SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
'IPSEC (phase1 -step3)'
IPSEC (main mode)
Hashing
Difffie-Hellman
2. 'Developed in 1977 by Ronald Rivest - Adi Shamir - and Leonard Adleman (therefore - RSA).'
hash-based message authentication codes (HMAC).
IPSEC (main mode)
RSA
AH/ESP
3. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. 'Message digest algorithms have a drawback whereby a hacker (man in the middle) can intercept a message containing the packet and hash values - then re-create and transmit a modified packet with the same calculated hash to the target destination.'
RSA
Difffie-Hellman
Hashing
AH/ESP
5. Hybrid protocol that defines the mechanism to derive authenticated keying material and negotiation of security associations (SA).
Hashing
HMAC-MD5/HMAC-SHA
IKE
ESP
6. Invented by Ron Rivest of RSA Security (RFC 1321).
AH
MD5
IPSEC (main mode)
IKE
7. More CPU intensive
SHA
HMAC
ESP
AH
8. Common key size is 1024 bits.
'IPSEC (phase1 -step3)'
Difffie-Hellman
RSA
Asymetric Encryption Protocols
9. Data integrity is the process of making sure data is not tampered with while it
AH
IPSEC BENEFIT
IPSEC (aggressive mode)
SHA
10. 'requires that the sender and receiver have key pairs. By combining the sender
IKE
HMAC-MD5/HMAC-SHA
3DES
Difffie-Hellman
11. 'When using the hash-based key function -'
AH
HMAC-MD5/HMAC-SHA
Origin Auth (DH auth)
AH/ESP
12. The protocol of choice for key management and establishing security associations between peers on the Internet.
GRE
ISAKMP
IPSEC (main mode)
RSA
13. 'Encryption - where Peer X uses Peer Y
IPSEC
RSA
ESP
IKE
14. 'in most cases - this mode is preferred with certificates.'
IPSEC (main mode)
DES
3DES
hash-based message authentication codes (HMAC).
15. The receiving device then encrypts the data with the second key.
Hashing
3DES
Tunnel Mode (ipsec)
RSA/DSA
16. 'MACs with hash algorithms -'
Tunneling
3DES
AES
hash-based message authentication codes (HMAC).
17. Turns clear-text data into cipher text with an encryption algorithm. The receiving station decrypts the data from cipher text into clear text. The encryption key is a shared secret key that encrypts and decrypts messages.
IKE
DES
DSA
'IPSEC (phase1 -step3)'
18. IPSEC performs this function by using a sequence field in the IPsec header combined with integrity checks.
3DES
IPSEC (aggressive mode)
ISAKMP
Antireplay
19. Provide authentication in Internet Key Exchange (IKE) Phase 2.
DES
HMAC
DSA
3DES
20. IPSec SAs are negotiated and protected by the existing IPsec SA.
IKE
SHA
IPSEC (phase2)
3DES
21. Uses protocol number 50.
ESP
IKE
Difffie-Hellman
SHA
22. DoS attacks are more probable with this mode.
Hashing
Asymetric Encryption Protocols
HMAC-MD5/HMAC-SHA
IPSEC (aggressive mode)
23. Uses IKE for key exchange.
ISAKMP
'IPSEC (phase1 -step2)'
DES
Hashing
24. 'The messages are authenticated - and the mechanisms that provide such integrity checks based on a secret key are usually called'
SHA
RSA
IPSEC (main mode)
message authentication codes (MAC).
25. Key exchange for IPSEC
Hashing
ISAKMP
Difffie-Hellman
IKE
26. IPSEC Encryption is performed by
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. ' is defined in RFC 3174. has as output a 160-bit value -'
3DES
Difffie-Hellman
SHA
hash-based message authentication codes (HMAC).
28. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
3DES
Difffie-Hellman
Tunnel Mode (ipsec)
AH/ESP
29. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
RSA
ISAKMP
MD5
AES
30. The DES algorithm that performs 3 times sequentially.
Hashing
RSA
3DES
MD5
31. Main disadvantage of asymmetric algorithms is that they are slow.
IPSEC (aggressive mode)
RSA/DSA
3DES
AH/ESP
32. 'key lengths are 128 - 192 - or 256 bits to encrypt blocks of equal length.'
DSA
GRE
AES
'IPSEC (phase1 -step2)'
33. Where the original Layer 3 header and payload inside an IPsec packet is encapsulated. Tunnel mode does add overhead to each packet and uses some additional CPU resources.
Difffie-Hellman
Tunnel Mode (ipsec)
AES
'DES - 3DES - or AES.'
34. 'often called public-key algorithms - do not rely on a randomly generated shared encryption key; instead - they create two static keys. These static keys are completely different - but mathematically bound to each other; what one key encrypts - the o
Asymetric Encryption Protocols
DES
IKE
Hashing
35. Used in IPsec for two discreet purposes:
AH
Hashing
RSA
AH/ESP
36. 'is a block-cipher algorithm - which means that it performs operations on fixed-length data streams of 64-bit blocks. The key ostensibly consists of 64 bits; however - only 56 are actually used by the algorithm.'
DSA
IPSEC BENEFIT
DES
hash algorithms
37. RFC 2631 on the workings of the key generation/exchange process.
Hashing
3DES
Hashing
Difffie-Hellman
38. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
Difffie-Hellman
MD5
MD5
3DES
39. No additional Layer 3 header is created. The original Layer 3 header is used.
Transport Mode (Ipsec)
3DES
MD5
SHA
40. Used in government installs and was created to work with the SHA-1 hash algorithm.
DES
AH/ESP
AES
DSA
41. It also provides protection for ISAKMP peer identities with encryption.
DSA
AH
hash algorithms
IPSEC (main mode)
42. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
SHA
3DES
MD5
Hashing
43. 'is a more secure version of MD5 - and hash-based message authentication codes (HMAC) provides further security with the inclusion of a key-based hash.'
Difffie-Hellman
SHA
message authentication codes (MAC).
hash-based message authentication codes (HMAC).
44. 'produces a 160-bit hash output - which makes it more difficult to decipher.'
IPSEC
'IPSEC (phase1 -step1)'
IKE
SHA
45. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
hash algorithms
3DES
IKE
IKE
46. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. Uses protocol number 51.
AH
Difffie-Hellman
3DES
3DES
48. ID exchange and authentication of D-H key by using the reply to the received nonce or string of bits
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. 'defines the mode of communication - creation - and management of security associations.'
Difffie-Hellman
ISAKMP
AH/ESP
IKE
50. The sending device encrypts for a final time with another 56-bit key.
AH/ESP
3DES
AH/ESP
Difffie-Hellman