SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 'Finally - the receiving devices decrypt the data with the first key.'
IKE
IPSEC (main mode)
3DES
IPSEC (aggressive mode)
2. 'The messages are authenticated - and the mechanisms that provide such integrity checks based on a secret key are usually called'
IPSEC
Asymetric Encryption Protocols
DES
message authentication codes (MAC).
3. 'is a block-cipher algorithm - which means that it performs operations on fixed-length data streams of 64-bit blocks. The key ostensibly consists of 64 bits; however - only 56 are actually used by the algorithm.'
RSA
DES
RSA
3DES
4. Provides authentication and encryption of the payload.
ESP
AH/ESP
RSA
MD5
5. Hybrid protocol that defines the mechanism to derive authenticated keying material and negotiation of security associations (SA).
AH
'MD5 - SHA-1 - or RSA'
IKE
MD5
6. Has a trailer which identifies IPsec information and ESP integrity-check information.
IKE
ESP
ISAKMP
Difffie-Hellman
7. More CPU intensive
DSA
hash algorithms
RSA/DSA
SHA
8. 'defines the mode of communication - creation - and management of security associations.'
IKE
RSA
ISAKMP
Difffie-Hellman
9. 'produces a 160-bit hash output - which makes it more difficult to decipher.'
Hashing
Difffie-Hellman
SHA
IKE
10. 'including Internet Security Association and Key Management Protocol (ISAKMP) - Secure Key Exchange Mechanism for the Internet (SKEME) - and Oakley.'
Asymetric Encryption Protocols
RSA
IKE
3DES
11. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
IPSEC (aggressive mode)
IKE
3DES
MD5
12. 'often called public-key algorithms - do not rely on a randomly generated shared encryption key; instead - they create two static keys. These static keys are completely different - but mathematically bound to each other; what one key encrypts - the o
Hashing
Origin Auth (DH auth)
RSA
Asymetric Encryption Protocols
13. 'MACs with hash algorithms -'
AES
hash-based message authentication codes (HMAC).
RSA
3DES
14. 'key lengths are 128 - 192 - or 256 bits to encrypt blocks of equal length.'
3DES
AES
SHA
Difffie-Hellman
15. 'Developed in 1977 by Ronald Rivest - Adi Shamir - and Leonard Adleman (therefore - RSA).'
RSA
DES
DSA
RSA/DSA
16. One of the most popular tunneling protocols is
GRE
IPSEC (main mode)
'DES - 3DES - or AES.'
3DES
17. A
Tunneling
GRE
Hashing
RSA
18. IPSEC Encryption is performed by
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. IPSEC tunnels data through IP using one of two protocols?
DSA
3DES
RSA
AH/ESP
21. Where the original Layer 3 header and payload inside an IPsec packet is encapsulated. Tunnel mode does add overhead to each packet and uses some additional CPU resources.
Transport Mode (Ipsec)
Hashing
hash-based message authentication codes (HMAC).
Tunnel Mode (ipsec)
22. 'has a Next Protocol field which identifies the next Layer 4 transport protocol in use - TCP or UDP'
Difffie-Hellman
IPSEC (aggressive mode)
AH/ESP
Hashing
23. IPSec SAs are negotiated and protected by the existing IPsec SA.
Difffie-Hellman
IPSEC BENEFIT
'IPSEC (phase1 -step1)'
IPSEC (phase2)
24. You check it by hashing data and appending the hash value to the data as you send it across the network to a peer.
Tunneling
Hashing
IPSEC (aggressive mode)
SHA
25. The protocol of choice for key management and establishing security associations between peers on the Internet.
IPSEC (main mode)
RSA
ISAKMP
DSA
26. DoS attacks are more probable with this mode.
IPSEC BENEFIT
message authentication codes (MAC).
Tunnel Mode (ipsec)
IPSEC (aggressive mode)
27. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
Tunnel Mode (ipsec)
hash-based message authentication codes (HMAC).
Difffie-Hellman
Antireplay
28. 'Encryption - where Peer X uses Peer Y
RSA
Origin Auth (DH auth)
MD5
DSA
29. 'Message digest algorithms have a drawback whereby a hacker (man in the middle) can intercept a message containing the packet and hash values - then re-create and transmit a modified packet with the same calculated hash to the target destination.'
RSA
Hashing
IPSEC (main mode)
ISAKMP
30. 'Digital signatures. Peer X encrypts a hash value with his private key and then sends the data to Peer Y. Peer Y obtains Peer X
MD5
Difffie-Hellman
RSA
IPSEC (main mode)
31. 'DSA is roughly the same speed as RSA when creating signatures - but 10 to 40 times slower when verifying signatures. Because verification happens more frequently than creation - this issue is worth noting when deploying DSA in any environment.'
MD5
DSA
IPSEC (main mode)
Difffie-Hellman
32. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
AES
3DES
Difffie-Hellman
Tunneling
33. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
DES
MD5
Transport Mode (Ipsec)
SHA
34. 'group 1 identifies a 768-bit key - group 1 is faster to execute - but it is less secure -'
Difffie-Hellman
IPSEC (aggressive mode)
ISAKMP
AH
35. Does not provide payload encryption.
3DES
ISAKMP
'MD5 - SHA-1 - or RSA'
AH
36. That authenticate data packets and ensure that data is not tampered with or modified.
Hashing
IPSEC (aggressive mode)
DSA
hash algorithms
37. The receiving device decrypts the data with the third key.
3DES
IPSEC BENEFIT
HMAC-MD5/HMAC-SHA
ISAKMP
38. 'group 5 identifies a 1536-bit key - provides for highest security but is the slowest of all groups.'
HMAC-MD5/HMAC-SHA
IKE
IPSEC (main mode)
Difffie-Hellman
39. Used for integrity checks on peer and data sent by peer and for authentication checks.
AES
AH
'IPSEC (phase1 -step3)'
DSA
40. The sending device encrypts for a final time with another 56-bit key.
3DES
ISAKMP
Tunnel Mode (ipsec)
SHA
41. Turns clear-text data into cipher text with an encryption algorithm. The receiving station decrypts the data from cipher text into clear text. The encryption key is a shared secret key that encrypts and decrypts messages.
DES
AH/ESP
ESP
Difffie-Hellman
42. Used in IPsec for two discreet purposes:
RSA
GRE
IPSEC
hash-based message authentication codes (HMAC).
43. 'is a more secure version of MD5 - and hash-based message authentication codes (HMAC) provides further security with the inclusion of a key-based hash.'
'MD5 - SHA-1 - or RSA'
DES
Tunneling
SHA
44. IPsec implements using a shim header between L2 and L3
AH/ESP
Difffie-Hellman
IPSEC (aggressive mode)
Asymetric Encryption Protocols
45. This mode does not support identity protection or protection against clogging attacks and spoofing.
IPSEC BENEFIT
IPSEC (aggressive mode)
3DES
DSA
46. 'requires that the sender and receiver have key pairs. By combining the sender
DES
RSA
Difffie-Hellman
DES
47. RFC 2631 on the workings of the key generation/exchange process.
3DES
Difffie-Hellman
MD5
AH/ESP
48. Is a two-phase protocol: The first phase establishes a secure authenticated channel and the second phase is where SAs are negotiated on behalf of the IPsec services.
AH/ESP
Tunneling
'DES - 3DES - or AES.'
IKE
49. IPSEC performs this function by using a sequence field in the IPsec header combined with integrity checks.
Difffie-Hellman
HMAC
IKE
Antireplay
50. Uses the D-H algorithm to come to agreement over a public network.
IPSEC (aggressive mode)
RSA
'IPSEC (phase1 -step1)'
IKE