SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IPsec implements using a shim header between L2 and L3
AH/ESP
Hashing
IKE
Origin Auth (DH auth)
2. Uses the D-H algorithm to come to agreement over a public network.
ESP
HMAC
3DES
IKE
3. Main mode establishes ISAKMP security association in six messages and performs authenticated D-H exchange.
IPSEC (main mode)
Hashing
Hashing
IPSEC (aggressive mode)
4. 'defines the mode of communication - creation - and management of security associations.'
RSA
DSA
Difffie-Hellman
ISAKMP
5. Act of encapsulating a packet within another packet.
Tunneling
RSA/DSA
AH
IPSEC (main mode)
6. A variable block- length and key-length cipher.
AH
AES
ESP
'IPSEC (phase1 -step3)'
7. 'provides everything required to securely connect over a public media - such as the Internet.'
'MD5 - SHA-1 - or RSA'
Difffie-Hellman
ESP
IPSEC
8. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
Origin Auth (DH auth)
IKE
Difffie-Hellman
hash algorithms
10. 'often called public-key algorithms - do not rely on a randomly generated shared encryption key; instead - they create two static keys. These static keys are completely different - but mathematically bound to each other; what one key encrypts - the o
RSA
Asymetric Encryption Protocols
hash-based message authentication codes (HMAC).
IPSEC (main mode)
11. More CPU intensive
Difffie-Hellman
'IPSEC (phase1 -step2)'
IPSEC (phase2)
SHA
12. The DES algorithm that performs 3 times sequentially.
3DES
DSA
IKE
IPSEC BENEFIT
13. A
3DES
Hashing
HMAC-MD5/HMAC-SHA
IKE
14. 'in most cases - this mode is preferred with certificates.'
RSA
Difffie-Hellman
Difffie-Hellman
IPSEC (main mode)
15. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
DES
3DES
DSA
'IPSEC (phase1 -step2)'
16. Origin authentication validates the origin of a message upon receipt; this process is done during initial communications.
AH/ESP
IPSEC BENEFIT
hash-based message authentication codes (HMAC).
AH/ESP
17. 'DSA is roughly the same speed as RSA when creating signatures - but 10 to 40 times slower when verifying signatures. Because verification happens more frequently than creation - this issue is worth noting when deploying DSA in any environment.'
HMAC-MD5/HMAC-SHA
DSA
Tunnel Mode (ipsec)
Transport Mode (Ipsec)
18. It uses UDP 500 and is defined by RFC 2409.
DES
IKE
ISAKMP
HMAC
19. Drawback of this is that the hash is passed unencrypted and is susceptible to PSK crack attacks.
IPSEC (aggressive mode)
DES
SHA
AH/ESP
20. This mode does not support identity protection or protection against clogging attacks and spoofing.
DSA
3DES
ISAKMP
IPSEC (aggressive mode)
21. Provide authentication in Internet Key Exchange (IKE) Phase 2.
HMAC
Hashing
AH
RSA
22. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
message authentication codes (MAC).
IKE
3DES
IPSEC (aggressive mode)
23. 'Developed in 1977 by Ronald Rivest - Adi Shamir - and Leonard Adleman (therefore - RSA).'
IKE
hash-based message authentication codes (HMAC).
Hashing
RSA
24. 'A 56-bit encryption algorithm - meaning the number of possible keys
AES
ESP
Difffie-Hellman
DES
25. Data integrity is the process of making sure data is not tampered with while it
IPSEC (main mode)
IPSEC BENEFIT
ESP
IPSEC (main mode)
26. That authenticate data packets and ensure that data is not tampered with or modified.
DSA
HMAC-MD5/HMAC-SHA
hash algorithms
3DES
27. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
3DES
Difffie-Hellman
DSA
Hashing
28. It also provides protection for ISAKMP peer identities with encryption.
IPSEC (main mode)
AH/ESP
HMAC
Transport Mode (Ipsec)
29. 'When using the hash-based key function -'
DES
DSA
IPSEC
HMAC-MD5/HMAC-SHA
30. Benefits are that the preshared authentication can be based on ID versus IP address and the speed of the process.
hash-based message authentication codes (HMAC).
IKE
Difffie-Hellman
IPSEC (aggressive mode)
31. Has a trailer which identifies IPsec information and ESP integrity-check information.
IPSEC (main mode)
ESP
DES
SHA
32. Used in IPsec for two discreet purposes:
IKE
IPSEC (aggressive mode)
RSA
3DES
33. 'Finally - the receiving devices decrypt the data with the first key.'
3DES
MD5
Difffie-Hellman
'IPSEC (phase1 -step2)'
34. Invented by Ron Rivest of RSA Security (RFC 1321).
'DES - 3DES - or AES.'
HMAC-MD5/HMAC-SHA
MD5
3DES
35. Used for integrity checks on peer and data sent by peer and for authentication checks.
AH
IKE
IKE
IPSEC (phase2)
36. 'The sending device decrypts the data with the second key - which is also 56 bits in length.'
'IPSEC (phase1 -step3)'
3DES
Difffie-Hellman
DES
37. Verify whether the data has been altered.
message authentication codes (MAC).
Difffie-Hellman
Hashing
IKE
38. Common key size is 1024 bits.
RSA
AH/ESP
Difffie-Hellman
SHA
39. Integrity checks are done
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. 'Message digest algorithms have a drawback whereby a hacker (man in the middle) can intercept a message containing the packet and hash values - then re-create and transmit a modified packet with the same calculated hash to the target destination.'
3DES
DES
Hashing
IKE
41. 'key exchange is vulnerable to a man-in-the-middle attack. You can rectify this problem by allowing the two parties to authenticate themselves to each other with a shared secret key - digital signatures - or public-key certificates.'
3DES
Difffie-Hellman
IPSEC (main mode)
HMAC
42. Uses protocol number 50.
ESP
'IPSEC (phase1 -step3)'
IPSEC (aggressive mode)
Difffie-Hellman
43. 'has a Next Protocol field which identifies the next Layer 4 transport protocol in use - TCP or UDP'
ESP
RSA
IPSEC (aggressive mode)
AH/ESP
44. ' is defined in RFC 3174. has as output a 160-bit value -'
SHA
IKE
IPSEC (aggressive mode)
RSA
45. RFC 2631 on the workings of the key generation/exchange process.
Difffie-Hellman
IPSEC BENEFIT
IKE
'IPSEC (phase1 -step3)'
46. 'can be achieved using one of three methods: preshared keys - encrypted nonces - or digital signatures.'
Origin Auth (DH auth)
hash algorithms
SHA
RSA/DSA
47. 'is a more secure version of MD5 - and hash-based message authentication codes (HMAC) provides further security with the inclusion of a key-based hash.'
AH
SHA
DES
'MD5 - SHA-1 - or RSA'
48. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. 'Digital signatures. Peer X encrypts a hash value with his private key and then sends the data to Peer Y. Peer Y obtains Peer X
IPSEC BENEFIT
RSA
IKE
MD5
50. 'group 5 identifies a 1536-bit key - provides for highest security but is the slowest of all groups.'
Difffie-Hellman
IKE
IPSEC (main mode)
AH/ESP
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests