA
44. Uses protocol number 51.
MD5
AH
Difffie-Hellman
IKE
45. Can be implemented efficiently on a wide range of processors and in hardware.
AH
3DES
SHA
AES
46. IPSEC Encryption is performed by
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. Integrity checks are done
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. 'Message digest algorithms have a drawback whereby a hacker (man in the middle) can intercept a message containing the packet and hash values - then re-create and transmit a modified packet with the same calculated hash to the target destination.'
RSA
MD5
AH/ESP
Hashing
50. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests