SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Main disadvantage of asymmetric algorithms is that they are slow.
hash algorithms
RSA/DSA
Difffie-Hellman
ISAKMP
2. The protocol of choice for key management and establishing security associations between peers on the Internet.
Difffie-Hellman
ISAKMP
3DES
Tunneling
3. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
IPSEC (main mode)
Origin Auth (DH auth)
IPSEC (aggressive mode)
Difffie-Hellman
4. 'can be achieved using one of three methods: preshared keys - encrypted nonces - or digital signatures.'
Origin Auth (DH auth)
SHA
RSA
Hashing
5. 'defines the mode of communication - creation - and management of security associations.'
ISAKMP
Hashing
DES
DSA
6. Turns clear-text data into cipher text with an encryption algorithm. The receiving station decrypts the data from cipher text into clear text. The encryption key is a shared secret key that encrypts and decrypts messages.
DES
AES
Difffie-Hellman
message authentication codes (MAC).
7. The DES algorithm that performs 3 times sequentially.
IKE
3DES
DES
AH/ESP
8. 'group 2 identifies a 1024-bit key - group 2 is more secure - but slower to execute.'
Difffie-Hellman
DES
DSA
IPSEC BENEFIT
9. IPSEC Encryption is performed by
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
10. Drawback of this is that the hash is passed unencrypted and is susceptible to PSK crack attacks.
Difffie-Hellman
IKE
RSA/DSA
IPSEC (aggressive mode)
11. Uses protocol number 51.
AH
AES
RSA
MD5
12. The sending device encrypts for a final time with another 56-bit key.
Tunneling
3DES
IKE
RSA
13. Data integrity is the process of making sure data is not tampered with while it
ISAKMP
Difffie-Hellman
AH
IPSEC BENEFIT
14. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
IPSEC
IPSEC (main mode)
RSA
MD5
15. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
Hashing
DES
MD5
IPSEC
16. IPSEC performs this function by using a sequence field in the IPsec header combined with integrity checks.
Asymetric Encryption Protocols
Antireplay
IPSEC BENEFIT
IPSEC (phase2)
17. 'produces a 160-bit hash output - which makes it more difficult to decipher.'
3DES
GRE
IPSEC
SHA
18. Verify whether the data has been altered.
hash algorithms
IPSEC (aggressive mode)
Asymetric Encryption Protocols
Hashing
19. 'DSA is roughly the same speed as RSA when creating signatures - but 10 to 40 times slower when verifying signatures. Because verification happens more frequently than creation - this issue is worth noting when deploying DSA in any environment.'
AES
'IPSEC (phase1 -step3)'
DSA
IPSEC (main mode)
20. This mode does not support identity protection or protection against clogging attacks and spoofing.
Hashing
AH
DES
IPSEC (aggressive mode)
21. 'requires that the sender and receiver have key pairs. By combining the sender
SHA
Difffie-Hellman
AH/ESP
hash algorithms
22. 'key exchange is vulnerable to a man-in-the-middle attack. You can rectify this problem by allowing the two parties to authenticate themselves to each other with a shared secret key - digital signatures - or public-key certificates.'
AH/ESP
IPSEC (main mode)
Difffie-Hellman
AH
23. Does not provide payload encryption.
AH
IPSEC
IKE
RSA
24. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
Transport Mode (Ipsec)
3DES
Antireplay
Origin Auth (DH auth)
25. 'Created by NIST in 1994 - is the algorithm used for digital signatures but not for encryption.'
DSA
SHA
IPSEC (main mode)
SHA
26. Common key size is 1024 bits.
Hashing
ESP
SHA
RSA
27. A variable block- length and key-length cipher.
AES
3DES
IPSEC (main mode)
IKE
28. Origin authentication validates the origin of a message upon receipt; this process is done during initial communications.
IPSEC BENEFIT
3DES
Difffie-Hellman
DSA
29. ID exchange and authentication of D-H key by using the reply to the received nonce or string of bits
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. Can be implemented efficiently on a wide range of processors and in hardware.
IPSEC (main mode)
ISAKMP
Difffie-Hellman
AES
31. Where the original Layer 3 header and payload inside an IPsec packet is encapsulated. Tunnel mode does add overhead to each packet and uses some additional CPU resources.
IPSEC BENEFIT
Tunnel Mode (ipsec)
AH
AES
32. 'provides everything required to securely connect over a public media - such as the Internet.'
IPSEC
IKE
IKE
Hashing
33. Provide authentication in Internet Key Exchange (IKE) Phase 2.
DSA
RSA
IPSEC (aggressive mode)
HMAC
34. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. That authenticate data packets and ensure that data is not tampered with or modified.
IPSEC (main mode)
'IPSEC (phase1 -step3)'
IPSEC (main mode)
hash algorithms
36. RFC 2631 on the workings of the key generation/exchange process.
SHA
Origin Auth (DH auth)
Difffie-Hellman
'IPSEC (phase1 -step3)'
37. 'key lengths are 128 - 192 - or 256 bits to encrypt blocks of equal length.'
3DES
AES
ESP
SHA
38. 'A 56-bit encryption algorithm - meaning the number of possible keys
HMAC
SHA
DES
'IPSEC (phase1 -step2)'
39. 'When using the hash-based key function -'
HMAC-MD5/HMAC-SHA
ESP
AES
IKE
40. Invented by Ron Rivest of RSA Security (RFC 1321).
3DES
IPSEC BENEFIT
AH/ESP
MD5
41. Is a two-phase protocol: The first phase establishes a secure authenticated channel and the second phase is where SAs are negotiated on behalf of the IPsec services.
3DES
AH/ESP
ESP
IKE
42. The receiving device then encrypts the data with the second key.
Hashing
IKE
3DES
Difffie-Hellman
43. ' is defined in RFC 3174. has as output a 160-bit value -'
IPSEC (main mode)
SHA
ISAKMP
RSA/DSA
44. One of the most popular tunneling protocols is
SHA
Hashing
AH/ESP
GRE
45. Integrity checks are done
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. IPsec implements using a shim header between L2 and L3
Tunnel Mode (ipsec)
GRE
Difffie-Hellman
AH/ESP
47. 'group 5 identifies a 1536-bit key - provides for highest security but is the slowest of all groups.'
3DES
Difffie-Hellman
'DES - 3DES - or AES.'
AH/ESP
48. Used for integrity checks on peer and data sent by peer and for authentication checks.
IKE
3DES
ISAKMP
AH
49. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
3DES
AH
GRE
Difffie-Hellman
50. 'Finally - the receiving devices decrypt the data with the first key.'
IPSEC (main mode)
Hashing
3DES
ESP