SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You use this encryption method by keeping one key private and giving the other key to anyone in the public Internet. It does not matter who has your public key; it is useless without the private key.
Asymetric Encryption Protocols
3DES
DSA
Antireplay
2. A
Hashing
MD5
'IPSEC (phase1 -step1)'
3DES
3. 'Finally - the receiving devices decrypt the data with the first key.'
MD5
Difffie-Hellman
Difffie-Hellman
3DES
4. Uses protocol number 50.
ESP
DSA
HMAC-MD5/HMAC-SHA
Tunneling
5. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
MD5
IPSEC (main mode)
DES
SHA
6. RFC 2631 on the workings of the key generation/exchange process.
Hashing
IPSEC (aggressive mode)
IPSEC
Difffie-Hellman
7. Invented by Ron Rivest of RSA Security (RFC 1321).
'DES - 3DES - or AES.'
Tunnel Mode (ipsec)
MD5
RSA
8. Used in government installs and was created to work with the SHA-1 hash algorithm.
AH
IKE
AES
DSA
9. Used for integrity checks on peer and data sent by peer and for authentication checks.
AH
hash algorithms
DSA
3DES
10. 'MACs with hash algorithms -'
Hashing
DSA
IPSEC (main mode)
hash-based message authentication codes (HMAC).
11. You check it by hashing data and appending the hash value to the data as you send it across the network to a peer.
Hashing
3DES
'IPSEC (phase1 -step1)'
ISAKMP
12. 'is a block-cipher algorithm - which means that it performs operations on fixed-length data streams of 64-bit blocks. The key ostensibly consists of 64 bits; however - only 56 are actually used by the algorithm.'
IPSEC (aggressive mode)
DES
ESP
MD5
13. Drawback of this is that the hash is passed unencrypted and is susceptible to PSK crack attacks.
Hashing
Difffie-Hellman
'DES - 3DES - or AES.'
IPSEC (aggressive mode)
14. 'A 56-bit encryption algorithm - meaning the number of possible keys
DES
IPSEC (aggressive mode)
3DES
AH
15. 'When using the hash-based key function -'
IPSEC (main mode)
RSA
SHA
HMAC-MD5/HMAC-SHA
16. ' is defined in RFC 3174. has as output a 160-bit value -'
SHA
Difffie-Hellman
IKE
HMAC
17. Hybrid protocol that defines the mechanism to derive authenticated keying material and negotiation of security associations (SA).
AES
DSA
IPSEC (main mode)
IKE
18. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
3DES
IPSEC (main mode)
Tunnel Mode (ipsec)
IKE
19. 'The sending device decrypts the data with the second key - which is also 56 bits in length.'
3DES
Transport Mode (Ipsec)
Difffie-Hellman
IPSEC (aggressive mode)
20. Uses protocol number 51.
AH
'MD5 - SHA-1 - or RSA'
IKE
Difffie-Hellman
21. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
AH
3DES
HMAC
Difffie-Hellman
22. Has a trailer which identifies IPsec information and ESP integrity-check information.
Hashing
DES
IKE
ESP
23. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Hashing
IPSEC (main mode)
DES
RSA
24. It also provides protection for ISAKMP peer identities with encryption.
IPSEC (main mode)
Antireplay
DSA
RSA
25. 'requires that the sender and receiver have key pairs. By combining the sender
Difffie-Hellman
RSA
3DES
3DES
26. The receiving device then encrypts the data with the second key.
3DES
Hashing
Difffie-Hellman
'IPSEC (phase1 -step2)'
27. The DES algorithm that performs 3 times sequentially.
AES
3DES
Tunnel Mode (ipsec)
GRE
28. 'key lengths are 128 - 192 - or 256 bits to encrypt blocks of equal length.'
AES
'MD5 - SHA-1 - or RSA'
IPSEC (aggressive mode)
IKE
29. 'DSA is roughly the same speed as RSA when creating signatures - but 10 to 40 times slower when verifying signatures. Because verification happens more frequently than creation - this issue is worth noting when deploying DSA in any environment.'
DSA
DES
SHA
AH
30. Key exchange for IPSEC
Asymetric Encryption Protocols
Hashing
IKE
IPSEC (aggressive mode)
31. IPSec SAs are negotiated and protected by the existing IPsec SA.
message authentication codes (MAC).
Hashing
ESP
IPSEC (phase2)
32. One of the most popular tunneling protocols is
Difffie-Hellman
GRE
ESP
'DES - 3DES - or AES.'
33. Is a two-phase protocol: The first phase establishes a secure authenticated channel and the second phase is where SAs are negotiated on behalf of the IPsec services.
IKE
ISAKMP
DES
AH/ESP
34. 'produces a 160-bit hash output - which makes it more difficult to decipher.'
SHA
AH
Difffie-Hellman
MD5
35. The sending device encrypts for a final time with another 56-bit key.
IPSEC BENEFIT
3DES
IKE
SHA
36. Provide authentication in Internet Key Exchange (IKE) Phase 2.
IPSEC (aggressive mode)
HMAC
IPSEC (aggressive mode)
'IPSEC (phase1 -step3)'
37. Act of encapsulating a packet within another packet.
GRE
Tunneling
DES
RSA
38. No additional Layer 3 header is created. The original Layer 3 header is used.
HMAC
Transport Mode (Ipsec)
SHA
MD5
39. Turns clear-text data into cipher text with an encryption algorithm. The receiving station decrypts the data from cipher text into clear text. The encryption key is a shared secret key that encrypts and decrypts messages.
SHA
MD5
AH
DES
40. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
Origin Auth (DH auth)
SHA
3DES
Difffie-Hellman
41. More CPU intensive
SHA
ISAKMP
Difffie-Hellman
MD5
42. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
ESP
MD5
Hashing
Difffie-Hellman
43. Provides authentication and encryption of the payload.
3DES
ESP
'MD5 - SHA-1 - or RSA'
DES
44. Used in IPsec for two discreet purposes:
IPSEC (main mode)
Hashing
Asymetric Encryption Protocols
RSA
45. 'Encryption - where Peer X uses Peer Y
Antireplay
Difffie-Hellman
RSA
IPSEC (aggressive mode)
46. Can be implemented efficiently on a wide range of processors and in hardware.
AES
IPSEC (main mode)
RSA
DES
47. 'often called public-key algorithms - do not rely on a randomly generated shared encryption key; instead - they create two static keys. These static keys are completely different - but mathematically bound to each other; what one key encrypts - the o
HMAC
'DES - 3DES - or AES.'
Asymetric Encryption Protocols
ESP
48. The receiving device decrypts the data with the third key.
AH/ESP
SHA
IKE
3DES
49. A variable block- length and key-length cipher.
Transport Mode (Ipsec)
AES
AH
3DES
50. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
HMAC-MD5/HMAC-SHA
Antireplay
AH/ESP
IPSEC (aggressive mode)