SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hybrid protocol that defines the mechanism to derive authenticated keying material and negotiation of security associations (SA).
RSA
IKE
RSA
'IPSEC (phase1 -step3)'
2. IPSEC performs this function by using a sequence field in the IPsec header combined with integrity checks.
IPSEC BENEFIT
Antireplay
IPSEC (aggressive mode)
AH
3. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
RSA
MD5
DES
ESP
4. 'requires that the sender and receiver have key pairs. By combining the sender
DES
ISAKMP
AH/ESP
Difffie-Hellman
5. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
IKE
message authentication codes (MAC).
MD5
RSA/DSA
6. A
ISAKMP
DSA
SHA
Hashing
7. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Difffie-Hellman
IPSEC (main mode)
hash algorithms
'IPSEC (phase1 -step1)'
8. 'group 2 identifies a 1024-bit key - group 2 is more secure - but slower to execute.'
Difffie-Hellman
RSA/DSA
IPSEC (main mode)
Hashing
9. Main mode establishes ISAKMP security association in six messages and performs authenticated D-H exchange.
IPSEC (main mode)
hash-based message authentication codes (HMAC).
MD5
DSA
10. 'A 56-bit encryption algorithm - meaning the number of possible keys
IPSEC
RSA
HMAC
DES
11. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
3DES
Hashing
Difffie-Hellman
IPSEC (phase2)
12. Used in IPsec for two discreet purposes:
RSA
3DES
ESP
Hashing
13. Used for integrity checks on peer and data sent by peer and for authentication checks.
Transport Mode (Ipsec)
AH
DES
IPSEC (aggressive mode)
14. The DES algorithm that performs 3 times sequentially.
ESP
Transport Mode (Ipsec)
Tunnel Mode (ipsec)
3DES
15. It uses UDP 500 and is defined by RFC 2409.
SHA
IKE
AH/ESP
IPSEC BENEFIT
16. 'Created by NIST in 1994 - is the algorithm used for digital signatures but not for encryption.'
DSA
ESP
AH
IPSEC (main mode)
17. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. 'key exchange is vulnerable to a man-in-the-middle attack. You can rectify this problem by allowing the two parties to authenticate themselves to each other with a shared secret key - digital signatures - or public-key certificates.'
AES
RSA
Antireplay
Difffie-Hellman
19. Does not provide payload encryption.
Hashing
RSA
AH
IKE
20. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
'IPSEC (phase1 -step1)'
3DES
Difffie-Hellman
DSA
21. 'can be achieved using one of three methods: preshared keys - encrypted nonces - or digital signatures.'
AH
Origin Auth (DH auth)
ESP
IKE
22. 'is a block-cipher algorithm - which means that it performs operations on fixed-length data streams of 64-bit blocks. The key ostensibly consists of 64 bits; however - only 56 are actually used by the algorithm.'
3DES
MD5
DES
'MD5 - SHA-1 - or RSA'
23. Provide authentication in Internet Key Exchange (IKE) Phase 2.
HMAC
'IPSEC (phase1 -step2)'
IPSEC (phase2)
IPSEC (aggressive mode)
24. Origin authentication validates the origin of a message upon receipt; this process is done during initial communications.
IPSEC BENEFIT
IPSEC (main mode)
3DES
RSA
25. ID exchange and authentication of D-H key by using the reply to the received nonce or string of bits
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. IPSec SAs are negotiated and protected by the existing IPsec SA.
DES
IPSEC (aggressive mode)
Difffie-Hellman
IPSEC (phase2)
27. The receiving device then encrypts the data with the second key.
SHA
3DES
IKE
RSA/DSA
28. 'The sending device decrypts the data with the second key - which is also 56 bits in length.'
IKE
Hashing
3DES
Difffie-Hellman
29. IPSEC Encryption is performed by
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. Uses protocol number 50.
'IPSEC (phase1 -step1)'
ESP
IKE
IKE
31. Integrity checks are done
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. Uses IKE for key exchange.
Difffie-Hellman
IPSEC (aggressive mode)
ISAKMP
SHA
33. 'is a more secure version of MD5 - and hash-based message authentication codes (HMAC) provides further security with the inclusion of a key-based hash.'
ISAKMP
MD5
SHA
DES
34. Drawback of this is that the hash is passed unencrypted and is susceptible to PSK crack attacks.
AH
IPSEC (phase2)
IPSEC (aggressive mode)
RSA
35. Common key size is 1024 bits.
Origin Auth (DH auth)
Antireplay
RSA
SHA
36. 'including Internet Security Association and Key Management Protocol (ISAKMP) - Secure Key Exchange Mechanism for the Internet (SKEME) - and Oakley.'
Difffie-Hellman
Hashing
IKE
ESP
37. You use this encryption method by keeping one key private and giving the other key to anyone in the public Internet. It does not matter who has your public key; it is useless without the private key.
IPSEC (aggressive mode)
IPSEC
RSA
Asymetric Encryption Protocols
38. Can be implemented efficiently on a wide range of processors and in hardware.
AH/ESP
Hashing
AES
DES
39. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
IPSEC (aggressive mode)
Hashing
3DES
AH
40. Uses the D-H algorithm to come to agreement over a public network.
IKE
message authentication codes (MAC).
3DES
SHA
41. 'group 5 identifies a 1536-bit key - provides for highest security but is the slowest of all groups.'
Antireplay
Difffie-Hellman
AH/ESP
Asymetric Encryption Protocols
42. Main disadvantage of asymmetric algorithms is that they are slow.
AES
Difffie-Hellman
Hashing
RSA/DSA
43. Used in government installs and was created to work with the SHA-1 hash algorithm.
IPSEC (aggressive mode)
'IPSEC (phase1 -step3)'
DSA
'DES - 3DES - or AES.'
44. 'provides everything required to securely connect over a public media - such as the Internet.'
IKE
3DES
IPSEC
MD5
45. Invented by Ron Rivest of RSA Security (RFC 1321).
AH
'IPSEC (phase1 -step2)'
MD5
RSA
46. A variable block- length and key-length cipher.
'IPSEC (phase1 -step3)'
RSA
AES
IPSEC (aggressive mode)
47. RFC 2631 on the workings of the key generation/exchange process.
IPSEC (main mode)
Difffie-Hellman
'DES - 3DES - or AES.'
hash algorithms
48. Provides authentication and encryption of the payload.
RSA
RSA/DSA
ESP
Asymetric Encryption Protocols
49. 'produces a 160-bit hash output - which makes it more difficult to decipher.'
DES
SHA
Transport Mode (Ipsec)
AES
50. More CPU intensive
AES
Difffie-Hellman
SHA
'MD5 - SHA-1 - or RSA'
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests