SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 'often called public-key algorithms - do not rely on a randomly generated shared encryption key; instead - they create two static keys. These static keys are completely different - but mathematically bound to each other; what one key encrypts - the o
Antireplay
AH/ESP
IPSEC (aggressive mode)
Asymetric Encryption Protocols
2. 'requires that the sender and receiver have key pairs. By combining the sender
IPSEC (main mode)
3DES
HMAC-MD5/HMAC-SHA
Difffie-Hellman
3. 'group 2 identifies a 1024-bit key - group 2 is more secure - but slower to execute.'
'IPSEC (phase1 -step2)'
Difffie-Hellman
Asymetric Encryption Protocols
IPSEC (aggressive mode)
4. 'can be achieved using one of three methods: preshared keys - encrypted nonces - or digital signatures.'
Hashing
Origin Auth (DH auth)
AH/ESP
AH/ESP
5. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
AH/ESP
DSA
3DES
'IPSEC (phase1 -step2)'
6. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
3DES
'MD5 - SHA-1 - or RSA'
'IPSEC (phase1 -step2)'
DSA
7. 'The messages are authenticated - and the mechanisms that provide such integrity checks based on a secret key are usually called'
3DES
message authentication codes (MAC).
Hashing
DES
8. Drawback of this is that the hash is passed unencrypted and is susceptible to PSK crack attacks.
IPSEC (aggressive mode)
SHA
Hashing
AH/ESP
9. The receiving device then encrypts the data with the second key.
3DES
MD5
Asymetric Encryption Protocols
IKE
10. 'provides everything required to securely connect over a public media - such as the Internet.'
IPSEC
HMAC
3DES
IPSEC (aggressive mode)
11. Key exchange for IPSEC
Tunneling
AH/ESP
IKE
IPSEC (aggressive mode)
12. A
'MD5 - SHA-1 - or RSA'
IPSEC
Tunnel Mode (ipsec)
Hashing
13. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
IPSEC
DSA
MD5
SHA
14. Turns clear-text data into cipher text with an encryption algorithm. The receiving station decrypts the data from cipher text into clear text. The encryption key is a shared secret key that encrypts and decrypts messages.
3DES
Difffie-Hellman
DES
hash algorithms
15. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. The protocol of choice for key management and establishing security associations between peers on the Internet.
3DES
3DES
GRE
ISAKMP
17. 'Developed in 1977 by Ronald Rivest - Adi Shamir - and Leonard Adleman (therefore - RSA).'
RSA
Difffie-Hellman
Asymetric Encryption Protocols
IPSEC BENEFIT
18. IPSec SAs are negotiated and protected by the existing IPsec SA.
hash algorithms
IPSEC (phase2)
ESP
IPSEC (aggressive mode)
19. Does not provide payload encryption.
DSA
AH
DSA
DSA
20. You check it by hashing data and appending the hash value to the data as you send it across the network to a peer.
MD5
AH/ESP
Hashing
AH/ESP
21. Common key size is 1024 bits.
IKE
SHA
IPSEC (aggressive mode)
RSA
22. 'including Internet Security Association and Key Management Protocol (ISAKMP) - Secure Key Exchange Mechanism for the Internet (SKEME) - and Oakley.'
IKE
MD5
AH/ESP
IPSEC (main mode)
23. 'produces a 160-bit hash output - which makes it more difficult to decipher.'
SHA
RSA
HMAC-MD5/HMAC-SHA
DES
24. This mode does not support identity protection or protection against clogging attacks and spoofing.
message authentication codes (MAC).
DSA
IPSEC (aggressive mode)
IPSEC (main mode)
25. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
IPSEC (aggressive mode)
IPSEC BENEFIT
GRE
IKE
26. The receiving device decrypts the data with the third key.
Hashing
ESP
3DES
DES
27. Can be implemented efficiently on a wide range of processors and in hardware.
3DES
IPSEC (main mode)
IPSEC (main mode)
AES
28. It uses UDP 500 and is defined by RFC 2409.
IKE
IPSEC (phase2)
IPSEC BENEFIT
3DES
29. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. Invented by Ron Rivest of RSA Security (RFC 1321).
MD5
IKE
3DES
AES
31. RFC 2631 on the workings of the key generation/exchange process.
Difffie-Hellman
3DES
'MD5 - SHA-1 - or RSA'
DSA
32. 'key lengths are 128 - 192 - or 256 bits to encrypt blocks of equal length.'
Difffie-Hellman
AES
hash-based message authentication codes (HMAC).
IPSEC (aggressive mode)
33. That authenticate data packets and ensure that data is not tampered with or modified.
AH
hash algorithms
DSA
3DES
34. Used for integrity checks on peer and data sent by peer and for authentication checks.
'MD5 - SHA-1 - or RSA'
IPSEC
AES
AH
35. 'When using the hash-based key function -'
HMAC-MD5/HMAC-SHA
ISAKMP
Difffie-Hellman
Hashing
36. 'has a Next Protocol field which identifies the next Layer 4 transport protocol in use - TCP or UDP'
'IPSEC (phase1 -step1)'
IPSEC (main mode)
AH
AH/ESP
37. Origin authentication validates the origin of a message upon receipt; this process is done during initial communications.
IPSEC BENEFIT
AES
DES
'IPSEC (phase1 -step1)'
38. One of the most popular tunneling protocols is
3DES
IPSEC (main mode)
3DES
GRE
39. It also provides protection for ISAKMP peer identities with encryption.
AH/ESP
RSA
IPSEC (main mode)
AH/ESP
40. 'is a block-cipher algorithm - which means that it performs operations on fixed-length data streams of 64-bit blocks. The key ostensibly consists of 64 bits; however - only 56 are actually used by the algorithm.'
DES
Tunneling
Difffie-Hellman
ESP
41. Uses the D-H algorithm to come to agreement over a public network.
IKE
'IPSEC (phase1 -step1)'
Hashing
MD5
42. Provide authentication in Internet Key Exchange (IKE) Phase 2.
IPSEC (aggressive mode)
IPSEC (main mode)
HMAC
Hashing
43. 'group 5 identifies a 1536-bit key - provides for highest security but is the slowest of all groups.'
Hashing
SHA
DES
Difffie-Hellman
44. 'Digital signatures. Peer X encrypts a hash value with his private key and then sends the data to Peer Y. Peer Y obtains Peer X
RSA
IPSEC (main mode)
SHA
AH
45. 'Finally - the receiving devices decrypt the data with the first key.'
3DES
Hashing
Difffie-Hellman
'DES - 3DES - or AES.'
46. Used in government installs and was created to work with the SHA-1 hash algorithm.
RSA
DSA
'MD5 - SHA-1 - or RSA'
HMAC-MD5/HMAC-SHA
47. A variable block- length and key-length cipher.
AES
ESP
IPSEC (aggressive mode)
Asymetric Encryption Protocols
48. DoS attacks are more probable with this mode.
'IPSEC (phase1 -step1)'
Tunnel Mode (ipsec)
IPSEC (aggressive mode)
Hashing
49. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
Difffie-Hellman
Hashing
MD5
'IPSEC (phase1 -step2)'
50. 'in most cases - this mode is preferred with certificates.'
IPSEC (main mode)
IPSEC (aggressive mode)
MD5
DES