SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Common key size is 1024 bits.
'MD5 - SHA-1 - or RSA'
IKE
RSA
ISAKMP
2. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
IPSEC (main mode)
Difffie-Hellman
DES
AH
3. Uses the D-H algorithm to come to agreement over a public network.
DSA
AH/ESP
HMAC
IKE
4. Act of encapsulating a packet within another packet.
AH
IKE
Tunneling
IPSEC (main mode)
5. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
ISAKMP
MD5
DES
AH/ESP
6. 'Developed in 1977 by Ronald Rivest - Adi Shamir - and Leonard Adleman (therefore - RSA).'
SHA
MD5
IKE
RSA
7. 'requires that the sender and receiver have key pairs. By combining the sender
HMAC
HMAC-MD5/HMAC-SHA
Difffie-Hellman
RSA
8. Main disadvantage of asymmetric algorithms is that they are slow.
RSA/DSA
RSA
'IPSEC (phase1 -step1)'
Hashing
9. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
Difffie-Hellman
IPSEC (aggressive mode)
IPSEC (main mode)
Asymetric Encryption Protocols
10. Where the original Layer 3 header and payload inside an IPsec packet is encapsulated. Tunnel mode does add overhead to each packet and uses some additional CPU resources.
IPSEC
3DES
Tunnel Mode (ipsec)
IPSEC (main mode)
11. ' is defined in RFC 3174. has as output a 160-bit value -'
IKE
'IPSEC (phase1 -step1)'
hash algorithms
SHA
12. 'DSA is roughly the same speed as RSA when creating signatures - but 10 to 40 times slower when verifying signatures. Because verification happens more frequently than creation - this issue is worth noting when deploying DSA in any environment.'
AH
Transport Mode (Ipsec)
DSA
'MD5 - SHA-1 - or RSA'
13. 'defines the mode of communication - creation - and management of security associations.'
RSA
IPSEC (aggressive mode)
ISAKMP
DSA
14. The receiving device then encrypts the data with the second key.
message authentication codes (MAC).
3DES
Hashing
Difffie-Hellman
15. 'produces a 160-bit hash output - which makes it more difficult to decipher.'
SHA
Hashing
IPSEC (aggressive mode)
RSA
16. Benefits are that the preshared authentication can be based on ID versus IP address and the speed of the process.
DSA
AH
IPSEC (aggressive mode)
IKE
17. 'Finally - the receiving devices decrypt the data with the first key.'
AES
Hashing
3DES
RSA
18. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
IPSEC (aggressive mode)
RSA/DSA
Transport Mode (Ipsec)
DES
19. The sending device encrypts for a final time with another 56-bit key.
3DES
'DES - 3DES - or AES.'
Antireplay
AH/ESP
20. Has a trailer which identifies IPsec information and ESP integrity-check information.
Difffie-Hellman
HMAC
AH/ESP
ESP
21. 'A 56-bit encryption algorithm - meaning the number of possible keys
DES
IKE
IKE
MD5
22. Integrity checks are done
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. Data integrity is the process of making sure data is not tampered with while it
IPSEC BENEFIT
3DES
HMAC-MD5/HMAC-SHA
ISAKMP
24. 'group 1 identifies a 768-bit key - group 1 is faster to execute - but it is less secure -'
Difffie-Hellman
3DES
DSA
IPSEC (aggressive mode)
25. More CPU intensive
hash-based message authentication codes (HMAC).
ISAKMP
SHA
ESP
26. IPSEC tunnels data through IP using one of two protocols?
AH/ESP
HMAC-MD5/HMAC-SHA
3DES
hash algorithms
27. Key exchange for IPSEC
IKE
Hashing
IPSEC (phase2)
RSA
28. Can be implemented efficiently on a wide range of processors and in hardware.
IKE
AES
HMAC-MD5/HMAC-SHA
IPSEC (main mode)
29. Does not provide payload encryption.
IPSEC (aggressive mode)
AH
3DES
AES
30. 'MACs with hash algorithms -'
hash-based message authentication codes (HMAC).
DES
IPSEC (main mode)
AES
31. 'can be achieved using one of three methods: preshared keys - encrypted nonces - or digital signatures.'
Hashing
MD5
Tunneling
Origin Auth (DH auth)
32. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. Provides authentication and encryption of the payload.
ESP
AH/ESP
'DES - 3DES - or AES.'
IKE
34. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
RSA
MD5
IPSEC (aggressive mode)
hash algorithms
35. 'key lengths are 128 - 192 - or 256 bits to encrypt blocks of equal length.'
RSA/DSA
SHA
AES
hash algorithms
36. Used for integrity checks on peer and data sent by peer and for authentication checks.
AH
'DES - 3DES - or AES.'
ISAKMP
RSA/DSA
37. 'has a Next Protocol field which identifies the next Layer 4 transport protocol in use - TCP or UDP'
3DES
IPSEC (aggressive mode)
AH/ESP
Difffie-Hellman
38. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
3DES
Difffie-Hellman
DSA
ESP
39. The protocol of choice for key management and establishing security associations between peers on the Internet.
IPSEC (main mode)
IPSEC (main mode)
ISAKMP
DES
40. ID exchange and authentication of D-H key by using the reply to the received nonce or string of bits
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. A variable block- length and key-length cipher.
DES
AES
IKE
Asymetric Encryption Protocols
42. Uses IKE for key exchange.
IKE
SHA
ISAKMP
Difffie-Hellman
43. You check it by hashing data and appending the hash value to the data as you send it across the network to a peer.
Hashing
Asymetric Encryption Protocols
HMAC
SHA
44. 'Digital signatures. Peer X encrypts a hash value with his private key and then sends the data to Peer Y. Peer Y obtains Peer X
AES
IPSEC (aggressive mode)
ISAKMP
RSA
45. 'in most cases - this mode is preferred with certificates.'
IPSEC BENEFIT
IPSEC (main mode)
Difffie-Hellman
IPSEC (aggressive mode)
46. IPsec implements using a shim header between L2 and L3
ISAKMP
hash-based message authentication codes (HMAC).
Antireplay
AH/ESP
47. 'The sending device decrypts the data with the second key - which is also 56 bits in length.'
RSA
3DES
'MD5 - SHA-1 - or RSA'
IKE
48. 'group 2 identifies a 1024-bit key - group 2 is more secure - but slower to execute.'
Hashing
Difffie-Hellman
3DES
Tunneling
49. DoS attacks are more probable with this mode.
AH
MD5
IPSEC (aggressive mode)
DES
50. Uses protocol number 50.
ESP
'IPSEC (phase1 -step1)'
IPSEC (phase2)
IPSEC (main mode)